The Role of Honeypots and Sabotage in State-Based Operations Against Online Jihadism, 2001-2020
September 18, 2023
This article offers a descriptive analysis of intelligence operations carried out by the United States and its allies against the presence of jihadist groups on the Internet during the period 2001–2020. In contrast to actions aimed at eliminating the virtual spaces in which terrorists operate, the intelligence operations analysed here are designed to erode terrorists’ ...
Confronting Cyberterrorism With Cyber Deception
September 18, 2023
This thesis concerns the possibility of deceiving cyberterrorists using defensive deception methods. As cyberspace today is a battleground for myriad cyber attacks and intrusions, it may only be a matter of time before terrorists choose to advance their deadly cause in cyberspace. We explore some of the questions raised regarding the threat of cyberterrorism by ...
The Threat Of Cyberterrorism: Contemporary Consequences And Prescriptions
September 18, 2023
This study researches the varying threats that emanate from terrorists who carry their activity into the online arena. It examines several elements of this threat. First, it explores elements of virtual to virtual attacks. Second, it looks at threats against critical infrastructures that can be traced to online sources. Third, this thesis reports on ways ...