1,496
Views
5
CrossRef citations to date
0
Altmetric
Original Articles

Intelligence for Counter‐Terrorism: Technology and Methods

Pages 48-61 | Published online: 03 Aug 2011

REFERENCES

  • Cordesman , A.H. and Wagner , A.R. 2005 . The lessons of modern war. Volume V: The war in Iraq , Volume V , New York, NY : Harper‐Collins .
  • Ehrenfeld , R. 2003 . Funding evil: How terrorism is financed – and how to stop it , New York, NY : Bonus Books .
  • Flynn , S.E. 2004 . America the vulnerable: How our government is failing to protect us from terrorism , New York, NY : Harper‐Collins .
  • Lipton , E. 2005 . U.S. to spend billions more to alter security systems . New York Times , May 8 : 1
  • National Commission on Terrorist Attacks Upon the United States (9–11 Commission) . 2004 . The 9/11 Commission report: Final report of the National Commission on Terrorist Attacks upon the United States. , New York : W. W. Norton & Company .
  • National Research Council . 2002 . Making the nation safer: The role of science and technology in countering terrorism , Washington, DC : National Academies Press .
  • Report of the Commission on the Intelligence Capabilities of the United States regarding weapons of mass destruction: Report to the President of the United States. (2005). Washington, DC: Executive Office of the President.
  • Report of the Inspector General. (2005). Washington, DC: U.S. Department of Homeland Security.
  • Report of the Joint Inquiry of the Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence in Intelligence Community Activities before and after the Terrorist Attacks of September 11, 2001. (2002). Washington, DC: United States Senate.
  • Wagner , A R. 2005 . “ Terrorism and the internet: Uses and abuses ” . In Cyberterrorism , Edited by: Kandel , M. and Last , A. 1 – 28 . New York, NY : World Scientific .
  • Wagner , A R. 2006a . “ Information operations and international law ” . In Security, terrorism and privacy in information society, , Edited by: von Knop , K. , Neisser , H. , Salnikov , A. and Ganor , B. 373 – 398 . Berlin : Bielefeld, W. Bartelsmann Verlag, GmbH & Co .
  • Wagner , A R. 2006b . “ Terrorist use of new technologies ” . In Countering terrorism and WMD , Edited by: Katona , P. , Intriligator , M. and Sullivan , J. 122 – 147 . London : Routledge .
  • Wagner , A R. 2007a . Meeting the terrorist challenge: Coping with failures of leadership and intelligence , New York, NY : Harper‐Collins .
  • Wagner , A R. 2007b . Terrorism and surveillance: The technical and legal context , New York, NY : Columbia University Press .
  • Weimann , G. 2006 . Terror on the internet , Washington, DC : United States Institute for Peace .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.