1. National Research
Council, System Security Study committee, Computers at Risk; Safe Computing
in the Information Age (Washington D.C.: National Academy Press, 1991),
7.
2. Alvin Toffler, The
Third Wave (New York: William Morrow and Co., 1980).
3. Lewis Gann, Guerrillas
in History (Stanford CA: Hoover Institution Press, 1971)
4. Bruce Hoffman, Responding to Terrorism
Across the Technological Spectrum (Santa Monica: Rand corporation,
1994), 6.
5. Neal Pollard, "Computer Terrorism
and the Information Infrastructure," in InfowarCon '95 Conference
Proceedings: Held in Arlington VA 7-8 September 1995, (Carlisle PA:
National Computer Security Association, 1995) I-9.
6. John Arquilla and David Ronfeldt, "Cyberwar
is Coming!" Comparative Strategy, 12 (1993): 144.
7. Arquilla and Ronfeldt, 146.
8. Working definition recognized by the
Information Resources Management College of the National Defense University
as of 11/16/93
9. Martin Libicki, What is Information
Warfare? (Washington DC: National Defense University Press, August
1995), Internet.http://www.ndu.edu/ndu/inss/actpubs/act003/a003cont.html.
10. Libicki, Chapter 7.
11. Michael I. Handel, Masters of War:
Sun Tzu, Clausewitz and Jomini (London: Frank Cass and Co., 1992),
75.
12. Chairman of the Joint Chiefs of Staff,
Memorandum of Policy Number 30 (Washington D.C., 8 March 1993), 3.
13. Wayne J. Rowe, Information Warfare:
A Primer for Navy Personnel (Newport: U.S. Naval War College, 1995),
10.
14. Bowyer Bell, "Aspects of the Dragonworld:
Covert Communications and the Rebel Ecosystem," International Journal
of Intelligence and Counterintelligence, 3-1 (Spring 1989):
15-43.
15. Winn Schwartau, Information Warfare:
Chaos on the Electronic Superhighway (New York: Thunder's Mouth Press,
1994), 49.
16. Robert Ayers (Chief, Information Warfare
Division, DISA) presentation, "DISA and Information Warfare,"
to InfoWarCon'95, 7-8 September 1995, Washington, D.C.
17. Joseph Seanor, speech The Cyber-Terrorist
presented to InforWarCon'95 7-8 September, 1995, Washington, D.C.
18. Paul A. Stassmann, speech Information
Terrorism presented at NDU 10 April 1995, Washington D.C.
19. Briefing, Denver Post 8 March 1995
business, C-2, Nexis.
20. Prevention Beats cure for Terminal
Illnesses: Computer Viruses," Daily Telegraph (London), 30
May 1995, 26.
21. Ira Winkler, "Case Study: Social
Engineers Wreak Havoc," in InfoWarCon'95 Conference Proceedings,
September 7-8, 1995, by National computer Security Association (Carusle
PA: NCSA, 1995), F-1.
22. James W. Rawles, "High-Technology
Terrorism," Defense Electronics, January 1990, 74.
23. Neil Munro, "Microwave Weapons
Stuns Iraqis," Defense News, 15 April 1992, Nexis
24. Yomiuri Shimbun, "Aum Linked with
Microwave Weapons," The Daily Yomiuri, 11 June 1995,
Nexis.
25. Schwartau, 171-189.
26. Thomas Perry Thornton, "Terror
as a Weapon of Political Agitation," in Internal War: Problems
and Approaches, ed. Harry Eckstein (New York: Free Press of Glencoe,
1964), 73.
27. Thornton, 77.
28. Thornton, 77.
29. Philip A. Karber, "Urban Terrorism:
Baseline Data and conceptual Framework," Social Science Quarterly
(Vol. 52, Dec. 1971) 527-528 as cited in Alex P. Schmid, Political
Terrorism (New Brunswick: Transaction Books, 1983), 83.
30. Alex P. Schmid, Political Terrorism
(New Brunswick: Transaction Books, 1983), 83.
31. Alex P. Schmid, Violence as Communication,
(Beverly Hills: Sage, 1982), 60.
32. Schmid, Political Terrorism,
107.
33. Schmid, Political Terrorism,
108.
34. Schmid, Political Terrorism,
109.
35. Thornton, 83.
36. Thornton, 80-81.
37. Thornton 75.
38. Paul Wilkinson, Terrorism and the
Liberal State (New York: New York UP, 1986), 24.
39. Thornton, 83.
40. Neil Munro, "The Pentagon's New
Nightmare: An Electronic Pearl Harbor," Washington Post, 16
July 1995, C-3.
41. Thornton, 86-87.
42. Ted Robert Gurr, "Terrorism in
Democracies: Its Social and Political Bases," in Origins of Terrorism:
Psychologies, Ideologies, Theologies, States of Mind, ed. Walter Reich
(New York: Cambridge University Press, 1990), 94.
43. Richard Clutterbuck, Terrorism and
Guerrilla Warfare: Forecasts and Remedies (New York: Routledge, 1990)
18.
44. Schwartau, 127.
45. Schwartau, 64.
46. Thornton, 83.
47. Martin Libicki, The Mesh and the
Net (Washington, D.C.: Institute for National Strategic Studies, 1994),
97-119.
48. Cynthia Bournellis, "Internet'95,"
Internet World, November 1995, 52.|
49. Bournellis, 47.
50. Schwartau, 77.
51. Rusty Graham, "Storm, Bombing
Work 1-2 Punch on Local ATMs," Temple Daily Telegram, 18 March 1993,
Business section, Nexis.
52. Brian Jenkins, "Future Trends
in International Terrorism," Current Perspectives in International
Terrorism, eds. Robert O. Slater and Michael Stohl (New York: St. Martin's
Press, 1988) 258.
53. Peter E. Sakkas, "Espionage and
Sabotage in the Computer World," International Journal of Intelligence
and Counterintelligence 5-2 (Summer 1991): 155-202.
54. Wayne Madsen, "Intelligence Agency
Threats to Computer Security," International Journal of Intelligence
and Counterintelligence 6 (Winter 1993): 440.
55. Clifford Stoll, the Cuckoo's Egg: Tracking
a Spy Through the Maze of Computer Espionage (New York: Doubleday, 1989).
56. Madsen, 419.
57. "Soviet Attaché expelled
as 'computer spy'," Jane's Defense Weekly 18 March 1989, 438.
58. Wayne Madsen "Retired KGB Officers
Refuse Comment on Russia Computer Espionage," Computer Fraud and
Security Bulletin Jan. 1994, Nexis.
59. Claire Sterling, The Terror Network
(New York: Berkeley, 1982).
60. Madsen, "Intelligence Threats"
426.
61. Madsen, 450.
62. Michael J. McDermott, "Is International
Marketing a game of spy versus spy?" Brandweek 20 June 1994,
31.
63. Ronald E. Yates, "Cold War: Part
II, Foreign Intelligence Agencies have New Targets- U.S. Companies,"
Chicago Tribune, 29 Aug. 1993, C1.
64. Peter Schweizer, Friendly Spies
(New York: Atlantic Monthly Press, 1993), 122.
65. Madsen, 436.
66. Stephen Keating, "Global Intrigue
on Info Highway, Local Case Alleges Chinese Piracy," Denver Post,
24 April 1994, A1.
67. Schweizer, 161-2.
68. Government Accounting Office, Hackers
Penetrate DOD computer Systems, Statement of Jack L. Brock before Senate
Subcommittee on Government Information and Regulation. 20 November 1991,
1-4. GAO/T-IMTEC-92-5.
69. Madsen, 437.
70. "Suspicions Surface About Bugged
Swiss Encryption Units," Computer Fraud and Security Bulletin, October
1994.
71. Madsen, 440.
72. Wolf Blitzer, Territory of Lies
(New York: Harper and Row, 1989), 68.
73. Jay Peterzell, "Spying and Sabotage
by Computer; The U.S. and its adversaries are tapping databases -- and
spreading viruses," Time, 20 March 1989, 25.
74. Madsen 434.
75. Buck Bloombecker, "Of Systems,
Solidarity, and Struggle," Datamation, 33,21 (1 November 1987):
47, Nexis.
76. Bloombecker, Nexis.
77. Bloombecker, Nexis.
78. Lisa Maechling and Yonah Alexander,
"Risks to Energy Production and Trade," in Political Terrorism
and Energy: The Threat and Response, eds., Yonah Alexander and
Charles K. Ebinger (New York: Praeger, 1982), 140.
79. Congress, Senate, Committee on Governmental
Affairs, Vulnerability of Telecommunications and Energy Resources to
Terrorism 101st Cong., 1st sess., 7-8 February 1989, 252-257.
80. Thomas Griffith, "Strategic Attacks
of National Electrical Systems" (M.A. thesis, School of Advanced Airpower
Studies, 1994), 59.
81. Elliot Diringer, "Environmental
Demonstrations Take Violent Turn," San Francisco Chronicle,
24 April 1990, A3.
82. Susan Ager, "Byline," Associated
Press, 17 March 1978, Nexis.
83. Stephen Bowman, "Lights Out: Electrical
Systems an Easy Target for Terrorists," Denver Post, 29 May
1995, 74.
84. Congress, Senate, 7, 11.
85. Congress, Senate, 70.
86. Congress, Senate, 10.
87. Congress, Senate, 248.
88. Norman S. Leach, "Terrorism in
Your Own Back Yard," Security Management, 33, 5 (May 1989):
56, Nexis.
89. Congress, Senate, 63.
90. Robert Crabbe, United Press International
(Sacramento), 25 January 1991, Financial report, Nexis.
91. Marvin J. Cetron, "The Growing
Threat of Terrorism," The Futurist, 23, 4 (July 1989): 20,
Nexis.
92. John Lamb and James Etheridge, "DP:
The Target of Terror," Datamation 32 (1 February 1986): 44,
Nexis.
93. Lamb and Etheridge, Nexis.
94. Reuters North European Service, "Attack
Against U.S. Computer Firm" 26 October 1983, Nexis.
95. France: Terror by Technology,"
The Economist, 19 April 1980, 44, Nexis.
96. Eugene Moosa, "Hundreds of Police
Hunt for 300 Rail Saboteurs," Associated Press, 30 November
1985, Nexis.
97. Moosa, Nexis.
98. Japan Economic Newswire, "Radical
Guerrilla Assaults Stop JNR Train Runs," 29 November 1985, Nexis.
99. Douglas E. Campbell, "The Intelligent
Threat," Security Management 33, 2 (March 1989): 19A, Nexis.
100. Campbell, Nexis.
101. Saul Hansell, "Citibank Fraud
Case Raises Computer Security Questions," New York Times, 19
Aug. 1995, 31.
102. Hansell, 31.
103. John Manson, "Bank's Security
Chain's rattled," Financial Times (London), 20 September 1995,
20, Nexis.
104. Kelley Holland, "Bank Fraud,
The Old-Fashioned Way," Business Week, 4 September 1995, 96,
Nexis.
105. Holland, Nexis.
106. Campbell.
107. Matthew May, "Super Snoopers
or Plain Bad?" Times (London), 18 August 1995, Nexis.
108. "Wall Street Friday" AFX
News, 21 August 1995, Nexis.
109. Rochelle Garner, "The Growing
Professional Menace," Open Computing, July 1995, 32, Nexis.
110. Garner.
111. Government Accounting Office, Hackers
Penetrate DOD Computer Systems, Statement of Jack L. Brock before Senate
Subcommittee on Government Information and Regulation, 20 November 1991,
1-4. GAO/T-IMTEC-92-5.
112. Gordon R. Meyer, "The social
Organization of the Computer Underground" (M.A. thesis, Northern Illinois
University, 1989).
113. Katie Hafner and John Markoff, Cyberpunk:
Outlaws and Hackers on the Commuter Frontier (New York: Touchstone/Simon
and Schuster, 1991) 345-6.
114. Hafner and Markoff, 296.
115. Hafner and Markoff, 328-9.
116. Peter J. Denning, "The Internet
Worm: in Computers Under Attack: Intruders, Worms, and Viruses Peter
J. Denning ed. (Massachusetts: ACM Press, 1990) 193-4.
117. Figures obtained from Internet Society
International Host Distribution survey at ftp.isoc.org/isoc/charts2/host/hosts.xls.
Also see Internet World, November 1995.
118. Aaron Zitner, "Netscape Flaw
Seen Setback for Business," Boston Globe, 20 September 1995,
33.
119. Strategic Assessment 1995
(Washington D.C.: National Institute for Strategic Studies, 1995), 153
120. Internet Society Figures.
121. William Wresch, "New Lifelines,"
Internet World November 1995, 103.
122. Arquilla and Ronfeldt, 141.
123. Alex P. Schmid, Political Terrorism
(New Brunswick: Transaction Books 1983), 73.
124. Thomas Perry Thornton, "Terror
as a Weapon of Political Agitation," Internal War: Problems and
Approaches, ed. Harry Eckstein (New York: Free Press of Glencoe, 1964),
73.
125. E.F. Mickolus, Transnational Terrorism:
A Chronology of Events, 1968-1979 (London: Aldwych Press, 1980),
XIII-XIV as quoted in Schmid Political Terrorism.
126. R. Clutterbuck Guerrillas
and Terrorists (London: Faber and Faber, 1977), 11,21 as quoted in
Schmid Political Terrorism.
127. Schmid, 111.