Entering into the world of globalization create the right proportional process in which benefits have for anyone. For the ordinary man a boon, for terrorists open space for boundless projection of their scopes and impacts. The process of transition of the traditional way of warfare where the battlefield has been replaced by cyberspace, and military operations have been replaced by cyber operations and all of this within the cyber war, the question is, which is the limit, or where it ends the process?
This paper in the form of a thesis will explain the scientific basis for the access, conditions and the using of cyberspace by terrorists in the realization of all its cyclic activities, ranging from calls for the acceptance of the ideology until carrying out a terrorist act. Following the stages of funding terrorist activities, with special emphasis will turn the use of cyberspace in the collection of funds transfer patterns from the source to the terrorists, and the manner of use of the funds for necessary cyclic activities. At the same time, we will explain the paradox of the development of techniques and technology as well as its use for criminal or terrorist activities in the area of methods and ways of fundraising.
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
Tel.: +1 703 830 6300
Fax: +1 703 830 2300 firstname.lastname@example.org
(Corporate matters and books only) IOS Press c/o Accucoms US, Inc.
For North America Sales and Customer Service
West Point Commons
Lansdale PA 19446
Tel.: +1 866 855 8967
Fax: +1 215 660 5042 email@example.com