TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.
-
Upload
brian-richards -
Category
Documents
-
view
220 -
download
1
Transcript of TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.
![Page 1: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/1.jpg)
TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL
IN INDONESIA
IT & Cyber Crime Unit of INP 1
![Page 2: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/2.jpg)
INTRODUCTIONTHE GROWTH OF INFORMATION TECHNOLOGY AS WELL
AS INTERNET HAS BROUGHT US BOTH POSITIVE AND NEGATIVE IMPACT.
ONE OF THE NEGATIVE IMPACTS IS THE USAGE OF INTERNET FOR ACHIEVING TERRORIST GROUPS’ GOALS.
IN MANY CASES, TERRORIST GROUPS ARE AHEAD OF GOVERNMENTS IN USING THIS TECHNOLOGY TO FURTHER THEIR ACTIVITIES.
TERRORISTS IN INDONESIA IN FACT HAVE USED IT AS THEIR TOOLS AS WELL AS COMMUNICATION MEDIA TO SUPPORT THEIR TERROR ACTIVITIES AND ACHIEVE THEIR CERTAIN GOALS. WE CLASSIFIED IT AS CYBER TERRORISM.
IT & Cyber Crime Unit of INP 2
![Page 3: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/3.jpg)
CYBER TERRORISM
IT & Cyber Crime Unit of INP 3
![Page 4: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/4.jpg)
WHAT IS CYBER TERRORISM?
CYBER TERRORISM IS A PREMEDITATED, POLITICALLY MOTIVATED ACT AGAINST INFORMATION, COMPUTER SYSTEMS, AND DATA WHICH RESULT IN VIOLENCE AGAINST NONCOMBATANT TARGETS BY SUB NATIONAL GROUPS OR CLANDESTINE AGENTS (POLLITS, 2002).
IN INDONESIA, WE DEFINE CYBER TERRORISM AS: ANY TERRORISM ACTS USING INFORMATION TECHNOLOGY AND COMMUNICATION SPECIALLY INTERNET AS A TOOL TO CONDUCT FUND RAISING, COLLECT INFORMATION, CAMPAIGN ANY PARTICULAR ISSUES THAT ARE CAUSING FEAR AS WELL AS TO EXECUTE ANY TERRORIST ATTACKS.
IT & Cyber Crime Unit of INP 4
![Page 5: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/5.jpg)
TERRORISTS’ MOTIVATION IN INDONESIA
• THE ESSENCE OF TERRORISM IS TO IMPOSE INTEREST FACTOR OR ACTION OR THREATEN HARASSMENT, CAUSING FEAR, TARGETING CIVIL CITIZEN (NON-MILITARY/NON-COMBATANT), AND HAS PARTICULAR TARGETS, USUALLY POLITICAL AGENDA.
• FOUR WAVES OF MODERN TERRORISM:– ANARCHIST/REVOLUTIONARY TERRORISM– ANTI COLONIAL; NATIONALIST TERRORISM– NEW LEFT (IDEOLOGICAL) TERRORISM– RADICAL RELIGIOUS TERRORISM
• IN INDONESIA, MOST TERRORISTS ARE MOTIVATED BY RELIGIOUS RADICALISM SO THAT CLASSIFIED AS RADICAL RELIGIOUS TERRORISM.
IT & Cyber Crime Unit of INP 5
![Page 6: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/6.jpg)
TERRORISTS USED THE INTERNET
THE TERRORISTS EXPLOIT INTERNET FOR: – MEDIA COMMUNICATION
• NETWORKING WITHIN GROUPS• CAMPAIGN AND PROPAGANDA• MEMBERS RECRUITMENT• FUND RAISING• COLLECT INFORMATION AND LEARNING MEDIA
– EXECUTING ANY ATTACK IN CYBER SPACE.
IT & Cyber Crime Unit of INP 6
![Page 7: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/7.jpg)
TERRORISTS ACTIVITIES VIA INTERNET
CREATING WEBSITE/BLOGCOMMUNICATION VIA EMAIL OR CHATTINGDISCUSSION VIA CHAT ROOME-TRANSACTION (E-COMMERCE/E-BANKING)USING SEARCHING MACHINE TO COLLECT DATA OR
FINDING INFORMATIONPHISHING/HACKINGMANY OTHER TYPES SUCH AS VIRUSES, WORM,
TROJAN, ROOTKIT, MALICIOUS CODE, AND DDOS ATTACK.
IT & Cyber Crime Unit of INP 7
![Page 8: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/8.jpg)
POTENTIAL TARGET
IT & Cyber Crime Unit of INP 8
![Page 9: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/9.jpg)
IT & Cyber Crime Unit of INP 9
OFFICIAL WEBSITESOFFICIAL WEBSITES – THESE ARE IDENTIFIED AS GOVERNMENT WEB SITES
THAT ARE AVAILABLE TO THE PUBLIC FOR INFORMATION ON GOVERNMENTAL SERVICES.
THE VAST MAJORITY OF GOVERNMENT WEB SITES ARE HOSTED BY PRIVATE INDUSTRY INTERNET SERVICE PROVIDERS.
TERRORIST ORGANIZATIONS CAN GATHER INFORMATION FROM OFFICIAL GOVERNMENT WEBSITES ON LAW ENFORCEMENT AND MILITARY PERSONNEL AND ACTIVITIES.
GOVERNMENT AGENCIES SHOULD CONDUCT PERIODIC REVIEWS OF THEIR WEBSITES IN ORDER TO DETERMINE IF CRITICAL INFORMATION IS BEING POSTED TO THE SITE.
![Page 10: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/10.jpg)
IT & Cyber Crime Unit of INP 10
OFFICIAL WEBSITES
TERRORIST GROUPS CAN LAUNCH DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS AGAINST GOVERNMENT WEBSITES TO DISRUPT SERVICE.
WEBSITES MAY BE ATTACKED BY TERRORIST ORGANIZATIONS IN ORDER TO GAIN ACCESS TO GOVERNMENT NETWORKS WHERE CRITICAL INFORMATION IS STORED.
THE CYBER ATTACKS OCCUR DUE TO THE LACK OF SECURITY MECHANISMS ON COMPUTER SYSTEMS.
![Page 11: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/11.jpg)
IT & Cyber Crime Unit of INP 11
FINANCIAL & MONETARY INSTITUTIONS
MONETARY INSTITUTIONS - THE VERY NATURE OF A NATION-STATES EXISTENCE RELIES ON ITS ABILITY TO FUNCTION ECONOMICALLY.
THREATS TO THE FINANCIAL SYSTEMS WILL HAVE DIRE CONSEQUENCES FOR A NATIONS ABILITY TO OPERATE EFFECTIVELY AND EFFICIENTLY.
THE VAST MAJORITY OF FINANCIAL AND BANKING SYSTEMS NOW HAVE A PRESENCE ON THE INTERNET.
THE PRESENCE OF BANKING ON THE INTERNET ALSO EXPOSES THE FINANCIAL SYSTEMS TO RISKS FROM CYBER TERRORIST ATTACKS.
PRIVATE INDUSTRY AND GOVERNMENT MUST ENSURE THAT THEY SECURE THEIR COMPUTER SYSTEMS.
![Page 12: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/12.jpg)
IT & Cyber Crime Unit of INP 12
WATER SYSTEMSWATER SOURCES – THE WATER FACILITIES, PLANTS AND DAMS THAT
CONTAIN AND PROVIDE WATER AND ENERGY TO COMMUNITIES.THESE FACILITIES ARE CONTROLLED BY SUPERVISORY CONTROL AND
DATA ACQUISITION SYSTEMS (SCADA). IMAGINE THE IMPLICATIONS OF A CYBER TERRORIST GAINING
ACCESS TO THE SCADA NETWORK THAT CONTROLS A LARGE DAM AND THEN RELEASING THE WATER UPON AN UNSUSPECTING TOWN OR CITY.
THE VULNERABILITIES OF SCADA ARE WELL KNOWN AND DOCUMENTED.
![Page 13: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/13.jpg)
INDONESIAN TERRORISTS’ WEBSITES
THE INP HAS MONITORED SOME WEBSITES USED BY THE TERRORIST GROUPS:
WEBSITE www.anshar.net RELATED WITH ABDUL AZIZ AND POSSIBLY RELATED WITH THE
SECOND BALI BOMBING TRAGEDYWEBSITE www.ar-risalah.com
RELATED WITH AR RISALAH MAGAZINE;WEBSITE www.istimata.com
RELATED WITH THE SECOND BALI BOMBING TRAGEDY;WEBSITE www.muharridh.comwww.geocities.com/maktabistimata.index.html?200619
BRIGADE ISTIMATA INTERNATIONAL
IT & Cyber Crime Unit of INP 13
![Page 14: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/14.jpg)
ACTUAL CASE
INVESTIGATION ON WEBSITE www.anshar.netTHE INVESTIGATION WAS FOCUSED IN:
- THE WEBSITE CREATOR;- THE OBJECTIVES OF THE WEBSITE CREATION;- INVOLVEMENT OF OTHER TERRORISTS GROUPS;- FUNDING: WHO SPONSORED THE WEBSITE; - RECRUITMENT METHOD FOR NEW MEMBERS;
IT & Cyber Crime Unit of INP 14
![Page 15: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/15.jpg)
PARTIES INVOLVED IN THE INVESTIGATION
• INVESTIGATORS OF THE INP IT & CYBER CRIME UNIT OF INP• YAHOO ADMINISTRATOR• INTERNET PROVIDER• CELLULAR PROVIDER• OTHER INVESTIGATORS FROM OTHER COUNTRIES AFP & FBI• SOME IT EXPERTS
IT & Cyber Crime Unit of INP 15
![Page 16: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/16.jpg)
RESULT OF THE INVESTIGATION
THE INVESTIGATION HAS SUCCEEDED TO:– REVEAL THE MOTIVATION OF THE WEBSITE
ESTABLISHMENT;– REVEAL ANY PARTIES WHO SUPPORTED THE WEBSITE;– IDENTIFY ANY PERSONS WHO DIRECTLY AND INDIRECTLY
INVOLVED IN ESTABLISHING, DEVELOPING AND MAINTAINING THE WEBSITE AS WELL AS THEIR RELATION WITH THE TERRORISTS GROUPS WHICH OPERATES IN INDONESIA.
IT & Cyber Crime Unit of INP 16
![Page 17: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/17.jpg)
CHALLENGES OF INVESTIGATING CYBER TERRORISM
LOCUS DELICTI (THE EXACT PLACE WHERE A LAW WAS BROKEN) ISSUE
IN THIS CASE, THE INVESTIGATOR HAS COME TO THE CONCLUSION THAT THE LOCUS DELICTI TOOK PLACE IN CENTRAL JAVA.
GENERALLY DIGITAL EVIDENCE IS NOT RECOGNIZED AS LEGAL EVIDENCE BEFORE THE COURT UNDER INDONESIAN LEGAL SYSTEM. DIGITAL EVIDENCE SHOULD BE INTRODUCED TO INDONESIAN LEGAL SYSTEM, ALLOWING DIGITAL EVIDENCE AS LEGAL EVIDENCE BEFORE THE COURT SUCH AS COMPUTER PROGRAM, EMAIL AND WEBSITE.
ESPECIALLY FOR TERRORISM CASE, DIGITAL EVIDENCE HAS BEEN ALLOWED AS LEGAL EVIDENCE BEFORE THE COURT, HOWEVER IT IS STILL REQUIRED MORE SOSIALIZATION IN EACH LAW ENFORCEMENT OFFICER INCLUDING POLICE, ATTORNEY AND JUDGES.
IT & Cyber Crime Unit of INP 17
![Page 18: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/18.jpg)
INVESTIGATION REPORTS: WEBSITE www.anshar.net CASE
SUSPECTS:
• THE WEBSITE WAS INITIATED BY NOORDIN M. TOP (ONE OF THE TERRORISTS “MOST WANTED”), CREATED AND HOSTED BY MOHAMMAD AGUNG PRABOWO A.K.A MAXFIDERMAN
• THE CONTENT/SUBSTANCE WAS CREATED AND UPLOADED BY ABDUL AZIS A.K.A QITAL
IT & Cyber Crime Unit of INP 18
![Page 19: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/19.jpg)
“MAX FIDERMAN”MOHAMMAD AGUNG PRABOWO
Student of Electronic EngineeringFaculty of Semarang University
AGUNG SETYADI Skom.“pakne” “salafuljihad”
IT TEACHER at UNIVERSITY ofSTIKUBANK
ABDUL AZIS “qital”(Computer Teacher at Senior High
School in Pekalongan)
“AL-IRHAB” IMAM SAMUDRA
CAHYO a.k.a WAHYU a.k.a WISNU,ABDUL HADI
(DEAD)
TEDI a.k.aRENO
Request to learn: CARDINGHACKINGHOSTING/DOMAIN
REJECTED TO BUY LAPTOP BY CARDINGJOIN NGAJI ON JUNE 14, 2005THOUGHT AGUNG ABOUT:- CARDING- HACKING- HOSTING
- MET MAXFIDER - FOUND LAPTOP- RECEIVED Rp 3 MILLION VIA BANK TRANSFER- SENT LAPTOP ECS 1,2 GHz (JUNE 2005) MET ONCE
TIME
GROBOGANREHABILITATIONCENTER- Laptop- Mobile Phone
Website anshar.net
ASKED MAXFIDER TO JOIN NGAJIMET MAX 3 TO 5 TIMESLEARNED CARDING,HACKING,HOSTING, PROXY
JUNE TO AUGUST 2005JUNE TO AUGUST 2005
Rented House in Kedung WuniMedono, Pekalongan FATHUROHMANYASIN a.k.a REZBUKHORI
AUSTRALIAN EMBASSY BOMBINGAUSTRALIAN EMBASSY BOMBING
Channel #caféislam #ahlussunnah
ISLAMICARD
SECOND BALI BOMBING SECOND BALI BOMBING OCTOBER 1, 2005OCTOBER 1, 2005
AFTER KUNINGANAFTER KUNINGANBOMBING BOMBING
NMT
-HELPED TO FIND RENTED HOUSE IN MEDONO -TOGETHER DEVELOPED WEB CONTENT
IT & Cyber Crime Unit of INP 19
![Page 20: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/20.jpg)
hostin
g
dom
ain
www.openhosting.co.uk
www.joker.com
MAX FIDERMAN alias MAP Gg. Pangeran Cendono Rt. 04/05
Dawe, Kudus, Central Java
www.anshar.net“online”
Registration Form:- E-mail: [email protected] Payment Confirmation- Credit Card Form- Submit of Credit Card (Carding) hosting = £300 per year domain = US$60 per year
QITAL
UPLOADED CONTENTAND TEMPLATE
http://www.anshar.net
HOSTING & DOMAIN REGISTRATIONhttp://www.anshar.net
IT & Cyber Crime Unit of INP 20
![Page 21: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/21.jpg)
INVESTIGATION REPORTS: WEBSITE www.anshar.net
PURPOSE OF THE WEBSITE ESTABLISHMENT:
– PROPAGANDA;
– PUBLICATION OF EXECUTION OF THE AL-JAMAAH AL-ISLAMIYAH GROUPS;
– DISTRIBUTION OF TRAINING MATERIAL FOR THE ASKARIYAH (SOLDIERS).
IT & Cyber Crime Unit of INP 21
![Page 22: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/22.jpg)
CONTENT OF WEBSITE anshar.net
IT & Cyber Crime Unit of INP 22
![Page 23: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/23.jpg)
TEMPLATE CONTENT OF www.anshar.netCREATED BY NMT FROM ASKARIYAH TACTICS
IT & Cyber Crime Unit of INP 23
![Page 24: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/24.jpg)
JI HAD A PLAN TO TARGET SOME LOCATIONS
IT & Cyber Crime Unit of INP 24
![Page 25: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/25.jpg)
IT & Cyber Crime Unit of INP 25
![Page 26: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/26.jpg)
IT & Cyber Crime Unit of INP 26
![Page 27: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/27.jpg)
IT & Cyber Crime Unit of INP 27
![Page 28: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/28.jpg)
IT & Cyber Crime Unit of INP 28
![Page 29: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/29.jpg)
IT & Cyber Crime Unit of INP 29
![Page 30: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/30.jpg)
IT & Cyber Crime Unit of INP 30
![Page 31: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/31.jpg)
IT & Cyber Crime Unit of INP 31
![Page 32: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/32.jpg)
CONCLUSIONTHE INTERNET WILL FACILITATE THE ABILITY OF TERRORIST
ORGANIZATIONS TO COMMUNICATE AMONG THEIR CELLS, RECRUIT NEW MEMBERS, ADVOCATE THEIR VIEWS WITH PROPAGANDA, GATHER INTELLIGENCE OR LAUNCH DEVASTATING ATTACKS ON AN UNPROTECTED CRITICAL INFRASTRUCTURE.
NATIONS NEED TO BE AWARE OF AND BE PREPARED TO RESPOND TO TERRORISM ON THE INTERNET.
FROM WEBSITE INTENSIVE INVESTIGATION, WE WILL FIND OUT THE PARTIES WHO ACTIVELY INVOLVED IN TERRORIST GROUPS, AND COUNTER THE TERRORISTS THREAT.
IT & Cyber Crime Unit of INP 32
![Page 33: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1.](https://reader036.fdocuments.in/reader036/viewer/2022062404/55150842550346a87d8b46d6/html5/thumbnails/33.jpg)
THE END
IT & Cyber Crime Unit of INP 33