(U//FOUO) DHS-FBI Bulletin: Use of the Internet for Attack Planning

Roll Call Release: Use of the Internet for Attack Planning

  • 1 page
  • For Official Use Only
  • April 24, 2013

Download

(U//FOUO) Malicious actors may leverage the Internet to gain information against a potential target to support pre-operational planning efforts for kinetic or cyber attacks. Malicious actors can use Internet search engines for information such as maps, company photographs or blueprints, and gain additional details from social media sites and Web blogs. Some actors may use more sophisticated techniques—such as phishing, spear phishing, or actual penetration of an organization’s network or devices—which can be used to gather personal, sensitive, or proprietary data.

Share this:

Facebooktwitterredditlinkedinmail