Mulai Membaca

2018 Threat Assessment Series: Enemies in Cyberspace - Cyberterrorism and Terrorists' Use of the Internet: According to our 2018 NJ Terrorism Threat Assessment and our partners at the New Jersey Cybersecu...

Nilai:
0 halaman

Ikhtisar

According to our 2018 NJ Terrorism Threat Assessment and our partners at the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC), terrorists will increasingly use encryption, the dark web, and cryptocurrencies for recruitment and to spread propaganda. They will also use those items to encourage lone-wolf attacks, facilitate their operations, and acquire weapons to conduct physical attacks against targets. As such, we have seen social media companies remove extremist content and suspend accounts, forcing extremists to move their Internet activities to less active platforms, limiting their potential influence.
Join us as analysts from our office and the NJCCIC provide insight into terrorist groups’ current cyber capabilities and their predictions of what their future cyber operations may look like. Additionally, the analysts discuss the challenges for social media and web hosting companies in policing terrorists’ content on their sites.

Baca di aplikasi seluler Scribd

Unduh aplikasi seluler Scribd gratis untuk membaca kapan pun, di mana pun.