ABSTRACT

This chapter explores the types of online mechanisms that can be used to further the cause of the terrorist groups, the digital evidence created and left behind in the process, and the methods that can be used to determine and protect the authenticity of the evidence. Terrorist organizations thrive in the relative anonymity of the internet and their use of online mechanisms to spread their message as well as coordinate and plan their activities. More and more of our daily activities are recorded by mobile devices and wearable devices. The chain of custody of digital evidence is an essential component of the admissibility of the evidence in a court of law. The evidence needs to be maintained in a manner that limits access to personnel with a need-to-know. Once an individual’s identity is authenticated, their role or need-to-know for an investigation can be established and access can be granted for suitably authorized individuals.