Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Terror Spam and phishing

Terror Spam and phishing
View Free PDF
Author(s): Tomer Ben-Ari (The Interdisciplinary Center Herzliya, Israel)and Ron Rymon (The Interdisciplinary Center Herzliya, Israel)
Copyright: 2007
Pages: 4
Source title: Managing Worldwide Operations and Communications with Information Technology
Source Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59904-929-8.ch225
ISBN13: 9781599049298
EISBN13: 9781466665378


We claim that mail Spam and Phishing can become an operational tool in the hands of terrorists, to perform more than just simple recruiting and fund raising activities. We show that by using spam methods terrorists can reach the heart of society, and succeed in getting some of its fringes to act on their behalf. This "outsourcing" of terrorist activity to own members of the attacked society may adversely affect law enforcement ability to use profiling in the war against terror. We describe a system that combines standard spamming techniques with standard and adapted security mechanisms, and which provides the functionality needed to target, recruit, and operate terrorist cells and opportunistic accomplices.

Body Bottom