Responses to Cyber TerrorismLooks at the difficulty of arriving at a definition of cyber terrorism. This publication examines cyber terrorism in the proper sense of the term and how to respond in terms of technology, awareness, and legal/political measures. However, there is also the related question of responding to the terrorist presence on the Internet. |
Contents
The Interwoven Domain of Enabling Technologies and Cultural Interaction | 1 |
Institutionalization of a WebFocused Multinational CounterTerrorism Campaign Building a Collective Open Source Intelligent System | 8 |
Critical Information Infrastructure Protection | 24 |
Use of the Internet by Terrorists | 34 |
The Reliance of alQaeda on the Internet | 61 |
General Overview of the Available Mechanisms to Facilitate an Overwhelming Task | 70 |
International Coordination of Prosecution and Prevention of Cyber Terrorism | 89 |
The Internet as a Tool for Intelligence and CounterTerrorism | 104 |
NATO and Cyber Terrorism | 118 |
Analysis of PKKKONGRAGEL Websites to Identify Points of Vulnerability | 127 |
Summary of the Working Group Discussions | 142 |
145 | |
Other editions - View all
Common terms and phrases
action activities agencies aims allow analysis approach areas authorities become bomb cause collection communication connections considered Convention cooperation Council countries create crime criminal critical cyber attacks cybercrime cyberspace cyberterrorism Defense definition direct discussion effective especially established Estonia Europe European example give global identify important individual information systems infrastructure institutions intelligence interest Internet involvement issues jihad last visited law enforcement March mass means measures methods monitoring movement operations organizations participants physical PKK/KONGRA-GEL political possible potential present Press problems protection Qaeda recruits require response result Retrieved September 2007 servers terrorism terrorist terrorist organizations threat Turkish United users vulnerabilities websites