Libros importados hasta 50% OFF + Envío Gratis a todo USA   Ver más

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Crs Report for Congress: Terrorist Use of the Internet: Information Operations in Cyberspace: March 8, 2011 - R41674 (in English)
Type
Physical Book
Publisher
Language
Inglés
Pages
22
Format
Paperback
Dimensions
24.6 x 18.9 x 0.1 cm
Weight
0.06 kg.
ISBN13
9781294245629

Crs Report for Congress: Terrorist Use of the Internet: Information Operations in Cyberspace: March 8, 2011 - R41674 (in English)

Congressional Research Service the Libr (Author) · John Rollins (Author) · Catherine a. Theohary (Author) · Bibliogov · Paperback

Crs Report for Congress: Terrorist Use of the Internet: Information Operations in Cyberspace: March 8, 2011 - R41674 (in English) - Theohary, Catherine a. ; Rollins, John ; Congressional Research Service the Libr

Physical Book

$ 11.80

$ 14.75

You save: $ 2.95

20% discount
  • Condition: New
It will be shipped from our warehouse between Tuesday, July 09 and Wednesday, July 10.
You will receive it anywhere in United States between 1 and 3 business days after shipment.

Synopsis "Crs Report for Congress: Terrorist Use of the Internet: Information Operations in Cyberspace: March 8, 2011 - R41674 (in English)"

The Internet is used by international insurgents, jihadists, and terrorist organizations as a tool for radicalization and recruitment, a method of propaganda distribution, a means of communication, and ground for training. Although there are no known reported incidents of cyberattacks on critical infrastructure as acts of terror, this could potentially become a tactic in the future. There are several methods for countering terrorist and insurgent information operations on the Internet. The federal government has organizations that conduct strategic communications, counterpropaganda, and public diplomacy activities. The National Framework for Strategic Communication guides how interagency components are to integrate their activities. However, these organizations may be stovepiped within agencies, and competing agendas may be at stake. This report does not discuss technical and Internet architecture design solutions. Some may interpret the law to prevent federal agencies from conducting "propaganda" activities that may potentially reach domestic audiences. Others may wish to dismantle all websites that are seen to have malicious content or to facilitate acts of terror, while some may have a competing interest in keeping a site running and monitoring it for intelligence value. Key issues for Congress: - Although the Comprehensive National Cybersecurity Initiative addresses a federal cybersecurity strategy and departmental ...

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews