Aschmann, MJLeenen, LouiseJansen van Vuuren, Johanna C2017-06-072017-06-072017-03Aschmann, M.J., Leenen, L. and Jansen van Vuuren, J.C. 2017. The utilisation of the deep web for military counter terrorist operations. International Conference on Cyber Warfare and Security, Dayton, Ohio, USA, 2-3 March 2017, p. 15-22.978-1-911218-26-52048-9889https://books.google.co.za/books?id=uYiRDgAAQBAJ&pg=PA15&lpg=PA15&dq=The+utilisation+of+the+deep+web+for+military+counter+terrorist+operations&source=bl&ots=gJX3F3d8iA&sig=Udilto-eGpS1xg1_eDfIbrJj-2A&hl=en&sa=X&ved=0ahUKEwignM2i0pfUAhVEIcAKHSOnAPcQ6AEIJTAC#v=onepage&q=The%20utilisation%20of%20the%20deep%20web%20for%20military%20counter%20terrorist%20operations&f=falsehttps://www.researchgate.net/publication/315656270_THE_UTILISATION_OF_THE_DEEP_WEB_FOR_MILITARY_COUNTER_TERRORIST_OPERATIONShttp://www.academic-bookshop.com/ourshop/prod_6044993-ICCWS-2017-Proceedings-of-12th-International-Conference-on-Cyber-Warfare-and-Security.htmlhttp://hdl.handle.net/10204/9261International Conference on Cyber Warfare and Security, Dayton, Ohio, USA, 2-3 March 2017. Copyright: The Authors 2017.The Internet offers anonymity and a disregard of national boundaries. Most countries are deeply concerned about the threat cyberspace and in particular, cyberterrorism, are posing to national security. The Deep and Dark Web is associated with anonymity, covert communications and trade. This brings to the table a new opportunity for organised crime and terrorist organisations to trade, communicate, plan and organise specific strikes or market their future activities. Simultaneously, this has opened military operations to a new facet of collecting and processing information to gain an advantage over an adversary who wants to remain anonymous and unseen, especially in the intelligence realm. The military of any nation must be on the forefront in protecting and defending its citizens from these types of threats. Asymmetrical use of the Deep and Dark Web has allowed for rogue actions to take place in which the military has a responsibility to strike back at terrorist organisations who threaten the safety of its citizens. There is a need for new methods and approaches for military forces to plan and conduct counter cyberterrorism operations. This paper gives an overview of using the Deep and Dark Web in military counter terrorist operations, presents an adaptation of the “Cyber Kill Chain” methodology aimed at gathering information for cyber counter terrorist operations, and presents a rudimentary approach to incorporate cyber counter terrorist operations with military terrorist operations.enDeep webDark webCounter-terrorismCyber offensiveThe utilisation of the deep web for military counter terrorist operationsConference PresentationAschmann, M., Leenen, L., & Jansen van Vuuren, J. C. (2017). The utilisation of the deep web for military counter terrorist operations. Academic Conferences and Publishing Limited. http://hdl.handle.net/10204/9261Aschmann, MJ, Louise Leenen, and Johanna C Jansen van Vuuren. "The utilisation of the deep web for military counter terrorist operations." (2017): http://hdl.handle.net/10204/9261Aschmann M, Leenen L, Jansen van Vuuren JC, The utilisation of the deep web for military counter terrorist operations; Academic Conferences and Publishing Limited; 2017. http://hdl.handle.net/10204/9261 .TY - Conference Presentation AU - Aschmann, MJ AU - Leenen, Louise AU - Jansen van Vuuren, Johanna C AB - The Internet offers anonymity and a disregard of national boundaries. Most countries are deeply concerned about the threat cyberspace and in particular, cyberterrorism, are posing to national security. The Deep and Dark Web is associated with anonymity, covert communications and trade. This brings to the table a new opportunity for organised crime and terrorist organisations to trade, communicate, plan and organise specific strikes or market their future activities. Simultaneously, this has opened military operations to a new facet of collecting and processing information to gain an advantage over an adversary who wants to remain anonymous and unseen, especially in the intelligence realm. The military of any nation must be on the forefront in protecting and defending its citizens from these types of threats. Asymmetrical use of the Deep and Dark Web has allowed for rogue actions to take place in which the military has a responsibility to strike back at terrorist organisations who threaten the safety of its citizens. There is a need for new methods and approaches for military forces to plan and conduct counter cyberterrorism operations. This paper gives an overview of using the Deep and Dark Web in military counter terrorist operations, presents an adaptation of the “Cyber Kill Chain” methodology aimed at gathering information for cyber counter terrorist operations, and presents a rudimentary approach to incorporate cyber counter terrorist operations with military terrorist operations. DA - 2017-03 DB - ResearchSpace DP - CSIR KW - Deep web KW - Dark web KW - Counter-terrorism KW - Cyber offensive LK - https://researchspace.csir.co.za PY - 2017 SM - 978-1-911218-26-5 SM - 2048-9889 T1 - The utilisation of the deep web for military counter terrorist operations TI - The utilisation of the deep web for military counter terrorist operations UR - http://hdl.handle.net/10204/9261 ER -