-
1
-
-
0038420383
-
Law enforcement officials cite changes in types of domestic terrorism threats
-
February 19. Atlanta, GA: Cable News Network
-
Allen, N., Meserve, J., & Arena, K. (2001, February 19). Law enforcement officials cite changes in types of domestic terrorism threats. CNN Sunday [Television broadcast]. Atlanta, GA: Cable News Network.
-
(2001)
CNN Sunday [Television Broadcast]
-
-
Allen, N.1
Meserve, J.2
Arena, K.3
-
3
-
-
0038758278
-
Police urge public caution in face of rising Internet crime
-
January 22
-
Appel, A. (2001, January 22). Police urge public caution in face of rising Internet crime. The Jerusalem Post, p. 4.
-
(2001)
The Jerusalem Post
, pp. 4
-
-
Appel, A.1
-
5
-
-
25044475188
-
Teen is accused of making threat against school over Internet
-
Associated Press, March 27
-
Associated Press. (2001, March 27). Teen is accused of making threat against school over Internet. St. Louis Post-Dispatch, p. A9.
-
(2001)
St. Louis Post-Dispatch
-
-
-
11
-
-
0038420274
-
-
Bernstein v. United States Department of State, 974 F. Supp 1288, 176 F.3d 1132 (9th Cir. 1999), rev'd 192 F.3d 1308 (9th Cir. 1999)
-
Bernstein v. United States Department of State, 974 F. Supp 1288, 176 F.3d 1132 (9th Cir. 1999), rev'd 192 F.3d 1308 (9th Cir. 1999).
-
-
-
-
12
-
-
0037744155
-
-
New York: Springer
-
Beth, T., Frisch, M., Simmons, G. J., Goos, G. & Hartmanis, J. (Eds.). (1992). Public-key cryptography: State of the art and future directions. New York: Springer.
-
(1992)
Public-Key Cryptography: State of the Art and Future Directions
-
-
Beth, T.1
Frisch, M.2
Simmons, G.J.3
Goos, G.4
Hartmanis, J.5
-
13
-
-
0038420288
-
-
Brandenburg v. Ohio, 395 U.S. 444 (1969)
-
Brandenburg v. Ohio, 395 U.S. 444 (1969).
-
-
-
-
15
-
-
4243312782
-
NSC chief urges US tech firms to protect computer networks
-
March 23
-
Bridis, T. (2001, March 23). NSC chief urges US tech firms to protect computer networks. The Wall Street Journal, p. B2.
-
(2001)
The Wall Street Journal
-
-
Bridis, T.1
-
16
-
-
0038081630
-
CSIS on alert for cyber saboteurs: Spy agency monitors threat to computer networks: Report
-
January 9
-
Bronskill, J. (2001, January 9). CSIS on alert for cyber saboteurs: Spy agency monitors threat to computer networks: Report. Ottawa Citizen, p. A3.
-
(2001)
Ottawa Citizen
-
-
Bronskill, J.1
-
18
-
-
0038420287
-
-
Communications Assistance for Law Enforcement Act, 47 U.S.C. §§ 1001-1010 (1994)
-
Communications Assistance for Law Enforcement Act, 47 U.S.C. §§ 1001-1010 (1994).
-
-
-
-
19
-
-
0007033641
-
Terrorism: The problem of the problem of definition
-
Cooper, H.H.A. (1978). Terrorism: The problem of the problem of definition. Chitty's Law Journal, 26, 105-108.
-
(1978)
Chitty's Law Journal
, vol.26
, pp. 105-108
-
-
Cooper, H.H.A.1
-
21
-
-
0038420284
-
-
Unpublished manuscript, School of Computer Applications, Dublin City University, Ireland
-
Davern, P., & Scott, M. (1995). Steganography: Its history and its application to computer based data files. Unpublished manuscript, School of Computer Applications, Dublin City University, Ireland.
-
(1995)
Steganography: Its History and its Application to Computer Based Data Files
-
-
Davern, P.1
Scott, M.2
-
22
-
-
0038420285
-
-
Retrieved June 4, 2001
-
Denning, D. E. (2000). Statement of Dorothy E. Denning. Retrieved June 4, 2001, from http://www.house.gov/hasc/testimony/106thcongress/00-05-23denning.htm
-
(2000)
Statement of Dorothy E. Denning
-
-
Denning, D.E.1
-
24
-
-
0038758396
-
Special FBI unit targets online fraud, gambling
-
April 27
-
DiDio, L. (1998, April 27). Special FBI unit targets online fraud, gambling. Computerworld, 47-48.
-
(1998)
Computerworld
, pp. 47-48
-
-
DiDio, L.1
-
25
-
-
4243223739
-
The phantom menace
-
September/October
-
Dreyfuss, R. (2000, September/October). The phantom menace. Mother Jones, 40-45, 88-91.
-
(2000)
Mother Jones
, vol.40-45
, pp. 88-91
-
-
Dreyfuss, R.1
-
26
-
-
0038758288
-
-
18 U.S.C. § 2518(1)(c) (1994)
-
18 U.S.C. § 2518(1)(c) (1994).
-
-
-
-
27
-
-
0038081634
-
-
Export Administration Regulations, 15 C.F.R. §§ 730-740 (1999)
-
Export Administration Regulations, 15 C.F.R. §§ 730-740 (1999).
-
-
-
-
29
-
-
0038081631
-
Officials consider threat of cyberattack
-
April 27. Atlanta, GA: Cable News Network
-
Frazier, S. (2001a, April 27). Officials consider threat of cyberattack. Daybreak [Television broadcast]. Atlanta, GA: Cable News Network.
-
(2001)
Daybreak [Television Broadcast]
-
-
Frazier, S.1
-
30
-
-
0037744156
-
What can be done to prevent cyber terrorism
-
April 29. Atlanta, GA: Cable News Network
-
Frazier, S. (2001b, April 29). What can be done to prevent cyber terrorism. CNN Sunday [Television broadcast]. Atlanta, GA: Cable News Network.
-
(2001)
CNN Sunday [Television Broadcast]
-
-
Frazier, S.1
-
33
-
-
0038420289
-
A terrorist version of NATO?
-
February 16
-
Grier, P. (2001, February 16). A terrorist version of NATO? The Christian Science Monitor, p. 1.
-
(2001)
The Christian Science Monitor
, pp. 1
-
-
Grier, P.1
-
34
-
-
0038758290
-
Cyber terrorism
-
February 15. Retrieved May 30, 2001
-
Grossman, M. (1999, February 15). Cyber terrorism. Computer Law Tip of the Week. Retrieved May 30, 2001, from http://www.mgrossmanlaw.com/articles/1999/cyberterrorism.htm
-
(1999)
Computer Law Tip of the Week
-
-
Grossman, M.1
-
35
-
-
0038420296
-
Ben Venzke of iDefense discusses cyber terrorism
-
February 7. Atlanta, GA: Cable News Network
-
Harris, L. (2001, February 7). Ben Venzke of iDefense discusses cyber terrorism. Morning News [Television broadcast]. Atlanta, GA: Cable News Network.
-
(2001)
Morning News [Television Broadcast]
-
-
Harris, L.1
-
37
-
-
0004095933
-
-
New York: Columbia University Press
-
Hoffman, B. (1998). Inside terrorism. New York: Columbia University Press.
-
(1998)
Inside Terrorism
-
-
Hoffman, B.1
-
39
-
-
21444457485
-
Chronology of international terrorism 1995
-
Hoffman, B., & Hoffman, D. K. (1996). Chronology of international terrorism 1995. Terrorism and Political Violence, 8(3), 87-127.
-
(1996)
Terrorism and Political Violence
, vol.8
, Issue.3
, pp. 87-127
-
-
Hoffman, B.1
Hoffman, D.K.2
-
40
-
-
0038081640
-
Jeffrey Hunker on cyberterrorists: The head of critical infrastructure at the National Security Council says the threat is real
-
May 5. Retrieved May 19, 2001
-
Hunker, J. (2000, May 5). Jeffrey Hunker on cyberterrorists: The head of critical infrastructure at the National Security Council says the threat is real. TechTV. Retrieved May 19, 2001, from http://www.techtv.com/print/story/0,23102,2559742.00.html
-
(2000)
TechTV
-
-
Hunker, J.1
-
45
-
-
0038758399
-
-
Junger v. Daly, 8 F. Supp 2d 708 (N.D. Ohio 1998), rev'd 209 F.3d 481 (2000)
-
Junger v. Daly, 8 F. Supp 2d 708 (N.D. Ohio 1998), rev'd 209 F.3d 481 (2000).
-
-
-
-
47
-
-
0038758349
-
-
Karn v. United States Department of State, 925 F. Supp 1 (D.D.C. 1996)
-
Karn v. United States Department of State, 925 F. Supp 1 (D.D.C. 1996).
-
-
-
-
48
-
-
0037744204
-
-
Katz v. United States, 389 U.S. 347 (1967)
-
Katz v. United States, 389 U.S. 347 (1967).
-
-
-
-
50
-
-
0039430385
-
Terror groups hide behind Web encryption: Officials say sites disguise activities
-
February 6
-
Kelley, J. (2001a, February 6). Terror groups hide behind Web encryption: Officials say sites disguise activities. USA Today, p. A7.
-
(2001)
USA Today
-
-
Kelley, J.1
-
51
-
-
4243339429
-
Terrorists use Web to mount attacks
-
February 6
-
Kelley, J. (2001b, February 6). Terrorists use Web to mount attacks. USA Today, p. A9.
-
(2001)
USA Today
-
-
Kelley, J.1
-
52
-
-
66149093944
-
U.S. finds Bin Laden an elusive target
-
March 1
-
Kelley, J. (2001c, March 1). U.S. finds bin Laden an elusive target. USA Today, p. A1.
-
(2001)
USA Today
-
-
Kelley, J.1
-
53
-
-
66149093944
-
Web hosts terror traffic: Bin Laden linked to hidden messages
-
February 6
-
Kelley, J. (2001d, February 6). Web hosts terror traffic: Bin Laden linked to hidden messages. USA Today, p. 1A.
-
(2001)
USA Today
-
-
Kelley, J.1
-
55
-
-
0038758356
-
End hackers' war, urges China paper
-
May 7
-
Kwang, M. (2001, May 7). End hackers' war, urges China paper. The Straits Times, p. 4.
-
(2001)
The Straits Times
, pp. 4
-
-
Kwang, M.1
-
58
-
-
0038758364
-
Protecting critical infrastructures
-
September
-
Lesce, T. (1999, September). Protecting critical infrastructures. Law and Order, 95-98.
-
(1999)
Law and Order
, pp. 95-98
-
-
Lesce, T.1
-
59
-
-
0004260885
-
-
Santa Monica, CA: RAND
-
Lesser, I. O., Hoffman B., Arquilla, J., Ronfeldt, D., & Zanini, D. (Eds.). (1999). Countering the new terrorism. Santa Monica, CA: RAND.
-
(1999)
Countering the New Terrorism
-
-
Lesser, I.O.1
Hoffman, B.2
Arquilla, J.3
Ronfeldt, D.4
Zanini, D.5
-
62
-
-
0037744205
-
Note: First Amendment freedoms and the encryption battle: Deciphering the importance of Bernstein v. United States Department of Justice
-
176 F.3d 1132 (9th Cir. 1999)
-
McClure, D. (2000). Note: First Amendment freedoms and the encryption battle: Deciphering the importance of Bernstein v. United States Department of Justice, 176 F.3d 1132 (9th Cir. 1999). Nebraska Law Review, 79(2), 465, 473.
-
(2000)
Nebraska Law Review
, vol.79
, Issue.2
, pp. 465
-
-
McClure, D.1
-
63
-
-
0037744199
-
Cyber enemy: America's newest threat is lurking behind computer screens
-
March 21
-
McFeatters, A. (2001, March 21). Cyber enemy: America's newest threat is lurking behind computer screens. Pittsburgh Post-Gazette, p. E-3.
-
(2001)
Pittsburgh Post-Gazette
-
-
McFeatters, A.1
-
64
-
-
0038758366
-
Legislating terrorism: Justice issues and the public forum
-
March, Las Vegas, NV
-
Mullendore, K., & White, J. R. (1996, March). Legislating terrorism: Justice issues and the public forum. Paper presented at the Academy of Criminal Justice Sciences, Las Vegas, NV.
-
(1996)
Academy of Criminal Justice Sciences
-
-
Mullendore, K.1
White, J.R.2
-
65
-
-
0038420346
-
Computer information systems and the high technology offender: The need for an interdisciplinary approach in higher education curricula
-
Myers, L. J., & Beatty, P. T. (2001). Computer information systems and the high technology offender: The need for an interdisciplinary approach in higher education curricula. ACJS Today, 23(1), 1, 4-6.
-
(2001)
ACJS Today
, vol.23
, Issue.1
, pp. 1
-
-
Myers, L.J.1
Beatty, P.T.2
-
67
-
-
0037744241
-
-
Omnibus Crime Control and Safe Streets Act, Title III, 42 U.S.C. § 3789(d) (1968)
-
Omnibus Crime Control and Safe Streets Act, Title III, 42 U.S.C. § 3789(d) (1968).
-
-
-
-
68
-
-
0000230675
-
Attacks on copyright marking systems
-
D. Aucsmith (Ed.). New York: Springer
-
Petitcolas, F. A., Anderson, R. J., & Kuhn, M. G. (1998). Attacks on copyright marking systems. In D. Aucsmith (Ed.), Information hiding: Second international workshop (pp. 219-239). New York: Springer.
-
(1998)
Information Hiding: Second International Workshop
, pp. 219-239
-
-
Petitcolas, F.A.1
Anderson, R.J.2
Kuhn, M.G.3
-
69
-
-
0004198635
-
-
Upper Saddle River, NJ: Prentice Hall
-
Pfleeger, C. (1989). Security in computing. Upper Saddle River, NJ: Prentice Hall.
-
(1989)
Security in Computing
-
-
Pfleeger, C.1
-
70
-
-
4243599831
-
Terrorists taking up Cyberspace: Web sites have become inexpensive, easily accessible tools for giving instructions to operatives and raising funds
-
February 8
-
Piller, C. (2001, February 8). Terrorists taking up Cyberspace: Web sites have become inexpensive, easily accessible tools for giving instructions to operatives and raising funds. Los Angeles Times, p. A1.
-
(2001)
Los Angeles Times
-
-
Piller, C.1
-
71
-
-
0012418538
-
-
Retrieved May 30, 2001
-
Pollitt, M. M. (2001). Cyber terrorism - Fact or fancy? Retrieved May 30, 2001, from http://www.cosc.georgetown.edu/̃denning/infosec/pollitt.html
-
(2001)
Cyber Terrorism - Fact or Fancy?
-
-
Pollitt, M.M.1
-
72
-
-
0038420368
-
The RIAA's low watermark
-
July
-
The RIAA's low watermark. (2001, July). Wired, 61-63.
-
(2001)
Wired
, pp. 61-63
-
-
-
73
-
-
0038081697
-
-
Rice v. Paladin Enterprises, 128 F.3d 233 (4th Cir. 1997), cert. denied 523 U.S. 1074 (1998)
-
Rice v. Paladin Enterprises, 128 F.3d 233 (4th Cir. 1997), cert. denied 523 U.S. 1074 (1998).
-
-
-
-
74
-
-
0003811515
-
-
Santa Monica, CA: RAND
-
Ronfeldt, D., Arquilla, J., Fuller, G. E., & Fuller, M. (1998). The Zapatista social netwar in Mexico. Santa Monica, CA: RAND.
-
(1998)
The Zapatista Social Netwar in Mexico
-
-
Ronfeldt, D.1
Arquilla, J.2
Fuller, G.E.3
Fuller, M.4
-
75
-
-
0038081694
-
Letters to the editor
-
February 22
-
Roy, R. (2001, February 22). Letters to the editor. The Statesman.
-
(2001)
The Statesman
-
-
Roy, R.1
-
76
-
-
0038081685
-
Judgment on "Nuremberg": An analysis of free speech and antiabortion threats made on the Internet
-
Winter
-
Schlosberg, J. (2001, Winter). Judgment on "Nuremberg": An analysis of free speech and antiabortion threats made on the Internet. Journal of Science & Technology Law, 52-78.
-
(2001)
Journal of Science & Technology Law
, pp. 52-78
-
-
Schlosberg, J.1
-
77
-
-
0004572608
-
-
New Brunswick, NJ: Transaction
-
Schmid, A. P. (1988). Political terrorism: A research guide to concepts, theories, data bases, and literature. New Brunswick, NJ: Transaction.
-
(1988)
Political Terrorism: A Research Guide to Concepts, Theories, Data Bases, and Literature
-
-
Schmid, A.P.1
-
81
-
-
0004056227
-
-
San Francisco: Albion
-
Shea, V. (1994). Netiquette. San Francisco: Albion.
-
(1994)
Netiquette
-
-
Shea, V.1
-
82
-
-
0038420372
-
Getting the message across: Hidden writing is a sensation
-
February 9
-
Sloan, W. (2001, February 9). Getting the message across: Hidden writing is a sensation. Bangkok Post.
-
(2001)
Bangkok Post
-
-
Sloan, W.1
-
83
-
-
0038081687
-
Current U.S. encryption regulations: A federal law enforcement perspective
-
Smith, C. (2000). Current U.S. encryption regulations: A federal law enforcement perspective. New York University Journal of Legislation and Public Policy, 3, 11-20.
-
(2000)
New York University Journal of Legislation and Public Policy
, vol.3
, pp. 11-20
-
-
Smith, C.1
-
84
-
-
0038758362
-
Terrorists plan havoc using Internet
-
March 21
-
Spiegel, P. (2001, March 21). Terrorists plan havoc using Internet. The Financial Times, p. 11.
-
(2001)
The Financial Times
, pp. 11
-
-
Spiegel, P.1
-
85
-
-
0038758369
-
Steganography thumbprinting
-
January 26
-
Steganography thumbprinting. (1998, January 26). Phrack Magazine, 23-26.
-
(1998)
Phrack Magazine
, pp. 23-26
-
-
-
89
-
-
0038758379
-
-
United States v. Barnett, 667 F.2d 835 (9th Cir. 1982)
-
United States v. Barnett, 667 F.2d 835 (9th Cir. 1982).
-
-
-
-
90
-
-
0038758378
-
-
United States v. Giordano, 416 U.S. 505 (1974)
-
United States v. Giordano, 416 U.S. 505 (1974).
-
-
-
-
91
-
-
0038081698
-
-
United States v. Mendelsohn, 896 F.2d 1183 (9th Cir. 1990)
-
United States v. Mendelsohn, 896 F.2d 1183 (9th Cir. 1990).
-
-
-
-
92
-
-
0038420373
-
-
United States v. O'Brien, 391 U.S. 367 (1968)
-
United States v. O'Brien, 391 U.S. 367 (1968).
-
-
-
-
93
-
-
84908977670
-
-
Washington, DC: United States Department of Justice, Terrorism Research and Analytical Center, National Security Division
-
U.S. Department of Justice. (1995). Terrorism in the United States. Washington, DC: United States Department of Justice, Terrorism Research and Analytical Center, National Security Division.
-
(1995)
Terrorism in the United States
-
-
-
94
-
-
0008675458
-
-
Washington, DC: U.S. Department of Justice Counterterrorism Threat and Assessment and Warning Unit, National Security Division
-
U.S. Department of Justice. (1998). Terrorism in the United States. Washington, DC: U.S. Department of Justice Counterterrorism Threat and Assessment and Warning Unit, National Security Division.
-
(1998)
Terrorism in the United States
-
-
-
95
-
-
0003891710
-
-
Washington, DC: Author
-
U.S. Department of State. (1996). Patterns of global terrorism. Washington, DC: Author.
-
(1996)
Patterns of Global Terrorism
-
-
-
96
-
-
0003891710
-
-
Washington, DC: Author
-
U.S. Department of State. (2000). Patterns of global terrorism. Washington, DC: Author.
-
(2000)
Patterns of Global Terrorism
-
-
-
105
-
-
0038081705
-
-
Retrieved June 10, 2001
-
Yahoo! Inc. (2001). Terms of service. Retrieved June 10, 2001, from http://docs/yahoo.com/info/terms
-
(2001)
Terms of Service
-
-
-
106
-
-
0347468730
-
In business today and tomorrow
-
July
-
Zhao, J., Koch, E., & Luo, C. (1998, July). In business today and tomorrow. Communications of the ACM, 41, 67-72.
-
(1998)
Communications of the ACM
, vol.41
, pp. 67-72
-
-
Zhao, J.1
Koch, E.2
Luo, C.3
|