Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Terrorism

Australian Information Warfare and Security Conference

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Is The Internet The Main Medium Of Transmitting Terrorism?, Hatem El Zein Jan 2015

Is The Internet The Main Medium Of Transmitting Terrorism?, Hatem El Zein

Australian Information Warfare and Security Conference

The influx of virtual media platforms has allowed extremists and terrorists to transmit their messages to wider audiences without passing through a gatekeeper or being a subject to editorial policies existed in traditional media outlets. Thus, extremists and terrorists exploit virtual media platforms to report their actions; propagate their ideologies and ultimately to boost their objectives, because these mediums enabled them to have control over time and space. As a result, some governments work to deprive extremists and terrorists from this 'oxygen' through monitoring the cyberspace to block the suspected virtual media platforms. The reactions of some governments to face …


Virtual Radicalisation: Challenges For Police, Simon O'Rourke Dec 2007

Virtual Radicalisation: Challenges For Police, Simon O'Rourke

Australian Information Warfare and Security Conference

Recent advances in communications technology are providing a medium for individuals or groups to subscribe to extremist worldviews and form networks, access training and obtain information, whilst remaining virtually undetected in the online world. Whilst the Internet is facilitating global virtual communities like Second Life, MySpace and Facebook it is also providing an anonymous meeting place for disenfranchised individuals to gather, share ideas, post and exchange information regarding their particular ideology. This virtual community provides a sense of belonging to a global cause in which the actions of an individual can be aligned to, and seen to contribute towards something …


Global Reach: Terrorists And The Internet, Simon O'Rourke Apr 2006

Global Reach: Terrorists And The Internet, Simon O'Rourke

Australian Information Warfare and Security Conference

The use of the Internet by terrorists appears to diverge into two distinct modes neither of which is mutually exclusive. The first aligns to the view that terrorists will use the Internet as a platform to launch cyber attacks against critical infrastructure nodes as well as key government and private sector networks. This paper discusses the alternate mode that being the primary use of the Internet by terrorists will be to recruit, train, communicate and gain information about potential targets by conducting virtual reconnaissance. It will examine the nexus between the virtual world and the physical threat that is manifested …


Information Terrorism In The New Security Environment, Ken Webb Apr 2006

Information Terrorism In The New Security Environment, Ken Webb

Australian Information Warfare and Security Conference

Over the years there have been many interpretations of what constitutes Information Terrorism. This paper examines the correlation/relationship between Information Warfare and Terrorism, and describes what is considered to be Information Terrorism now. It achieves this by outlining the threat’s impact, advantage and capability. It then examines the positives that can be derived from such and, based on the literature available on the subject, provides a deduced interpretation of what Information Terrorism is. The paper concludes with remarks supporting the assertion that Information Terrorism is a major dynamic and asymmetric threat contributing to a new national security environment.