Chapter 3 Internet Forensics and Combating Terrorism
2013
Abstract
AI
AI
Chapter 3 discusses the impact of the Internet on modern lifestyle, highlighting its utility and the associated risks, particularly concerning terrorist activities. It emphasizes the role of the Internet in facilitating the spread of extremist ideologies, recruitment, and communication among terrorists. The chapter also addresses the emerging threat of cyber terrorism, pointing out the vulnerability of societies to extremist recruitment during economic downturns, and calls for establishing international legal frameworks to regulate the Internet and safeguard against its misuse for terrorist purposes.
References (20)
- Abu 'Amr al-Qa'idi, A Course in the Art of Recruitment, http://revolution.thabaat.net/?p=964.
- Krunoslav Antoliš, "Information & Organization Prerequisites for Combating Terrorism," Vojaškošolski zbornik, no.4 (December 2005): 51- 65.
- Krunoslav Antoliš, Presentation at CTWG conference, PfP Consortium, 14- 17 November 2004, Oberammergau, Germany.
- Krunoslav Antoliš, "Prerequisites for Systematic Fighting Terrorism," Croatian International Relations Review XI, no. 40/41 (July/December 2005, Zagreb, Croatia): 121-125.
- Krunoslav Antoliš, "The National Strategy for the Prevention and Suppression of Terrorism," Police & Security, CODEN POSIE9, No. 1/90 (January/February, 2009), Zagreb, Croatia, pp.150-153.
- Michael Chertoff, "5-year Terrorism Threats Forecast for U.S.," www.msnbc.msn.com/id/28387496.
- James J.F. Forest, "Exploiting the Fears of Al-Qaeda's Leadership," http://ctc.usma.edu/default.asp.
- Thomas Frank, "Feds consider searches of terrorism blogs," www.usatoday.com/news1/washington/2008-12-23-terrorblogs_N.htm.
- John Goetz, Marcel Rosenbach, and Alexander Szandar, "National Defense in Cyberspace," www.spiegel.de/international/germany/0,1518,606 987,00.html.
- Michael Lipin, "Al-Qaeda Seeks to Capitalize on Global Financial Crisis," www.voanews.com/english/archive/2008-11/2008-11-21-voa3.cfm? CFID=176543362&CFTOKEN=41072727&jsessionid=663020f2a6352b1 7c1a936233246256a1650.
- Brent MacLean, "Terrorism and Internet Use," www.canadafreepress.com/ 2007/internet-security092107.htm.
- Sun Tzu, The Art of War, www.chinapage.com/sunzi-e.html.
- Gabriel Weimann, "How Modern Terrorism Uses the Internet," The United States Institute of Peace, www.usip.org/pubs/specialreports/ sr116.html.
- The map of United states of Islam, http://littlegreenfootballs.com/ weblog/?entry=14952&only
- A Jihadist's Course in the Art of Recruitment, http://revolution.thabaat.net/?p=964.
- US Officials, "Recession Could Fuel Right-Wing Extremism," By VOA News, 15 April 2009, www.voanews.com/english/2009-04-15-voa27.cfm.
- National Strategy for Prevention and Suppression of Terrorism of the Republic of Croatia, Nn no. 139, 3 December 2008.
- EU Convention on Cybercrime, Nn no. 09/2002.
- The Information Security Act, Nn no. 79/2007.
- Amendments to the Penal Code and to the Criminal Procedure Act, Nn no. 152/2008.
Krunoslav Antoliš