The Internet offers anonymity and a disregard of national boundaries. Most countries are deeply concerned about the threat cyberspace and in particular, cyberterrorism, are posing to national security. The Deep and Dark Web is associated with anonymity, covert communications and trade. This brings to the table a new opportunity for organised crime and terrorist organisations to trade, communicate, plan and organise specific strikes or market their future activities. Simultaneously, this has opened military operations to a new facet of collecting and processing information to gain an advantage over an adversary who wants to remain anonymous and unseen, especially in the intelligence realm. The military of any nation must be on the forefront in protecting and defending its citizens from these types of threats. Asymmetrical use of the Deep and Dark Web has allowed for rogue actions to take place in which the military has a responsibility to strike back at terrorist organisations who threaten the safety of its citizens. There is a need for new methods and approaches for military forces to plan and conduct counter cyberterrorism operations. This paper gives an overview of using the Deep and Dark Web in military counter terrorist operations, presents an adaptation of the “Cyber Kill Chain” methodology aimed at gathering information for cyber counter terrorist operations, and presents a rudimentary approach to incorporate cyber counter terrorist operations with military terrorist operations.
Reference:
Aschmann, M.J., Leenen, L. and Jansen van Vuuren, J.C. 2017. The utilisation of the deep web for military counter terrorist operations. International Conference on Cyber Warfare and Security, Dayton, Ohio, USA, 2-3 March 2017, p. 15-22.
Aschmann, M., Leenen, L., & Jansen van Vuuren, J. C. (2017). The utilisation of the deep web for military counter terrorist operations. Academic Conferences and Publishing Limited. http://hdl.handle.net/10204/9261
Aschmann, MJ, Louise Leenen, and Johanna C Jansen van Vuuren. "The utilisation of the deep web for military counter terrorist operations." (2017): http://hdl.handle.net/10204/9261
Aschmann M, Leenen L, Jansen van Vuuren JC, The utilisation of the deep web for military counter terrorist operations; Academic Conferences and Publishing Limited; 2017. http://hdl.handle.net/10204/9261 .