ResearchSpace

The utilisation of the deep web for military counter terrorist operations

Show simple item record

dc.contributor.author Aschmann, MJ
dc.contributor.author Leenen, Louise
dc.contributor.author Jansen van Vuuren, Johanna C
dc.date.accessioned 2017-06-07T08:05:41Z
dc.date.available 2017-06-07T08:05:41Z
dc.date.issued 2017-03
dc.identifier.citation Aschmann, M.J., Leenen, L. and Jansen van Vuuren, J.C. 2017. The utilisation of the deep web for military counter terrorist operations. International Conference on Cyber Warfare and Security, Dayton, Ohio, USA, 2-3 March 2017, p. 15-22. en_US
dc.identifier.isbn 978-1-911218-26-5
dc.identifier.issn 2048-9889
dc.identifier.uri https://books.google.co.za/books?id=uYiRDgAAQBAJ&pg=PA15&lpg=PA15&dq=The+utilisation+of+the+deep+web+for+military+counter+terrorist+operations&source=bl&ots=gJX3F3d8iA&sig=Udilto-eGpS1xg1_eDfIbrJj-2A&hl=en&sa=X&ved=0ahUKEwignM2i0pfUAhVEIcAKHSOnAPcQ6AEIJTAC#v=onepage&q=The%20utilisation%20of%20the%20deep%20web%20for%20military%20counter%20terrorist%20operations&f=false
dc.identifier.uri https://www.researchgate.net/publication/315656270_THE_UTILISATION_OF_THE_DEEP_WEB_FOR_MILITARY_COUNTER_TERRORIST_OPERATIONS
dc.identifier.uri http://www.academic-bookshop.com/ourshop/prod_6044993-ICCWS-2017-Proceedings-of-12th-International-Conference-on-Cyber-Warfare-and-Security.html
dc.identifier.uri http://hdl.handle.net/10204/9261
dc.description International Conference on Cyber Warfare and Security, Dayton, Ohio, USA, 2-3 March 2017. Copyright: The Authors 2017. en_US
dc.description.abstract The Internet offers anonymity and a disregard of national boundaries. Most countries are deeply concerned about the threat cyberspace and in particular, cyberterrorism, are posing to national security. The Deep and Dark Web is associated with anonymity, covert communications and trade. This brings to the table a new opportunity for organised crime and terrorist organisations to trade, communicate, plan and organise specific strikes or market their future activities. Simultaneously, this has opened military operations to a new facet of collecting and processing information to gain an advantage over an adversary who wants to remain anonymous and unseen, especially in the intelligence realm. The military of any nation must be on the forefront in protecting and defending its citizens from these types of threats. Asymmetrical use of the Deep and Dark Web has allowed for rogue actions to take place in which the military has a responsibility to strike back at terrorist organisations who threaten the safety of its citizens. There is a need for new methods and approaches for military forces to plan and conduct counter cyberterrorism operations. This paper gives an overview of using the Deep and Dark Web in military counter terrorist operations, presents an adaptation of the “Cyber Kill Chain” methodology aimed at gathering information for cyber counter terrorist operations, and presents a rudimentary approach to incorporate cyber counter terrorist operations with military terrorist operations. en_US
dc.language.iso en en_US
dc.publisher Academic Conferences and Publishing Limited en_US
dc.relation.ispartofseries Worklist;18774
dc.subject Deep web en_US
dc.subject Dark web en_US
dc.subject Counter-terrorism en_US
dc.subject Cyber offensive en_US
dc.title The utilisation of the deep web for military counter terrorist operations en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Aschmann, M., Leenen, L., & Jansen van Vuuren, J. C. (2017). The utilisation of the deep web for military counter terrorist operations. Academic Conferences and Publishing Limited. http://hdl.handle.net/10204/9261 en_ZA
dc.identifier.chicagocitation Aschmann, MJ, Louise Leenen, and Johanna C Jansen van Vuuren. "The utilisation of the deep web for military counter terrorist operations." (2017): http://hdl.handle.net/10204/9261 en_ZA
dc.identifier.vancouvercitation Aschmann M, Leenen L, Jansen van Vuuren JC, The utilisation of the deep web for military counter terrorist operations; Academic Conferences and Publishing Limited; 2017. http://hdl.handle.net/10204/9261 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Aschmann, MJ AU - Leenen, Louise AU - Jansen van Vuuren, Johanna C AB - The Internet offers anonymity and a disregard of national boundaries. Most countries are deeply concerned about the threat cyberspace and in particular, cyberterrorism, are posing to national security. The Deep and Dark Web is associated with anonymity, covert communications and trade. This brings to the table a new opportunity for organised crime and terrorist organisations to trade, communicate, plan and organise specific strikes or market their future activities. Simultaneously, this has opened military operations to a new facet of collecting and processing information to gain an advantage over an adversary who wants to remain anonymous and unseen, especially in the intelligence realm. The military of any nation must be on the forefront in protecting and defending its citizens from these types of threats. Asymmetrical use of the Deep and Dark Web has allowed for rogue actions to take place in which the military has a responsibility to strike back at terrorist organisations who threaten the safety of its citizens. There is a need for new methods and approaches for military forces to plan and conduct counter cyberterrorism operations. This paper gives an overview of using the Deep and Dark Web in military counter terrorist operations, presents an adaptation of the “Cyber Kill Chain” methodology aimed at gathering information for cyber counter terrorist operations, and presents a rudimentary approach to incorporate cyber counter terrorist operations with military terrorist operations. DA - 2017-03 DB - ResearchSpace DP - CSIR KW - Deep web KW - Dark web KW - Counter-terrorism KW - Cyber offensive LK - https://researchspace.csir.co.za PY - 2017 SM - 978-1-911218-26-5 SM - 2048-9889 T1 - The utilisation of the deep web for military counter terrorist operations TI - The utilisation of the deep web for military counter terrorist operations UR - http://hdl.handle.net/10204/9261 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record