Cyber Terror and Security | Jerusalem Center For Public Affairs
4/23/17, 9*43 AM
Contact Us עבריתFrançais Deutsch
Home
> Lessons from Israel’s Response to Terrorism > Cyber Terror and Security
Cyber Terror and Security Brig.-Gen. (res.) Yossi Kuperwasser The challenge of dealing with the terror threats on the Internet is becoming more complicated, as the quantity of data grows exponentially and as the terrorists make effective use of the cyber dimension for a wide variety of purposes. They take advantage of the Internet’s wide reach, its complexity, the ability to use it without being identi?ed, the emphasis by its mega-corporate operators on protecting privacy and free speech, its reliability, and its commitment to facilitate secrecy so that secured communications will be guaranteed for everybody. New technologies have made it possible for terrorists to produce propaganda videos and disseminate messages with relative ease, reaching an incredibly wide audience that was previously beyond their reach with immediacy and intimacy. Terrorists recognized the power of social media early on and built an entire organizational network that has been very diCcult for counter-terrorism analysts to penetrate. By exploiting Twitter and Facebook platforms, apps such as Telegram, and content sharing sites such as JustPaste, terrorists further improved their capability to safely and rapidly extend their messages to wide audiences. Thus, the use of these new technologies by counter-terrorism analysts wishing to penetrate closed forums or telegram groups must be incredibly focused. Different methods must be adopted depending on the type of information desired. If done correctly, analysts can put potential terrorists under surveillance, track every move they make, both on and off social media, in order to get secret information. The approach for ?nding terrorists and/or terrorist activity online must be based on the type of content desired. For example, looking for the current jihadi chatter about a speci?c incident, it is vital to check jihadi forums and Twitter and then search those platforms using related keywords and hashtags. With the emergence of new media, terrorists have switched to operating on closed forums and telegram, and privacy issues have become more relevant as social media platforms established their regulations and strict usage policies. Thus, in order to get the necessary sensitive information, one has to develop methods that may enable penetrating and following any of these closed groups.
The Search for Information Information about homemade explosives can be found through searches on Google and YouTube. Jihadi homemade explosives manuals can be collected from jihadi forums and
http://jcpa.org/lessons-israels-response-terrorism/cyber-terror-security/
CONTENTS Executive Summary Is the Terror Against Europe Different from the Terror Against Israel? by Amb. Dore Gold
Resilience, the Israeli People’s Weapon against Terror by Fiamma Nirenstein
The National Security Aspect of Fighting Terror – The Israeli Experience by Brig.-Gen. (res.) Yossi Kuperwasser
The History of the West’s Struggle against Terror by Amb. Freddy Eytan
The Legal Response by Amb. Alan Baker
International Legitimization of Terror Groups: Lessons from Israel's Experience by Dan Diker
Democracy Facing Terrorism: Human Rights and Military Ethics by Prof. Asa Kasher
Familiarity Breeds Respect: Awareness of Social Mores as a Factor in the Fight against Terror by Jennifer Roskies Page 1 of 4