INFORMATION TERRORISM: DEVELOPMENT OF STRATEGY OF COUNTERACTION
Table of contents
Share
QR
Metrics
INFORMATION TERRORISM: DEVELOPMENT OF STRATEGY OF COUNTERACTION
Annotation
PII
S086904990000617-0-1
Publication type
Article
Status
Published
Edition
Pages
131-140
Abstract
The analysis purpose is identifi cation of the technologies having the greatest potential from thepoint of view of their application by the terrorist organizations and development of recommendationsfor a safety force directed on counteraction, prevention or reduction of effi ciency of application byterrorists of the given technologies.
Keywords
terrorism, information and communication technologies, strategy and tactics, planning and targeting, recruiting, antiterrorist activities
Date of publication
15.07.2011
Number of purchasers
1
Views
1014
Readers community rating
0.0 (0 votes)
Cite Download pdf

To download PDF you should pay the subscribtion

1

References



Additional sources and materials

Golubev V.A. Kiberterrorizm kak novaya forma terrorizma? (http://www.crime-research.org).
Rogovskij E.A. Rossiya v bor'be s mezhdunarodnym terrorizmom: grani povysheniya pozitivnogo obraza strany // Rossiya i Amerika v XXI veke. Internet-izdanie.
Starostina E. Terrorizm i kiberterrorizm: ugroza mezhdunarodnoj bezopasnosti // Tsentr issledovaniya komp'yuternoj prestupnosti. Internet-izdanie (www.crime-research.ru).
Tomas T.L. Sderzhivanie asimmetrichnykh terroristicheskikh ugroz, stoyaschikh pered obschestvom v informatsionnuyu ehpokhu // Mirovoe soobschestvo protiv globalizatsii prestupnosti i terrorizma. Materialy mezhdunarodnoj konferentsii. M., 2002.
Tropina T. Kiberprestupnost' i kiberterrorizm (http://www Crime.vl.ru).
Coll S., Susan B.G. Terrorists Turn to the Web as Base of Operations // The Washington Post. August 7, 2005.
Denning D.E. Activism, Hacktivism, and Cyberterrorism: the Internet as a Tool for Infl uencing Foreign Policy (http://www.nautilus.org/info-policy/workshop/papers/denning.html).
Lewis N. Dangerous Games: how the Seductive Power of Video Games Is Being Harnessed to Push Deadly Agendas // The Calgary Herald. July 9, 2005.
Money-Transfer Systems, Hawala Style // CBC News Online. June 11, 2004.
National Commission on Terrorist Attacks upon the United States. The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States. New York, 2004.
Taylor P. The New Al-Qaeda: Jihad.com // BBC Television. July 20, 2005.
Weimann G. Www.Terror.Net: how Modern Terrorism Uses the Internet. Washington (D.C.), March 2004.
Wilson P., Roger C.M. Exploring Money Laundering Vulnerabilities Through Emerging Cyberspace Technologies: a Caribbean-based Exercise. Santa Monica (Cal), 1998.
Zanini M., Sean J.A.E. The Networking of Terror in the Information Age // Networks and Netwars: the Future of Terror, Crime, and Militancy. Santa Monica (Cal), 2001.

Comments

No posts found

Write a review
Translate