Content area

Abstract

The Internet offers anonymity and a disregard of national boundaries. Most countries are deeply concerned about the threat cyberspace and in particular, cyberterrorism, are posing to national security. The Deep and Dark Web is associated with anonymity, covert communications and trade. This brings to the table a new opportunity for organised crime and terrorist organisations to trade, communicate, plan and organise specific strikes or market their future activities. Simultaneously, this has opened military operations to a new facet of collecting and processing information to gain an advantage over an adversary who wants to remain anonymous and unseen, especially in the intelligence realm. The military of any nation must be on the forefront in protecting and defending its citizens from these types of threats. Asymmetrical use of the Deep and Dark Web has allowed for rogue actions to take place in which the military has a responsibility to strike back at terrorist organisations who threaten the safety of its citizens. There is a need for new methods and approaches for military forces to plan and conduct counter cyberterrorism operations. This paper gives an overview of using the Deep and Dark Web in military counter terrorist operations, presents an adaptation of the "Cyber Kill Chain" methodology aimed at gathering information for cyber counter terrorist operations, and presents a rudimentary approach to incorporate cyber counter terrorist operations with military terrorist operations.

Details

Title
The Utilisation of the Deep Web for Military Counter Terrorist Operations
Pages
15-XIV
Number of pages
9
Publication year
2017
Publication date
2017
Publisher
Academic Conferences International Limited
Place of publication
Reading
Country of publication
United Kingdom
Publication subject
Source type
Conference Paper
Language of publication
English
Document type
Conference Proceedings
Document feature
References; Illustrations
ProQuest document ID
1897672713
Document URL
https://www.proquest.com/conference-papers-proceedings/utilisation-deep-web-military-counter-terrorist/docview/1897672713/se-2?accountid=208611
Copyright
Copyright Academic Conferences International Limited 2017
Last updated
2025-11-14
Database
2 databases
  • ProQuest One Academic
  • ProQuest One Academic