Main Article Content
Abstract
The aim of this study is to present how acts of terrorism are financed and orchestrated in secrecy today, by committing criminal offenses, through donations, and by legal businesses and by the use of smartphone applications. Terrorists abuse the anonymity of the internet, and constantly look for secure channels of communication, to further their goals and to stay one step ahead of law enforcement. Through encrypted channels, terrorists spread their propaganda, recruit new members, and try to reach potential financers etc. In this paper, we introduce the categories of smartphone apps used by terrorists. We also examine the weak point of these apps, and methods for infiltration.
Keywords
terrorist financing
intelligence
smartphone applications
terrorist groups
IRA
security
propaganda
ISIS