Terrorist watch list screening and Brady background checks for firearms / William J. Krouse.
The Internet is used by international insurgents, jihadists, and terrorist organizations as a tool for radicalization and recruitment, a method of propaganda distribution, a means of communication, and ground for training. Although there are no known reported incidents of cyberattacks on critical in...
Saved in:
Online Access: |
Full Text (via HeinOnline) |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
[Washington, District of Columbia] :
[Congressional Research Service, the Library of Congress],
[2013]
|
Series: | CRS report for Congress ;
R42336. HeinOnline. Gun regulation and legislation in America. HeinOnline. U.S. Congressional documents. |
Subjects: |
Summary: | The Internet is used by international insurgents, jihadists, and terrorist organizations as a tool for radicalization and recruitment, a method of propaganda distribution, a means of communication, and ground for training. Although there are no known reported incidents of cyberattacks on critical infrastructure as acts of terror, this could potentially become a tactic in the future. There are several methods for countering terrorist and insurgent information operations on the Internet. The federal government has organizations that conduct strategic communications, counterpropaganda, and public diplomacy activities. The National Framework for Strategic Communication guides how interagency components are to integrate their activities. However, these organizations may be stovepiped within agencies, and competing agendas may be at stake. This report does not discuss technical and Internet architecture design solutions. Some may interpret the law to prevent federal agencies from conducting 'propaganda' activities that may potentially reach domestic audiences. Others may wish to dismantle all websites that are seen to have malicious content or to facilitate acts of terror, while some may have a competing interest in keeping a site running and monitoring it for intelligence value. |
---|---|
Item Description: | "May 1, 2013." |
Physical Description: | 1 online resource (iv, 28 pages) |
Bibliography: | Includes bibliographical references. |
Source of Description, Etc. Note: | PDF title page, viewed April 14, 2016. |