Have a personal or library account? Click to login
Illicit Activities Beneath the Surface Web: Investigating Domestic Extremism on Anonymous Social Media Platforms Cover

Illicit Activities Beneath the Surface Web: Investigating Domestic Extremism on Anonymous Social Media Platforms

Open Access
|Apr 2021

References

  1. Balduzzi, M., & Ciancaglini, V. n.d.. Cybercrime in the Deep Web. In Black Hat EU, Amsterdam 2015. Retrieved from https://www.blackhat.com/docs/eu-15/materials/eu-15-Balduzzi-Cybercrmine-In-The-Deep-Web-wp.pdf.
  2. Bergman, M. K. (2001). White paper: the deep web: surfacing hidden value. Journal of electronic publishing, 7(1).10.3998/3336451.0007.104
  3. Bernstein, M. S., Monroy-Hernandez, A., Harry, D., Andre, P., Panovich, K., & Vargas, G. n.d.. 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community. 8.
  4. Best, C. (2011). Challenges in open source intelligence. Intelligence and Security Informatics Conference (EISIC), IEEE: 58-62).10.1109/EISIC.2011.41
  5. Cardenas-Haro, J. A., & Dawson, M. (2017). Tails Linux Operating System: The Amnesiac Incognito System in Times of High Surveillance, Its Security Flaws, Limitations, and Strengths in the Fight for Democracy in Security Solutions for Hyperconnectivity and the Internet of Things, 260-271. IGI Global.10.4018/978-1-5225-0741-3.ch010
  6. Committee on Homeland Security 8chan Inquiry before the U.S. House of Representatives, 106th Cong. (2019).
  7. Dawson, M., & Cárdenas-Haro, J. A. (2017). Tails Linux Operating System: Remaining Anonymous with the Assistance of an Incognito System in Times of High Surveillance. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 1(1), 47-55.10.4018/IJHIoT.2017010104
  8. Dawson, M., Kisku, D. R., Gupta, P., Sing, J. K., & Li, W. (Eds.). (2016). Developing Next-Generation Countermeasures for Homeland Security Threat Prevention. IGI Global.10.4018/978-1-5225-0703-1
  9. Denis, M., Zena, C., & Hayajneh, T. (2016). Penetration testing: Concepts, attack methods, and defense strategies. 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT). doi:10.1109/lisat.2016.749415610.1109/LISAT.2016.7494156
  10. Duggan, M., & Smith, A. (2013). 6% of online adults are reddit users. Pew Internet & American Life Project, 3: 1-10.
  11. Griffith, E. (2018). The Dark Side of Crypto Revolution. Accessed December 10, 2018. https://www.wired.com/story/the-dark-side-of-the-crypto-revolution/.
  12. Harris, S., & Meyers, M. (2002). CISSP. McGrawHill/Osborne
  13. Janczewski, L., & Colarik, A. (2007). Cyber Warfare and Cyber Terrorism. Hershey. PA: IGI Global. doi:10.4018/978-1-59140-991-510.4018/978-1-59140-991-5
  14. Lapowsky, I. (2018). How Russian Facebook Ads Divided and Targeted US Voters Before the 2016 Election. Accessed December 3, 2018. https://www.wired.com/story/russian-facebookads-targeted-us-voters-before-2016-election/.
  15. Lima, D. (2016). Lessons to be learned from Adult FriendFinder hack of 412M accounts. Accessed December 19, 2018. https://www.bizjournals.com/southflorida/news/2016/11/21/lessons-to-be-learned-from-adult-friendfinder-hack.html.
  16. Nagle, A. (2017). Kill all normies: Online culture wars from 4chan and Tumblr to Trump and the alt-right. John Hunt Publishing.
  17. Osint framework. n.d.. Accessed January 9, 2021. https://osintframework.com/.
  18. Pingle, B., Mairaj, A., & Javaid, A. Y. (2018). Real-World Man-in-the-Middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use. 2018 IEEE International Conference on Electro/Information Technology (EIT). doi:10.1109/eit.2018.850008210.1109/EIT.2018.8500082
  19. Qin, J., Zhou, Y., Lai, G., Reid, E., Sageman, M., & Chen, H. (2005). The dark web portal project: collecting and analysing the presence of terrorist groups on the web, in Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics, 623-624. Springer-Verlag.10.1007/11427995_78
  20. Shoaib, M., Ilyas, M., & Khiyal, M. S. (2013). Official digital currency. Eighth International Conference on Digital Information Management (ICDIM 2013). doi:10.1109/icdim.2013.669398210.1109/ICDIM.2013.6693982
  21. Telford, T., & Timberg, C. (2018). Marriott discloses massive data breach affecting up to 500 million guests. Accessed December 19, 2018. https://www.washingtonpost.com/business/2018/11/30/marriott-discloses-massive-data-breach-impacting-million-guests/?noredirect=on&utm_term=.717f57eb3cea.
  22. Wang, J., & Yang, T. (2018). Subliminal Channel and Digital Currency Pay Security. 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). doi:10.1109/icitbs.2018.0004110.1109/ICITBS.2018.00041
  23. Wang, P., Dawson, M., & Williams, K. L. (2018). Improving Cyber Defense Education through National Standard Alignment: Case Studies. International Journal of Hyperconnectivity and the Internet of Things (IJHIoT), 2(1), 12-28.10.4018/IJHIoT.2018010102
DOI: https://doi.org/10.2478/hjbpa-2021-0003 | Journal eISSN: 2067-9785 | Journal ISSN: 2457-5720
Language: English
Page range: 27 - 40
Submitted on: Feb 1, 2021
Accepted on: Mar 1, 2021
Published on: Apr 27, 2021
Published by: Association Holistic Research Academic (Hora)
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2021 Maurice Dawson, Andreas Vassilakos, Jose Luis Castanon Remy, Tenace Kwaku Setor, published by Association Holistic Research Academic (Hora)
This work is licensed under the Creative Commons Attribution 4.0 License.