It is important to map what a cyberterrorist network would look like. For this, it's useful to look at traditional hacker networks. It can be safely said that hackers, like terrorists, tend to work in asymmetric, non-hierarchical formation, which means that they do not have organizations like gangs and so forth. The concept of netwar (Arquilla & Ronfeldt 2001) might or might not be useful at explaining these new kinds of formations. Although the concept of netwar is at odds with traditional forms of organization, criminal networks tend to have the following types of members, which can be compared to the types of members found in a terrorist network, as follows:
Membership Roles/Components of Hacking/Terrorist Networks:
- Organizers -- core members who steer group
- Leadership -- charismatics who lead group
- Insulators -- members who protect the core
- Bodyguards -- members who protect leaders
- Communicators -- pass on directives
- Seconds in command -- pass on orders
- Guardians -- security enforcers
- Intelligence -- and counterintelligence agents
- Extenders -- recruiters of new members
- Financiers -- fund raisers & money launderer
- Monitors -- advisors about group weaknesses
- Logistics -- keepers of safe houses
- Members -- those who do the hacking
- Operations -- those who commit the terror
- Crossovers -- people with regular jobs
- Sleepers -- members living under deep cover
By Fahd
for more info visit:http://www.apsu.edu/oconnort/3100/3100lect02d.htm
No comments:
Post a Comment