메뉴 건너뛰기




Volumn 25, Issue 1, 2002, Pages 61-74

The use and limits of U.S. intelligence

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0038897166     PISSN: 0163660X     EISSN: None     Source Type: Journal    
DOI: 10.1162/016366002753358320     Document Type: Review
Times cited : (9)

References (10)
  • 2
    • 0040022656 scopus 로고    scopus 로고
    • R. James Woolsey, testimony before House Committee on National Security, February 12, 1998
    • R. James Woolsey, testimony before House Committee on National Security, February 12, 1998.
  • 4
    • 0039430385 scopus 로고    scopus 로고
    • Terror groups hide behind web encryption
    • June 19
    • See Jack Kelley, "Terror Groups Hide behind Web Encryption," USA Today, June 19, 2001; Dan Verton, "Terrorists Use High-Tech Tools, Low-Tech Tactics," Computerworld, September 12, 2001; Daniel Seiberg, "Bin Laden Exploits Technology to Suit His Needs," CNN.com, located at www.cnn.com; accessed September 21, 2001; Jerry Seper, "Terrorists May Have Used Internet to Plot," Washington Times, October 6, 2001; Doug Bedell, "Possible Terrorist Use of Internet Encryption Debated," Dallas Morning News, October 12, 2001.
    • (2001) USA Today
    • Kelley, J.1
  • 5
    • 0040615645 scopus 로고    scopus 로고
    • Terrorists use high-tech tools, low-tech tactics
    • September 12
    • See Jack Kelley, "Terror Groups Hide behind Web Encryption," USA Today, June 19, 2001; Dan Verton, "Terrorists Use High-Tech Tools, Low-Tech Tactics," Computerworld, September 12, 2001; Daniel Seiberg, "Bin Laden Exploits Technology to Suit His Needs," CNN.com, located at www.cnn.com; accessed September 21, 2001; Jerry Seper, "Terrorists May Have Used Internet to Plot," Washington Times, October 6, 2001; Doug Bedell, "Possible Terrorist Use of Internet Encryption Debated," Dallas Morning News, October 12, 2001.
    • (2001) Computerworld
  • 6
    • 0039430384 scopus 로고    scopus 로고
    • Bin Laden exploits technology to suit his needs
    • accessed September 21
    • See Jack Kelley, "Terror Groups Hide behind Web Encryption," USA Today, June 19, 2001; Dan Verton, "Terrorists Use High-Tech Tools, Low-Tech Tactics," Computerworld, September 12, 2001; Daniel Seiberg, "Bin Laden Exploits Technology to Suit His Needs," CNN.com, located at www.cnn.com; accessed September 21, 2001; Jerry Seper, "Terrorists May Have Used Internet to Plot," Washington Times, October 6, 2001; Doug Bedell, "Possible Terrorist Use of Internet Encryption Debated," Dallas Morning News, October 12, 2001.
    • (2001) CNN.com
    • Seiberg, D.1
  • 7
    • 0040022655 scopus 로고    scopus 로고
    • Terrorists may have used internet to plot
    • October 6
    • See Jack Kelley, "Terror Groups Hide behind Web Encryption," USA Today, June 19, 2001; Dan Verton, "Terrorists Use High-Tech Tools, Low-Tech Tactics," Computerworld, September 12, 2001; Daniel Seiberg, "Bin Laden Exploits Technology to Suit His Needs," CNN.com, located at www.cnn.com; accessed September 21, 2001; Jerry Seper, "Terrorists May Have Used Internet to Plot," Washington Times, October 6, 2001; Doug Bedell, "Possible Terrorist Use of Internet Encryption Debated," Dallas Morning News, October 12, 2001.
    • (2001) Washington Times
    • Seper, J.1
  • 8
    • 0039430383 scopus 로고    scopus 로고
    • Possible terrorist use of internet encryption debated
    • October 12
    • See Jack Kelley, "Terror Groups Hide behind Web Encryption," USA Today, June 19, 2001; Dan Verton, "Terrorists Use High-Tech Tools, Low-Tech Tactics," Computerworld, September 12, 2001; Daniel Seiberg, "Bin Laden Exploits Technology to Suit His Needs," CNN.com, located at www.cnn.com; accessed September 21, 2001; Jerry Seper, "Terrorists May Have Used Internet to Plot," Washington Times, October 6, 2001; Doug Bedell, "Possible Terrorist Use of Internet Encryption Debated," Dallas Morning News, October 12, 2001.
    • (2001) Dallas Morning News
    • Bedell, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.