23.04.2017 Views

RAND_MR1382

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

37 Andrew Brown, “Editors Wanted,” New Statesman, April 26, 1999.<br />

38 Nigel Hickson, private conversation, April 29, 1999.<br />

39 Nigel Hickson, private communication, July 28, 1999.<br />

40 Richard Davis, The Web of Politics, Oxford University Press, 1999, p. 177.<br />

41 Davis, 1999, p. 178.<br />

42 See www.protest.net.<br />

43 Martin Stone, “Prof to Build Archive of Insurgency Groups,” Newsbytes, March 3, 1999.<br />

44 Edward Harris, “Web Becomes a Cybertool for Political Activists,” Wall Street Journal, August 5, 1999, B11; Barbara<br />

Adam, “J18 Hackers Could Target Australian Companies on Friday,” Australian Associated Press, June 16, 1999.<br />

45 Jon Ungoed-Thomas and Maeve Sheehan, “Riot Organisers Prepare to Launch Cyber War on City,” Sunday Times, August<br />

15, 1999.<br />

46 Liz Bernstein, private communication, October 4, 1999.<br />

47 Ibid.<br />

48 Ken Rutherford, private communication, October 6, 1999.<br />

49 See also the ICBL web site at www.icbl.org and the web site of the Land Mine Survivors Network at<br />

www.landminesurvivors.org.<br />

50 Alan Boyle, “Crypto Can Save Lives,” ZDNet, January 26, 1999. PGP provides both file and electronic-mail encryption.<br />

51 John Arquilla, David Ronfeldt, and Michele Zanini, “Networks, Netwar, and Information-Age Terrorism,” in Ian O.<br />

Lesser et al., Countering the New Terrorism, <strong>RAND</strong>, 1999, p. 65. The authors cite “Afghanistan, Saudi Arabia: Editor’s<br />

Journey to Meet Bin-Laden Described,” London al-Quds al-’Arabi, FBIS-TOT-97-003-L, November 27, 1996, p. 4, and “Arab<br />

Afghans Said to Launch Worldwide Terrorist War,” 1995.<br />

52 Ibid. The authors cite “Israel: U.S. Hamas Activists Use Internet to Send Attack Threats,” Tel Aviv IDF Radio, FBIS-TOT-<br />

97-001-L, October 13, 1996, and “Israel: Hamas Using Internet to Relay Operational Messages,” Tel Aviv Ha’aretz, FBIS-<br />

TOT-98-034, February 3, 1998, p. 1.<br />

53 The NIST AES web site is at csrc.nist.gov/encryption/aes/aes_home.htm.<br />

54 See www.aeronautix.com/nato/yugoslavia.html.<br />

55 Rebecca Fairley Raney, “Flood of E-Mail Credited with Halting U.S. Bank Plan,” The New York Times (Cybertimes),<br />

March 24, 1999.<br />

56 Ibid.<br />

57 Edward Harris, “Web Becomes a Cybertool for Political Activists,” Wall Street Journal, August 5, 1999, B11. The web<br />

site is at www.e-thepeople.com.<br />

58 The persons organizing the campaign went on to form the Electronic Privacy Information Center shortly thereafter.<br />

59 For example, each chip was uniquely keyed and decryption was not possible without getting the keys to the subject’s<br />

chip from two separate government agencies.<br />

60 For an interesting discussion of the Internet campaign against Clipper, see Laura J. Gurak, Persuasion and Privacy in<br />

Cyberspace, Yale University Press, 1997.<br />

61 Chris Carr, “Internet Anti-Impeachment Drive Yields Big Pledges of Money, Time,” Washington Post, February 7, 1999.<br />

The site is at www.moveon.org.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!