NOTES

1. National Research Council, System Security Study committee, Computers at Risk; Safe Computing in the Information Age (Washington D.C.: National Academy Press, 1991), 7.
2. Alvin Toffler, The Third Wave (New York: William Morrow and Co., 1980).
3. Lewis Gann, Guerrillas in History (Stanford CA: Hoover Institution Press, 1971)
4. Bruce Hoffman, Responding to Terrorism Across the Technological Spectrum (Santa Monica: Rand corporation, 1994), 6.
5. Neal Pollard, "Computer Terrorism and the Information Infrastructure," in InfowarCon '95 Conference Proceedings: Held in Arlington VA 7-8 September 1995, (Carlisle PA: National Computer Security Association, 1995) I-9.
6. John Arquilla and David Ronfeldt, "Cyberwar is Coming!" Comparative Strategy, 12 (1993): 144.
7. Arquilla and Ronfeldt, 146.
8. Working definition recognized by the Information Resources Management College of the National Defense University as of 11/16/93
9. Martin Libicki, What is Information Warfare? (Washington DC: National Defense University Press, August 1995), Internet.http://www.ndu.edu/ndu/inss/actpubs/act003/a003cont.html.
10. Libicki, Chapter 7.
11. Michael I. Handel, Masters of War: Sun Tzu, Clausewitz and Jomini (London: Frank Cass and Co., 1992), 75.
12. Chairman of the Joint Chiefs of Staff, Memorandum of Policy Number 30 (Washington D.C., 8 March 1993), 3.
13. Wayne J. Rowe, Information Warfare: A Primer for Navy Personnel (Newport: U.S. Naval War College, 1995), 10.
14. Bowyer Bell, "Aspects of the Dragonworld: Covert Communications and the Rebel Ecosystem," International Journal of Intelligence and Counterintelligence, 3-1 (Spring 1989): 15-43.
15. Winn Schwartau, Information Warfare: Chaos on the Electronic Superhighway (New York: Thunder's Mouth Press, 1994), 49.
16. Robert Ayers (Chief, Information Warfare Division, DISA) presentation, "DISA and Information Warfare," to InfoWarCon'95, 7-8 September 1995, Washington, D.C.
17. Joseph Seanor, speech The Cyber-Terrorist presented to InforWarCon'95 7-8 September, 1995, Washington, D.C.
18. Paul A. Stassmann, speech Information Terrorism presented at NDU 10 April 1995, Washington D.C.
19. Briefing, Denver Post 8 March 1995 business, C-2, Nexis.
20. Prevention Beats cure for Terminal Illnesses: Computer Viruses," Daily Telegraph (London), 30 May 1995, 26.
21. Ira Winkler, "Case Study: Social Engineers Wreak Havoc," in InfoWarCon'95 Conference Proceedings, September 7-8, 1995, by National computer Security Association (Carusle PA: NCSA, 1995), F-1.
22. James W. Rawles, "High-Technology Terrorism," Defense Electronics, January 1990, 74.
23. Neil Munro, "Microwave Weapons Stuns Iraqis," Defense News, 15 April 1992, Nexis
24. Yomiuri Shimbun, "Aum Linked with Microwave Weapons," The Daily Yomiuri, 11 June 1995, Nexis.
25. Schwartau, 171-189.
26. Thomas Perry Thornton, "Terror as a Weapon of Political Agitation," in Internal War: Problems and Approaches, ed. Harry Eckstein (New York: Free Press of Glencoe, 1964), 73.
27. Thornton, 77.
28. Thornton, 77.
29. Philip A. Karber, "Urban Terrorism: Baseline Data and conceptual Framework," Social Science Quarterly (Vol. 52, Dec. 1971) 527-528 as cited in Alex P. Schmid, Political Terrorism (New Brunswick: Transaction Books, 1983), 83.
30. Alex P. Schmid, Political Terrorism (New Brunswick: Transaction Books, 1983), 83.
31. Alex P. Schmid, Violence as Communication, (Beverly Hills: Sage, 1982), 60.
32. Schmid, Political Terrorism, 107.
33. Schmid, Political Terrorism, 108.
34. Schmid, Political Terrorism, 109.
35. Thornton, 83.
36. Thornton, 80-81.
37. Thornton 75.
38. Paul Wilkinson, Terrorism and the Liberal State (New York: New York UP, 1986), 24.
39. Thornton, 83.
40. Neil Munro, "The Pentagon's New Nightmare: An Electronic Pearl Harbor," Washington Post, 16 July 1995, C-3.
41. Thornton, 86-87.
42. Ted Robert Gurr, "Terrorism in Democracies: Its Social and Political Bases," in Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind, ed. Walter Reich (New York: Cambridge University Press, 1990), 94.
43. Richard Clutterbuck, Terrorism and Guerrilla Warfare: Forecasts and Remedies (New York: Routledge, 1990) 18.
44. Schwartau, 127.
45. Schwartau, 64.
46. Thornton, 83.
47. Martin Libicki, The Mesh and the Net (Washington, D.C.: Institute for National Strategic Studies, 1994), 97-119.
48. Cynthia Bournellis, "Internet'95," Internet World, November 1995, 52.|
49. Bournellis, 47.
50. Schwartau, 77.
51. Rusty Graham, "Storm, Bombing Work 1-2 Punch on Local ATMs," Temple Daily Telegram, 18 March 1993, Business section, Nexis.
52. Brian Jenkins, "Future Trends in International Terrorism," Current Perspectives in International Terrorism, eds. Robert O. Slater and Michael Stohl (New York: St. Martin's Press, 1988) 258.
53. Peter E. Sakkas, "Espionage and Sabotage in the Computer World," International Journal of Intelligence and Counterintelligence 5-2 (Summer 1991): 155-202.
54. Wayne Madsen, "Intelligence Agency Threats to Computer Security," International Journal of Intelligence and Counterintelligence 6 (Winter 1993): 440.
55. Clifford Stoll, the Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (New York: Doubleday, 1989).
56. Madsen, 419.
57. "Soviet Attaché expelled as 'computer spy'," Jane's Defense Weekly 18 March 1989, 438.
58. Wayne Madsen "Retired KGB Officers Refuse Comment on Russia Computer Espionage," Computer Fraud and Security Bulletin Jan. 1994, Nexis.
59. Claire Sterling, The Terror Network (New York: Berkeley, 1982).
60. Madsen, "Intelligence Threats" 426.
61. Madsen, 450.
62. Michael J. McDermott, "Is International Marketing a game of spy versus spy?" Brandweek 20 June 1994, 31.
63. Ronald E. Yates, "Cold War: Part II, Foreign Intelligence Agencies have New Targets- U.S. Companies," Chicago Tribune, 29 Aug. 1993, C1.
64. Peter Schweizer, Friendly Spies (New York: Atlantic Monthly Press, 1993), 122.
65. Madsen, 436.
66. Stephen Keating, "Global Intrigue on Info Highway, Local Case Alleges Chinese Piracy," Denver Post, 24 April 1994, A1.
67. Schweizer, 161-2.
68. Government Accounting Office, Hackers Penetrate DOD computer Systems, Statement of Jack L. Brock before Senate Subcommittee on Government Information and Regulation. 20 November 1991, 1-4. GAO/T-IMTEC-92-5.
69. Madsen, 437.
70. "Suspicions Surface About Bugged Swiss Encryption Units," Computer Fraud and Security Bulletin, October 1994.
71. Madsen, 440.
72. Wolf Blitzer, Territory of Lies (New York: Harper and Row, 1989), 68.
73. Jay Peterzell, "Spying and Sabotage by Computer; The U.S. and its adversaries are tapping databases -- and spreading viruses," Time, 20 March 1989, 25.
74. Madsen 434.
75. Buck Bloombecker, "Of Systems, Solidarity, and Struggle," Datamation, 33,21 (1 November 1987): 47, Nexis.
76. Bloombecker, Nexis.
77. Bloombecker, Nexis.
78. Lisa Maechling and Yonah Alexander, "Risks to Energy Production and Trade," in Political Terrorism and Energy: The Threat and Response, eds., Yonah Alexander and Charles K. Ebinger (New York: Praeger, 1982), 140.
79. Congress, Senate, Committee on Governmental Affairs, Vulnerability of Telecommunications and Energy Resources to Terrorism 101st Cong., 1st sess., 7-8 February 1989, 252-257.
80. Thomas Griffith, "Strategic Attacks of National Electrical Systems" (M.A. thesis, School of Advanced Airpower Studies, 1994), 59.
81. Elliot Diringer, "Environmental Demonstrations Take Violent Turn," San Francisco Chronicle, 24 April 1990, A3.
82. Susan Ager, "Byline," Associated Press, 17 March 1978, Nexis.
83. Stephen Bowman, "Lights Out: Electrical Systems an Easy Target for Terrorists," Denver Post, 29 May 1995, 74.
84. Congress, Senate, 7, 11.
85. Congress, Senate, 70.
86. Congress, Senate, 10.
87. Congress, Senate, 248.
88. Norman S. Leach, "Terrorism in Your Own Back Yard," Security Management, 33, 5 (May 1989): 56, Nexis.
89. Congress, Senate, 63.
90. Robert Crabbe, United Press International (Sacramento), 25 January 1991, Financial report, Nexis.
91. Marvin J. Cetron, "The Growing Threat of Terrorism," The Futurist, 23, 4 (July 1989): 20, Nexis.
92. John Lamb and James Etheridge, "DP: The Target of Terror," Datamation 32 (1 February 1986): 44, Nexis.
93. Lamb and Etheridge, Nexis.
94. Reuters North European Service, "Attack Against U.S. Computer Firm" 26 October 1983, Nexis.
95. France: Terror by Technology," The Economist, 19 April 1980, 44, Nexis.
96. Eugene Moosa, "Hundreds of Police Hunt for 300 Rail Saboteurs," Associated Press, 30 November 1985, Nexis.
97. Moosa, Nexis.
98. Japan Economic Newswire, "Radical Guerrilla Assaults Stop JNR Train Runs," 29 November 1985, Nexis.
99. Douglas E. Campbell, "The Intelligent Threat," Security Management 33, 2 (March 1989): 19A, Nexis.
100. Campbell, Nexis.
101. Saul Hansell, "Citibank Fraud Case Raises Computer Security Questions," New York Times, 19 Aug. 1995, 31.
102. Hansell, 31.
103. John Manson, "Bank's Security Chain's rattled," Financial Times (London), 20 September 1995, 20, Nexis.
104. Kelley Holland, "Bank Fraud, The Old-Fashioned Way," Business Week, 4 September 1995, 96, Nexis.
105. Holland, Nexis.
106. Campbell.
107. Matthew May, "Super Snoopers or Plain Bad?" Times (London), 18 August 1995, Nexis.
108. "Wall Street Friday" AFX News, 21 August 1995, Nexis.
109. Rochelle Garner, "The Growing Professional Menace," Open Computing, July 1995, 32, Nexis.
110. Garner.
111. Government Accounting Office, Hackers Penetrate DOD Computer Systems, Statement of Jack L. Brock before Senate Subcommittee on Government Information and Regulation, 20 November 1991, 1-4. GAO/T-IMTEC-92-5.
112. Gordon R. Meyer, "The social Organization of the Computer Underground" (M.A. thesis, Northern Illinois University, 1989).
113. Katie Hafner and John Markoff, Cyberpunk: Outlaws and Hackers on the Commuter Frontier (New York: Touchstone/Simon and Schuster, 1991) 345-6.
114. Hafner and Markoff, 296.
115. Hafner and Markoff, 328-9.
116. Peter J. Denning, "The Internet Worm: in Computers Under Attack: Intruders, Worms, and Viruses Peter J. Denning ed. (Massachusetts: ACM Press, 1990) 193-4.
117. Figures obtained from Internet Society International Host Distribution survey at ftp.isoc.org/isoc/charts2/host/hosts.xls. Also see Internet World, November 1995.
118. Aaron Zitner, "Netscape Flaw Seen Setback for Business," Boston Globe, 20 September 1995, 33.
119. Strategic Assessment 1995 (Washington D.C.: National Institute for Strategic Studies, 1995), 153
120. Internet Society Figures.
121. William Wresch, "New Lifelines," Internet World November 1995, 103.
122. Arquilla and Ronfeldt, 141.
123. Alex P. Schmid, Political Terrorism (New Brunswick: Transaction Books 1983), 73.
124. Thomas Perry Thornton, "Terror as a Weapon of Political Agitation," Internal War: Problems and Approaches, ed. Harry Eckstein (New York: Free Press of Glencoe, 1964), 73.
125. E.F. Mickolus, Transnational Terrorism: A Chronology of Events, 1968-1979 (London: Aldwych Press, 1980), XIII-XIV as quoted in Schmid Political Terrorism.
126. R. Clutterbuck Guerrillas and Terrorists (London: Faber and Faber, 1977), 11,21 as quoted in Schmid Political Terrorism.
127. Schmid, 111.

Previous

Top of Document