Cyber-Herding: Exploiting Islamic Extremists Use of the Internet
Abstract
The internet has many characteristics that support extremists' information operations, such as being able to reach large audiences. Yet the internet also has inherent weaknesses that can be exploited. One of these weaknesses is the ambiguous nature of the net. You trust that when you go to a website that it is legitimate. If it looks professional, you tend to believe that the site is real. However, criminals or terrorists could just as easily be running that website. The same is true when you chat with someone online. […]. Terrorist organizations also have an inherent weakness that can be exploited using the internet. This weakness is the decentralized nature of terrorist organizations. Many terrorist organizations that do not have state sponsorship organize and accomplish work utilizing social networks versus a hierarchy command structure. This only makes sense. Individuals engaged in criminal activities need to work with people they trust so they can accomplish their mission. In the physical world, social networks are very reliable. However, in the virtual world social networks can be exploited because personalities in the virtual world can be real or fictitious. In order to exploit these weaknesses, a cyber system that invisibly drives Islamic extremists from terrorist websites to covertly controlled websites can be developed. I will generically refer to this system as cyber-herding.
Rights
NACollections
Related items
Showing items related by title, author, creator and subject.
-
Fake news, conspiracy theories, and lies: an information laundering model for homeland security
Korta, Samantha M. (Monterey, California: Naval Postgraduate School, 2018-03);The purpose of this research, broadly speaking, is to expose the threat that fake news poses to our national security. This thesis answers the question: Can the information laundering model, or a modified version of it, ... -
A best effort traffic management solution for server and agent-based active network management (SAAM)
Wofford, Corey D. (Monterey, California. Naval Postgraduate School, 2002-03);Server and Agent-based Active Network Management (SAAM) is a promising network management solution for the Internet of tomorrow, "Next Generation Internet (NGI)." SAAM is a new network architecture that incorporates many ... -
Internetworking: economical storage and retrieval of digital audio and video for distance learning
Tiddy, Michael E. (Monterey, California. Naval Postgraduate School, 1996-09);Previous research has shown that it is possible to use the Internet's Multicast Backbone (MBone) and associated audio/video software for the purpose of Distance Learning. As more education is performed online, the need ...