Terror on the Internet: The New Arena, the New Challenges
US Institute of Peace Press, 2006 - 309 lappuses
Terrorists fight their wars in cyberspace as well as on the ground. However, while politicians and the media have hotly debated the dangers of terrorists sabotaging the Internet, surprisingly little is known about terrorists actual use of the Internet.In this timely and eye-opening volume, Gabriel Weimann reveals that terrorist organizations and their supporters maintain hundreds of Web sites, taking advantage of the unregulated, anonymous, and easily accessible nature of the Internet to target an array of messages to a variety of audiences. Drawing on a seven-year study of the World Wide Web and a wide variety of literature, the author examines how modern terrorist organizations exploit the Internet to raise funds, recruit, and propagandize, as well as to plan and launch attacks and to publicize their chilling results. Weimann also investigates the effectiveness of counterterrorism measures, and warns that this cyberwar may cost us dearly in terms of civil rights.Illustrated with numerous examples taken from terrorist Web sites, "Terror on the Internet" offers the definitive introduction to this newly emerging and highly dynamic arena. The volume lays bare the challenges we collectively face in confronting the growing and increasingly sophisticated terrorist presence on the Net. - Read the review on Economist.com- Read the review on New York Times"
Lietotāju komentāri - Rakstīt atsauksmi
Ierastajās vietās neesam atraduši nevienu atsauksmi.
New Terrorism New Media
The War over Minds The Psychology of Terrorism
Communicative Uses of the Internet for Terrorism
Instrumental Uses of the Internet for Terrorism
Cyberterrorism How Real Is the Threat?
Fighting Back Responses to Terrorism on the Internet and Their Cost
According actions activities agencies al Qaeda allow American appeared Arabic argues Army attacks become bombings called cause Center civil liberties claims communication conducted countries create Cyber cyberterrorism describes e-mail effective electronic enemy example fear fight forces forms freedom global groups hackers Hamas Hezbollah Ibid important individuals Institute Internet Iraq Islamic Israeli issue Jihad killed Laden leader March mass means measures ment messages military monitoring movement Muslim offers officials operations organizations peace political potential present propaganda protect psychological published Qaeda recruit Research responsibility Saudi September serve society suicide surveillance technologies terrorism terrorist terrorist groups threat tion United users various virtual Washington weapons Web sites