BIBLIOGRAPHY

Alexander, Yonah and Charles Ebinger, eds. Political Terrorism and Energy: The Threat and Response. New York: Praeger, 1982.

Alexander, Yonah, David Carlton, and Paul Wilkinson. Terrorism: Theory and Practice. Boulder CO: Westview Press, 1979.

Bell, J. Bower. A Time of Terror. New York: Basic Books, 1978.

Blitzer, Wolf. Territory of Lies. New York: Harper and Row, 1989.

Chairman of the Joint Chiefs of Staff. Memorandum of Policy Number 30. Washington, D.C., 8 March 1993.

Clark, Richard C. Technological Terrorism. Old Greenwich CT: Devin-Adair, 1980.

Clutterbuck, Richard. Terrorism and Guerrilla Warfare. New York: Routledge, 1990.

Coakley, Thomas P. Command and Control for War and Peace. Washington, D.C.: National Defense University, 1991.

Cohen, Frederick B. Protection and Security on the Information Superhighway. New York: John Wiley and sons, 1995.

Cooper, James A. Computer and Communications Security. New York: Intertext, 1989.

Denning, Peter J., ed. Computers Under Attack. Reading MA: ACM Press, 1990.

Eckstein, Harry, ed. Internal War: Problems and Approaches. London: Free Press of Glencoe, 1964.

Ederington, L. Benjamin, and Michael Mazarr, eds. Turning Point: The Gulf War and U.S. Military Strategy. Boulder: Westview Press, 1994.

Gutteridge, William F. Contemporary Terrorism. New York: Facts on File Publications, 1986.

Hafner, Katie and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon and Shuster, 1991.

Handel, Michael I. Masters of War: Sun Tzu, Clausewitz and Jomini. Portland: Frank Cass c/o International Specialized Book Services, Inc., 1992.

Hoffman, Bruce. Recent Trends and future Prospects of Terrorism in the United States. Santa Monica CA: Rand Corporation, 1988.

Hoffman, Bruce. Responding to Terrorism Across the Technological Spectrum. Santa Monica CA: Rand Corporation, 1994.

Kurz, Anat, ed. Contemporary Trends in World Terrorism. New York: Praeger, 1987.

Laqueur, Walter. The Age of Terrorism. Boston: Little, Brown and Co., 1987.

Libicki, Martin, C. The Mesh and the Net: Speculations on Armed Conflict in a Time of Free Silicon Washington, D.C.: National Defense University, 1994.

Libicki, Martin What is Information Warfare, ACIS Paper 3. Washington, D.C.: National Defense University, August 1995.

Netanyahu, Benjamin, ed. Terrorism: How the West Can Win. New York: Farrar, Straus, Giroux, 1986.

Planning Considerations for Defensive Information Warfare: Information Assurance. Report prepared for Defense Information Systems Agency, Joint Interoperability and Engineering Organization, and Center for Information Systems Security by SAIC under Task order 90-SAIC-019, 16 December 1993.

Power, Richard, Information Warfare: A CSI Special Report. San Francisco: Computer Security Institute, 1995.

Reich, Walter, ed. Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind. New York: Cambridge University Press, 1990.

Rowe, Wayne, J. Information Warfare: A Primer for Navy Personnel. Newport RI: Naval War college, Center for Naval Warfare Studies, 1995.

Schmid, Alex P. Political Terrorism. New Brunswick: Transaction Books, 1983.

Schwartau, Winn, Information Warfare: Chaos on the Electronic Superhighway. New York: Thunder's Mouth Press, 1994.

Schweizer, Peter. Friendly Spies. New York: Atlantic Monthly Press, 1993.

Simon, Jeffrey D. The Terrorist Trap. Indianapolis: Indiana University Press, 1994.

Slater, Robert O. and Michael Stohl, eds. Current Perspectives on International Terrorism. New York: St. Martin's Press, 1988.

Sloan, Stephen. Beating International Terrorism: An Action Strategy for Preemption and Punishment. Maxwell AFB, Alabama: Air University Press, 1986.

Smith, G. Davidson. Combating Terrorism. New York: Routledge, 1990.

Sterling, Claire, The Terror Network. New York: Berkeley, 1982.

Stoll, Clifford. The Cuckoo's Egg. New York: Doubleday, 1989.

Toffler, Alvin. The Third Wave. New York: William Morrow, 1985.

Toffler, Alvin. Powershift. New York: Bantam, 1990.

Toffler, Alvin and Heidi Toffler. War and Anti-War. New York: Little, Brown and Co., 1993.

U.S. General Accounting Office. Hackers Penetrate DOD Computer Systems, testimony of Jack L. Brock before Senate Subcommittee on Government Information and Regulation, Committee of Governmental Affairs, GAO/T-IMTEC-92-5, 20 November 1991.

U.S. Congress. Senate Committee on Governmental Affairs. Vulnerability of Telecommunications and Energy Resources to Terrorism. 101st Cong., 1st Sess., 7-8 February 1989.

U.S. Congress. House. Science, Space and Technology Committee. Computer Security: 101st Cong., 2nd Sess., 10 July 1990.

U.S. Congress, Office of Technology Assessment. Technology Against Terrorism: Structuring Security, OTA-ISC-511. Washington. D.C.: U.S. Government Printing Office, January 1992.

U.S. Congress. Senate. Committee on Governmental Affairs. Vulnerability of the Nation's Electric System to Multi-Site Terrorist Attack. 101st Cong., 2nd Sess., 28 June 1990.

Van Creveld, Martin. Command in War. Cambridge MA: Harvard University Press, 1985.

Van Creveld, Martin. Technology and War. New York: Free Press, 1989.

Van Creveld, Martin. The Transformation of War. New York: The Free Press, 1991.

Wardlaw, Grant. Political Terrorism: Theory, Tactics, and Counter-measures. New York: Cambridge University Press, 1982.

Wilkinson, Paul. Terrorism and the Liberal State. New York: NYU Press, 1986.

ARTICLES

Ager, Susan. :Byline." Associated Press, 17 March 1978.

Anthes, Gary. "Info-terrorist Threat Growing." Computerworld, 20 January 1995. 1.

Anthes, Gary. "Info Warfare Risk Growing" Computerworld, 22 May 1995, 1.

Arquilla, John, and Ronfeldt, David. "Cyberwar is Coming!" Comparative Strategy, 12 (1993): 141-165.

Arquilla, John, "the Strategic Implications of Information Dominance." Strategic Review (Summer 1994): 24-30.

Bell, J. Bowyer. "Aspects of the Dragonworld: Covert Communications and the Rebel Ecosystem." International Journal of Intelligence and Counterintelligence 3-1 (Spring 1989): 15-43.

Benesh, Peter, "Amateurs; Deadly New Menace." Pittsburgh Post-Gazette, 28 September 1995, A1.

Bloombecker, Buck. "Of Systems, Solidarity, and Struggle." Datamation, 1 November 1987, 47.

Bournellis, Cynthia. "Internet '95." Internet World, November 1995, 47.

Bowman, Stephen. "U.S. Still ripe for Terror." Denver Post, 28 May 1995, A2.

Bowman, Stephen, "Lights out: Electrical Systems an Easy Target for Terrorists." Denver Post, 29 May 1995. A2.

Campbell, Douglas E. " The Intelligent Threat." Security Management, March 1989, 19A.

Cetron, Marvin J. "The Growing Threat of Terrorism." The Futurist 23-4 (July 1989): 4.

Cetron, Marvin J. and Owen Davies. "The Future Face of Terrorism." The Futurist 28-6 (November 1994): 10.

Cooper, Pat. "In Cyberspace, U.S. Confronts and Illusive Foe." Defense News, 13 February 1995, 1.

Crabbe, Robert. "Mideast War: California Moves to Protect Big Dams." United Press International, 25 January 1991.

Diringer, Elliot. "Environmental Demonstrations Take Violent Turn." San Francisco Chronicle, 24 April 1990, A3.

Dowell, William. "French Terrorists Attract Outside Aid." Christian Science Monitor, 17 July 1980, 4.

Eddington, Mark. "Taking the Offensive; Against Terrorism." The Atlantic 269-6 (June 1992): 40.

Elliott, Ronald. "Information Security is Crucial." Defense News, 13 January 1992, 20.

Evers, Stacey, "IW Poses Infinite Questions, Few Answers." Aerospace Daily, 23 June 1995, 472.

Garner, Rochelle. "The Growing Professional Menace." Open Computing, July 1995, 32.

Gertz, Bill. "Spies on the Information Superhighway." The Washington Times, 17 Nov. 1994.

Graham, Rusty. "Storm, Bombing work 1-2 Punch on Local ATMs." Temple Daily Telegram, 18 March 1993.

Grier, Peter. "Information Warfare," Air Force Magazine, March 1995, 34.

Hansell, Saul. "Citibank Fraud Case Raises Computer Security Questions." New York Times, 19 August 1995, 1-31.

Hoffman, Lance, Faraz Ali, Steven Heckler, Ann Huybrechts. "Cryptography Policy." Communications of the ACM 37-9 (September 1994): 109.

Holland, Kelley. "Bank Fraud, The Old-Fashioned Way." Business Week, 4 September 1995.

Keating, Stephen. "Global Intrigue on Info Highway." Denver Post, 24 April 1994, A1.

Knutson, Jeanne N. "The Terrorist's Dilemmas: Some Implicit Rules of the Game." Terrorism: An International Journal. 4 (1980): 195-222.

Lamb, John and James Etheridge. "DP: The Target of Terror." Datamation, 1 February 1986, 44.

Leach, Norman. "Terrorism in Your Own Backyard." Security Management 33-5 (May 1989): 56.

Madsen, Wayne. "Retired KGB Officers Refuse Comment on Russian Computer Espionage." Computer Fraud and Security Bulletin, January 1994.

Madsen, Wayne. "Intelligence Agency Threats to Computer Security." International Journal of Intelligence and Counterintelligence 6-4 (Winter 1993): 413-487.

Maney, Kevin and Robyn Meredith. "Risky Business on the Internet." USA Today, 20 September 1995, 1B.

Mannix, Margaret. "Can Hackers Break into Netscape?" U.S. News and World Report, 2 October 1995, 84.

Markoff, John. "Feared Computer Plague Passes With Very Few Infections." New York Times, 7 March 1992, 1-8.

Mason, John. "Banks' Security Chains Rattled." Financial Times, 20 September 1995, 20.

May, Matthew. "Super Snoopers or Plain Bad?" Times (London), 18 August 1995.

Moffett, George D. "High-tech Terrorism in the Future." Christian Science Monitor, 27 June 1986, 4.

Mokrzycki, Mike. "Battleground of Bits and Bytes." Jerusalem Post, 19 April 1995, 5.

Munro, Neil "The Pentagon's New Nightmare: An Electronic Pearl Harbor." Washington Post, 16 July 1995, C3.

Ognibene, Peter J. "Perspective on Gulf Crisis, America, The Vulnerable." Los Angeles Times, 16 January 1991, B7.

Peterzell, Jay. "Spying and Sabotage by Computer." Time 20 March 1989, 25.

Radigan, Joseph. "Info Highway Robbers Try Cracking the Vault." U.S. Banker, May 1995, 67.

Rawles, James W. "High Technology Terrorism." Defense Electronics, January 1990, 74.

Richardson, Valerie. "Ecoterrorists put 92,000 Homes in Dark." Washington Times, 24 April 1990, A4.

Sakkas, Peter E. "Espionage and Sabotage in the Computer World." International Journal of Intelligence and Counterintelligence 5-2 (Spring 1992): 155-202.

Segal, Gerald. "Asians in Cyberia." Washington Quarterly 18-3 (Summer 1995): 3.

Sitomer, Curtis J. "Crooks find Computers Useful; Terrorist see Vulnerable Targets." Christian Science Monitor, 5 December 1986, 6.

Stern, Chester. "Choas by Computer." Mail on Sunday (Associated Newspapers), 14 February 1993, 8.

Tomkins, Richard, "Techno-terror Makes Debut, Repeat Performances Likely." Deutsche Presse-Agentur, 24 March 1995.

Wade, Nicholas, "Method and Madness: Bytes Make Might." New York Times, 12 March 1995, 6-28.

Wald, Matthew, "The Nation; How Does the World Look Through the Eyes of Aspiring Terrorists?" New York Times, 6 March 1994, 4-3.

Wilder, Clinton, "Netscape Encryption Codes Cracked." InformationWeek, 2 October 1995, 32.

Wresch, William. "New Lifelines: The Internet in Africa." Internet World, November 1995, 102.

Zitner, Aaron. "Netscape Flaw Seen as Setback for Business." Boston Globe, 20 September 1995, 33.

"A War on French Computer." Newsweek, 28 April 1980, 56.

"France; Terror by Technology." Economist, 19 April 1980, 44.

"German Retailer Warns on Computer Virus." Reuter European Business Repor, 10 August 1995.

"Police Say Radicals Used Radio Transmitters in Rail Sabotage." Associated Press, 1 December 1985, AM Cycle.

"Radical Guerrilla Assaults Stop JNR Train Runs." Japan Economic Newswire, 29 November 1985.

"Soviet Attaché Expelled as 'Computer Spy'." Jane's Defence Weekly 11-11 (18 March 1989).

"Suspicions surface About Bugged Swiss Encryption Units." Computer Fraud and Security Bulletin, October 1994.

"Techno-Terrorists Might Cripple Computerized Society." Associated Press, 11 April 1986.

"The Softwar Revolution; The Ties that Bind," The Economist, 10 June 1995, 18.

 PROCEEDINGS

Kelchner, T. and Graham, K., eds. InfoWarCon'95 Conference Proceedings, September 7-8, 1995, by National Computer Security Association. Carlisle PA: National Computer Security Association, 1995.

THESES

Meyer, Gordon, R. "The Social Organization of the Computer Underground." M.A. Thesis, Northern Illinois University, 1989.

Previous

Next

Table of Contents