Fighting Terror in CyberspaceAs became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack against the communication infrastructure is low. However, this situation may change abruptly once the terrorists decide that the Net does not serve their purposes anymore and, like any other invention of our civilization, deserves destruction.Fighting Terror in Cyberspace is a unique volume, which provides, for the first time, a comprehensive overview of terrorist threats in cyberspace along with state-of-the-art tools and technologies that can deal with these threats in the present and in the future. The book covers several key topics in cyber warfare such as terrorist use of the Internet, the Cyber Jihad, data mining tools and techniques of terrorist detection on the web, analysis and detection of terror financing, and automated identification of terrorist web sites in multiple languages. The contributors include leading researchers on international terrorism, as well as distinguished experts in information security and cyber intelligence. This book represents a valuable source of information for academic researchers, law enforcement and intelligence experts, and industry consultants who are involved in detection, analysis, and prevention of terrorist activities on the Internet. |
What people are saying - Write a review
We haven't found any reviews in the usual places.
Contents
| 1 | |
| 27 | |
| 39 | |
| 59 | |
| 73 | |
Bibliography | 89 |
Bibliography | 103 |
Analysis of Financial Intelligence and the Detection | 105 |
Identification of Terrorist Web Sites with CrossLingual | 117 |
Bibliography | 143 |
About the Authors | 157 |
Other editions - View all
Common terms and phrases
abnormal accounts activity agents algorithm analysis applications approach Arabic associated attacks become behavior called centroid Chapter classification cluster collection communications compared concept cyber cyberspace data mining defined Department detection developed document e-mail encryption Engineering evaluated example experts extraction files frequency funds Fuzzy given graph important Institute intelligence interests International Internet Israel issues key phrase Knowledge known language Last learning means measure method mode monitoring Name nodes normal normal user operations organizations patterns performance personalization possible presented problem Proc relevant Report represent representation Retrieval similarity sub-graph techniques terror terrorist testing threats tion topic transactions transfers trend United University users vectors
Popular passages
Page 43 - Knowledge discovery in databases (KDD) is the non-trivial process of identifying valid, novel, potentially useful, and ultimately understandable patterns in data [1].
Page 33 - To be more precise, netwar refers to an emerging mode of conflict and crime at societal levels, involving measures short of traditional war, in which the protagonists use network forms of organization and related doctrines, strategies, and technologies attuned to the information age. These protagonists are likely to consist of dispersed small groups who communicate, coordinate, and conduct their campaigns in an internetted manner, without a precise central command.
Page 32 - In a legal sense, information terrorism can be the intentional abuse of a digital information system, network or component toward an end that supports or facilitates a terrorist campaign or action.
Page 159 - ... and research monographs in the field. Dr. Kandel is a Fellow of the ACM, Fellow of the IEEE, Fellow of the New York Academy of Sciences, Fellow of AAAS, Fellow of IFSA, as well as a member of NAFIPS, IAPR, ASEE, and Sigma-Xi. Dr. Kandel has been awarded the College of Engineering Outstanding Research Award, USF, 1993-94; Sigma-Xi Outstanding Faculty Researcher Award, 1995; The Theodore and Venette-Askounes Ashford Distinguished Scholar Award, USF, 1995; MOISIL International Foundation Gold Medal...
Page 159 - Fuzziness and its Applications. Dr. Kandel has published over 500 research papers for numerous professional publications in Computer Science and Engineering. He is also the author, co-author, editor or co-editor of 46 text books and research monographs in the field. Dr. Kandel is a Fellow of the ACM, Fellow of the IEEE, Fellow of the New York Academy of Sciences, Fellow of AAAS, Fellow of IFSA, as well as a member of NAFIPS, IAPR, ASEE, and Sigma-Xi. Dr. Kandel has been awarded the...
