Similar Articles |
|
Searcher Nov/Dec 2008 Paul Piper |
Nets of Terror Terrorist activity on the Internet. |
National Defense November 2013 Yasmin Tadjdeh |
Al-Qaida Seen Shifting Tactics to Smaller Attacks The Boston bombing quickly brought domestic jihadist terrorism back into the public eye. Counterterrorism analysts are now concerned that the United States may soon face an increase in deadly, smaller scale attacks. |
Parameters Spring 2004 Matthew J. Morgan |
The Origins of the New Terrorism A history of terrorism and where it's headed. |
InternetNews October 27, 2008 Richard Adhikari |
Twitter an Emerging Terrorist Tool Military paper outlines some of the emerging uses of tech in ways that can hurt. |
Fast Company Sarah Kessler |
Facebook, Twitter Would Be Forced To Report Terrorist Activity Under Proposed Bill Efforts in Washington have put a spotlight on the debate around the role of technology companies in aiding law enforcement's investigation of terrorist activity. |
National Defense December 2014 Yasmin Tadjdeh |
Government, Industry Countering Islamic State's Social Media Campaign The U.S. government, along with industry partners, is working to stymie the Islamic State's burgeoning social media campaign, which experts say is widespread and highly advanced for a terror organization. |
PC Magazine February 27, 2008 Isabelle Groc |
The Online Hunt for Terrorists Researchers are using Web spiders to track down terrorists online. |
Parameters Autumn 2008 Daniel S. Roper |
Global Counterinsurgency: Strategic Clarity for the Long War Though policy initiatives since September 11, 2001 have positively influenced certain agencies in their efforts to secure America, some steps have actually limited the nation's effectiveness in countering the threats it faces. |
National Defense July 2007 Breanne Wagner |
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. |
Fast Company Christina Farr |
How Effective Is It To Vet The Social Media Activity Of Visa Applicants? Technology company employees are skeptical that government pilot programs to scrutinize visa applicants' social media activity will be effective at rooting out potential terrorists or terrorist sympathizers. |
Reason December 2001 |
Guarding the Home Front Will civil liberties be a casualty in the War on Terrorism? A panel of experts discuss which civil liberties they think are most at risk in what has been called America's first 21st century war... |
National Defense January 2005 Joe Pappalardo |
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. |
National Defense November 2012 Erwin et al. |
Top Five Threats to National Security in the Coming Decade The next wave of national security threats might be more than the technology community can handle. They are complex, multidimensional problems against which no degree of U.S. technical superiority in stealth, fifth-generation air warfare or night-vision is likely to suffice. |
PC World September 11, 2001 Dan Verton |
Terrorist Attacks Shake U.S. Infrastructure Cyberspace may be clogged, but it's apparently not a target -- this time, experts say... |
IEEE Spectrum September 2006 Harry Goldstein |
Modeling Terrorists New simulators could help intelligence analysts think like the enemy. Whether the goal is to kill, deter, or negotiate with terrorists inside a computer or in the real world, ultimately agent-based models must answer one fundamental question: Do they help save lives? |
Fast Company Steven Melendez |
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. |
Salon.com March 5, 2002 Eric Boehlert |
Terrorists under the bed "Terrorism expert" Steven Emerson paints a terrifying picture of lethal Muslim fundamentalists among us in "American Jihad." But he doesn't know the difference between Osama bin Laden and Yasser Arafat... |
National Defense April 2015 Yasmin Tadjdeh |
Big Data Helping to Pinpoint Terrorist Activities, Attacks Using big data for counter terrorism efforts will only become more prevalent as time goes on, said Josh New, a policy analyst at the Information Technology and Innovation Foundation's Center for Data Innovation. |
Salon.com July 17, 2002 Farhad Manjoo |
The case of the missing code Are al-Qaida terrorists hiding their secrets in eBay photographs? |
Mother Jones Jan/Feb 2002 Ted Gup |
Clueless in Langley For two decades, the CIA has been making excuses for why it has failed to tackle terrorism. Can a spy agency rooted in the Cold War adapt to a changed world? |
BusinessWeek June 28, 2004 Paul Magnusson |
The Smart Way To Fix Intelligence From Pearl Harbor to the terrorist attacks of September 11, the lesson keeps being repeated: A dollar spent on identifying the threat and preventing the attack can be worth far more than the millions spent safeguarding targets or the billions spent cleaning up the aftermath. |
Salon.com June 12, 2000 Bruce Shapiro |
The hyping of domestic terrorism Why a new report on the threat of international terrorist attacks on U.S. soil is a con job. |
National Defense November 2010 Stew Magnuson |
DHS Warns Local Law Enforcement Of New Homegrown Terrorist Threat The general consensus in the intelligence community is that the homegrown terrorist threat during the last year has supplanted plots that originate overseas. |
National Defense June 2009 Erwin & Magnuson |
7 Deadly Myths About Weapons of Terror Seven noteworthy misconceptions associated with weapons of terror. |
National Defense November 2006 Stew Magnuson |
Feds lagging in most disaster scenarios, McHale says The federal government has identified 15 homeland disaster scenarios for which it must prepare. But does making lists equate to preparedness? |
National Defense February 2010 Stew Magnuson |
Homegrown Terrorist Cases Bring Focus to Debates on Radicalization The development of terrorists can not be predicted in an individual with a one-size fits all profile. |
Salon.com September 11, 2001 Laura Miller |
A new breed of terrorism A security expert says it's time for the U.S. to declare war on those who are waging war on America... |
PC World September 12, 2001 Tom Spring & Frank Thorsberg |
Will Attack Hurt Net Privacy? Privacy advocates urge government to balance security needs and civil liberties... |
Reason November 2003 |
Show Us Your Money The USA PATRIOT Act lets the feds spy on your finances. But does it help catch terrorists? |
Reason October 2006 Walker & Gillespie |
The State of War and Domestic Terrorism In this interview, Chet Richards and John Mueller discuss where America is at five years after the 9/11 attacks. |
Wired December 2001 John Arquilla & David Ronfeldt |
Fighting The Network War Conventional military power stands little chance against a band of swarming 14th-century terrorists, according to the authors, RAND analysts who wrote the book on "netwar." Here's their five-point plan to tear apart the terror network... |
Military & Aerospace Electronics September 2004 |
The 9/11 Report: Details of the central event of our time It's not the sophisticated sensors, signal processing, satellite communications, and automation technology that wins the day in the end; it's the people who use the technology that make the difference. |
Fast Company Michael Grothaus |
White House Officials To Meet With Tech Execs To Discuss Countering Terrorism Online They will discuss the ongoing concern of how terrorists have become adept at using social media to recruit members and converts online. |
IEEE Spectrum September 2006 Charles Perrow |
Shrink The Targets Human nature can better withstand a dozen small disasters than a single great one, even if the casualty total is the same. Protecting America's big targets is next to impossible; we should instead downsize them to make them less consequential and easier to protect. |
Parameters Spring 2005 Saxby Chambliss |
We Have Not Correctly Framed the Debate on Intelligence Reform Over the last decade, our intelligence community has failed us. It wasn't able to penetrate the al Qaeda terrorist organization, and we paid a high price for that failure. |
National Defense August 2006 Stew Magnuson |
Former staffer becomes leading DHS critic Former Department of Homeland Security Inspector General Clark Kent Ervin has emerged in recent months as one of the department's leading critics, and one with some credibility. |
Parameters Summer 2004 P. W. Singer |
The War on Terrorism: The Big Picture In the fight against terrorism, are we deterring more terrorists than are being trained for the future? Are we spending so much money trying to capture them, that we're really getting behind? |
Popular Mechanics June 2006 Brad Reagan |
Public Defenders Protecting America's cities, ports, borders and airports requires new technology and new tactics. |
Salon.com September 12, 2000 Arthur Allen |
The battle over bio-terror A recent report urges America to pour $13 billion into preventing disease-based warfare, but evidence suggests that our fears are misplaced. |
National Defense September 2009 Stew Magnuson |
Feds Begin to Tackle the Vexing Problem of How to Defeat Homemade Bombs Congress' attention remains focused on preventing the use of weapons of mass destruction on U.S. soil, but improvised explosive devices do not receive the same attention as the chemical, biological or nuclear threats. |
National Defense July 2007 Stew Magnuson |
When It Comes to The Battle of Ideas, The U.S. Has No General On a day to day basis, who is responsible for information operations for the United States government? |
PC World September 12, 2001 Joris Evers |
Spy Technology: Too Little, Too Late? Echelon, other high-tech surveillance tools may not have been effective when needed... |
Salon.com February 1, 2002 Jeff Stein |
Bin Laden's Olympic dreams Al-Qaida conducted "meticulous" surveillance of Salt Lake City, intelligence official says... |
PC World September 14, 2001 Sam Costello |
Carnivore Dispatched to Sniff Out Terrorists Senate OKs measure to broaden technology's use, urges research for more tools... |
PC World October 5, 2001 Frank Thorsberg |
PC World Poll Highlights Privacy Concerns Our online poll shows most readers are concerned about giving the government more power for online surveillance... |
National Defense September 2011 Eric Beidel |
Homeland Security Market 'Vibrant' Despite Budget Concerns The abundance of small, medium and large firms vying for DHS contracts is creating healthy competition. |
Parameters Summer 2007 Gary L. Guertner |
European Views of Preemption in US National Security Strategy The transatlantic divide over preemption. |
Scientific American December 26, 2005 Luis Miguel Ariza |
Virtual Jihad The Internet as the ideal terrorism recruiting tool. |
National Defense January 2006 Abshire & Czerwinski |
With an Overstretched Military, U.S. Should Create `Home Guard' The U.S. presence in Iraq has in many ways made near-term gains in the war on terror more difficult and thrown America's homeland security into question. But a creative solution with roots reaching far back into American history may be the answer. |
PC World January 2002 Anne Kandra |
National Security vs. Online Privacy The new antiterrorism law steps up electronic surveillance of the Internet... |