As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
The use of cyberspace – for good and for evil – has accelerated faster than almost anyone could have imagined. From global malware attacks to alleged Russian interference in the US presidential elections, it is a rare day that some form of cyberspace attack isn't in the news. To think that terrorist organizations haven't understood that cyberspace represents an attack vector that is particularly asymmetric. A few good hackers – either in their organizations or paid for on an outsourced basis – can do tremendous damage or provide the means for communication that are virtually immune to interception by governments. New forms of value transfer – cryptocurrencies, can enable a terrorist group to move funds between countries instantaneously and outside of traditional financial sectors. The present keynote chapter provides an overview of what has been transpiring and why the danger of terrorist misuse of cyberspace is not just possible but is virtually certain.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.