-
1
-
-
0013455064
-
-
Los Angeles: Crescent Publication
-
Brian Jenkins, International Terrorism (Los Angeles: Crescent Publication, 1975), p. 4.
-
(1975)
International Terrorism
, pp. 4
-
-
Jenkins, B.1
-
4
-
-
14644413023
-
The Terrorist Calculus Behind 9-11: A Model For Future Terrorism?
-
Brigitte Nacos, "The Terrorist Calculus Behind 9-11: A Model For Future Terrorism?," Studies in Conflict & Terrorism, 26 (2003), pp. 1-16.
-
(2003)
Studies in Conflict & Terrorism
, vol.26
, pp. 1-16
-
-
Nacos, B.1
-
5
-
-
54349092562
-
-
The quotes are taken from the translations of a videotape, presumably made in mid-November 2001 in Afghanistan. Available at http://www.washingtonpost.com/wp-srv/nation/specials
-
The quotes are taken from the translations of a videotape, presumably made in mid-November 2001 in Afghanistan. Available at http://www.washingtonpost.com/wp-srv/nation/specials
-
-
-
-
6
-
-
17444431486
-
Al Qaeda, Trends in Terrorism, and Future Potentialities: An Assessment
-
Bruce Hoffman, "Al Qaeda, Trends in Terrorism, and Future Potentialities: An Assessment," Studies in Conflict and Terrorism 26 (2003), pp. 427-440
-
(2003)
Studies in Conflict and Terrorism
, vol.26
, pp. 427-440
-
-
Hoffman, B.1
-
8
-
-
4043091585
-
The Advent of Netwar (revisited)
-
John Arquilla and David Ronfeldt, eds, Santa Monica: RAND Corporation
-
John Arquilla and David Ronfeldt, "The Advent of Netwar (revisited)," in Networks and Netwars, John Arquilla and David Ronfeldt, eds. (Santa Monica: RAND Corporation, 2001)
-
(2001)
Networks and Netwars
-
-
Arquilla, J.1
Ronfeldt, D.2
-
9
-
-
54349119509
-
Networks, Netwars, and the Fight for the Future
-
25 October
-
John Arquilla and David Ronfeldt, "Networks, Netwars, and the Fight for the Future," First Monday (25 October 2003), pp. 1-25
-
(2003)
First Monday
, pp. 1-25
-
-
Arquilla, J.1
Ronfeldt, D.2
-
10
-
-
0012443107
-
Networks, Netwar and Information-Age Terrorism
-
Ian O. Lesser, Bruce Hoffman, John Arquilla, David Ronfeldt, Michele Zanini, eds, Santa Monica: RAND Corporation
-
John Arquilla, David Ronfeldt, and Michele Zanini, "Networks, Netwar and Information-Age Terrorism," in Countering the New Terrorism, Ian O. Lesser, Bruce Hoffman, John Arquilla, David Ronfeldt, Michele Zanini, eds. (Santa Monica: RAND Corporation).
-
Countering the New Terrorism
-
-
Arquilla, J.1
Ronfeldt, D.2
Zanini, M.3
-
11
-
-
3042729016
-
MilitantsWireWeb with Links to Jihad
-
Cited by, 10 July, available at
-
Cited by Jack Kelly, "MilitantsWireWeb with Links to Jihad," USA TODAY (10 July 2002), available at http://www.usatoday.com/news/world/2002/07/10/web-terror-cover.htm
-
(2002)
USA TODAY
-
-
Kelly, J.1
-
13
-
-
84948958305
-
The Psychology of Cyber-terrorism
-
Andrew Silke, ed, Chichester: John Wiley & Sons
-
Marc Rogers, "The Psychology of Cyber-terrorism," in Terrorist, Victims and Society, Andrew Silke, ed. (Chichester: John Wiley & Sons, 2003), pp. 77-92.
-
(2003)
Terrorist, Victims and Society
, pp. 77-92
-
-
Rogers, M.1
-
14
-
-
54349084257
-
-
Gabriel Weimann, How Modern Terrorism Uses the Internet (Washington, DC: United States Institute of Peace, Special Report 116, 2004), available at http://www.usip.org/pubs/specialreports/sr116.pdf
-
Gabriel Weimann, How Modern Terrorism Uses the Internet (Washington, DC: United States Institute of Peace, Special Report 116, 2004), available at http://www.usip.org/pubs/specialreports/sr116.pdf
-
-
-
-
15
-
-
33644597220
-
-
Washington, DC: United States Institute of Peace Press
-
Gabriel Weimann, Terror on the Internet (Washington, DC: United States Institute of Peace Press, 2006)
-
(2006)
Terror on the Internet
-
-
Weimann, G.1
-
16
-
-
54349118861
-
-
Bruce Hoffman, The Use of the Internet by Islamic Extremists, Testimony before the House Permanent Select Committee on Intelligence (Rand Corporation, CT-262-1, 4May 2006), available at http://www.au.af.mil/au/awc/awcgate/congress/hoffmantestimony4may06.pdf
-
Bruce Hoffman, "The Use of the Internet by Islamic Extremists," Testimony before the House Permanent Select Committee on Intelligence (Rand Corporation, CT-262-1, 4May 2006), available at http://www.au.af.mil/au/awc/awcgate/congress/hoffmantestimony4may06.pdf
-
-
-
-
17
-
-
33750320271
-
Terrorists Turn to the Web as Base of Operations,
-
7 August, available at
-
Stephen Coll and Susan B. Glasser, "Terrorists Turn to the Web as Base of Operations," The Washington Post (7 August 2005),p. A01, available at http://www.washingtonpost.com/wp-dyn/content/article/ 2005/08/05/AR2005080501138.html
-
(2005)
The Washington Post
-
-
Coll, S.1
Glasser, S.B.2
-
18
-
-
0012422098
-
Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet
-
November 2002, available at
-
Maura Conway, "Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet," First Monday (November 2002), available at http://www.firstmonday.org/issues/issue7_11/conway/
-
First Monday
-
-
Conway, M.1
-
20
-
-
85055358368
-
Cyber-Mobilization: The New Levee en Masse
-
Summer, available at at
-
Audrey Kurth Cronin, "Cyber-Mobilization: The New Levee en Masse " Parameters (Summer 2006), pp. 77-87, available at at: http://www.carlisle.army.mil/usawc/Parameters/06summer/cronin.htm
-
(2006)
Parameters
, pp. 77-87
-
-
Kurth Cronin, A.1
-
21
-
-
84870703652
-
The Web as a Weapon,
-
9 August, available at
-
Susan B. Glasser and Stephen Coll, "The Web as a Weapon," The Washington Post (9 August 2005), p. A01, available at http://www.washingtonpost.com/wp-dyn/content/article/2005/08/08/ AR2005080801018.html
-
(2005)
The Washington Post
-
-
Glasser, S.B.1
Coll, S.2
-
22
-
-
84924009025
-
Jihad 2.0
-
July/August 2006, available at onlinejihad
-
Nadya Labi, "Jihad 2.0," The Atlantic Monthly (July/August 2006), available at http://www.theatlantic.com/doc/prem/ 200607/onlinejihad
-
The Atlantic Monthly
-
-
Labi, N.1
-
23
-
-
83055199947
-
Al-Qaeda's Media Strategies
-
Spring
-
Marc Lynch, "Al-Qaeda's Media Strategies," The National Interest (Spring 2006)
-
(2006)
The National Interest
-
-
Lynch, M.1
-
24
-
-
54349110052
-
-
Hanna Rogan, Jihadism Online: A Study of how al-Qaida and Radical Islamist Groups use the Internet for Terrorist Purposes (Norwegian Defense Research Establishment, FFI/RAPPORT-2006/00915, 2006), available at http://rapporter.ffi.no/rapporter/2006/00915.pdf
-
Hanna Rogan, "Jihadism Online: A Study of how al-Qaida and Radical Islamist Groups use the Internet for Terrorist Purposes" (Norwegian Defense Research Establishment, FFI/RAPPORT-2006/00915, 2006), available at http://rapporter.ffi.no/rapporter/2006/00915.pdf
-
-
-
-
25
-
-
84902751420
-
Terrorists' use of Internet Spreads
-
20 February 2005, available at
-
Jon Swartz, "Terrorists' use of Internet Spreads," USA Today (20 February 2005), available at http://www.usatoday.com/money/ industries/technology/2005-02-20-cyber-terror-usat_x.htm
-
USA Today
-
-
Swartz, J.1
-
26
-
-
33745266657
-
Terror's Server
-
Massachusetts Institute of Technology, February
-
David Talbot, "Terror's Server," Technology Review (Massachusetts Institute of Technology, February 2005), pp. 46-52
-
(2005)
Technology Review
, pp. 46-52
-
-
Talbot, D.1
-
27
-
-
85048941387
-
Al Qaeda and the Internet: The Danger of 'Cyberplanning'
-
Spring, available at
-
Timothy L. Thomas, "Al Qaeda and the Internet: The Danger of 'Cyberplanning'," Parameters (Spring 2003), pp. 112-123, available at http://carlisle-www.army.mil/usawc/Parameters/03spring/ thomas.htm
-
(2003)
Parameters
, pp. 112-123
-
-
Thomas, T.L.1
-
30
-
-
0008783791
-
-
Institute for Security Technology Studies, Dartmouth College, 22 September 2001, available at
-
Michael Vatis, Cyber Attacks During The War on Terrorism: A Predictive Analysis (Institute for Security Technology Studies, Dartmouth College, 22 September 2001), available at http://www.ists.dartmouth.edu/analysis/cyber_a1.pdf
-
Cyber Attacks During The War on Terrorism: A Predictive Analysis
-
-
Vatis, M.1
-
31
-
-
54349088705
-
Terrorist Activities On the Net,
-
available at
-
Cited in ADL report "Terrorist Activities On the Net," available at http://www.adl.org/terror/focus/16_focus_a.asp
-
Cited in ADL report
-
-
-
35
-
-
54349087302
-
-
Jody R. Westby, Countering Terrorism with Cyber Security, paper for the 36th Session of World Federation of Scientists, International Seminars on Planetary Emergencies (18-26 August 2006, Erice, Italy).
-
Jody R. Westby, "Countering Terrorism with Cyber Security," paper for the 36th Session of World Federation of Scientists, International Seminars on Planetary Emergencies (18-26 August 2006, Erice, Italy).
-
-
-
-
36
-
-
38049076478
-
-
Online, available at, accessed 12 October 2007
-
Tor Anonymity Online, available at http://www.torproject.org/ index.html.en (accessed 12 October 2007).
-
Tor Anonymity
-
-
-
37
-
-
54349092547
-
-
Bruce Hoffman, cited in Les Blumenthal, U.S. Seeks to Counter Terrorists' use of the Internet , available at
-
Bruce Hoffman, cited in Les Blumenthal, "U.S. Seeks to Counter Terrorists' use of the Internet" (2007), available at http://www.kansascity.com/news/world/story/287013.html
-
(2007)
-
-
-
39
-
-
54349113998
-
-
Boaz Ganor, Katharina von Knop, and Carlos Duarte, Hypermedia Seduction for Terrorist Recruiting, B. Ganor, K. Von Knop, C. Duarte, eds. (Washington, DC: NATO Science for Peace and Security Series, 2007)
-
Boaz Ganor, Katharina von Knop, and Carlos Duarte, Hypermedia Seduction for Terrorist Recruiting, B. Ganor, K. Von Knop, C. Duarte, eds. (Washington, DC: NATO Science for Peace and Security Series, 2007)
-
-
-
-
41
-
-
54349094724
-
-
Gabriel Weimann, Using the Internet for Terrorist Recruitment and Mobilization, in Hypermedia Seduction for Terrorist Recruiting (Washington, DC: NATO Science for Peace and Security Series, 2007), pp. 47-58.
-
Gabriel Weimann, "Using the Internet for Terrorist Recruitment and Mobilization," in Hypermedia Seduction for Terrorist Recruiting (Washington, DC: NATO Science for Peace and Security Series, 2007), pp. 47-58.
-
-
-
-
43
-
-
31144446140
-
Militant Recruitment in Pakistan: Implications for Al Qaeda and Other Organizations
-
Christine Fair, "Militant Recruitment in Pakistan: Implications for Al Qaeda and Other Organizations," Studies in Conflict & Terrorism, 27(6) (2007), pp. 489-504
-
(2007)
Studies in Conflict & Terrorism
, vol.27
, Issue.6
, pp. 489-504
-
-
Fair, C.1
-
44
-
-
54349098678
-
-
Santa Monica, CA: RAND National Security Research Division
-
Bruce Hoffman,William Rosenau, Andrew Curiel, and Doron Zimmermann, The Radicalization of Diasporas and Terrorism (Santa Monica, CA: RAND National Security Research Division, 2007)
-
(2007)
The Radicalization of Diasporas and Terrorism
-
-
Hoffman, B.1
Rosenau, W.2
Curiel, A.3
Zimmermann, D.4
-
46
-
-
0013025146
-
-
Boca Raton: CRC Press
-
Frank Bolz, Kenneth Dudonis, and David Schulz, The Counterterrorism Handbook: Tactics, Procedures, and Techniques (Boca Raton: CRC Press, 2002)
-
(2002)
The Counterterrorism Handbook: Tactics, Procedures, and Techniques
-
-
Bolz, F.1
Dudonis, K.2
Schulz, D.3
-
47
-
-
85055361827
-
Strategic Communication
-
Autumn
-
Richard Halloran, "Strategic Communication," Parameters (Autumn 2007), pp. 4-14.
-
(2007)
Parameters
, pp. 4-14
-
-
Halloran, R.1
-
49
-
-
6344239117
-
Soft Power and American Foreign Policy
-
Joseph S. Nye, "Soft Power and American Foreign Policy," Political Science Quarterly, 119(2) (2004), p. 256.
-
(2004)
Political Science Quarterly
, vol.119
, Issue.2
, pp. 256
-
-
Nye, J.S.1
-
50
-
-
33748117348
-
The Power of Persuasion, Dual Components of US Leadership
-
Joseph S. Nye, "The Power of Persuasion, Dual Components of US Leadership," Harvard International Review, 24(4) (2003), p. 46.
-
(2003)
Harvard International Review
, vol.24
, Issue.4
, pp. 46
-
-
Nye, J.S.1
-
51
-
-
33747686518
-
Virtual Disputes: The Use of the Internet for Terrorist Debates
-
Gabriel Weimann, "Virtual Disputes: The Use of the Internet for Terrorist Debates," Studies in Conflict and Terrorism, 29(7) (2006), pp. 623-639
-
(2006)
Studies in Conflict and Terrorism
, vol.29
, Issue.7
, pp. 623-639
-
-
Weimann, G.1
-
52
-
-
54349128856
-
When Fatwas Clash Online: Terrorist Debates on the Internet
-
James J. F. Forest, ed, Westport, CT: Praeger
-
Gabriel Weimann, "When Fatwas Clash Online: Terrorist Debates on the Internet," in Information Warfare 2.0: How States and Armed Groups Compete for Strategic Influence, James J. F. Forest, ed. (Westport, CT: Praeger, 2008).
-
(2008)
Information Warfare 2.0: How States and Armed Groups Compete for Strategic Influence
-
-
Weimann, G.1
-
53
-
-
84918937782
-
Spy Agencies Iraq War Hurting U.S. Terror Fight,
-
Cited by, 24 September, available at
-
Cited by Karen deYoung, "Spy Agencies Iraq War Hurting U.S. Terror Fight," Washington Post (24 September 2006), available at http://www.washingtonpost.com/wp-dyn/content/article/2006/09/23/ AR2006092301130.html
-
(2006)
Washington Post
-
-
deYoung, K.1
-
54
-
-
84945310839
-
-
available at, accessed 1 January 2008
-
Roger Needham and Butler Lampson, "Network Attack and Defense," available at http://www.cl.cam.ac.uk/~rja14/Papers/SE-18.pdf (accessed 1 January 2008).
-
Network Attack and Defense
-
-
Needham, R.1
Lampson, B.2
-
55
-
-
54349121262
-
-
From Terrorist Groups Relying on Identity Theft for Funding andOperations, About.Com, available at http://idtheft.about.com/od/useofstolenidentity/p/IDTheftTerror.htm
-
From "Terrorist Groups Relying on Identity Theft for Funding andOperations," About.Com, available at http://idtheft.about.com/od/useofstolenidentity/p/IDTheftTerror.htm
-
-
-
-
56
-
-
54349115133
-
Information Warfare
-
Österreichische Militärzeitschrift
-
Arnulf Kopeinig, "Information Warfare" (Österreichische Militärzeitschrift, vol. 1, 1999), p. 23.
-
(1999)
, vol.1
, pp. 23
-
-
Kopeinig, A.1
-
57
-
-
0347127284
-
Information Warfare
-
Spring
-
George S. Stein, "Information Warfare," Airpower Journal (Spring 1995), p. 32.
-
(1995)
Airpower Journal
, pp. 32
-
-
Stein, G.S.1
-
58
-
-
54349090057
-
-
Joint Chiefs of Staff, Joint Psychological Operations, Joint Pub 3-53 (Washington, DC: GPO, 10 July 1996), p. I-1.
-
Joint Chiefs of Staff, Joint Psychological Operations, Joint Pub 3-53 (Washington, DC: GPO, 10 July 1996), p. I-1.
-
-
-
-
60
-
-
84937187529
-
Army PSYOP in Bosnia: Capabilities and Constraints
-
Steven Collins, "Army PSYOP in Bosnia: Capabilities and Constraints," Parameters, 29 (1999), p. 57.
-
(1999)
Parameters
, vol.29
, pp. 57
-
-
Collins, S.1
-
61
-
-
54349103727
-
Information Operations in Bosnia
-
November-December
-
Timothy LaBahn, "Information Operations in Bosnia," FA Journal (November-December 2001), p. 32.
-
(2001)
FA Journal
, pp. 32
-
-
LaBahn, T.1
-
62
-
-
54349085544
-
DOS spokesman James Rubin, quoted in Jon Swartz, "Administration Drops Idea of Blocking Serb Net Sites,"
-
15 May
-
DOS spokesman James Rubin, quoted in Jon Swartz, "Administration Drops Idea of Blocking Serb Net Sites," The San Francisco Chronicle (15 May 1999).
-
(1999)
The San Francisco Chronicle
-
-
-
63
-
-
54349101216
-
Information in Support of Psychological Operations, quoted by Lungu
-
Defense Science Board
-
Defense Science Board, Information in Support of Psychological Operations, quoted by Lungu, "War.com: The Internet and Psychological Operations."
-
War.com: The Internet and Psychological Operations
-
-
-
67
-
-
54349122215
-
-
Montague Kern, Web and Mass Media Campaigns by Political Candidates: MoveOn.org and the Democratic Party in 2003-2004 Presidential Primaries, in Elections on the Horizon: Marketing Politics to the Electorate in the USA and UK (London: The British Library, 2004), available at http://sherpa.bl.uk/2/01/PMKern.pdf, Paper presented at the conference 'Elections on the Horizon: Marketing Politics to the Electorate in the USA and UK,' 15 March 2004, The British Library, London.
-
Montague Kern, "Web and Mass Media Campaigns by Political Candidates: MoveOn.org and the Democratic Party in 2003-2004 Presidential Primaries," in Elections on the Horizon: Marketing Politics to the Electorate in the USA and UK (London: The British Library, 2004), available at http://sherpa.bl.uk/2/01/PMKern.pdf, Paper presented at the conference 'Elections on the Horizon: Marketing Politics to the Electorate in the USA and UK,' 15 March 2004, The British Library, London.
-
-
-
-
70
-
-
54349115355
-
-
Council of the European Union, doc. 14781/1/05, subject: The European Union Strategy for Combating Radicalization and Recruitment to Terrorism, 24 November 2005, p. 3.
-
Council of the European Union, doc. 14781/1/05, subject: The European Union Strategy for Combating Radicalization and Recruitment to Terrorism, 24 November 2005, p. 3.
-
-
-
-
71
-
-
54349098429
-
-
Council of the European Union, subject: Presidency Conclusions, doc. 10633/06, p. 5.
-
Council of the European Union, subject: Presidency Conclusions, doc. 10633/06, p. 5.
-
-
-
-
72
-
-
54349096067
-
-
Council of the European Union, subject: Council Conclusions on Cooperation to Combat Terrorist use of the Internet, doc. 8457/2/07, p. 3.
-
Council of the European Union, subject: Council Conclusions on Cooperation to Combat Terrorist use of the Internet, doc. 8457/2/07, p. 3.
-
-
-
-
73
-
-
3843051401
-
Management and Virtual Decentralized Networks: The Linux Project
-
available at
-
George Dafermos, "Management and Virtual Decentralized Networks: The Linux Project," First Monday 6 (11), available at http://www.firstmonday.org/issues/issue6_11/dafermos/
-
First Monday
, vol.6
, Issue.11
-
-
Dafermos, G.1
-
74
-
-
54349106371
-
-
Google also provided its hardware and software system, which includes proprietary algorithms that intelligence IT managers praise highly, to the Army, the Energy Department, and other agencies in the intelligence world
-
Google also provided its hardware and software system, which includes proprietary algorithms that intelligence IT managers praise highly, to the Army, the Energy Department, and other agencies in the intelligence world.
-
-
-
-
75
-
-
54349086051
-
-
Stew Magnuson, Wikipedia for Intel Officers Proves Useful, National Defense Magazine, National Defense (November 2006), available at http://www.nationaldefensemagazine.org/issues/ 2006/November/SecurityBeat.htm#
-
Stew Magnuson, "Wikipedia for Intel Officers Proves Useful, National Defense Magazine," National Defense (November 2006), available at http://www.nationaldefensemagazine.org/issues/ 2006/November/SecurityBeat.htm#
-
-
-
-
77
-
-
84942542258
-
Institutionalization of a Web-focused, Multinational Counter-Terrorism Campaign: Building a Collective Open Source Intelligence System
-
On the use of virtual and physical open source intelligence counterterrorism system, see, Washington, DC: NATO IOS Press
-
On the use of virtual and physical open source intelligence counterterrorism system, see Katharina von Knop, "Institutionalization of a Web-focused, Multinational Counter-Terrorism Campaign: Building a Collective Open Source Intelligence System," in Response to Cyber-Terrorism (Washington, DC: NATO IOS Press, 2008).
-
(2008)
Response to Cyber-Terrorism
-
-
Katharina von Knop1
|