Cyber Mobs, Disinformation, And Death Videos: The Internet As It Is (and As It Should Be)
September 18, 2023
Nick Drnaso’s graphic novel Sabrina provides a powerful snapshot of online norms. The picture is not pretty. A young woman goes missing. Her grief-struck boyfriend cannot bear to stay in their home and escapes to a friend’s house. Her sister struggles with the pain of her loss. We learn that the woman’s neighbor, a misogynist ...
Briefing Note ‘El Rubio’ Lives: The Challenge Of Arabic Language Extremist Content On Social Media Platforms
September 18, 2023
This briefing outlines research uncovering thousands of users viewing extremist content in Arabic language across mainstream social platforms including Facebook and YouTube. The findings emerged as world leaders, policymakers, and technology companies gathered in Jordan earlier this month to discuss counter-terrorism and extremism as part of the Aqaba Process and the convening of the Global ...
Social Media and Terrorist Financing: What are the Vulnerabilities and How Could Public and Private Sectors Collaborate Better?
September 18, 2023
• Social media companies should recognise the political importance of counterterrorist financing (CTF) by explicitly reflecting the priorities of the UN Security Council and the Financial Action Task Force (FATF) in their policies, strategies and transparency reports. • Furthermore, social media companies identified as being at high risk of exploitation should update their terms of ...
The Hunt For The Paper Tiger: The Social Construction Of Cyberterrorism
September 18, 2023
For two decades, there has been a high-profile debate on the issue of cyberterrorism. Politicians, law enforcement agents, the information security industry, other experts and the press have all made claims about the threats to and vulnerabilities in our society, who is responsible and what should be done. This is a UK study in the ...
The Effectiveness Of The Principle Of Distinction In The Context Of Cyber Warfare
September 18, 2023
International humanitarian law provides foundational norms which are to be observed by states in order to protect civilians from the harsh realities of war. These norms have been applied to traditional kinetic methods of warfare but as technology advances at a rapid pace so too do methods of warfare. As weaponry becomes more sophisticated it ...
Knowledge And Perceptions Of Cyberterrorism
September 18, 2023
While the threat of terrorists utilizing the Internet to execute a cyberterrorist attack is of prominent concern there exist great misconceptions and factual errors in the media as to the nature of this threat (Conway, 2002; Embar-Seddon, 2002; Weimann, 2005). This thesis examined media exposure, knowledge of cyberterrorism, fear of terrorism and perceived seriousness of ...
New Zealand Government And Critical Infrastructure Ready Reaction To Cyber Terrorism
September 18, 2023
The purpose of this research is to obtain input from government agencies, elements of the critical infrastructure and cyber space, to determine what level of knowledge on cyber terrorism exists. Furthermore, are there ready reaction plans in place, and is staff-awareness training conducted on a regular basis? This probably won’t prevent or stop an attack ...
Call Of Duty Jihad: How The Video Game Motif Has Migrated Downstream From Islamic State Propaganda Videos
September 18, 2023
From a technical standpoint, Islamic State (IS) videos are demonstrably superior to those of other groups. But as time goes by, their aesthetic is migrating downstream as other groups attempt to copy it. Specifically, IS has turned to video games, regularly mimicking and even directly copying the aesthetic and design of First Person Shooter games, ...
Design And Control Of Resilient Interconnected Microgrids For Reliable Mass Transit Systems
September 18, 2023
Mass transit systems are relied on a daily basis to transport millions of passengers and bring billions of dollars’ worth of economic goods to market. While some forms of mass transit rely on a fuel, electrified railway systems are dependent on the electric grid. The electric grid is becoming more vulnerable to disruptions, due to ...
Cyberterrorism Cyber Prevention Vs Cyber Recovery
September 18, 2023
The technological age has forced the U.S. to engage a new set of national security challenges. Several potential adversaries have cyberspace capabilities comparable to those of the U.S., and are constantly conducting surveillance, gathering technical information, and mapping critical nodes that could be exploited in future conflicts. How can the U.S. government best defend against ...