The Role of Honeypots and Sabotage in State-Based Operations Against Online Jihadism, 2001-2020
This article offers a descriptive analysis of intelligence operations carried out by the United States and its allies against the presence of jihadist groups on the Internet during the period 2001–2020. In contrast to actions aimed at eliminating the virtual spaces in which terrorists operate, the i...
| Autor principal: | |
|---|---|
| Tipo de documento: | Electrónico Artículo |
| Lenguaje: | Inglés |
| Publicado: |
2023
|
| En: |
Terrorism and political violence
Año: 2023, Volumen: 35, Número: 6, Páginas: 1440-1450 |
| Acceso en línea: |
Volltext (lizenzpflichtig) |
| Verificar disponibilidad: | HBZ Gateway |
| Palabras clave: |
MARC
| LEADER | 00000naa a22000002c 4500 | ||
|---|---|---|---|
| 001 | 185442985X | ||
| 003 | DE-627 | ||
| 005 | 20230807054804.0 | ||
| 007 | cr uuu---uuuuu | ||
| 008 | 230807s2023 xx |||||o 00| ||eng c | ||
| 024 | 7 | |a 10.1080/09546553.2022.2050221 |2 doi | |
| 035 | |a (DE-627)185442985X | ||
| 035 | |a (DE-599)KXP185442985X | ||
| 040 | |a DE-627 |b ger |c DE-627 |e rda | ||
| 041 | |a eng | ||
| 084 | |a 2,1 |2 ssgn | ||
| 100 | 1 | |a Torres-Soriano, Manuel R. |e VerfasserIn |4 aut | |
| 245 | 1 | 4 | |a The Role of Honeypots and Sabotage in State-Based Operations Against Online Jihadism, 2001-2020 |
| 264 | 1 | |c 2023 | |
| 336 | |a Text |b txt |2 rdacontent | ||
| 337 | |a Computermedien |b c |2 rdamedia | ||
| 338 | |a Online-Ressource |b cr |2 rdacarrier | ||
| 520 | |a This article offers a descriptive analysis of intelligence operations carried out by the United States and its allies against the presence of jihadist groups on the Internet during the period 2001–2020. In contrast to actions aimed at eliminating the virtual spaces in which terrorists operate, the intelligence operations analysed here are designed to erode terrorists’ trust in such spaces without compromising intelligence sources. The article argues that the combination of cyberattacks and psychological operations in the form of honeypots and sabotage have achieved considerable success in terms of reducing terrorist activities on the Internet and undermining the effectiveness of propaganda initiatives undertaken by terrorist groups. | ||
| 650 | 4 | |a Al Qaeda | |
| 650 | 4 | |a Islamic State | |
| 650 | 4 | |a intelligence services | |
| 650 | 4 | |a Propaganda | |
| 650 | 4 | |a cyberactivism | |
| 650 | 4 | |a Internet | |
| 773 | 0 | 8 | |i Enthalten in |t Terrorism and political violence |d London : Cass, 1989 |g 35(2023), 6, Seite 1440-1450 |h Online-Ressource |w (DE-627)349234795 |w (DE-600)2080322-9 |w (DE-576)113563507 |x 1556-1836 |7 nnas |
| 773 | 1 | 8 | |g volume:35 |g year:2023 |g number:6 |g pages:1440-1450 |
| 856 | 4 | 0 | |u https://doi.org/10.1080/09546553.2022.2050221 |x Resolving-System |z lizenzpflichtig |3 Volltext |
| 935 | |a mkri | ||
| 951 | |a AR | ||
| ELC | |a 1 | ||
| LOK | |0 000 xxxxxcx a22 zn 4500 | ||
| LOK | |0 001 436340602X | ||
| LOK | |0 003 DE-627 | ||
| LOK | |0 004 185442985X | ||
| LOK | |0 005 20230807043606 | ||
| LOK | |0 008 230807||||||||||||||||ger||||||| | ||
| LOK | |0 035 |a (DE-2619)KrimDok#2023-08-06#3A7466E8814B696CB3E830C944FB17F48A5C6E59 | ||
| LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
| LOK | |0 092 |o n | ||
| LOK | |0 852 |a DE-2619 | ||
| LOK | |0 852 1 |9 00 | ||
| LOK | |0 935 |a zota |a tiep | ||
| ORI | |a SA-MARC-krimdoka001.raw | ||
