Compartir
Crs Report for Congress: Terrorist Use of the Internet: Information Operations in Cyberspace: March 8, 2011 - R41674 (en Inglés)
Congressional Research Service the Libr
(Autor)
·
John Rollins
(Autor)
·
Catherine a. Theohary
(Autor)
·
Bibliogov
· Tapa Blanda
Crs Report for Congress: Terrorist Use of the Internet: Information Operations in Cyberspace: March 8, 2011 - R41674 (en Inglés) - Theohary, Catherine a. ; Rollins, John ; Congressional Research Service the Libr
17,92 €
19,91 €
Ahorras: 1,99 €
Elige la lista en la que quieres agregar tu producto o crea una nueva lista
✓ Producto agregado correctamente a la lista de deseos.
Ir a Mis Listas
Origen: Estados Unidos
(Costos de importación incluídos en el precio)
Se enviará desde nuestra bodega entre el
Miércoles 24 de Julio y el
Miércoles 07 de Agosto.
Lo recibirás en cualquier lugar de España entre 1 y 5 días hábiles luego del envío.
Reseña del libro "Crs Report for Congress: Terrorist Use of the Internet: Information Operations in Cyberspace: March 8, 2011 - R41674 (en Inglés)"
The Internet is used by international insurgents, jihadists, and terrorist organizations as a tool for radicalization and recruitment, a method of propaganda distribution, a means of communication, and ground for training. Although there are no known reported incidents of cyberattacks on critical infrastructure as acts of terror, this could potentially become a tactic in the future. There are several methods for countering terrorist and insurgent information operations on the Internet. The federal government has organizations that conduct strategic communications, counterpropaganda, and public diplomacy activities. The National Framework for Strategic Communication guides how interagency components are to integrate their activities. However, these organizations may be stovepiped within agencies, and competing agendas may be at stake. This report does not discuss technical and Internet architecture design solutions. Some may interpret the law to prevent federal agencies from conducting "propaganda" activities that may potentially reach domestic audiences. Others may wish to dismantle all websites that are seen to have malicious content or to facilitate acts of terror, while some may have a competing interest in keeping a site running and monitoring it for intelligence value. Key issues for Congress: - Although the Comprehensive National Cybersecurity Initiative addresses a federal cybersecurity strategy and departmental ...