Countering Daesh Cognitive and Cyber Warfare with OSINT and Basic Data Mining Tools
Downloads
Digital civilization has changed war circumstances. Emerging dangers have asymmetry, variety, and continual change; quick transmission through the network; near-immediacy; possibility for unrestricted access; and swift power to affect people’s behavior. Cognitive Warfare, an international relations issue, uses information, cyber, and psychological warfare tactics. Daesh sends threatening messages to Western countries and spreads internet propaganda to recruit new members and induce terror. The study attempts to propose a novel knowledge-based approach for detecting terrorists by examining data obtained from Twitter and leading Daesh publications, through Data Mining techniques.
Downloads
N. Tocci and R. Alcaro, “Three scenarios for the future of the transatlantic relationship,” TRANSWORLD. The Transatlantic Relationship and the Future Global Conference, Sept. 2012. [Online]. Available: http://transworld.iai.it/wp-content/uploads/2012/10/TW_WP_04.pdf. Accessed: Nov. 3, 2022.
M. Ingelevič-Citak and Z. Przyszlak, “Jihadist, Far-Right and Far-Left Terrorism in Cyberspace-Same Threats and Same Countermeasures?” International Comparative Jurisprudence 6.2, vol. 8, no. 2, pp. 158-159, June 2020. [Online]. Available: https://repository.mruni.eu/bitstream/handle/007/17195/6291-15119-1-SM.pdf?sequence=1&isAllowed=y. Accessed: Sept. 28, 2022.
G. Weimann, Terrorism in Cyberspace: the next generation, Washington, DC: Woodrow Wilson Center Press, 2015.
G. Weimann, “Virtual Training Camps: Terrorists' Use of the Internet,” in James J. F. Forest, ed., Teaching Terror: Strategic and Tactical Learning in the Terrorist World, Lanham, MD: Rowman & Littlefield, 2006, p. 112.
B. Todorovic and D. Trifunovic, “Prevention of (Ab-) Use of the Internet for Terrorist Plotting and Related Purposes,” International Centre for Counter-Terrorism (ICCT), 2020. [Online]. Available: https://www.icct.nl/sites/default/files/2023-01/Chapter-19-Handbook.pdf. Accessed: Oct. 24, 2022.
D. Trifunović, “Digital steganography in terrorist networks,” In Proc. SYM-OP-IS 2015: XLII International Symposium on Operations Research, Vol. V (1), 2015, pp. 190-193. [Online]. Available: https://www.researchgate.net/profile/Snezana-Kirin/post/HelloI_hope_that_your_project_is_developing_well_Can_we_get_some_update_on_published_results/attachment/59d64a2479197b80779a47c9/AS:474077556154368@1490040305737/download/ZbornikN20015.pdf#page=208.
J. Adams, “The financing of terror: Behind the PLO, Ira, red brigades and M-19 stand the paymasters: how the groups that are terrorizing the world get the money to do it,” New York: Simon and Schuster, Jan. 1986.
R. Borum, Psychology of terrorism, Tampa: University of South Florida, Jan. 2004. [Online]. Available: https://www.ojp.gov/pdffiles1/nij/grants/208552.pdf. Accessed: Oct. 20, 2022.
P. Wilkinson, “Terrorism versus democracy: The liberal state response,” Cass Series on Political Violencce, Taylor & Francis, 2011, ch. 10, pp. 152.
A. Chuipka, The Strategies of Cyberterrorism: Is Cyberterrorism an effective means to Achieving the Goals of Terrorists? University of Ottawa, 20 Nov. 2016. [Online]. Available: https://ruor.uottawa.ca/bitstream/10393/35695/1/CHUIPKA%2c%20Adam%2020169.pdf. Accessed: Oct. 24, 2022.
R. Zgryziewicz, J. Shaheen, T. Grzyb, and S. Fahmy, “Daesh Information Campaign And Its Influence,” NATO Strategic Communications Centre of Excellence, 2015. [Online]. Available: https://stratcomcoe.org/pdfjs/?file=/publications/download/daesh_public_use_19-08-2016.pdf?zoom=page-fit. Accessed: Oct. 28, 2022.
F. J. Cesteros García, “2Private Investigation and Open Source INTelligence (OSINT),” in Cybersecurity Threats with New Perspectives, IntechOpen, Dec. 08, 2021, pp-129-143. doi: 10.5772/intechopen.95857. Accessed: Nov. 15, 2022.