Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath Jan 2023

Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath

Pepperdine Law Review

The United States faces a grave challenge in its fight against cyberattacks from abroad. Chief among the foreign cyber threats comes from a finite number of “ransomware-as-a-service” gangs, which are responsible for extorting billions of dollars from American citizens and companies annually. Prosecuting these cybercriminals has proven exceedingly difficult. Law enforcement often struggles to forensically trace ransomware attacks, which makes identifying and prosecuting the perpetrators challenging. Moreover, even when prosecutors can identify the perpetrators of these attacks, the ransomware gangs are headquartered in foreign adversarial nations that do not extradite criminals to the United States. Finally, ransomware gangs are governed …


Tweeting Terror: Evaluating Changes To The Terror Recruitment And Radicalization Process In The Age Of Social Media, Jackson T. Grasz May 2021

Tweeting Terror: Evaluating Changes To The Terror Recruitment And Radicalization Process In The Age Of Social Media, Jackson T. Grasz

Pepperdine Policy Review

The 2019 terror attack in Christchurch, New Zealand shocked the world as a lone gunman claimed the lives of more than fifty Muslin men, women, and children. As the nation grieved and security experts searched for answers, old notions of how and why terrorism occurs began to crumble. It became clear that this attack, perpetrated by a white supremacist, was born of and carried out for a new digital age. What set this terror attack apart was the centrality of social media to the radicalization and motivation of the lone assailant. In light of this development, this paper evaluates the …


Much Ado About Cyber-Space: Cyber-Terrorism And The Reformation Of The Cyber-Security, Christian Pedersen Jan 2014

Much Ado About Cyber-Space: Cyber-Terrorism And The Reformation Of The Cyber-Security, Christian Pedersen

Pepperdine Policy Review

The threats residing in cyber-space are becoming well understood by policymakers and security experts alike. However, cyber-security defenses and strategies cannot solely be directed towards nation states, as non-governmental actors – such as transnational crime groups and terrorist organizations are becoming increasingly reliant upon internet technologies. Attacks on the digital components of the critical infrastructure, have the potential to unleash devastation on the United States. In a time when reliability and ethnicity of the National Security Administration, the Nation’s leading digital intelligence organization, are becoming increasingly questioned; defensive measures need to be improved to prevent future attacks and improve the …


Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston Jan 2007

Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston

Global Tides

Adversarial influence operations perpetrated by Islamist terrorist networks confront the most foundational of America’s national defense capabilities: the will of the American people to fight. This assertion is predicated on four key determinations. First, Islamist terrorist networks use influence operations as an integral tool of global jihad. Second, these adversarial influence operations should be perceived as attacks and, subsequently, should demand response. Third, a wide array of US Government tools and institutions currently exists to counter this challenge. Fourth, precision-strike doctrine and cyber-attack response frameworks provide instructional examples of methods to create a coordinated US Government response to such influence …