Violent Extremist Organisations (VEOs)

Cyber-Sophistication Assessment Methodology for Public-Facing Terrorist Web Sites

Abstract:

Cyber technologies are becoming an ever-increasing part of the portfolios of Violent Extremist Organisations (VEO). Terrorist groups use these technologies in a variety of ways, such   as   group   decision-making,   cyber-facilitated   financing,   broader   recruitment,   and propaganda dissemination. However, evaluating the actual cyber capabilities of covert organisations cannot be accomplished through conventional channels. In this study, a methodology is developed and piloted in order to rate the source code supporting public-facing web  pages  of  terrorist  organisations  as  a  proxy  for  assessing  the  cyber-sophistication capabilities of those organisations.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com