Web site Assessment

Cyber-Sophistication Assessment Methodology for Public-Facing Terrorist Web Sites

Abstract:

Cyber technologies are becoming an ever-increasing part of the portfolios of Violent Extremist Organisations (VEO). Terrorist groups use these technologies in a variety of ways, such   as   group   decision-making,   cyber-facilitated   financing,   broader   recruitment,   and propaganda dissemination. However, evaluating the actual cyber capabilities of covert organisations cannot be accomplished through conventional channels. In this study, a methodology is developed and piloted in order to rate the source code supporting public-facing web  pages  of  terrorist  organisations  as  a  proxy  for  assessing  the  cyber-sophistication capabilities of those organisations.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.234.6664
  • jiw@gbpts.com