-
1
-
-
85033300784
-
-
In this case, the Trojan horse would be a malicious program, as the name implies, inserted without initial suspicion and activated at a later advantageous time
-
In this case, the Trojan horse would be a malicious program, as the name implies, inserted without initial suspicion and activated at a later advantageous time.
-
-
-
-
2
-
-
85033299280
-
-
DNS attack scenario that Princeton researchers used to exploit a flaw in Java
-
See http://www.cs.princeton.edu/∼ddean/java/dns-scenario.html for the DNS attack scenario that Princeton researchers used to exploit a flaw in Java.
-
-
-
-
3
-
-
85033326255
-
-
note
-
By a most unfortunate coincidence, this scenario was fully developed four days before the tragic crash of Commerce Secretary Brown's airplane in Croatia. While not wishing to exploit such a tragic loss, we feel the scenario is still clearly relevant. Our most sincere condolences go to the families, friends and colleagues of all who perished.
-
-
-
-
4
-
-
85033292714
-
CIA Gears Up to Thwart "Information Attacks"
-
26 June
-
'CIA Gears Up to Thwart "Information Attacks'", Washington Post, 26 June 1996, p A19.
-
(1996)
Washington Post
-
-
-
6
-
-
5844336209
-
-
Washington, DC: US Department of Justice, Law Enforcement Assistance Administration
-
Robert Kupperman, Facing Tomorrow's Terrorist Incident Today (Washington, DC: US Department of Justice, Law Enforcement Assistance Administration 1977). Cited in Grant Wardlaw, Political Terrorism, 2nd ed. (Cambridge: CUP 1989) p.26.
-
(1977)
Facing Tomorrow's Terrorist Incident Today
-
-
Kupperman, R.1
-
7
-
-
0013489415
-
-
Cambridge: CUP
-
Robert Kupperman, Facing Tomorrow's Terrorist Incident Today (Washington, DC: US Department of Justice, Law Enforcement Assistance Administration 1977). Cited in Grant Wardlaw, Political Terrorism, 2nd ed. (Cambridge: CUP 1989) p.26.
-
(1989)
Political Terrorism, 2nd Ed.
, pp. 26
-
-
Wardlaw, G.1
-
8
-
-
85033317925
-
-
note
-
This assumption is based on the notion that in political crimes, as opposed to crimes for ego or greed, the perpetrator and the beneficiary are usually not the same person, with more tenuous connections, and the intended long-term gains from the crime are usually abstract. From a law enforcement perspective, this places primacy on the motivations of the act; however, from a military perspective, it is the act itself which merits focus, since it is the act itself which wreaks the damage and poses the threat to national security. This is one of many facets in the argument surrounding the degree to which counterterrorism should be approached from a military vis-à-vis law enforcement perspective.
-
-
-
-
9
-
-
0041498858
-
-
That Wild, Wild Cyberspace Frontier. Internet source: 5 April
-
Review of Richard Hundley and Robert Anderson, 'Security in Cyberspace: An Emerging Challenge for Society', from That Wild, Wild Cyberspace Frontier. Internet source: http://www.rand.org/publications/RRR/RRR.fall95.cyber/wild.html, 5 April 1996.
-
(1996)
Security in Cyberspace: An Emerging Challenge for Society
-
-
Hundley, R.1
Anderson, R.2
-
12
-
-
85033318005
-
-
The IRA were specifically targeting the Square Mile of London on a weekend to minimize casualties but maximize damage to a financial center of western Europe
-
The IRA were specifically targeting the Square Mile of London on a weekend to minimize casualties but maximize damage to a financial center of western Europe.
-
-
-
-
14
-
-
85033301394
-
-
The best mixture of protection, detection and reaction strategies for the information infrastructure is itself an issue of debate, and is far beyond the scope of this article
-
The best mixture of protection, detection and reaction strategies for the information infrastructure is itself an issue of debate, and is far beyond the scope of this article.
-
-
-
-
16
-
-
85033309511
-
-
Telephone conversation with Senator Sam Nunn's office, 2 July 1996
-
Telephone conversation with Senator Sam Nunn's office, 2 July 1996.
-
-
-
|