Main Article Content

Abstract

The aim of this study is to present how acts of terrorism are financed and orchestrated in secrecy today, by committing criminal offenses, through donations, and by legal businesses and by the use of smartphone applications. Terrorists abuse the anonymity of the internet, and constantly look for secure channels of communication, to further their goals and to stay one step ahead of law enforcement. Through encrypted channels, terrorists spread their propaganda, recruit new members, and try to reach potential financers etc. In this paper, we introduce the categories of smartphone apps used by terrorists. We also examine the weak point of these apps, and methods for infiltration.

Keywords

terrorist financing intelligence smartphone applications terrorist groups IRA security propaganda ISIS

Article Details