Centro de Documentação da PJ
Monografia

CD262
NETWORK TECHNOLOGIES FOR NETWORKED TERRORISTS
Network technologies for networked terrorists [Documento electrónico] : assessing the value of information and communications technologies to modern terrorist organizations / Bruce W. Don ..[et al.].- 1st ed.- Santa Monica : RAND Corporation, 2007.- 1 CD-ROM ; 12 cm. - (Technical report)
Ficheiro de 762 KB em formato PDF (100 p.).
ISBN 978-0-8330-4141-8


ANÁLISE CRIMINAL, TERRORISMO, GRUPO TERRORISTA, TECNOLOGIA DA INFORMAÇÃO, CRIME VIA INTERNET

CHAPTER ONE. Introduction. The Scope and Purpose of the Analysis. Research Approach. What Could Terrorists Do with Network Technology? Which Network Technologies Are Most Attractive to Terrorists? How Would Specific Network Technologies Fit Within Terrorist Groups’ Broader Approaches to Acquiring and Using Technologies? What Should Security Forces Do to Counter This? What Conclusions and Recommendations Can Be Drawn from This Analysis? How This Report Is Organized. CHAPTER TWO. What Could Terrorists Do with Network Technology? Recruiting. Current State-of-the-Art Recruiting. The Future of Recruiting. Acquiring Resources. Current State-of-the-Art Resource Acquisition. The Future of Resource Acquisition. Training. Current State-of-the-Art Training. The Future of Training. Creating False Identities, Forgery, and Other Deception. Current State-of-the-Art of Deception. The Future of Forgery and Other Deception. Reconnaissance and Surveillance. Current State-of-the-Art Reconnaissance and Surveillance. The Future of Reconnaissance and Surveillance. Planning and Targeting. Current State-of-the-Art Planning and Targeting. The Future of Planning and Targeting. Communication. Current State-of-the-Art Communication Practices. Future Communication Technologies. Future Communication Practices and Terrorist Activities. Overall Effects of Changes in Communication Technology. Attack Operations. Current State-of-the-Art Operations. The Future of Terrorist Operations. Propaganda and Persuasion. Current State-of-the-Art Propaganda and Persuasion. The Future of Propaganda and Persuasion. Which of These Network Technologies Are Potentially Most Attractive to Terrorists? Network Technologies That Can Enhance Strategic or Enabling Activities. Network Technologies That Can Enhance the Direct Outcomes of Attacks. CHAPTER THREE. Security Force Responses to Terrorists’ Acquisition and Use of Network Technologies. The Role of Specific Network Technologies Within Terrorist Groups’ Technology Strategies. Benefits and Risks from Network Technology Use. Benefits and Risks of Using Network Technology for Terrorist Groups. Benefits and Risks to Security Forces of Terrorist Use of Network Technology. Options for Countering Terrorist Use of Network Technologies. Evaluating the Countermeasure Options. Network Technologies Within Specialized Technology Strategies. Network Technologies Within Versatility- and Variety-Based Strategies. Network Technologies Pursued Opportunistically. Countermeasure Approach Suggested by the Evaluation. CHAPTER FOUR. Conclusions and Recommendations. Conclusions. Major Breakthroughs in Terrorist Attack Operations? Versatility, Variety, Efficiency, and Effectiveness. Precluding Terrorists from Getting Technology and Developing Direct Counters. Exploitation Seems the More Promising Option. Security Services’ Role. Recommendations. Design a System to Address Terrorist Use of Network Technologies. Acquire and Retain People Who Can Make the System Work. Take the Initial Steps Needed to Implement Such a System Promptly. Bibliography.