-
1
-
-
84923057855
-
Congressional Authorization and the War on Terrorism
-
2047
-
Curtis A. Bradley and Jack L. Goldsmith, Congressional Authorization and the War on Terrorism, 188 Harvard Law Review 2047, 2061-2062 (2005).
-
(2005)
Harvard Law Review
, vol.188
, pp. 2061-2062
-
-
Bradley, C.A.1
Goldsmith, J.L.2
-
2
-
-
84923026060
-
Preemptive War and the Limits of National Security Policy
-
19
-
Donna M. Davis, Preemptive War and the Limits of National Security Policy, 10 IUS Gentium 11, 19 (2004).
-
(2004)
IUS Gentium
, vol.10
, pp. 11
-
-
Davis, D.M.1
-
3
-
-
84923018693
-
-
http://en.wikipedia.org/wiki/Military_uniform#Purpose.
-
-
-
-
4
-
-
84922991489
-
-
http://ibiblio.org/hyperwar/USN/ships/logs/AK/ak17-Pearl.html.
-
-
-
-
5
-
-
84923018692
-
-
http://en.wikipedia.org/wiki/Spartan_Army#Tactics.
-
-
-
-
6
-
-
84922991488
-
-
http://en.wikipedia.org/wiki/Bonnie_and_Clyde.
-
-
-
-
7
-
-
84922964919
-
-
http://en.wikipedia.org/wiki/Zodiac_killer.
-
-
-
-
8
-
-
0003480998
-
Techniques of Crime Scene Investigation
-
93-256, 372-374 (7th ed., CRC Press
-
Barry A. J. Fisher, Techniques of Crime Scene Investigation 25-56, 93-256, 372-374 (7th ed., CRC Press 2003).
-
(2003)
, pp. 25-56
-
-
Fisher, B.A.J.1
-
10
-
-
84922991487
-
-
http://en.wikipedia.org/wiki/Ilich_Ram%C3%ADrez_S%C3%A1nchez.
-
-
-
-
11
-
-
84922991486
-
-
http://edition.cnn.com/2006/WORLD/meast/10/01/hijackers.video/index.html.
-
-
-
-
12
-
-
84923018691
-
-
http://en.wikipedia.org/wiki/Martyrdom_video.
-
-
-
-
13
-
-
84923045443
-
-
http://en.wikipedia.org/wiki/7_July_2005_London_bombings#Claims_of_responsibility.
-
-
-
-
14
-
-
84923018690
-
Terrorist Attacks Kill 90, Wound Hundreds at Sharm el-Sheikh Resort
-
Militant Islam Monitor (July 23, 2005)
-
Hugh Miles, Terrorist Attacks Kill 90, Wound Hundreds at Sharm el-Sheikh Resort, Militant Islam Monitor (July 23, 2005), http://www.militantislammonitor.org/article/id/853;.
-
-
-
Miles, H.1
-
15
-
-
84923045442
-
Suicide Blast Kills Four in Tel Aviv
-
Washington Post (February 26, 2005, at A01)
-
John Ward Anderson, Suicide Blast Kills Four in Tel Aviv, Washington Post (February 26, 2005, at A01), http://www.washingtonpost.com/wp-dyn/articles/A55514-2005Feb26.html.
-
-
-
Anderson, J.W.1
-
16
-
-
84922985962
-
Is Al-Qaeda in Sinai?
-
(October 12, 2004) (synchronized attacks "a common Al-Qaeda tactic"); World Nations Beef Up Security after London Bombings, Al Jazeera, July 8, 2005
-
Scott MacLeod, Is Al-Qaeda in Sinai?, Time 17 (October 12, 2004) (synchronized attacks "a common Al-Qaeda tactic"); World Nations Beef Up Security after London Bombings, Al Jazeera, July 8, 2005, http://www.aljazeera.com/me.asp?service:ID=8870.
-
Time
, pp. 17
-
-
Scott, M.1
-
17
-
-
31544459176
-
Globalization and the (Foreign Affairs) Constitution
-
665
-
Peter J. Spiro, Globalization and the (Foreign Affairs) Constitution, 63 Ohio State Law Journal 649, 665 (2002).
-
(2002)
Ohio State Law Journal
, vol.63
, pp. 649
-
-
Peter, J.S.1
-
18
-
-
79960940336
-
Terrorism's War with America: A History
-
Praeger
-
Dennis Piszkiewicz, Terrorism's War with America: A History 85-95 (Praeger 2003).
-
(2003)
, pp. 85-95
-
-
Piszkiewicz, D.1
-
19
-
-
84922964918
-
-
http://www.symantec.com/avcenter/attack_sigs/.
-
-
-
-
20
-
-
84916969557
-
China Emerges as Leader in Cyberwarfare
-
September 14
-
Robert Marquand & Ben Arnoldy, China Emerges as Leader in Cyberwarfare, Christian Science Monitor (September 14, 2007), http://www.csmonitor.com/2007/0914/p01s01-woap.html?page=1.
-
(2007)
Christian Science Monitor
-
-
Marquand, R.1
Arnoldy, B.2
-
21
-
-
84922991485
-
A Testbed for Evaluation and Analysis of Stepping Stone Attack Attribution Techniques
-
25th IEEE International Performance Computing and Communications Conference (Phoenix 2006)
-
Jiangqiang Xin, et al., A Testbed for Evaluation and Analysis of Stepping Stone Attack Attribution Techniques, 25th IEEE International Performance Computing and Communications Conference (Phoenix 2006), http://www.public.iastate.edu/~zhanglf/doc/Testbed_TridentCom2006.pdf.
-
-
-
Xin, J.1
-
22
-
-
84923018689
-
Chinese Hackers Hit Commerce Department
-
October 6
-
Gregg Keizer, Chinese Hackers Hit Commerce Department, Tech Web, October 6, 2006, http://www.techweb.com/showArticle.jhtml;jsessionid=OM4E5LCHY4W0WQSNDLRCKHSCJUNN2JVN?articleID=193105174.
-
(2006)
Tech Web
-
-
Keizer, G.1
-
23
-
-
84873548728
-
The Invasion of the Chinese Cyberspies
-
September 5
-
Nathan Thornburgh, The Invasion of the Chinese Cyberspies, Time 34 (September 5, 2005), http://www.time.com/time/magazine/article/0,9171,1098961-1,00.html.
-
(2005)
Time
, pp. 34
-
-
Thornburgh, N.1
-
24
-
-
78649347124
-
For Estonia and NATO, A New Kind of War
-
May 22
-
Anne Applebaum, For Estonia and NATO, A New Kind of War, Washington Post A15 (May 22, 2007), http://www.washingtonpost.com/wp-dyn/content/article/2007/05/21/AR2007052101436.html.
-
(2007)
Washington Post
, pp. A15
-
-
Applebaum, A.1
-
25
-
-
84922964917
-
First Conviction for Estonia's "Cyberwar,"
-
January 24
-
Robert Vamosi, First Conviction for Estonia's "Cyberwar," CNet News (January 24, 2008), http://news.cnet.com/8301-10789_3-9857492-57.html.
-
(2008)
CNet News
-
-
Vamosi, R.1
-
26
-
-
84923045441
-
-
http://news.bbc.co.uk/2/hi/technology/7208511.stm.
-
-
-
-
27
-
-
84898305176
-
Here Come the Cyber Wars
-
August 17
-
Michael Weiss, Here Come the Cyber Wars, Reason Online (August 17, 2007), http://reason.com/news/show/121896.html.
-
(2007)
Reason Online
-
-
Weiss, M.1
-
28
-
-
84922964915
-
-
http://en.wikipedia.org/wiki/Accomplice.
-
-
-
-
29
-
-
84923045440
-
Cyber Crime Tool Kits Go on Sale
-
September 4
-
Cyber Crime Tool Kits Go on Sale, BBC News (September 4, 2007), http://news.bbc.co.uk/2/hi/technology/6976308.stm.
-
(2007)
BBC News
-
-
-
30
-
-
84923045439
-
The Filtered Future
-
July 11
-
Tim Wu, The Filtered Future, Slate (July 11, 2005), http://www.slate.com/id/2122270/.
-
(2005)
Slate
-
-
Wu, T.1
-
31
-
-
84923018688
-
-
http://www.chinaeconomicreview.com/cer/2007_01/Rules_impact_Shanghai_luxury_property.html.
-
-
-
-
32
-
-
84922964914
-
-
http://www.associatedcontent.com/article/321577/work_in_china_get_your_docs_in_order.html.
-
-
-
-
33
-
-
84922964913
-
-
http://jeremiahgrossman.blogspot.com/2006/07/devil-made-me-doit.Html.
-
-
-
-
34
-
-
84923045438
-
-
http://en.wikipedia.org/wiki/Occam's_Razor.
-
-
-
-
35
-
-
84922991484
-
Smash and Grab, the Hi-Tech Way
-
Manchester, U.K.) (Jan. 19, available at
-
Peter Warren, Smash and Grab, the Hi-Tech Way, Guardian (Manchester, U.K.) (Jan. 19, 2006), available at http://technology.guardian.co.uk/weekly/story/0,1689093,00.html.
-
(2006)
Guardian
-
-
Warren, P.1
-
36
-
-
84922964912
-
-
http://en.wikipedia.org/wiki/Ballykelly_disco_bombing.
-
-
-
-
37
-
-
84923018687
-
-
http://usinfo.state.gov/xarchives/display.html?p=washfileenglish&y=2005&m=April&x=20050427155413dmslahrellek0.2537195.
-
-
-
-
38
-
-
84923045437
-
-
http://en.wikipedia.org/wiki/INLA.
-
-
-
-
39
-
-
84922964911
-
-
http://en.wikipedia.org/wiki/Dominic_McGlinchey.
-
-
-
-
40
-
-
84922991483
-
-
http://www.cnn.com/US/9801/31/clinic.bombing/?Related.
-
-
-
-
41
-
-
84923045436
-
-
http://en.wikipedia.org/wiki/World_Trade_Center_Bombing.
-
-
-
-
42
-
-
84922964910
-
Cyberstalker Just out of Reach of Law, But Finally, He Stops
-
February 11
-
Paul Shukovsky, Cyberstalker Just out of Reach of Law, But Finally, He Stops, Seattle Post-Intelligencer (February 11, 2004), http://seattlepi.nwsource.com/local/160201_cyberstalking11.html.
-
(2004)
Seattle Post-Intelligencer
-
-
Shukovsky, P.1
-
43
-
-
84923018686
-
-
http://www.usdoj.gov/usao/cas/press/cas60828-1.pdf.
-
-
-
-
44
-
-
36949024777
-
An Exploration of Predatory Behaviour in Cyberspace: Towards a Typology of Cyberstalkers
-
September
-
Leroy McFarlane and Paul Bocij, An Exploration of Predatory Behaviour in Cyberspace: Towards a Typology of Cyberstalkers, First Monday (September 2003), http://www.firstmonday.org/issues/issue8_9/mcfarlane/index.html.
-
(2003)
First Monday
-
-
Leroy, M.1
Bocij, P.2
-
45
-
-
84922964909
-
-
http://www.haltabuse.org/resources/stats/relation.shtml.
-
-
-
-
46
-
-
84923045435
-
-
http://en.wikipedia.org/wiki/Andrei_Chikatilo.
-
-
-
-
47
-
-
84923018684
-
-
http://en.wikipedia.org/wiki/Serial_killer.
-
-
-
-
48
-
-
84923018683
-
-
http://en.wikipedia.org/wiki/Ted_Bundy.
-
-
-
-
49
-
-
84923018682
-
-
http://www.fas.org/irp/congress/1996_hr/s960605b.htm.
-
-
-
-
50
-
-
84923065456
-
U.S. Dep't. of Justice, Tracking a Computer Hacker
-
Daniel A. Morris, U.S. Dep't. of Justice, Tracking a Computer Hacker (2001), http://www.cybercrime.gov/usamay2001_2.htm.
-
(2001)
-
-
Morris, D.A.1
-
51
-
-
84922964908
-
IT Industry Core to Global E-Crime Battle
-
November 9
-
Tom Young, IT Industry Core to Global E-Crime Battle, IT Week (November 9, 2006), http://www.itweek.co.uk/computing/analysis/2168266/industry-core-global-crime.
-
(2006)
IT Week
-
-
Young, T.1
-
52
-
-
36549085171
-
Transnational Evidence-Gathering and Local Prosecution of International Cybercrime
-
354-88
-
Susan W. Brenner & Joseph J. Schwerha IV, Transnational Evidence-Gathering and Local Prosecution of International Cybercrime, 20 John Marshall Journal of Computer & Information Law J347, 354-88 (2002).
-
(2002)
John Marshall Journal of Computer & Information Law
, vol.20
, pp. J347
-
-
Brenner, S.W.1
Schwerha, J.J.2
-
53
-
-
84922991482
-
Half of All Phishes from Romanian Cyber Gang
-
December 18
-
Rene Millman, Half of All Phishes from Romanian Cyber Gang, PC Pro (December 18, 2006), http://www.pcpro.co.uk/news/100351/half-of-allphishes-from-romanian-cyber-gang.html.
-
(2006)
PC Pro
-
-
Millman, R.1
-
54
-
-
84896171268
-
Cyber Crime Hits the Big Time in 2006
-
December 28
-
Brian Krebs, Cyber Crime Hits the Big Time in 2006, Washington Post (December 28, 2006), http://www.washingtonpost.com/wpdyn/content/article/2006/12/22/AR2006122200367_pf.html.
-
(2006)
Washington Post
-
-
Krebs, B.1
-
55
-
-
84922964907
-
-
http://www.cfr.org/publication/9362/.
-
-
-
-
56
-
-
0142014634
-
They Had a Plan
-
August 2
-
Michael Elliott, They Had a Plan, Time (August 2, 2002), http://www.time.com/time/covers/1101020812/story.html.
-
(2002)
Time
-
-
Elliott, M.1
-
57
-
-
84923045433
-
-
http://en.wikipedia.org/wiki/Willie_Sutton.
-
-
-
-
58
-
-
84923045432
-
-
http://www.cbsnews.com/stories/2005/11/09/48hours/main1028132.shtml.
-
-
-
-
59
-
-
84923018681
-
-
http://www.nj.com/news/jjournal/index.ssf?/base/news-3/116556105967210.xml&coll=3.
-
-
-
-
60
-
-
84922964906
-
Homunculus
-
May 25
-
Phillip Ball, Homunculus (May 25, 2007), http://philipball.blogspot.com/2007/05/does-this-mean-war-this-is-my-latest.html.
-
(2007)
-
-
Ball, P.1
-
61
-
-
67649217993
-
Computer System Under Attack
-
October 6
-
Alan Sipress, Computer System Under Attack, Washington Post A21 (October 6, 2006), http://www.washingtonpost.com/wp-dyn/content/article/2006/10/05/AR2006100501781.html.
-
(2006)
Washington Post
, pp. A21
-
-
Sipress, A.1
-
62
-
-
84923045431
-
More Congres-sional Computers Hacked from China
-
June 21
-
Jordy Yager, More Congres-sional Computers Hacked from China, The Hill (June 21, 2008), http://thehill.com/leading-the-news/morecongressional-computers-hacked-from-china-2008-06-21.html.
-
(2008)
The Hill
-
-
Yager, J.1
-
63
-
-
84923045430
-
Flashpoint: The Cyber Challenge
-
March 5
-
Peter Brooks, Flashpoint: The Cyber Challenge, Armed Forces Journal (March 5, 2008), http://www.armedforcesjournal.com/2008/03/3463904.
-
(2008)
Armed Forces Journal
-
-
Brooks, P.1
-
64
-
-
84922964905
-
-
http://www.bis.doc.gov/about/index.htm.
-
-
-
-
65
-
-
84922991481
-
-
http://en.wikipedia.org/wiki/Rootkit.
-
-
-
-
66
-
-
84923045429
-
-
http://www.usatoday.com/tech/webguide/internetlife/2003-04-07-hospital-hack_x.htm.
-
-
-
-
67
-
-
84923045427
-
-
http://en.wikipedia.org/wiki/Counting_coup.
-
-
-
-
68
-
-
84923045428
-
-
http://www.cyberconflict.org/attributionworkshop.asp.
-
-
-
-
69
-
-
84923045426
-
-
http://en.wikipedia.org/wiki/Attack_on_Pearl_Harbor.
-
-
-
-
70
-
-
84922991480
-
-
http://en.wikipedia.org/wiki/Invasion_of_Poland_%281939%29.
-
-
-
-
71
-
-
84922964904
-
-
http://en.wikipedia.org/wiki/Trojan_War.
-
-
-
-
72
-
-
84923045425
-
-
http://en.wikipedia.org/wiki/2003_invasion_of_Iraq.
-
-
-
-
73
-
-
84923043477
-
Information Warfare and War Powers: Keeping the Constitutional Balance
-
242 (Summer/Fall
-
Kenneth B. Moss, Information Warfare and War Powers: Keeping the Constitutional Balance, 26 Fletcher Forum of World Affairs 239, 242 (Summer/Fall 2002).
-
(2002)
Fletcher Forum of World Affairs
, vol.26
, pp. 239
-
-
Moss, K.B.1
-
74
-
-
0003397807
-
Overkill: Mass Murder and Serial Killing Exposed
-
NY: Plenum Press
-
James Alan Fox & Jack Levin, Overkill: Mass Murder and Serial Killing Exposed 221 (NY: Plenum Press 1994).
-
(1994)
, vol.221
-
-
Fox, J.L.1
Levin, J.2
-
75
-
-
1642640270
-
A Sniper in the Tower: The Charles Whitman Murders
-
University of North Texas Press
-
Gary M. Lavergne, A Sniper in the Tower: The Charles Whitman Murders 90-99 (University of North Texas Press 1997).
-
(1997)
, pp. 90-99
-
-
Lavergne, G.M.1
-
76
-
-
84922991478
-
-
http://en.wikipedia.org/wiki/Suicide_attack.
-
-
-
-
77
-
-
79960940336
-
Terrorism's War with America
-
Praeger
-
Dennis Piszkiewicz, Terrorism's War with America 86-87 (Praeger 2003).
-
(2003)
, pp. 86-87
-
-
Piszkiewicz, D.1
-
78
-
-
79959312464
-
The New Condottieri and US Policy: The Privatization of Conflict and Its Implications
-
Eugene B. Smith, The New Condottieri and US Policy: The Privatization of Conflict and Its Implications 17 Parameters 104 (2002), http://www.carlisle.army.mil/usawc/Parameters/02winter/smith.htm.
-
(2002)
Parameters
, vol.17
, pp. 104
-
-
Smith, E.B.1
-
79
-
-
84923018680
-
-
http://www.fas.org/irp/doddir/dod/d2311_01e.pdf.
-
-
-
-
80
-
-
84922964903
-
-
http://www.breitbart.com/news/2005/12/12/051212224756.jwmkvntb.html.
-
-
-
-
81
-
-
84922991477
-
Is China's Guangdong Province Ground Zero for Hackers?
-
August 30
-
Robert Vamosi, Is China's Guangdong Province Ground Zero for Hackers?, ZD Net (August 30,2001), http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2808609,00.html.
-
(2001)
ZD Net
-
-
Vamosi, R.1
-
82
-
-
84922991476
-
-
http://www.time.com/time/magazine/article/0,9171,1098961-1,00.html.
-
-
-
-
83
-
-
84923018679
-
-
http://en.wikipedia.org/wiki/Espionage.
-
-
-
-
84
-
-
84923045424
-
-
http://www.ft.com/cms/s/0/9dba9ba2-5a3b-11dc-9bcd-0000779fd2ac.html.
-
-
-
-
85
-
-
84922964902
-
Chinese Hackers Happy to Take Credit for Code Red
-
August 3
-
Miro Cernetig, Chinese Hackers Happy to Take Credit for Code Red, Open Flows (August 3, 2001), http://www.openflows.org/article.pl?sid=01/08/05/1722210&mode=thread&tid=8.
-
(2001)
Open Flows
-
-
Cernetig, M.1
-
86
-
-
84923045423
-
The NASA Hacker: Scapegoat or Public Enemy?
-
July 13
-
Colin Barker, The NASA Hacker: Scapegoat or Public Enemy?, ZD Net, July 13, 2005, http://news.zdnet.co.uk/security/0,1000000189,39208862,00.htm.
-
(2005)
ZD Net
-
-
Barker, C.1
-
87
-
-
84898372378
-
Profile: Gary McKinnon
-
April 3
-
Clark Boyd, Profile: Gary McKinnon, BBC News (April 3, 2007), http://news.bbc.co.uk/2/hi/technology/4715612.stm.
-
(2007)
BBC News
-
-
Boyd, C.1
-
88
-
-
84923018678
-
-
http://www.futureintelligence.co.uk/content/view/85/63/.
-
-
-
-
89
-
-
84922991474
-
-
http://www.informationweek.com/story/showArticle.jhtml?articleID=200900283.
-
-
-
-
90
-
-
80053525878
-
Digital Fears Emerge after Data Siege in Estonia
-
New York Times (May 29
-
Mark Lander and John Markoff, Digital Fears Emerge after Data Siege in Estonia, New York Times (May 29, 2007), http://www.nytimes.com/2007/05/29/technology/29estonia.html?ex=1182484800&en=ac3eadbe88fdb21c&ei=5070.
-
(2007)
-
-
Lander, M.1
Markoff, J.2
-
91
-
-
70549098788
-
Cyber Assaults on Estonia Typify a New Battle Tactic
-
May 19
-
Peter Finn, Cyber Assaults on Estonia Typify a New Battle Tactic, Washington Post (May 19, 2007), http://www.washingtonpost.com/wp-dyn/content/article/2007/05/18/AR2007051802122_pf.html.
-
(2007)
Washington Post
-
-
Finn, P.1
-
92
-
-
84922991473
-
DIY Trojan-building Tools for Sale on the Internet
-
July 25
-
Joel Hruska, DIY Trojan-building Tools for Sale on the Internet, ars technical (July 25, 2007), http://arstechnica.com/news.ars/post/20070725-diy-trojan-tools-for-sale-on-the-internet.html.
-
(2007)
ars technical
-
-
Hruska, J.1
-
93
-
-
84923018677
-
Russian Gov't Not Behind Estonia DDoS Attacks
-
June 1
-
Jeremy Kirk, Russian Gov't Not Behind Estonia DDoS Attacks, PC World (June 1, 2007), http://www.pcworld.com/article/id,132469-pg,1/article.html.
-
(2007)
PC World
-
-
Kirk, J.1
-
94
-
-
84922964901
-
-
http://en.wikipedia.org/wiki/IP_address_spoofing.
-
-
-
-
95
-
-
84922991479
-
Cyberwar I: What the Attacks on Estonia Have Taught Us about Online Combat
-
May 22
-
Cyrus Farivar, Cyberwar I: What the Attacks on Estonia Have Taught Us about Online Combat, Slate (May 22, 2007), http://www.slate.com/id/2166749/.
-
(2007)
Slate
-
-
Farivar, C.1
-
96
-
-
84922964696
-
Analysis: Who Cyber Smacked Estonia?
-
June 11, quoting Bruce Brody
-
Shaun Waterman, Analysis: Who Cyber Smacked Estonia?, United Press International (June 11, 2007) (quoting Bruce Brody), http://www.upi.com/Security_Terrorism/Analysis/2007/06/11/analysis_who_cyber_smacked_estonia/2683/.
-
(2007)
United Press International
-
-
Shaun, W.1
-
97
-
-
84923061151
-
When Computers Attack
-
New York Times (June 24
-
John Schwartz, When Computers Attack, New York Times (June 24, 2007), http://www.nytimes.com/2007/06/24/weekinreview/24schwartz.html?ex=1340337600&en=6e966bd8b6fe8d8d&ei=5088.
-
(2007)
-
-
Schwartz, J.1
-
98
-
-
84923045401
-
-
http://www.fas.org/irp/news/1999/12/991221-cyber.htm.
-
-
-
-
100
-
-
84923045400
-
-
http://www.alexandrasamuel.com/dissertation/pdfs/index.html.
-
-
-
-
101
-
-
84923018651
-
-
http://www.cnn.com/2005/WORLD/americas/11/05/bush.summit/index.html.
-
-
-
-
102
-
-
84922991305
-
-
http://en.wikipedia.org/wiki/Transhumanism.
-
-
-
-
103
-
-
84923018650
-
-
http://en.wikipedia.org/wiki/Moonlight_Maze.
-
-
-
-
104
-
-
84923018649
-
-
http://en.wikipedia.org/wiki/Titan_Rain.
-
-
-
-
105
-
-
79751511088
-
State-Sponsored Crime: The Futility of the Economic Espionage Act
-
Susan W. Brenner and Anthony C. Crescenzi, State-Sponsored Crime: The Futility of the Economic Espionage Act, 27 Houston Journal of International Law 389 (2006).
-
(2006)
Houston Journal of International Law
, vol.27
, pp. 389
-
-
Brenner, S.W.1
Crescenzi, A.C.2
-
106
-
-
84922991304
-
-
http://www.senate.gov/~gov_affairs/030200_adams.htm.
-
-
-
-
107
-
-
84922991303
-
-
http://en.wikipedia.org/wiki/Game_theory.
-
-
-
-
108
-
-
84922964694
-
-
http://en.wikipedia.org/wiki/World_War_I.
-
-
-
-
109
-
-
84923045399
-
-
http://en.wikipedia.org/wiki/Marshall_Plan.
-
-
-
-
110
-
-
84923018648
-
-
http://www.isn.ethz.ch/news/sw/details.cfm?id=17677.
-
-
-
-
111
-
-
84922964693
-
-
http://www.nato.int/docu/basictxt/treaty.htm.
-
-
-
-
112
-
-
84923018647
-
-
http://www.slate.com/id/2166716/.
-
-
-
-
113
-
-
84923018646
-
-
http://www.theinquirer.net/default.aspx?article=39714.
-
-
-
-
114
-
-
84922991301
-
-
http://www.bloomberg.com/apps/news?pid=20601085&sid=abGseMma5MjU&refer=Europe.
-
-
-
-
115
-
-
84922991302
-
-
http://philipball.blogspot.com/2007/06/nato-ponders-cyberwarfare-if-iwere.Html.
-
-
-
-
116
-
-
84923045398
-
-
http://www.nato.int/docu/pr/2008/p08-049e.html.
-
-
-
-
117
-
-
84923045397
-
-
http://www.nato.int/issues/cyber_defence/practice.html.
-
-
-
-
118
-
-
84922991300
-
-
http://www.nato.int/issues/sact/index.html.
-
-
-
-
119
-
-
84922964692
-
-
http://www.jamestown.org/edm/article.php?article_id=2373060.
-
-
-
-
120
-
-
26044472171
-
Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense
-
207
-
Eric Talbot Jensen, Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense, 38 Stanford Journal of International Law 207, 230-231 (2002).
-
(2002)
Stanford Journal of International Law
, vol.38
, pp. 230-231
-
-
Jensen, E.T.1
-
121
-
-
84922991299
-
-
http://en.wikipedia.org/wiki/De_jure.
-
-
-
-
122
-
-
84863552308
-
Blood for Hire: How the War in Iraq Has Reinvented the World's Second Oldest Profession
-
307
-
Christopher H. Lytton, Blood for Hire: How the War in Iraq Has Reinvented the World's Second Oldest Profession, 8 Oregon Review of International Law 307, 318-319 (2006) (.
-
(2006)
Oregon Review of International Law
, vol.8
, pp. 318-319
-
-
Lytton, C.H.1
-
123
-
-
77952427002
-
Casualties in Evolving Warfare: Impact of Private Military Firms' Proliferation on the International Community
-
Kristen Fricchione, Casualties in Evolving Warfare: Impact of Private Military Firms' Proliferation on the International Community, 23 Wisconsin International Law Journal 731 (2005).
-
(2005)
Wisconsin International Law Journal
, vol.23
, pp. 731
-
-
Fricchione, K.1
-
124
-
-
84923018645
-
-
http://www.globalsecurity.org/military/world/para/pmclist.htm.
-
-
-
-
125
-
-
84922984364
-
The Detention Trilogy: Striking The Proper Balance Between National Security and Individual Liberty in an Era of Unconventional Warfare
-
217
-
Lloyd C. Anderson, The Detention Trilogy: Striking The Proper Balance Between National Security and Individual Liberty in an Era of Unconventional Warfare, 27 Whittier Law Review 217, 218-19 (2005).
-
(2005)
Whittier Law Review
, vol.27
, pp. 218-219
-
-
Anderson, L.C.1
-
126
-
-
34547408771
-
Crafting Military Commissions Post-Hamdan: The Military Commissions Act of 2006
-
1101
-
Douglas A. Hass, Crafting Military Commissions Post-Hamdan: The Military Commissions Act of 2006, 82 Indiana Law Journal 1101, 1106-1107 (2007).
-
(2007)
Indiana Law Journal
, vol.82
, pp. 1106-1107
-
-
Hass, D.A.1
-
127
-
-
22744451168
-
This Is Not a War
-
1871
-
Bruce Ackerman, This Is Not a War, 113 Yale Law Journal 1871, 1873-1874 (2004).
-
(2004)
Yale Law Journal
, vol.113
, pp. 1873-1874
-
-
Ackerman, B.1
-
128
-
-
84923045396
-
-
http://www.wired.com/wired/archive/6.02/cyberwar.html?topic=&topic_set=.
-
-
-
-
129
-
-
4344612704
-
"The Duty to Defend Them:" A Natural Law Justification for the Bush Doctrine of Preventive War
-
1365
-
William C. Bradford, "The Duty to Defend Them:" A Natural Law Justification for the Bush Doctrine of Preventive War, 79 Notre Dame Law Review 1365, 1373-1374 (2004).
-
(2004)
Notre Dame Law Review
, vol.79
, pp. 1373-1374
-
-
Bradford, W.C.1
-
130
-
-
84922964691
-
A Tempting Offer for Russian Pair
-
May 19
-
Ariana Eunjung Chung, A Tempting Offer for Russian Pair, Washington Post (May 19, 2003), http://www.washingtonpost.com/ac2/wp-dyn/A7774-2003May18?language=printer.
-
(2003)
Washington Post
-
-
Chung, A.E.1
-
131
-
-
84923018644
-
-
http://www.relcom.ru/English/.
-
-
-
-
132
-
-
84885529792
-
The Korean War: On What Legal Basis Did Truman Act?
-
1, 25
-
Louis Fisher, The Korean War: On What Legal Basis Did Truman Act?, 89 American Journal of International Law 1, 25, 32-34 (1995).
-
(1995)
American Journal of International Law
, vol.89
, pp. 32-34
-
-
Fisher, L.1
-
133
-
-
84922991298
-
-
http://en.wikipedia.org/wiki/Military_operations_other_than_war.
-
-
-
-
134
-
-
84923045395
-
-
http://www.dtic.mil/doctrine/jrm/mootw.pdf.
-
-
-
-
135
-
-
0034396401
-
Yamashita, Medina, and Beyond: Command Responsibility in Contemporary Military Operations
-
158
-
Michael L. Smidt, Yamashita, Medina, and Beyond: Command Responsibility in Contemporary Military Operations, 164 Military Law Review 155, 158 (2000).
-
(2000)
Military Law Review
, vol.164
, pp. 155
-
-
Smidt, M.L.1
-
136
-
-
84893086966
-
Legal Aspects of Information Warfare: Military Disruption of Telecommunications
-
57
-
Commander Roger D. Scott, Legal Aspects of Information Warfare: Military Disruption of Telecommunications, 45 Naval Law Review 57, 59-60 (1998).
-
(1998)
Naval Law Review
, vol.45
, pp. 59-60
-
-
Scott, C.R.D.1
-
137
-
-
0005408971
-
Libya and the Aerial Incident at Lockerbie: What Lessons for International Extradition Law?
-
229
-
Christopher C. Joyner & Wayne P. Rothbaum, Libya and the Aerial Incident at Lockerbie: What Lessons for International Extradition Law?, 14 Michigan Journal of International Law 222, 229 (1993).
-
(1993)
Michigan Journal of International Law
, vol.14
, pp. 222
-
-
Joyner, C.C.1
Rothbaum, W.P.2
-
138
-
-
0036005275
-
Legal Control of International Terrorism: A Policy-Oriented Assessment
-
84
-
M. Cherif Bassiouni, Legal Control of International Terrorism: A Policy-Oriented Assessment, 43 Harvard International Law Journal 83, 84 (2002).
-
(2002)
Harvard International Law Journal
, vol.43
, pp. 83
-
-
Cherif Bassiouni, M.1
-
140
-
-
84921545713
-
Economic Sanctions and International Terrorism
-
304
-
Kenneth W. Abbott, Economic Sanctions and International Terrorism, 20 Vanderbilt Journal of Transnational law 289, 304 (1987).
-
(1987)
Vanderbilt Journal of Transnational law
, vol.20
, pp. 289
-
-
Abbott, K.W.1
-
141
-
-
84922966218
-
Torts and Terror: Rethinking Deterrence Models and Catastrophic Terrorist Attack
-
379
-
James Kraska, Torts and Terror: Rethinking Deterrence Models and Catastrophic Terrorist Attack, 22 American University International Law Review 361, 379 (2007);.
-
(2007)
American University International Law Review
, vol.22
, pp. 361
-
-
Kraska, J.1
-
142
-
-
84922979144
-
Battling Aerial Terrorism and Compensating the Victims
-
244
-
James C. Duncan, Battling Aerial Terrorism and Compensating the Victims, 39 Naval Law Review 241, 244 (1990).
-
(1990)
Naval Law Review
, vol.39
, pp. 241
-
-
Duncan, J.C.1
-
143
-
-
18944398198
-
Enhancing the Status of Non-State Actors through a Global War on Terror?
-
435
-
Mary Ellen O'Connell, Enhancing the Status of Non-State Actors through a Global War on Terror?, 43 Columbia Journal of Transnational Law 435, 444-449 (2005).
-
(2005)
Columbia Journal of Transnational Law
, vol.43
, pp. 444-449
-
-
O'Connell, M.E.1
-
144
-
-
55149104413
-
The Campaign to Restrict the Right to Respond to Terrorist Attacks in Self-Defense under Article 51 of the U.N. Charter and What the United States Can Do About It
-
149
-
Gregory E. Maggs, The Campaign to Restrict the Right to Respond to Terrorist Attacks in Self-Defense under Article 51 of the U.N. Charter and What the United States Can Do About It, 4 Regent Journal of International Law 149, 164-167 (2006).
-
(2006)
Regent Journal of International Law
, vol.4
, pp. 164-167
-
-
Maggs, G.E.1
-
145
-
-
84922964690
-
-
http://www.msnbc.msn.com/id/4616799/.
-
-
-
-
146
-
-
84920064917
-
A Return to Lockerbie and the Montreal Convention in the Wake of the September 11th Terrorist Attacks: Ramifications of Past Security Council and International Court of Justice Action
-
532
-
Jonathan A. Frank, A Return to Lockerbie and the Montreal Convention in the Wake of the September 11th Terrorist Attacks: Ramifications of Past Security Council and International Court of Justice Action, 30 Denver Journal of International Law and Policy 532, 533-538 (2002).
-
(2002)
Denver Journal of International Law and Policy
, vol.30
, pp. 533-538
-
-
Frank, J.A.1
-
147
-
-
0004104765
-
Crime Control by the National Government
-
The Brookings Institution
-
Arthur C. Millspaugh, Crime Control by the National Government 278 (The Brookings Institution 1937).
-
(1937)
, pp. 278
-
-
Millspaugh, A.C.1
-
148
-
-
84923006244
-
The Fugitive in New York: Can Law Enforcement Cross State Lines and Act under Color of Its Office?
-
637
-
Frederic S. Berman & Jay M. Lippman, The Fugitive in New York: Can Law Enforcement Cross State Lines and Act under Color of Its Office?, 39 New York Law School Law Review 637, 648-649 (1994).
-
(1994)
New York Law School Law Review
, vol.39
, pp. 648-649
-
-
Berman, F.S.1
Lippman, J.M.2
-
150
-
-
3042620091
-
The Role of Police in American Society: A Documentary History
-
Greenwood Press
-
Cynthia Morris & Brian Vila, The Role of Police in American Society: A Documentary History 84 (Greenwood Press 1999).
-
(1999)
, pp. 84
-
-
Morris, C.1
Vila, B.2
-
151
-
-
84896185154
-
Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats
-
Government General Accountability Office, Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats 39-40.
-
-
-
-
152
-
-
84922991297
-
-
http://dictionary.reference.com/browse/cybercrime.
-
-
-
-
153
-
-
84923018643
-
-
http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm.
-
-
-
-
154
-
-
84922991296
-
-
http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=8&DF=12/11/2006&CL=ENG.
-
-
-
-
155
-
-
12344293756
-
Is There Such a Thing as Virtual Crime?
-
1
-
Susan W. Brenner, Is There Such a Thing as Virtual Crime?, 4 California Criminal Law Review 1 120-29 (2001), http://www.boalt.org/CCLR/v4/v4brenner.htm.
-
(2001)
California Criminal Law Review
, vol.4
, pp. 120-129
-
-
Brenner, S.W.1
-
156
-
-
84923015099
-
The Limits of Federal Criminal Sentencing Policy; or, Confessions of Two Reformed Reformers
-
1001
-
Jeffrey S. Parker & Michael K. Block, The Limits of Federal Criminal Sentencing Policy; or, Confessions of Two Reformed Reformers, 9 George Mason Law Review 1001, 1045 n. 176 (1001).
-
George Mason Law Review
, vol.9
, Issue.176
, pp. 1045
-
-
Parker, J.S.1
Block, M.K.2
-
157
-
-
84922978177
-
Pleading for Theft Consolidation in Virginia: Larceny, Embezzlement, False Pretenses and § 19.2-284
-
261
-
John Wesley Bartram, Pleading for Theft Consolidation in Virginia: Larceny, Embezzlement, False Pretenses and § 19.2-284, 56 Washington & Lee Law Review 249, 261 (1999).
-
(1999)
Washington & Lee Law Review
, vol.56
, pp. 249
-
-
Bartram, J.W.1
-
158
-
-
84922991295
-
-
http://www.ftc.gov/bcp/conline/pubs/tmarkg/target.htm.
-
-
-
-
159
-
-
2442706056
-
The Prevention of Non-Consensual Access to "Confidential" Health-Care Information in Cyberspace
-
Howard L. Steele, Jr., The Prevention of Non-Consensual Access to "Confidential" Health-Care Information in Cyberspace, 1 Computer Law Review & Technology Journal 101 (1997), http://www.smu.edu/csr/Steele.pdf.
-
(1997)
Computer Law Review & Technology Journal
, vol.1
, pp. 101
-
-
Steele, H.L.1
-
160
-
-
84923018642
-
-
http://en.wikipedia.org/wiki/Denialof-service:attack.
-
-
-
-
161
-
-
84923045394
-
Canadian Juvenile Charged in Connection with February "Denial of Service" Attacks
-
April 18
-
Pierre Thomas & D. Ian Hopper, Canadian Juvenile Charged in Connection with February "Denial of Service" Attacks, CNN.com, April 18, 2000, http://archives.cnn.com/2000/TECH/computing/04/18/hacker.arrest.01/.
-
(2000)
CNN.com
-
-
Thomas, P.1
Ian Hopper, D.2
-
162
-
-
84923015721
-
North America Criminology Report: Organized Crime and the Internet
-
2007
-
MacAfee North America Criminology Report: Organized Crime and the Internet 2007 12 (2007), http://www.mcafee.com/us/local_content/misc/na_criminology_report_07.pdf.
-
(2007)
, pp. 12
-
-
-
163
-
-
84923042224
-
-
McAfee NA Virtual Criminology Report 6-19 (2005), http://www.softmart.com/mcafee/docs/McAfee%20NA%20Virtual%20Criminology%20Report.pdf.
-
(2005)
NA Virtual Criminology Report
, pp. 6-19
-
-
-
164
-
-
84922964689
-
Addressing "DDoS Extortion,"
-
May 23
-
Paul McNamara, Addressing "DDoS Extortion," Network World, May 23, 2005, http://www.networkworld.com/columnists/2005/052305buzz.html;.
-
(2005)
Network World
-
-
Paul, M.1
-
165
-
-
84922991294
-
Cyber Extortion, A Very Real Threat
-
June 7
-
Jose Nazario, Cyber Extortion, A Very Real Threat, IT-Observer, June 7, 2006, http://www.it-observer.com/articles/1153/cyber_extortion_very_real_threat/.
-
(2006)
IT-Observer
-
-
Nazario, J.1
-
166
-
-
84923018641
-
Web of Crime: Enter the Professionals
-
August 22
-
Erik Larkin, Web of Crime: Enter the Professionals, PC World, August 22, 2005, http://pcworld.about.com/news/Aug222005id122240.htm.
-
(2005)
PC World
-
-
Larkin, E.1
-
167
-
-
84923015721
-
North America Criminology Report: Organized Crime and the Internet
-
MacAfee North America Criminology Report: Organized Crime and the Internet 2007, http://www.mcafee.com/us/local_content/misc/na_criminology_report_07.pdf.
-
(2007)
-
-
-
168
-
-
1142274087
-
Crime in a Free Society: Selections from the President's Commission on Law Enforcement and Administration of Justice
-
Dickinson Publishing
-
Robert W. Winslow, Crime in a Free Society: Selections from the President's Commission on Law Enforcement and Administration of Justice 192-209 (Dickinson Publishing 1968).
-
(1968)
, pp. 192-209
-
-
Winslow, R.W.1
-
169
-
-
84890699435
-
Law in an Era of Pervasive Technology
-
773
-
Susan W. Brenner, Law in an Era of Pervasive Technology, 15 Widener Law Journal 667, 773 (2006):.
-
(2006)
Widener Law Journal
, vol.15
, pp. 667
-
-
Brenner, S.W.1
-
171
-
-
67649215927
-
U.K. Outlaws Denial-of-Service Attacks
-
November 10
-
Tom Espiner, U.K. Outlaws Denial-of-Service Attacks, CNET News.com (November 10), 2006, http://news.com.com/2100-7348_3-6134472.html.
-
(2006)
CNET News.com
-
-
Espiner, T.1
-
172
-
-
84923018640
-
-
http://dictionary.reference.com/browse/cybercrime.
-
-
-
-
173
-
-
84923045393
-
(Un)Bridging the Gap
-
July
-
Michael Bobbitt, (Un)Bridging the Gap, Information Security (July 2000), http://infosecuritymag.techtarget.com/articles/july00/cover.shtml.
-
(2000)
Information Security
-
-
Bobbitt, M.1
-
174
-
-
84922991293
-
-
http://www.secretservice.gov/money_technologies.shtm.
-
-
-
-
175
-
-
36249020961
-
Terrorist Capabilities for Cyberattack: Overview and Policy Issues 3-5
-
John Rollins & Clay Wilson, Terrorist Capabilities for Cyberattack: Overview and Policy Issues 3-5, Congressional Research Service.
-
Congressional Research Service
-
-
Rollins, J.1
Wilson, C.2
-
176
-
-
84923045391
-
-
http://en.wikipedia.org/wiki/Zealotry.
-
-
-
-
177
-
-
84922971358
-
Assessing "Terrorism" into the New Millennium
-
1
-
M. Cherif Bassiouni, Assessing "Terrorism" into the New Millennium, 12 DePaul Business Law Journal 1, 1 (2000).
-
(2000)
DePaul Business Law Journal
, vol.12
, pp. 1
-
-
Cherif Bassiouni, M.1
-
178
-
-
33846563871
-
Defining Terrorism: The Evolution of Terrorism as a Legal Concept in International Law and Its Influence on Definitions in Domestic Legislation
-
23
-
Reuven Young, Defining Terrorism: The Evolution of Terrorism as a Legal Concept in International Law and Its Influence on Definitions in Domestic Legislation, 29 Boston College Comparative & International Law Review 23, 27-28 (2006).
-
(2006)
Boston College Comparative & International Law Review
, vol.29
, pp. 27-28
-
-
Young, R.1
-
179
-
-
33645000572
-
The Legal Response of the League of Nations to Terrorism
-
79
-
Ben Saul, The Legal Response of the League of Nations to Terrorism, 4 J. Int' l Crim. Just. 78, 79 (2006):.
-
(2006)
J. Int' l Crim. Just.
, vol.4
, pp. 78
-
-
Saul, B.1
-
180
-
-
0007026163
-
International Terrorism in the Contemporary World
-
Greenwood Press
-
Lee Bruce Kress, Marius H. Livingston, & Marie G. Wanek, International Terrorism in the Contemporary World 364 (Greenwood Press 1978).
-
(1978)
, pp. 364
-
-
Kress, L.B.1
Livingston, M.H.2
Wanek, M.G.3
-
182
-
-
36249020961
-
Terrorist Capabilities for Cyberattack: Overview and Policy Issues
-
Library of Congress
-
John Rollins & Clay Wilson, Terrorist Capabilities for Cyberattack: Overview and Policy Issues 3, Congressional Research Service (Library of Congress, 2007).
-
(2007)
Congressional Research Service
, vol.3
-
-
Rollins, J.1
Wilson, C.2
-
183
-
-
84923018639
-
-
http://en.wikipedia.org/wiki/September_11,_2001_attacks.
-
-
-
-
184
-
-
84922964688
-
-
http://en.wikipedia.org/wiki/Madrid_bombing.
-
-
-
-
185
-
-
84923043027
-
Council on Foreign Relations, Terrorists and the Internet
-
Eben Kaplan, Council on Foreign Relations, Terrorists and the Internet (2006), http://www.cfr.org/publication/10005/.
-
(2006)
-
-
Kaplan, E.1
-
186
-
-
33748799234
-
Country Reports on Terrorism
-
2006
-
U.S. Department of State, Country Reports on Terrorism 2006 17 (2007), http://www.state.gov/s/ct/rls/crt/2006/.
-
(2007)
, pp. 17
-
-
-
187
-
-
0342402758
-
Geneva Convention Relative to the Protection of Civilian Persons in Time of War
-
August 12
-
U.N. Office of the High Comm'r for Human Rights, Geneva Convention Relative to the Protection of Civilian Persons in Time of War, August 12, 1949, http://www.unhchr.ch/html/menu3/b/92.htm.
-
(1949)
-
-
-
188
-
-
84923018638
-
-
http://en.wikipedia.org/wiki/Definition_of_terrorism.
-
-
-
-
189
-
-
4243363956
-
Hacker Jailed for Revenge Sewage Attacks
-
Register, October. 31
-
Tony Smith, Hacker Jailed for Revenge Sewage Attacks, Register, October. 31, 2001, http://www.theregister.co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/.
-
(2001)
-
-
Smith, T.1
-
190
-
-
67649226237
-
Next Major Attack Could Be Over Net
-
November 12
-
Bill Wallace, Next Major Attack Could Be Over Net, San Francisco Chronicle A1 (November 12, 2001), http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2001/11/12/MN29929.DTL.
-
(2001)
San Francisco Chronicle
, pp. A1
-
-
Wallace, B.1
-
191
-
-
84940737218
-
Cyber Terrorism in the Context of Globalization
-
Rohas Nagpal, Cyber Terrorism in the Context of Globalization, 2 World Congress on Informatics & Law 22 (2002), http://www.ied.org/congreso/ponencias/Nagpal,%20Rohas.pdf.
-
(2002)
World Congress on Informatics & Law
, vol.2
, pp. 22
-
-
Nagpal, R.1
-
192
-
-
84922964687
-
Liberation Tigers of Tamil Eelam
-
Council on Foreign Relations, Liberation Tigers of Tamil Eelam (2006), http://www.cfr.org/publication/9242/.
-
(2006)
-
-
-
193
-
-
84923045389
-
-
http://www.uscc.gov/annual_report/2007/07_annual_report.php.
-
-
-
-
194
-
-
84923018637
-
-
http://en.wikipedia.org/wiki/11_March_2004_Madrid_train_bombings.
-
-
-
-
195
-
-
84922964686
-
Computer Security Officials Discount Chances of "Digital Pearl Harbor,"
-
June 3
-
Drew Clark, Computer Security Officials Discount Chances of "Digital Pearl Harbor," GovExec.com (June 3, 2003), http://www.govexec.com/dailyfed/0603/060303td2.htm.
-
(2003)
GovExec.com
-
-
Clark, D.1
-
196
-
-
84922964685
-
-
http://en.wikipedia.org/wiki/Chernobyl_accident.
-
-
-
-
197
-
-
0011016060
-
Cyber-Attacks by Al-Qaeda Feared
-
June 27
-
Barton Gellman, Cyber-Attacks by Al-Qaeda Feared, Washington Post A1 (June 27, 2002), http://www.washingtonpost.com/ac2/wp-dyn/A50765-2002Jun26?start=24&per=24.
-
(2002)
Washington Post
, pp. A1
-
-
Gellman, B.1
-
199
-
-
84922964684
-
-
http://en.wikipedia.org/wiki/September_11,_2001_timeline_for_the_day_of_the_attacks.
-
-
-
-
200
-
-
84923018636
-
-
http://en.wikipedia.org/wiki/The_War_of_the_Worlds_%28radio%29.
-
-
-
-
201
-
-
84922964683
-
-
http://en.wikipedia.org/wiki/Bay_Area_Rapid_Transit.
-
-
-
-
202
-
-
84923066317
-
Sim City: Terrortown
-
103, October
-
Chris Suellentrop, Sim City: Terrortown, Wired 103, 103-104 (October 2006), http://www.wired.com/wired/archive/14.10/posts.html?pg=2.
-
(2006)
Wired
, pp. 103-104
-
-
Suellentrop, C.1
-
203
-
-
24944497687
-
Black Ice: The Invisible Threat of Cyber-Terrorism
-
McGraw-Hill
-
Dan Verton, Black Ice: The Invisible Threat of Cyber-Terrorism 1-16 (McGraw-Hill, 2003).
-
(2003)
, pp. 1-16
-
-
Verton, D.1
-
204
-
-
84922991292
-
Russian Expert: Terrorists May Try Cyberattacks
-
December 13
-
Jeremy Kirk, Russian Expert: Terrorists May Try Cyberattacks, InfoWorld.com (December 13, 2006), http://www.infoworld.com/article/06/12/13/HNcyberterroralert_1.html?sour.
-
(2006)
InfoWorld.com
-
-
Kirk, J.1
-
205
-
-
84922964682
-
The Role of Cities
-
October 21
-
John Robb, The Role of Cities, Global Guerrillas, October 21, 2006, http://globalguerrillas.typepad.com/globalguerrillas/2006/10/the_role_of_cit.html.
-
(2006)
Global Guerrillas
-
-
Robb, J.1
-
206
-
-
84922964681
-
-
U.S. Department of Homeland Security, National Cyber Exercise: Cyber Storm 1 (2006), www.automationalley.com/MiRSA/Studies/prep_cyberstormreport_sep06.pdf.
-
(2006)
National Cyber Exercise: Cyber Storm
, pp. 1
-
-
-
207
-
-
84923018635
-
-
http://www.cryptome.org/cyberstorm.ppt.
-
-
-
-
208
-
-
84923057566
-
Fact Sheet: Cyber Storm Exercise
-
September 13
-
U.S. Department of Homeland Security, Fact Sheet: Cyber Storm Exercise (September 13, 2006), http://www.dhs.gov/xnews/releases/pr_1158340980371.shtm.
-
(2006)
-
-
-
209
-
-
84922964680
-
Homeland Security "Cyber Storm" Simulates Crisis
-
March 14
-
Anne Broache, Homeland Security "Cyber Storm" Simulates Crisis, CNet News (March 14, 2008), http://news.cnet.com/8301-10784_3-9894236-7.html.
-
(2008)
CNet News
-
-
Broache, A.1
-
210
-
-
84923018634
-
-
http://www.dhs.gov/xprepresp/training/gc_1204738760400.shtm.
-
-
-
-
211
-
-
84923045388
-
-
http://www.dhs.gov/xprepresp/training/gc_1204738275985.shtm.
-
-
-
-
212
-
-
84922991291
-
-
http://www.securityfocus.com/brief/303.
-
-
-
-
213
-
-
84922964679
-
When Hippies Turn to Cyber Terror
-
August 15
-
Kevin Poulsen, When Hippies Turn to Cyber Terror, Wired (August 15, 2006), http://blog.wired.com/27bstroke6/2006/08/when_hippies_tu.html?entry_id=1539952.
-
(2006)
Wired
-
-
Poulsen, K.1
-
214
-
-
85131775051
-
The Legitimation of Violence: A Critical History of the Laws of War
-
60
-
Chris Jochnick & Roger Normand, The Legitimation of Violence: A Critical History of the Laws of War, 35 Harvard International Law Journal 49, 60 (1994).
-
(1994)
Harvard International Law Journal
, vol.35
, pp. 49
-
-
Jochnick, C.1
Normand, R.2
-
215
-
-
84921596980
-
The History and Evolution of the Law of War Prior to World War II
-
176
-
Gregory P. Noone, The History and Evolution of the Law of War Prior to World War II, 47 Naval Law Review 176, 182-187 (2000).
-
(2000)
Naval Law Review
, vol.47
, pp. 182-187
-
-
Noone, G.P.1
-
216
-
-
84923045387
-
-
http://www.yale.edu/lawweb/avalon/lawofwar/hague02.htm.
-
-
-
-
217
-
-
84922991290
-
-
http://www.yale.edu/lawweb/avalon/lawofwar/lawwar.htm.
-
-
-
-
218
-
-
12744272186
-
War Everywhere: Rights, National Security Law, and the Law of Armed Conflict in the Age of Terror
-
691
-
Rosa Ehrenreich Brooks, War Everywhere: Rights, National Security Law, and the Law of Armed Conflict in the Age of Terror, 153 University of Pennsylvania Law Review 675, 691 (2004).
-
(2004)
University of Pennsylvania Law Review
, vol.153
, pp. 675
-
-
Brooks, R.E.1
-
219
-
-
84882570723
-
The UN Security Council and the Law of Armed Conflict: Amity or Enmity?
-
330
-
James D. Fry, The UN Security Council and the Law of Armed Conflict: Amity or Enmity?, 38 George Washington International Law Review, 327, 330 (2006).
-
(2006)
George Washington International Law Review
, vol.38
, pp. 327
-
-
Fry, J.D.1
-
220
-
-
78049234858
-
The Doctrine of Military Necessity and the Protection of Cultural Property during Armed Conflicts
-
179
-
Craig J.S. Forrest, The Doctrine of Military Necessity and the Protection of Cultural Property during Armed Conflicts, 37 Case Western International Law Journal 177, 179 (2007).
-
(2007)
Case Western International Law Journal
, vol.37
, pp. 177
-
-
Forrest, C.J.S.1
-
221
-
-
84923061761
-
The Just War Doctrine and State Liability for Paramilitary War Crimes
-
619
-
Alexander C. Linn, The Just War Doctrine and State Liability for Paramilitary War Crimes, 34 Georgia Journal of International & Comparative Law 619, 625-626 (2006).
-
(2006)
Georgia Journal of International & Comparative Law
, vol.34
, pp. 625-626
-
-
Linn, A.C.1
-
222
-
-
21844522345
-
Law without Borders: The Constitutionality of an International Criminal Court
-
76
-
Paul D. Marquardt, Law without Borders: The Constitutionality of an International Criminal Court, 33 Columbia Journal of Transnational Law 73, 76 (1995).
-
(1995)
Columbia Journal of Transnational Law
, vol.33
, pp. 73
-
-
Marquardt, P.D.1
-
223
-
-
84923043141
-
Unilateral and Multilateral Preventive Self-Defense
-
522
-
Stephanie Bellier, Unilateral and Multilateral Preventive Self-Defense, 58 Maine Law Review 508, 522 (2006).
-
(2006)
Maine Law Review
, vol.58
, pp. 508
-
-
Bellier, S.1
-
224
-
-
84923045386
-
-
http://www.yale.edu/lawweb/avalon/lawofwar/hague03.htm.
-
-
-
-
225
-
-
77952424392
-
On Law, Wars and Mercenaries: The Case for Courts-Martial Jurisdiction over Civilian Contractor Misconduct in Iraq
-
367
-
William C. Peters, On Law, Wars and Mercenaries: The Case for Courts-Martial Jurisdiction over Civilian Contractor Misconduct in Iraq, 2006 Brigham Young University Law Review 367, 404.
-
Brigham Young University Law Review
, vol.2006
, pp. 404
-
-
Peters, W.C.1
-
227
-
-
77953333955
-
Towards a Law of Unarmed Conflict: A Proposal for A New International Law of Hostility
-
15
-
Stephen Neff, Towards a Law of Unarmed Conflict: A Proposal for A New International Law of Hostility, 28 Cornell International Law Journal 1, 15 (1995).
-
(1995)
Cornell International Law Journal
, vol.28
, pp. 1
-
-
Neff, S.1
-
228
-
-
84922964678
-
-
http://www.yale.edu/lawweb/avalon/un/unchart.htm.
-
-
-
-
229
-
-
84923051949
-
Developing a Standard for Politically Related State Economic Action
-
219
-
Clinton E. Cameron, Developing a Standard for Politically Related State Economic Action, 13 Michigan Journal of International Law 218, 219 (1991).
-
(1991)
Michigan Journal of International Law
, vol.13
, pp. 218
-
-
Cameron, C.E.1
-
230
-
-
84923018633
-
-
http://www.yale.edu/lawweb/avalon/un/unchart.htm.
-
-
-
-
231
-
-
84901082550
-
Be Reasonable! Thoughts On The Effectiveness Of State Criticism In Enforcing International Law
-
883
-
Michael Y. Kieval, Be Reasonable! Thoughts On The Effectiveness Of State Criticism In Enforcing International Law, 26 Michigan Journal of International Law 869, 883 (2005).
-
(2005)
Michigan Journal of International Law
, vol.26
, pp. 869
-
-
Kieval, M.Y.1
-
232
-
-
33749156794
-
Doctrine Or Doctrinaire-The First Strike Doctrine And Preemptive Self-Defense Under International Law
-
132
-
Amy E. Eckert & Manooher Mofidi, Doctrine Or Doctrinaire-The First Strike Doctrine And Preemptive Self-Defense Under International Law, 12 Tulane Journal of International and Comparative Law 117, 132 (2004).
-
(2004)
Tulane Journal of International and Comparative Law
, vol.12
, pp. 117
-
-
Eckert, A.E.1
Mofidi, M.2
-
233
-
-
55149100906
-
Where There Are Good Arms, There Must Be Good Laws: An Empirical Assessment Of Customary International Law Regarding Preemptive Force
-
193
-
Ryan Schildkraut, Where There Are Good Arms, There Must Be Good Laws: An Empirical Assessment Of Customary International Law Regarding Preemptive Force, 16 Minnesota Journal of International Law 193, 202-211 (2007).
-
(2007)
Minnesota Journal of International Law
, vol.16
, pp. 202-211
-
-
Schildkraut, R.1
-
234
-
-
84922964677
-
-
http://www.af.mil/main/welcome.asp.
-
-
-
-
235
-
-
84923045385
-
Sec'y of the Air Force, Cyberspace as a Domain in Which the Air Force Flies and Fights
-
November 2
-
Michael W. Wynne, Sec'y of the Air Force, Cyberspace as a Domain in Which the Air Force Flies and Fights (November 2, 2006), http://www.af.mil/library/speeches/speech.asp?id=283.
-
(2006)
-
-
Wynne, M.W.1
-
236
-
-
84922991289
-
-
http://www.fas.org/irp/crs/RL31787.pdf.
-
-
-
-
237
-
-
84922991288
-
-
http://www.uscc.gov/researchpapers/annual_reports.htm.
-
-
-
-
238
-
-
84922991287
-
-
http://www.defenselink.mil/pubs/china.html.
-
-
-
-
239
-
-
84922991285
-
-
http://www.defenselink.mil/pubs/china.html.
-
-
-
-
240
-
-
84959236137
-
Congressional Research Service
-
Washington, DC, Library of Congress
-
Steven A. Hildreth, Congressional Research Service, Cyberwarfare (Washington, DC, Library of Congress 2001), http://www.fas.org/irp/crs/RL30735.pdf.
-
(2001)
Cyberwarfare
-
-
Hildreth, S.A.1
-
241
-
-
0012753054
-
The Great Cyberwar of 2002
-
February
-
John Arquilla, The Great Cyberwar of 2002, Wired, February 1998, http://www.wired.com/wired/archive/6.02/cyberwar_pr.html.
-
(1998)
Wired
-
-
Arquilla, J.1
-
242
-
-
84923018632
-
-
http://www.gcn.com/print/25_25/41716-1.html.
-
-
-
-
243
-
-
84922991284
-
-
http://www.uscc.gov/researchpapers/annual_reports.htm.
-
-
-
-
244
-
-
84922964675
-
-
http://armedservices.house.gov/hearing_information.shtml.
-
-
-
-
245
-
-
85076665266
-
Welcome to Cyberwar Country, USA
-
February 11
-
Marty Graham, Welcome to Cyberwar Country, USA, Wired (February 11, 2008), http://www.wired.com/politics/security/news/2008/02/cyber_command?currentPage=all.
-
(2008)
Wired
-
-
Graham, M.1
-
246
-
-
84923018631
-
-
http://www.af.mil/news/story.asp?id=123060959.
-
-
-
-
247
-
-
84922964674
-
-
http://www.iwar.org.uk/iwar/resources/cybercommand/index.htm.
-
-
-
-
248
-
-
84922991283
-
-
http://www.8af.acc.af.mil/news/story_print.asp?id=123031988.
-
-
-
-
249
-
-
84923045384
-
-
http://www.genevaconventions.org/.
-
-
-
-
250
-
-
84923045383
-
-
http://en.wikipedia.org/wiki/Attack_on_Pearl_Harbor.
-
-
-
-
251
-
-
84922964673
-
-
http://en.wikipedia.org/wiki/Battle_of_Thermopylae;.
-
-
-
-
252
-
-
84922964672
-
-
http://en.wikipedia.org/wiki/Invasion_of_Poland.
-
-
-
-
253
-
-
84922964671
-
-
http://en.wikipedia.org/wiki/Six-Day_War.
-
-
-
-
254
-
-
84922991282
-
-
http://www.yale.edu/lawweb/avalon/lawofwar/geneva03.htm.
-
-
-
-
255
-
-
84923018630
-
-
http://www.yale.edu/lawweb/avalon/lawofwar/hague04.htm.
-
-
-
-
256
-
-
84855841267
-
A Farewell to Arms
-
May
-
John Carlin, A Farewell to Arms, Wired (May 1997), http://www.wired.com/wired/archive/5.05/netizen.html.
-
(1997)
Wired
-
-
Carlin, J.1
-
257
-
-
84923045382
-
-
http://en.wikipedia.org/wiki/Leet.
-
-
-
-
259
-
-
0004286079
-
The Rise and Decline of the State
-
Martin van Creveld, The Rise and Decline of the State 2-12.
-
-
-
Van Creveld, M.1
-
260
-
-
11344254628
-
A Modern History of Japan: From Tokugawa Times to the Present
-
48-53
-
Andrew Gordon, A Modern History of Japan: From Tokugawa Times to the Present 9-15, 48-53.
-
-
-
Gordon, A.1
-
261
-
-
84923045381
-
-
http://en.wikipedia.org/wiki/Japan.
-
-
-
-
262
-
-
84922991281
-
-
http://en.wikipedia.org/wiki/Tokugawa_shogunate.
-
-
-
-
263
-
-
84923038703
-
From Spear to Flintlock: A History of War in Europe and the Middle East to the French Revolution
-
219-223
-
Frederic J. Baumgartner, From Spear to Flintlock: A History of War in Europe and the Middle East to the French Revolution 166-168, 219-223.
-
-
-
Baumgartner, F.J.1
-
264
-
-
84922964670
-
-
http://en.wikipedia.org/wiki/Thirty_Years'_War.
-
-
-
-
265
-
-
84899615158
-
Internationalizing the Statecraft: Genocide, Religious Revivalism, and the Cultural Politics of International Criminal Law
-
299
-
Kamari Maxine Clarke, Internationalizing the Statecraft: Genocide, Religious Revivalism, and the Cultural Politics of International Criminal Law, 28 Loyola of Los Angeles International and Comparative Law Review 279, 299 (2006).
-
(2006)
Loyola of Los Angeles International and Comparative Law Review
, vol.28
, pp. 279
-
-
Clarke, K.M.1
-
266
-
-
84923012675
-
A Tougher Row to Hoe: The European Union's Ascension as a Global Superpower Analyzed through the American Federal Experience
-
99
-
Mark C. Anderson, A Tougher Row to Hoe: The European Union's Ascension as a Global Superpower Analyzed through the American Federal Experience, 29 Syracuse Journal of International Law and Commerce 83, 99 (2001).
-
(2001)
Syracuse Journal of International Law and Commerce
, vol.29
, pp. 83
-
-
Anderson, M.C.1
-
267
-
-
84882687772
-
Nations and Civilizations from the Perspective of Jurisculture
-
133
-
Gray L. Dorsey, Nations and Civilizations from the Perspective of Jurisculture, 1997 St. Louis-Warsaw Transatlantic Law Journal 121, 133.
-
(1997)
St. Louis-Warsaw Transatlantic Law Journal
, pp. 121
-
-
Dorsey, G.L.1
-
268
-
-
85055304118
-
Taking Self-Determination Seriously: When Can Cultural and Political Minorities Control Their Own Fate?
-
737
-
Paul A. Clark, Taking Self-Determination Seriously: When Can Cultural and Political Minorities Control Their Own Fate?, 5 Chicago Journal of International Law 737, 737 (2005).
-
(2005)
Chicago Journal of International Law
, vol.5
, pp. 737
-
-
Clark, P.A.1
-
269
-
-
84922982657
-
A Sampler of Religious Experiences in International Law
-
235
-
Mark Weston Janis, A Sampler of Religious Experiences in International Law, 22 Mississippi College Law Review 233, 235 (2003).
-
(2003)
Mississippi College Law Review
, vol.22
, pp. 233
-
-
Janis, M.W.1
-
270
-
-
0003554116
-
Revolutions in Sovereignty: How Ideas Shaped Modern International Relations
-
Princeton University Press
-
Daniel Philpott, Revolutions in Sovereignty: How Ideas Shaped Modern International Relations 77 (Princeton University Press 2001).
-
(2001)
, pp. 77
-
-
Philpott, D.1
-
271
-
-
84923058380
-
Challenges to Authority, Burdens of Legitimatization: The Printing Press and the Internet
-
Zack Kertcher and Ainat N. Margalit, Challenges to Authority, Burdens of Legitimatization: The Printing Press and the Internet, 8 Yale Journal of Law & Technology 1 (2005-2006).
-
(2005)
Yale Journal of Law & Technology
, vol.8
, pp. 1
-
-
Kertcher, Z.1
Margalit, A.N.2
-
274
-
-
0003662876
-
The Theory of Social and Economic Organization 341-348
-
A. M. Henderson, trans., Talcott Parsons, ed., Oxford University Press
-
Max Weber, The Theory of Social and Economic Organization 341-348 (A. M. Henderson, trans., Talcott Parsons, ed., Oxford University Press 1947).
-
(1947)
-
-
Weber, M.1
-
275
-
-
77955730777
-
The Mismatch between State Power and State Capacity in Transnational Law Enforcement
-
16
-
Mariano-Florentino Cuellar, The Mismatch between State Power and State Capacity in Transnational Law Enforcement, 22 Berkeley International Law Journal 15, 16 (2004).
-
(2004)
Berkeley International Law Journal
, vol.22
, pp. 15
-
-
Cuellar, M.-F.1
-
276
-
-
78650559054
-
A Re-examination of the Firearms Regulation Debate and Its Consequences
-
213
-
Harold S. Herd, A Re-examination of the Firearms Regulation Debate and Its Consequences, 36 Washburn Law Journal 196, 213 (1997).
-
(1997)
Washburn Law Journal
, vol.36
, pp. 196
-
-
Herd, H.S.1
-
278
-
-
0141484515
-
Overcoming Post-Colonial Myopia: A Call to Recognize and Regulate Private Military Companies
-
10
-
Todd S. Milliard, Overcoming Post-Colonial Myopia: A Call to Recognize and Regulate Private Military Companies, 176 Military Law Review 1, 10 (2003).
-
(2003)
Military Law Review
, vol.176
, pp. 1
-
-
Milliard, T.S.1
-
280
-
-
84923018628
-
-
http://www.rmc.ca/academic/grad/calendar/p10milspec_1_e.html.
-
-
-
-
281
-
-
84922964668
-
Cyber Warriors
-
October 29
-
Neil Munro, Cyber Warriors, Government Executive (October 29, 2007), http://www.govexec.com/story_page.cfm?filepath=/dailyfed/1007/102907ol.htm.
-
(2007)
Government Executive
-
-
Munro, N.1
-
282
-
-
84922964669
-
-
http://en.wikipedia.org/wiki/Behavioral_Analysis_Unit.
-
-
-
-
284
-
-
33750112004
-
Daily Life in Medieval Europe
-
Greenwood Press
-
Jeffrey L. Singman, Daily Life in Medieval Europe 214-217 (Greenwood Press 1999);.
-
(1999)
, pp. 214-217
-
-
Singman, J.L.1
-
285
-
-
0345838980
-
The Republic of Letters: A History of the French Enlightenment
-
Dena Goodman, The Republic of Letters: A History of the French Enlightenment 140-145.
-
-
-
Goodman, D.1
-
286
-
-
0039157069
-
The Proper Scope of the Commerce Power
-
1443
-
Richard A. Epstein, The Proper Scope of the Commerce Power, 73 Virginia Law Review 1387, 1443 (1987).
-
(1987)
Virginia Law Review
, vol.73
, pp. 1387
-
-
Epstein, R.A.1
-
287
-
-
0038992127
-
Redesigning the Architecture of Federalism-An American Tradition
-
265
-
Harry N. Scheiber, Redesigning the Architecture of Federalism-An American Tradition, 14 Yale Law and Policy Review 227, 265 (1996).
-
(1996)
Yale Law and Policy Review
, vol.14
, pp. 227
-
-
Scheiber, H.N.1
-
288
-
-
32244438444
-
Executive Power and the War on Terror
-
335
-
Norman C. Bay, Executive Power and the War on Terror, 83 Denver University Law Review 335, 345-346 (2005):.
-
(2005)
Denver University Law Review
, vol.83
, pp. 345-346
-
-
Bay, N.C.1
-
289
-
-
84923018627
-
Large-scale DOS Attack Menace Continues to Grow
-
June 11
-
Robin Bloor, Large-scale DOS Attack Menace Continues to Grow, The Register (June 11, 2007), http://www.theregister.co.uk/2007/06/11/dos_security_cyberwarfare/.
-
(2007)
The Register
-
-
Bloor, R.1
-
290
-
-
80053525878
-
Digital Fears Emerge after Data Siege in Estonia
-
New York Times (May 29
-
Mark Lander & John Markoff, Digital Fears Emerge after Data Siege in Estonia, New York Times (May 29, 2007), http://www.nytimes.com/2007/05/29/technology/29estonia.html?ex=1182484800&en=ac3eadbe88fdb21c&ei=5070.
-
(2007)
-
-
Lander, M.1
Markoff, J.2
-
291
-
-
70449650721
-
Botnets as a Vehicle for Online Crime
-
December 1
-
Nicholas Ianelli & Aaron Hackworth, Botnets as a Vehicle for Online Crime, CERT Coordination Center (December 1, 2005), http://www.cert.org/archive/pdf/Botnets.pdf.
-
(2005)
CERT Coordination Center
-
-
Ianelli, N.1
Hackworth, A.2
-
292
-
-
84923018435
-
-
http://www.mcafee.com/us/local_content/misc/na_criminology_report_07.pdf.
-
-
-
-
293
-
-
84922972376
-
Bringing Botnets out of the Shadows
-
March 21
-
Brian Krebs, Bringing Botnets out of the Shadows, Washington Post (March 21, 2006), http://www.washingtonpost.com/wp-dyn/content/article/2006/03/21/AR2006032100279.html.
-
(2006)
Washington Post
-
-
Krebs, B.1
-
294
-
-
84922964637
-
Peer-to-Peer Botnets a new and Growing Threat
-
April 17
-
Peer-to-Peer Botnets a new and Growing Threat, CSO (April 17, 2007), http://www2.csoonline.com/blog_view.html?CID=32852.
-
(2007)
CSO
-
-
-
295
-
-
84923018434
-
Malware Evolution: January-March 2005
-
April 18
-
Alexander Gostev, Malware Evolution: January-March 2005, Viruslist.com (April 18, 2005), http://www.viruslist.com/en/analysis?pubid=162454316#botnets.
-
(2005)
Viruslist.com
-
-
Gostev, A.1
-
296
-
-
84923045354
-
What Good Are 1,000 Remote-Controlled PCs?
-
November 24
-
Robert Vamosi, What Good Are 1,000 Remote-Controlled PCs?, CNET News (November 24, 2005), http://www.cnet.com.au/software/security/0,239029558,240058520,00.htm.
-
(2005)
CNET News
-
-
Vamosi, R.1
-
297
-
-
84922964636
-
-
http://www.washingtonpost.com/wp-dyn/content/article/2006/02/16/AR2006021601388.html.
-
-
-
-
298
-
-
44649101679
-
Attack of the 50 Foot Botnet
-
Department of Computer Science, University of Calgary (August
-
Ryan Vogt & John Aycock, Attack of the 50 Foot Botnet, Technical Report 2006-846-39, Department of Computer Science, University of Calgary (August 2006), http://pages.cpsc.ucalgary.ca/~aycock/papers/50foot.pdf.
-
(2006)
Technical Report 2006-846-39
-
-
Vogt, R.1
Aycock, J.2
-
299
-
-
84922991260
-
Shadow Server
-
Bot Counts, Shadow Server, http://www.shadowserver.org/wiki/pmwiki.php?n=Stats.
-
-
-
Counts, B.1
-
300
-
-
68149177571
-
Criminals "May Overwhelm the Web,"
-
January 25
-
Tim Weber, Criminals "May Overwhelm the Web," BBC News (January 25, 2007), http://news.bbc.co.uk/2/hi/business/6298641.stm.
-
(2007)
BBC News
-
-
Weber, T.1
-
301
-
-
84904956609
-
Attack of the Bots
-
November
-
Scott Berinato, Attack of the Bots, Wired (November 2006), http://www.wired.com/wired/archive/14.11/botnet.html?pg=3&topic=botnet&topic_set=.
-
(2006)
Wired
-
-
Berinato, S.1
-
302
-
-
84923018433
-
Experts: Botnets Add Fault Tolerance
-
June 7
-
Matt Hines, Experts: Botnets Add Fault Tolerance, InfoWorld (June 7, 2007), http://www.infoworld.com/article/07/06/07/Botnets-get-faulttolerant_1.html.
-
(2007)
InfoWorld
-
-
Hines, M.1
-
303
-
-
84922987553
-
Estonia Computers Blitzed, Possibly by the Russians
-
New York Times (May 19
-
Steven Lee Myers, Estonia Computers Blitzed, Possibly by the Russians, New York Times (May 19, 2007), http://www.nytimes.com/2007/05/19/world/europe/19russia.html?ex=1337227200&en=4817e43658c91382&ei=5088.
-
(2007)
-
-
Myers, S.L.1
-
304
-
-
84894758246
-
Estonia Accuses Russia of "Waging Cyber War,"
-
Times Online (May 17
-
Tony Halpin, Estonia Accuses Russia of "Waging Cyber War," Times Online (May 17, 2007), http://www.timesonline.co.uk/tol/news/world/europe/article1802959.ece.
-
(2007)
-
-
Halpin, T.1
-
305
-
-
84922991479
-
Cyberwar I: What the Attacks on Estonia Have Taught Us about Online Combat
-
May 22
-
Cyrus Farivar, Cyberwar I: What the Attacks on Estonia Have Taught Us about Online Combat, Slate (May 22, 2007), http://www.slate.com/id/2166749/.
-
(2007)
Slate
-
-
Farivar, C.1
-
306
-
-
77950897387
-
Russia Accused of Unleashing Cyberwar to Disable Estonia
-
Guardian Unlimited (May 17
-
Ian Traynor, Russia Accused of Unleashing Cyberwar to Disable Estonia, Guardian Unlimited (May 17, 2007), http://www.guardian.co.uk/russia/article/0,2081438,00.html.
-
(2007)
-
-
Traynor, I.1
-
307
-
-
84923061151
-
When Computers Attack
-
New York Times (June 24
-
John Schwartz, When Computers Attack, New York Times (June 24, 2007), http://www.nytimes.com/2007/06/24/weekinreview/24schwartz.html?ex=1183694400&en=bb2b9a4c1a7bfc84&ei=5070.
-
(2007)
-
-
Schwartz, J.1
-
308
-
-
84923045353
-
-
http://www.javno.com/en/world/clanak.php?id=50606.
-
-
-
-
309
-
-
84923045352
-
Political Activists Blamed for Russian Cyber Assaults
-
June 4
-
Michelle Price, Political Activists Blamed for Russian Cyber Assaults, Information Age (June 4, 2007), http://www.information-age.com/infolog/ia_today/2007/06/political_activists_blamed_for.html.
-
(2007)
Information Age
-
-
Price, M.1
-
310
-
-
84922991258
-
Rentable Crime Networks Latest Security Threat
-
July 5
-
Alice Lipowicz, Rentable Crime Networks Latest Security Threat, Washington Technology (July 5, 2005), http://www.washingtontechnology.com/online/1_1/26546-1.html.
-
(2005)
Washington Technology
-
-
Lipowicz, A.1
-
311
-
-
84922964635
-
-
http://securitysolutions.com/news/security_fbi_director_encourages/.
-
-
-
-
314
-
-
0004268076
-
Sociobiology: The New Synthesis
-
Harvard University Press
-
Edward O. Wilson, Sociobiology: The New Synthesis 37-62 (Harvard University Press 2000).
-
(2000)
, pp. 37-62
-
-
Wilson, E.O.1
-
315
-
-
0009193658
-
The Nation-State and Global Order: A Historical Introduction to Contemporary Politics
-
Lynne Rienner
-
Walter C. Opello Jr. & Stephen J. Rosow, The Nation-State and Global Order: A Historical Introduction to Contemporary Politics 1-8 (Lynne Rienner 1999).
-
(1999)
, pp. 1-8
-
-
Opello, W.C.1
Rosow, S.J.2
-
316
-
-
84922989789
-
The Origins of Western Warfare: Militarism and Morality in the Ancient World
-
Doyne Dawson, The Origins of Western Warfare: Militarism and Morality in the Ancient World 13-77.
-
-
-
Dawson, D.1
-
317
-
-
84923013072
-
Traditions of War: Occupation, Resistance, and the Law 4-18 Theodor Meron, Henry's Wars and Shakespeare's Laws: Perspectives on the Law of War in the Later Middle Ages
-
Karma Nabulsi, Traditions of War: Occupation, Resistance, and the Law 4-18 Theodor Meron, Henry's Wars and Shakespeare's Laws: Perspectives on the Law of War in the Later Middle Ages 7-46.
-
-
-
Nabulsi, K.1
-
318
-
-
84923040008
-
A Well-Regulated Militia
-
Saul Cornell, A Well-Regulated Militia 12-13.
-
-
-
Cornell, S.1
-
319
-
-
0042157042
-
The Posse Comitatus Act: Setting the Record Straight on 124 Years of Mischief and Misunderstanding Before Any More Damage Is Done
-
Gary Felicetti and John Luce, The Posse Comitatus Act: Setting the Record Straight on 124 Years of Mischief and Misunderstanding Before Any More Damage Is Done, 175 Military Law Review 87 (2003).
-
(2003)
Military Law Review
, vol.175
, pp. 87
-
-
Felicetti, G.1
Luce, J.2
-
320
-
-
84892073533
-
Homeland Defense: Another Nail in the Coffin for Posse Comitatus
-
99
-
Nathan Canestaro, Homeland Defense: Another Nail in the Coffin for Posse Comitatus, 12 Washington University Journal of Law & Policy 99, 101-10 (2003).
-
(2003)
Washington University Journal of Law & Policy
, vol.12
, pp. 101-110
-
-
Canestaro, N.1
-
321
-
-
0005163689
-
Fourth Amendment and Posse Comitatus Restrictions on Military Involvement in Civil Law Enforcement
-
406
-
Roger Blake Hohnsbeen, Fourth Amendment and Posse Comitatus Restrictions on Military Involvement in Civil Law Enforcement, 54 George Washington Law Review 404, 406 (1986).
-
(1986)
George Washington Law Review
, vol.54
, pp. 404
-
-
Hohnsbeen, R.B.1
-
322
-
-
0004062456
-
The Soldier and the State
-
Samuel P. Huntington, The Soldier and the State 177.
-
-
-
Huntington, S.P.1
-
323
-
-
84923018432
-
-
http://en.wikipedia.org/wiki/Militia#United_Kingdom.
-
-
-
-
324
-
-
84876487657
-
The Second Amendment in Context: The Case of the Vanishing Predicate
-
467
-
H. Richard Uviller and William G. Merkel, The Second Amendment in Context: The Case of the Vanishing Predicate, 76 Chi-Kent L. Rev. 403, 467 (2000).
-
(2000)
Chi-Kent L. Rev.
, vol.76
, pp. 403
-
-
Richard Uviller, H.1
Merkel, W.G.2
-
326
-
-
84920587393
-
The Militia Clauses, The National Guard, and Federalism: A Constitutional Tug of War
-
333
-
Patrick Todd Mullins, The Militia Clauses, The National Guard, and Federalism: A Constitutional Tug of War, 57 Geo. Wash. L. Rev, 328, 333 (1988).
-
(1988)
Geo. Wash. L. Rev
, vol.57
, pp. 328
-
-
Mullins, P.T.1
-
327
-
-
84923045351
-
-
http://en.wikipedia.org/wiki/Naval_Militia.
-
-
-
-
328
-
-
84923018431
-
-
http://en.wikipedia.org/wiki/U.S._Marine_Corps.
-
-
-
-
329
-
-
84922964634
-
-
http://en.wikipedia.org/wiki/History_of_the_United_States_Air_Force.
-
-
-
-
330
-
-
84923045350
-
-
http://en.wikipedia.org/wiki/Air_National_Guard.
-
-
-
-
331
-
-
84923018430
-
-
http://en.wikipedia.org/wiki/Continental_Navy.
-
-
-
-
332
-
-
84922991257
-
-
http://en.wikipedia.org/wiki/Articles_of_confederation.
-
-
-
-
333
-
-
84923018429
-
-
http://www.yale.edu/lawweb/avalon/artconf.htm.
-
-
-
-
334
-
-
84922991256
-
-
http://en.wikipedia.org/wiki/United_States_Navy.
-
-
-
-
335
-
-
84922964633
-
Naval Militia: A Historical Perspective, State Guard Association of the United States, Inc
-
Jon B. Silvis, Naval Militia: A Historical Perspective, State Guard Association of the United States, Inc., http://www.sgaus.org/hist_nm.htm.
-
-
-
Silvis, J.B.1
-
336
-
-
84922991255
-
-
http://en.wikipedia.org/wiki/United_States_Navy_Reserve.
-
-
-
-
337
-
-
33846266246
-
Base Closure and Realignment: Federal Control over the National Guard
-
344
-
Jason A. Coats, Base Closure and Realignment: Federal Control over the National Guard, 75 U. Cin. L. Rev. 343, 344 (2006).
-
(2006)
U. Cin. L. Rev.
, vol.75
, pp. 343
-
-
Coats, J.A.1
-
338
-
-
84922964632
-
-
http://en.wikipedia.org/wiki/Naval_Militia.
-
-
-
-
339
-
-
32144453989
-
Not Fit For Sea Duty: The Posse Comitatus Act, the United States Navy, and Federal Law Enforcement at Sea
-
451
-
Christopher A. Abel, Not Fit For Sea Duty: The Posse Comitatus Act, the United States Navy, and Federal Law Enforcement at Sea, 31 William & Mary Law Review 445, 451 n. 36 (1990).
-
(1990)
William & Mary Law Review
, vol.31
, Issue.36
, pp. 445
-
-
Abel, C.A.1
-
340
-
-
33750262403
-
The Militia Clause of the Constitution
-
181
-
Fredrick B. Wiener, The Militia Clause of the Constitution, 54 Harvard Law Review 181, 187-188 (1940).
-
(1940)
Harvard Law Review
, vol.54
, pp. 187-188
-
-
Wiener, F.B.1
-
341
-
-
33747872798
-
Federalizing the First Responders to Acts of Terrorism via the Militia Clauses
-
1018
-
Brian C. Brook, Federalizing the First Responders to Acts of Terrorism via the Militia Clauses, 54 Duke Law Journal 999, 1018 (2005).
-
(2005)
Duke Law Journal
, vol.54
, pp. 999
-
-
Brook, B.C.1
-
342
-
-
22744444508
-
Emergency Power and the Militia Acts
-
149
-
Stephen I. Vladek, Emergency Power and the Militia Acts, 114 Yale Law Journal 149, 160-161 (2004).
-
(2004)
Yale Law Journal
, vol.114
, pp. 160-161
-
-
Vladek, S.I.1
-
343
-
-
85050415567
-
Posse Comitatus: Preparing for the Hearings
-
193
-
Michael Noone, Posse Comitatus: Preparing for the Hearings, 4 Chicago Journal of International Law 193, 194-195 (2003).
-
(2003)
Chicago Journal of International Law
, vol.4
, pp. 194-195
-
-
Noone, M.1
-
344
-
-
77956406152
-
Making a Burlesque of the Constitution: Military Trials of Civilians in the War against Terrorism
-
447
-
Anthony F. Renzo, Making a Burlesque of the Constitution: Military Trials of Civilians in the War against Terrorism, 31 Vermont Law Review 447, 487-489 (2007).
-
(2007)
Vermont Law Review
, vol.31
, pp. 487-489
-
-
Renzo, A.F.1
-
345
-
-
77952659999
-
The Posse Comitatus Act Applied to the Prosecution of Civilians
-
771, Comment
-
Comment, The Posse Comitatus Act Applied to the Prosecution of Civilians, 53 University of Kansas Law 767, 771 (2005).
-
(2005)
University of Kansas Law
, vol.53
, pp. 767
-
-
-
346
-
-
84923045349
-
-
http://www.yale.edu/lawweb/avalon/lawofwar/hague04.htm.
-
-
-
-
347
-
-
84923018428
-
-
http://www.unhchr.ch/html/menu3/b/93.htm.
-
-
-
-
348
-
-
84922991254
-
-
http://www.yale.edu/lawweb/avalon/lawofwar/geneva03.htm.
-
-
-
-
349
-
-
33845762922
-
The Rehnquist Court's Non interference with the Guardians of National Security
-
1122
-
Gregory E. Maggs, The Rehnquist Court's Non interference with the Guardians of National Security, 74 George Washington University Law Review 1122, 1122 (2006).
-
(2006)
George Washington University Law Review
, vol.74
, pp. 1122
-
-
Maggs, G.E.1
-
350
-
-
33645136625
-
Law in a Time of Emergency: States of Exception and the Temptations of 9/11
-
1016
-
Kim Lane Scheppele, Law in a Time of Emergency: States of Exception and the Temptations of 9/11, 6 University of Pennsylvania Journal of Constitutional Law 1001, 1016 (2004).
-
(2004)
University of Pennsylvania Journal of Constitutional Law
, vol.6
, pp. 1001
-
-
Scheppele, K.L.1
-
351
-
-
84922991253
-
-
http://en.wikipedia.org/wiki/National_security.
-
-
-
-
352
-
-
0003966734
-
Shattered Peace: The Origins of the Cold War and the National Security State
-
Daniel Yergin, Shattered Peace: The Origins of the Cold War and the National Security State 194-198.
-
-
-
Yergin, D.1
-
353
-
-
84922964631
-
-
https://www.cia.gov/about-cia/cia-vision-mission-values/index.html:.
-
-
-
-
354
-
-
84922991135
-
-
http://www.dia.mil/thisisdia/intro/index.htm.
-
-
-
-
356
-
-
78049299291
-
Why the President (Almost) Always Wins in Foreign Affairs: Lessons of the Iran-Contra Affair
-
1255
-
Harold Hongju Koh, Why the President (Almost) Always Wins in Foreign Affairs: Lessons of the Iran-Contra Affair, 97 Yale Law Journal 1255, 1280-1281 (1988).
-
(1988)
Yale Law Journal
, vol.97
, pp. 1280-1281
-
-
Koh, H.H.1
-
357
-
-
33846056437
-
The Architecture of Smart Intelligence: Structuring and Overseeing Agencies In the Post 9/11 World
-
1655
-
Anne Joseph O'Connell, The Architecture of Smart Intelligence: Structuring and Overseeing Agencies In the Post 9/11 World, 94 California Law Review 1655, 1660-1661 (2006).
-
(2006)
California Law Review
, vol.94
, pp. 1660-1661
-
-
O'Connell, A.J.1
-
358
-
-
84922991134
-
-
http://en.wikipedia.org/wiki/Timothy_McVeigh.
-
-
-
-
359
-
-
84923045205
-
-
http://en.wikipedia.org/wiki/Al-Qaeda_in_Iraq.
-
-
-
-
360
-
-
24144497157
-
Targeted Killing of Suspected Terrorists: Extra-Judicial Executions or Legitimate Means of Defence?
-
David Kretzmer, Targeted Killing of Suspected Terrorists: Extra-Judicial Executions or Legitimate Means of Defence?, 16 European Journal of International Law 171 (2005).
-
(2005)
European Journal of International Law
, vol.16
, pp. 171
-
-
Kretzmer, D.1
-
361
-
-
0043240735
-
National Security and the First Amendment: A Judicial Role in Maximizing Public Access to Information
-
1123
-
Matthew Silverman, National Security and the First Amendment: A Judicial Role in Maximizing Public Access to Information, 78 Indiana Law Journal 1101, 1123 (2003).
-
(2003)
Indiana Law Journal
, vol.78
, pp. 1101
-
-
Silverman, M.1
-
362
-
-
84922991133
-
-
http://www.cfr.org/publication/12689/.
-
-
-
-
363
-
-
84922961955
-
The CIA Mandate and the War on Terror
-
554
-
Grant T. Harris, The CIA Mandate and the War on Terror, 23 Yale and Policy Review 529, 554 (2005).
-
(2005)
Yale and Policy Review
, vol.23
, pp. 529
-
-
Harris, G.T.1
-
365
-
-
0003692845
-
Crime and Punishment in American History
-
Lawrence M. Friedman, Crime and Punishment in American History 172 (1993).
-
(1993)
, pp. 172
-
-
Friedman, L.M.1
-
366
-
-
25144482147
-
Vigilantism Revisited: An Economic Analysis of the Law of Extra-Judicial Self-Help or Why Can't Dick Shoot Henry for Stealing Jane's Truck?
-
1221
-
Kelly D. Hine, Vigilantism Revisited: An Economic Analysis of the Law of Extra-Judicial Self-Help or Why Can't Dick Shoot Henry for Stealing Jane's Truck?, 47 American University Law Review 1221, 1227-28 (1998).
-
(1998)
American University Law Review
, vol.47
, pp. 1227-1228
-
-
Hine, K.D.1
-
367
-
-
84923018262
-
-
http://en.wikipedia.org/wiki/Vigilante.
-
-
-
-
368
-
-
84922991132
-
-
http://www.esquire.com/features/predator0907.
-
-
-
-
369
-
-
84922964511
-
-
http://www.mcafee.com/us/research/criminology_report/default.html.
-
-
-
-
370
-
-
0003692845
-
Crime and Punishment in American History
-
Lawrence M. Friedman, Crime and Punishment in American History 158-168.
-
-
-
Friedman, L.M.1
-
371
-
-
84922991131
-
-
http://www.fbi.gov/pressrel/pressrel07/cius092407.htm.
-
-
-
-
372
-
-
0005566702
-
Why the Police Don't Care about Computer Crime
-
465
-
Marc D. Goodman, Why the Police Don't Care about Computer Crime, 10 Harvard Journal of Law & Technology 465, 479-483 (1997).
-
(1997)
Harvard Journal of Law & Technology
, vol.10
, pp. 479-483
-
-
Goodman, M.D.1
-
373
-
-
84922975670
-
Computer Forensics Laboratory: Long Term Strategic Plan
-
Office of the Maryland State Prosecutor, Computer Forensics Laboratory: Long Term Strategic Plan (2007), http://www.dbm.maryland.gov/portal.
-
(2007)
-
-
-
374
-
-
84922964510
-
Web Scammer Targets Senior U.S. Executives
-
November 9
-
Christopher Rhoads, Web Scammer Targets Senior U.S. Executives, Wall Street Journal (November 9, 2007), http://online.wsj.com/public/article/SB119456922698387317-8NgwGNUFMUMRACalcmtkuwOGCXY_20071208.html?mod=tff_main_tff_top.
-
(2007)
Wall Street Journal
-
-
Rhoads, C.1
-
375
-
-
0347020664
-
The Private Police
-
1212
-
David Sklansky, The Private Police, 46 UCLA Law Review 1165, 1212 (1999).
-
(1999)
UCLA Law Review
, vol.46
, pp. 1165
-
-
Sklansky, D.1
-
376
-
-
60950598086
-
Allan Pinkerton: The First Private Eye
-
Castle Books
-
James Mackay., Allan Pinkerton: The First Private Eye 106-120 (Castle Books 1996).
-
(1996)
, pp. 106-120
-
-
Mackay, J.1
-
377
-
-
2942645014
-
Transforming Installation Security: Where Do We Go from Here?
-
55
-
Gregory L. Bowman, Transforming Installation Security: Where Do We Go from Here?, 178 Military Law Review 50, 55 (2003).
-
(2003)
Military Law Review
, vol.178
, pp. 50
-
-
Bowman, G.L.1
-
378
-
-
84922964509
-
-
http://en.wikipedia.org/wiki/Privateer.
-
-
-
-
379
-
-
84923018261
-
-
http://www.yale.edu/lawweb/avalon/lawofwar/decparis.htm.
-
-
-
-
380
-
-
84923045204
-
Accession of the United States to the Declaration of Paris
-
Accession of the United States to the Declaration of Paris, 28 Am. L. Rev. 615 (1894).
-
(1894)
Am. L. Rev
, vol.28
, pp. 615
-
-
-
381
-
-
77952607017
-
Civilians at War: Reexamining the Status of Civilians Accompanying the Armed Forces
-
155
-
J. Ricou Heaton, Civilians at War: Reexamining the Status of Civilians Accompanying the Armed Forces, 57 Air Force Law Review 155, 157 (2005).
-
(2005)
Air Force Law Review
, vol.57
, pp. 157
-
-
Ricou Heaton, J.1
-
382
-
-
84923045203
-
-
http://www.blackwaterusa.com/.
-
-
-
-
383
-
-
33748278620
-
The Utility of Force
-
Alfred A. Knopf
-
Rupert Smith, The Utility of Force xiii (Alfred A. Knopf 2007).
-
(2007)
, pp. xiii
-
-
Smith, R.1
-
384
-
-
4944226592
-
Political Representation and Accountability under Don't Ask, Don't Tell
-
1633, note 89
-
Tobias Barrington Wolff, Political Representation and Accountability under Don't Ask, Don't Tell, 89 Iowa Law Review 1633, 1656 note 89 (2004).
-
(2004)
Iowa Law Review
, vol.89
, pp. 1656
-
-
Wolff, T.B.1
-
385
-
-
84922964508
-
Sharing Law Enforcement and Intelligence Information: The Congressional Role
-
Library of Congress
-
Richard A. Best, Jr., Sharing Law Enforcement and Intelligence Information: The Congressional Role, Congressional Research Service (Library of Congress 2007).
-
(2007)
Congressional Research Service
-
-
Best, R.A.1
-
387
-
-
84922991130
-
-
http://arcweb.sos.state.or.us/exhibits/ww2/threat/bombs.htm.
-
-
-
-
388
-
-
84922991128
-
-
http://www.ojp.usdoj.gov/nij/pubs-sum/186276.htm.
-
-
-
-
389
-
-
84922991129
-
-
http://www.schneier.com/blog/archives/2005/11/giving_the_us_m.html.
-
-
-
-
390
-
-
20644452212
-
Where Is the Lone Ranger When We Need Him?: America's Search for a Postconflict Stability Force
-
United States Institute of Peace Press
-
Robert M. Perito, Where Is the Lone Ranger When We Need Him?: America's Search for a Postconflict Stability Force 85-86 (United States Institute of Peace Press 2004).
-
(2004)
, pp. 85-86
-
-
Perito, R.M.1
-
391
-
-
84959808007
-
Social Institutions: Their Emergence, Maintenance and Effects
-
Michael Hechter, Karl-Dieter Opp & Reinhard Wippler, Social Institutions: Their Emergence, Maintenance and Effects 13-16 (1990).
-
(1990)
, pp. 13-16
-
-
Hechter, M.1
Opp, K.-D.2
Wippler, R.3
-
392
-
-
0003458607
-
The Social Construction of Reality
-
Anchor Books
-
Peter L. Berger & Thomas Luckmann, The Social Construction of Reality 47-92 (Anchor Books 1966).
-
(1966)
, pp. 47-92
-
-
Berger, P.L.1
Luckmann, T.2
-
393
-
-
84922964507
-
-
http://www.montgomerycountymd.gov/poltmpl.asp?url=/content/POL/ask/communityservices/volunteer/Appl_cover.asp.
-
-
-
-
394
-
-
84922964506
-
-
http://www.sanantonio.gov/saPD/cop2.asp.
-
-
-
-
395
-
-
0003781985
-
Community Policing, Chicago Style
-
Oxford University Press
-
M. Hartnett, Community Policing, Chicago Style 110-93 (Oxford University Press 1997).
-
(1997)
, pp. 110-193
-
-
Hartnett, M.1
-
396
-
-
84922964505
-
-
http://www.co.frederick.md.us/index.asp?NID=733#Book1.
-
-
-
-
397
-
-
84922991127
-
-
http://www.chilliwack.com/main/page.cfm?.
-
-
-
-
398
-
-
84923045202
-
-
http://www.securityfocus.com/columnists/134.
-
-
-
-
399
-
-
0042417797
-
The Price of Vigilance
-
Rand McNally
-
Joan M. Jensen, The Price of Vigilance 22 (Rand McNally 1968).
-
(1968)
, pp. 22
-
-
Jensen, J.M.1
-
400
-
-
0345480235
-
Federal Justice: Chapters in the History of Justice and the Federal Executive
-
Macmillan
-
Homer Cummings & Carl McFarland, Federal Justice: Chapters in the History of Justice and the Federal Executive 421 (Macmillan, 1937).
-
(1937)
, pp. 421
-
-
Cummings, H.1
McFarland, C.2
-
401
-
-
84923018260
-
-
http://toto.lib.unca.edu/findingaids/mss/biltmore_industries/american_protection_league/default_league.htm.
-
-
-
-
402
-
-
84922964504
-
-
http://toto.lib.unca.edu/findingaids/mss/biltmore_industries/american_protection_league/default_league.htm.
-
-
-
-
403
-
-
84923045201
-
-
http://www.census.gov/population/www/censusdata/hiscendata.html.
-
-
-
-
404
-
-
84922964503
-
-
http://factfinder.census.gov/servlet/SAFFPopulation?_submenuId=population_0&_sse=on.
-
-
-
-
405
-
-
0039490138
-
Road Rage: Drivers' Understandings and Experiences
-
280
-
Eborah Lupton, Road Rage: Drivers' Understandings and Experiences, 38 Journal of Sociology 275, 280 (2002).
-
(2002)
Journal of Sociology
, vol.38
, pp. 275
-
-
Lupton, E.1
-
407
-
-
50149094983
-
Anonymity and Pseudonymity in Cyberspace: Deindividuation, Incivility and Lawlessness Versus Freedom and Privacy
-
March
-
M. E. Kabay, Anonymity and Pseudonymity in Cyberspace: Deindividuation, Incivility and Lawlessness Versus Freedom and Privacy, Address Before Annual Conference of the European Institute for Computer Anti-virus Research 8 (March 1998), http://www2.norwich.edu/mkabay/overviews/anonpseudo.htm.
-
(1998)
Address Before Annual Conference of the European Institute for Computer Anti-virus Research
, pp. 8
-
-
Kabay, M.E.1
-
409
-
-
84922991126
-
-
http://en.wikipedia.org/wiki/Homefront-United_States-World_War_II#Civilian_support_for_war_effort.
-
-
-
-
410
-
-
84923045200
-
-
http://en.wikipedia.org/wiki/Attacks_on_North_America_during_World_War_II.
-
-
-
-
411
-
-
0042053173
-
Air War and the Law of War
-
1, note 379
-
W. Hays Parks, Air War and the Law of War, 32 Air Force Law Review 1, 123 note 379 (1990).
-
(1990)
Air Force Law Review
, vol.32
, pp. 123
-
-
Hays Parks, W.1
-
412
-
-
84922991125
-
Assistant Special Agent in Charge
-
New York Electronic Crimes Task Force, Testimony Before the House Science Committee (October 10
-
Robert N. Weaver, Assistant Special Agent in Charge, New York Electronic Crimes Task Force, Testimony Before the House Science Committee (October 10, 2001), http://www.nymissa.org/documents/testimony.htm.
-
(2001)
-
-
Weaver, R.N.1
-
413
-
-
84922991124
-
Secret Service Cyber Forensics Team Available to Assist Corporate America
-
June 7
-
Laura Taylor, Secret Service Cyber Forensics Team Available to Assist Corporate America, Relevant Technologies (June 7, 2007), http://www.relevanttechnologies.com/secserv_070607.asp (.
-
(2007)
Relevant Technologies
-
-
Taylor, L.1
-
414
-
-
84923018259
-
-
http://www.secretservice.gov/ectf.shtml.
-
-
-
-
415
-
-
84922991123
-
-
http://www.vnunet.com/News/1137500.
-
-
-
-
416
-
-
84922991122
-
-
http://www.fbi.gov/congress/congress01/rondick072501.htm:.
-
-
-
-
417
-
-
84922991121
-
-
http://www.infragard.net/about.php?mn=1&sm=1-0.
-
-
-
-
418
-
-
77950637005
-
And the Wall Came Tumbling Down: Secret Surveillance after the Terror
-
1152
-
William C. Banks, And the Wall Came Tumbling Down: Secret Surveillance after the Terror, 57 University of Miami Law Review 1147, 1152 (2003).
-
(2003)
University of Miami Law Review
, vol.57
, pp. 1147
-
-
Banks, W.C.1
-
419
-
-
84923045199
-
-
http://strategicinsightsblog.com/strategic-intelligence-versus-investigations/.
-
-
-
-
421
-
-
0348199150
-
No Right to Choose: Mandated Victim Participation in Domestic Violence Prosecutions
-
Cheryl Hanna, No Right to Choose: Mandated Victim Participation in Domestic Violence Prosecutions, 109 Harvard Law Review 1849 (1996).
-
(1996)
Harvard Law Review
, vol.109
, pp. 1849
-
-
Hanna, C.1
-
422
-
-
84922964502
-
-
http://www.usaonwatch.org/AboutUs/Publications.php.
-
-
-
-
423
-
-
84923018258
-
-
http://en.wikipedia.org/wiki/Whistleblower#Legal_protection_for_whistleblowers.
-
-
-
-
424
-
-
84922964501
-
-
http://www.infragard.net/member.php.
-
-
-
-
425
-
-
0004275417
-
The Nature of the Judicial Process
-
Yale University Press
-
Benjamin N. Cardozo, The Nature of the Judicial Process 51 (Yale University Press 1921).
-
(1921)
, pp. 51
-
-
Cardozo, B.N.1
-
426
-
-
84923018257
-
-
http://en.wikipedia.org/wiki/Military_of_the_United_States.
-
-
-
-
427
-
-
84922964500
-
-
http://www.army.mil/institution/organization/unitsandcommands/commandstructure/.
-
-
-
-
428
-
-
84922964499
-
-
http://en.wikipedia.org/wiki/Federal_Bureau_of_Investigation#Organization.
-
-
-
-
429
-
-
84923018256
-
-
http://en.wikipedia.org/wiki/State_police.
-
-
-
-
430
-
-
84922991120
-
-
http://en.wikipedia.org/wiki/County_police#United_States.
-
-
-
-
431
-
-
84922964498
-
-
http://www.ojp.usdoj.gov/bjs/abstract/lpd00.htm.
-
-
-
-
432
-
-
84923045198
-
-
http://www.eatoncounty.org/prosecutor/proslist.htm.
-
-
-
-
433
-
-
84922991119
-
-
http://www.dhs.gov/xabout/.
-
-
-
-
434
-
-
84923018255
-
Agent Closes the Case on a Long Career
-
Worcester Telegram & Gazette (January 29
-
Lee Hammel, Agent Closes the Case on a Long Career, Worcester Telegram & Gazette (January 29, 2007).
-
(2007)
-
-
Hammel, L.1
-
435
-
-
84922991118
-
Law Enforcement Rivalry in U.S. Slowed Inquiry on Russian Funds
-
New York Times (September 29
-
Timothy L. O'Brien & Lowell Bergman, Law Enforcement Rivalry in U.S. Slowed Inquiry on Russian Funds, New York Times (September 29, 1999), http://query.nytimes.com/gst/fullpage.html?res=9805E5DA173EF93AA1575AC0A96F958260.
-
(1999)
-
-
O'Brien, T.L.1
Bergman, L.2
-
436
-
-
84922991117
-
The Twin Towers-Rivalry: Animus Surfaces Between Rival Agencies
-
New York Times (March 7
-
Martin Gottlieb, The Twin Towers-Rivalry: Animus Surfaces Between Rival Agencies, New York Times (March 7, 1993), http://query.nytimes.com/gst/fullpage.html?res=9F0CE5D7133BF934A35750C0A965958260.
-
(1993)
-
-
Gottlieb, M.1
-
437
-
-
84923045197
-
Inquiry into CIA Tapes Seen as Payback for FBI
-
January 5
-
David Johnston, Inquiry into CIA Tapes Seen as Payback for FBI, International Herald Tribune (January 5, 2008).
-
(2008)
International Herald Tribune
-
-
Johnston, D.1
-
438
-
-
84923018254
-
Focus on Explosives: Failures and Fees
-
Spring
-
Edward M. Green & Michael Gill, Focus on Explosives: Failures and Fees, 22 Crowell & Moring Mining Law Monitor (Spring 2005), http://www.kph.com/NewsEvents/Article.aspx?id=241.
-
(2005)
Crowell & Moring Mining Law Monitor
, vol.22
-
-
Green, E.M.1
Gill, M.2
-
439
-
-
84937338897
-
The Essentials of Self-Preservation
-
Philip Gold, The Essentials of Self-Preservation, Policy Review 33 (2000).
-
(2000)
Policy Review
, pp. 33
-
-
Gold, P.1
-
440
-
-
84922991116
-
In It Together: Budget Decisions Should Be Immune to Interservice Rivalries
-
Bruce Carlson, In It Together: Budget Decisions Should Be Immune to Interservice Rivalries, Army Times, http://www.armytimes.com/community/opinion/airforce:opinion_carlson070319/.
-
Army Times
-
-
Carlson, B.1
-
441
-
-
33947390639
-
Nanshin: Budget-Maximizing Behavior, the Imperial Japanese Navy and the Origins of the Pacific War
-
Brian Dollery, Zane Spindler, & Craig Parsons, Nanshin: Budget-Maximizing Behavior, the Imperial Japanese Navy and the Origins of the Pacific War, 4 Public Organization Review 135.
-
Public Organization Review
, vol.4
, pp. 135
-
-
Dollery, B.1
Spindler, Z.2
Parsons, C.3
-
442
-
-
84923018253
-
-
http://www.armytimes.com/community/opinion/airforce:opinion_carlson070319/.
-
-
-
-
443
-
-
84923045196
-
-
http://www.ustreas.gov/usss/ectf_about.shtml.
-
-
-
-
444
-
-
84923045195
-
-
http://www.infragard.net/about.php?mn=1&sm=1-0.
-
-
-
-
445
-
-
84922991115
-
-
http://www.ustreas.gov/usss/ectf.shtml.
-
-
-
-
446
-
-
84923045194
-
-
http://www.infragard.net/chapters/.
-
-
-
-
447
-
-
84923045193
-
-
http://www.ustreas.gov/usss/ectf.shtml.
-
-
-
-
448
-
-
84922964497
-
-
http://www.infragard.net/chapters/.
-
-
-
-
449
-
-
84922991114
-
-
http://www.ustreas.gov/usss/ectf.shtml.
-
-
-
-
450
-
-
84923018252
-
-
http://www.infragard.net/chapters/.
-
-
-
-
451
-
-
84923045191
-
-
http://www.nym-infragard.us/nuke/downloads/agendas/Agenda%20NYM%20InfraGard%20Cybercrime%2004-13-07.pdf.
-
-
-
-
452
-
-
84923045192
-
-
http://findarticles.com/p/articles/mi_m0EIN/is_2006_August_14/ai_n16621507.
-
-
-
-
453
-
-
84923045190
-
-
http://infragardphl.org/calendar.php?mon=08&day=21&year=2007.
-
-
-
-
454
-
-
84923045189
-
Can FBI and CIA Cooperate?
-
June 5
-
Abraham McLaughlin, Can FBI and CIA Cooperate?, Christian Science Monitor (June 5, 2002), http://www.csmonitor.com/2002/0605/p01s01-uspo.html.
-
(2002)
Christian Science Monitor
-
-
McLaughlin, A.1
-
455
-
-
84922991112
-
-
http://www.whitehouse.gov/vicepresident/news-speeches/speeches/vp20020221.html.
-
-
-
-
456
-
-
84922991113
-
-
http://www.isaccouncil.org/about/.
-
-
-
-
457
-
-
84922991111
-
-
http://www.fmi.org/isac/.
-
-
-
-
458
-
-
84923045091
-
-
http://www.reisac.org/.
-
-
-
-
459
-
-
84923018251
-
-
http://www.ren-isac.net/.
-
-
-
-
460
-
-
84922964355
-
-
http://www.michigan.gov/cybersecurity/0,1607,7-217-43559-153667--,00.html.
-
-
-
-
461
-
-
84923018227
-
-
http://www.sc-isac.sc.gov/content.asp?contentid=579.
-
-
-
-
462
-
-
84923018226
-
-
http://www.cscic.state.ny.us/partnership/.
-
-
-
-
463
-
-
84922964354
-
-
http://en.wikipedia.org/wiki/List_of_intelligence:agencies.
-
-
-
-
466
-
-
84922964353
-
The United Nations' Secret Agenda: Globalization and the Elimination of America's Sovereignty
-
January 24
-
Carl S. Parnell, The United Nations' Secret Agenda: Globalization and the Elimination of America's Sovereignty, Free Republic (January 24, 2008), http://www.freerepublic.com/focus/f-news/1958703/posts.
-
(2008)
Free Republic
-
-
Parnell, C.S.1
-
467
-
-
84922991091
-
-
http://en.wikipedia.org/wiki/European_Union.
-
-
-
|