Share
Crs Report for Congress: Terrorist Use of the Internet: Information Operations in Cyberspace: March 8, 2011 - R41674 (in English)
Congressional Research Service the Libr
(Author)
·
John Rollins
(Author)
·
Catherine a. Theohary
(Author)
·
Bibliogov
· Paperback
Crs Report for Congress: Terrorist Use of the Internet: Information Operations in Cyberspace: March 8, 2011 - R41674 (in English) - Theohary, Catherine a. ; Rollins, John ; Congressional Research Service the Libr
$ 11.80
$ 14.75
You save: $ 2.95
Choose the list to add your product or create one New List
✓ Product added successfully to the Wishlist.
Go to My WishlistsIt will be shipped from our warehouse between
Tuesday, July 09 and
Wednesday, July 10.
You will receive it anywhere in United States between 1 and 3 business days after shipment.
Synopsis "Crs Report for Congress: Terrorist Use of the Internet: Information Operations in Cyberspace: March 8, 2011 - R41674 (in English)"
The Internet is used by international insurgents, jihadists, and terrorist organizations as a tool for radicalization and recruitment, a method of propaganda distribution, a means of communication, and ground for training. Although there are no known reported incidents of cyberattacks on critical infrastructure as acts of terror, this could potentially become a tactic in the future. There are several methods for countering terrorist and insurgent information operations on the Internet. The federal government has organizations that conduct strategic communications, counterpropaganda, and public diplomacy activities. The National Framework for Strategic Communication guides how interagency components are to integrate their activities. However, these organizations may be stovepiped within agencies, and competing agendas may be at stake. This report does not discuss technical and Internet architecture design solutions. Some may interpret the law to prevent federal agencies from conducting "propaganda" activities that may potentially reach domestic audiences. Others may wish to dismantle all websites that are seen to have malicious content or to facilitate acts of terror, while some may have a competing interest in keeping a site running and monitoring it for intelligence value. Key issues for Congress: - Although the Comprehensive National Cybersecurity Initiative addresses a federal cybersecurity strategy and departmental ...