You are not currently logged in.
Access JSTOR through your library or other institution:
If You Use a Screen ReaderThis content is available through Read Online (Free) program, which relies on page scans. Since scans are not currently available to screen readers, please contact JSTOR User Support for access. We'll provide a PDF copy for your screen reader.
COUNTERING TERRORISM WITH CYBER SECURITY
Jody R. Westby
Vol. 47, No. 3 (SPRING 2007), pp. 297-313
Published by: American Bar Association
Stable URL: http://www.jstor.org/stable/29762975
Page Count: 17
You can always find the topics here!Topics: Terrorism, Cybercrimes, Computer security, Information sharing, Internet, Private sector, Propaganda, Technology, Law enforcement, Countries
Were these topics helpful?See somethings inaccurate? Let us know!
Select the topics that are inaccurate.
Since scans are not currently available to screen readers, please contact JSTOR User Support for access. We'll provide a PDF copy for your screen reader.
Preview not available
Terrorist cells in more than 60 countries are using information and communication technologies (ICTs) to recruit and spread propaganda, raise money, train jihadists, and communicate and conspire. Their high-tech strategy outpaces the traditional approach of the United States and other countries who are relying upon traditional strategies aimed at tracking, capturing, and killing an enemy. The three problems that most frustrate governments in countering terrorists' use of ICTs are (1) difficulties in tracking and tracing cyber communications, (2) the lack of harmonized laws and procedures in investigating cybercrimes, and (3) inadequate or ineffective information sharing. Governments around the globe need to address these three areas of cyber security if they are to hope to win the battle against terror.
Jurimetrics © 2007 American Bar Association