Law enforcement catching up with terrorists, cyber criminals that use Internet to connect

Terrorists recruit on file-host sites


By Shaun Waterman
Washington Times

Terrorists using Internet techniques pioneered by child molesters and copyright pirates to recruit new followers lost a battle when Pakistani authorities arrested five Americans who reportedly wanted to join the jihad.

But videos, audios and written missives from Osama bin Laden and militant Muslim clerics continue to flow through cyberspace in an effort to attract new followers, experts say.

LexisNexis Copyright © 2013 LexisNexis, a division of Reed Elsevier Inc. All rights reserved.   
Terms and Conditions Privacy Policy

Full story: Law enforcement catching up with terrorists, cyber criminals that use Internet to connect

Request product info from top Police Technology companies

Thank You!

= required Error occured while sending data

By submitting your information, you agree to be contacted by the selected vendor.
  1. Tags
  2. Terrorism Prevention and Response
  3. Investigations
  4. CSI / Forensics
  5. Communications
  6. Federal Law Enforcement
  7. Patrol Issues
  8. Homeland Security

Join the discussion

Brand focus

Sponsored content
7 types of technologies you need to build a body-worn camera solution

7 types of technologies you need to build a body-worn camera solution

A body-worn camera program can be built effectively if all the elements are in place

logo for print