Abstract
Recently many autogenous terrors are occurred in many countries, and this kind of terrors are spread mostly through the Internet. Therefore, there should be regulations and tools to monitor suspicious Internet activities. Recently, due to the increased number of cyber terrors, many countries try to enact regulations against web server misuses. But, the establishment of such laws is slowed by the concerns of privacy of web users.
This paper proposed legislative measures against cyber terrors as well as the proposed scheme to collect terror-related information from web servers. The result of this research can reduce overall costs of anti-terror activities in the Internet.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Report: JFK terror plotters used Google Earth, http://news.com.com/8301-10784-3-9725253-7.html
Canada Foils Attack, Arrests 17 Al-Qaida-Inspired Suspects, http://abclocal.go.com/kabc/story?section=nation_world&id=4233870
Weimann, G.: Terror on the internet: The new arena, the new challenges, United States Institute for Peace, p. 309 (2006)
Estevez-Tapiador, J.: The emergence of cyber-terrorism. In: Distributed Systems Online, IEEE, Los Alamitos (2004)
Kim, I., Chung, Y., Lee, Y., Im, E.G., Won, D.: Information system modeling for analysis of propagation effects and levels of damage. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganà, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 54–63. Springer, Heidelberg (2006)
Kim, I., Chung, Y., Lee, Y., Won, D.: A time-variant risk analysis and damage estimation for large-scale network systems. In: Proc. of ICCSA 2005. LNCS, vol. 3481, pp. 92–101. Springer, Heidelberg (2005)
Zittrain, J., Edelman, B.: Empirical analysis of internet filtering in china, Technical report, Berkman Center for Internet & Society at Harvard Law School (2003)
HR 3162, RDS, 107th CONGRESS 1st Session H. R. 3162, IN THE SENETE OF THE UNITED STSTES (October 24, 2001), http://www.epic.org/privacy/terrorism/hr3162.html
Communications Assistance for Law Enforcement Act(CALEA), Pub. L. No. 103-414, 108 Stat. 4279 (1994), http://www.askcalea.net/
Foreign Intelligence Surveillance Act (FISA), Pub. L. No 95-511, 92 Stat. 1783 (1978), http://www.eff.org/Censorship/Terrorism_militias/fisa_faq.html
Anti-terrorism: Crime and Security Act, ISBN 0 10 542401 3 (2001), http://www.opsi.gov.uk/ACTS/acts2001/20010024.htm
German court outlaws wiretapping without court order (August 10, 2005), http://www.edri.org/edrigram/number3.16/wiretapping
Communications Surveillance (wiretapping and related activities) Act (2003), http://www.fipr.org/030818ripa.html
Sander, T., Christian, F.: Tschudin, protecting mobile agents against malicious hosts. Mobile Agents and Security, pp. 44–60 (1998)
Jansen, W.A.: Countermeasures for mobile agent security. Computer Communications, Special Issue on Advanced Security Techniques for NetworkProtection (2000)
Bellavista, P., Corradi, A., Stefanelli, C.: A secure and open mobile agent programming environment. In: Proceedings of the Fourth International Symposium on Autonomous Decentralized Systems (ISADS ’99), pp. 238–245 (1999)
Lee, Y., Kim, I., Kim, S., Won, D.: A method for detecting the exposure of ocsp responder’s session private key in d-ocsp-kis. In: Chadwick, D., Zhao, G. (eds.) EuroPKI 2005. LNCS, vol. 3545, pp. 215–226. Springer, Heidelberg (2005)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, Springer, Heidelberg (1985)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, I.J., Lee, CW., Im, E.G. (2007). Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-74477-1_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74475-7
Online ISBN: 978-3-540-74477-1
eBook Packages: Computer ScienceComputer Science (R0)