62 Davis, 1999, p. 135. 63 Edward Harris, “Web Becomes a Cybertool for Political Activists,” Wall Street Journal, August 5, 1999, B11. 64 Davis, 1999, p. 168. 65 Information provided to the author from Bruce Sterling; Winn Schwartau, Information Warfare, 2nd ed., Emeryville, Calif.: Thunder’s Mouth Press, 1996, p. 407. 66 For an in-depth analysis of the Zapatista’s “netwar,” see David Ronfeldt, John Arquilla, Graham E. Fuller, and Melissa Fuller, The Zapatista “Social Netwar” in Mexico, Santa Monica, Calif.: <strong>RAND</strong>, MR-994-A, 1998. 67 Niall McKay, “Pentagon Deflects Web Assault,” Wired News, September 10, 1998. 68 Brett Stalbaum, private correspondence, July 23, 1999. 69 Brett Stalbaum, “The Zapatista Tactical FloodNet,” www.thing.net/~rdom/ecd/ZapTact.html. 70 Niall McKay, “Pentagon Deflects Web Assault,” Wired News, September 10, 1998; Brett Stalbaum, personal communication, January 30, 1999. 71 Ricardo Dominguez, personal communication, February 2, 1999. 72 See www.aec.at/infowar/NETSYMPOSIUM/ARCH-EN/msg00633.html. 73 Day of Net Attacking Against Vivisection, communiqué from the Animal Liberation Front, December 31, 1998. The First Ever Animal Liberation Electronic Civil Disobedience Virtual Sit-In on the SMI Lab Web Site in Sweden, notice from Tactical Internet Response Network, http://freehosting.at.webjump.com/ fl/floodnet-webjump/smi.html. ECD Report—SMI Shuts Down Their Computer Network!!!, www.aec.at/infowar/NETSYMPOSIUM/ARCH-EN/msg00678.html, January 15, 1999. 74 Jon Ungoed-Thomas and Maeve Sheehan, “Riot Organisers Prepare to Launch Cyber War on City,” Sunday Times, August 15, 1999. 75 Carl Kaplan, “For Their Civil Disobedience, the ‘Sit-In’ Is Virtual,” Cyberlaw Journal, The New York Times on the Web, May 1, 1998. The law is Title 18 U.S.C. section 1030 (a)(5)(A). 76 See www gn.apc.org/pmhp/ehippies. 77 Ibid. 78 Rebecca Allison, “Belgrade Hackers Bombard MoD Website in ‘First’ Internet War,” PA News, March 31, 1999. 79 “E-Mail Attack on Sri Lanka Computers,” Computer Security Alert, No. 183, Computer Security Institute, June 1998, p. 8. 80 Jim Wolf, “First ‘Terrorist’ Cyber-Attack Reported by U.S.,” Reuters, May 5, 1998. 81 CIWARS Intelligence Report, May 10, 1998. 82 Rebecca Allison, “Belgrade Hackers Bombard MoD Website in ‘First’ Internet War,” PA News, March 31, 1999. 83 Patrick Riley, “E-Strikes and Cyber-Sabotage: Civilian Hackers Go Online to Fight,” Fox News, April 15, 1999. 84 Rebecca Vesely, “Controversial Basque Web Site Resurfaces,” Wired News, August 28, 1997; “Two More Basque Politicians Get ETA Death Threats,” Reuters, San Sebastian, Spain, December 16, 1997. 85 “IGC Censored by Mailbombers,” letter from Maureen Mason and Scott Weikart, IGC, www.infowar.com. 86 Rebecca Vesely, “Controversial Basque Web Site Resurfaces,” Wired News, August 28, 1997. 87 Yves Eudes, “The Zorros of the Net,” Le Monde, November 16, 1997. 88 Anti-Terrorist Squad Orders Political Censorship of the Internet, press release from Internet Freedom, September 1997.
89 Amy Harmon, “‘Hacktivists’ of All Persuasions Take Their Struggle to the Web,” The New York Times, October 31, 1999. 90 Lindsay Murdoch, “Computer Chaos Threat to Jakarta,” Sydney Morning Herald, August 18, 1999, p. 9. 91 James Glave, “Crackers: We Stole Nuke Data,” Wired News, June 3, 1998; Janelle Carter, “Hackers Hit U.S. Military Computers,” Associated Press, Washington, D.C., June 6, 1998; “Hackers Now Setting Their Sights on Pakistan,” Newsbytes, June 5, 1998. 92 Jim Hu, “Political Hackers Hit 300 Sites,” CNET, July 6, 1998. The Milw0rm page is shown at www.antionline.com. 93 Patrick Riley, “E-Strikes and Cyber-Sabotage: Civilian Hackers Go Online to Fight,” Fox News, April 15, 1999. 94 “Serb Hackers Reportedly Disrupt U.S. Military Computers,” SRNA (Bosnian Serb news agency), March 28, 1999. 95 “Serb Hackers Declare Computer War,” Associated Press, October 22, 1998. 96 Martyn Williams, “Federal Web Sites Under Attack After Embassy Bombing,” Newsbytes, May 10, 1999. 97 Stephen Barr, “Anti-NATO Hackers Sabotage 3 Web Sites,” Washington Post, May 12, 1999. 98 “China Suspends Contacts with U.S.,” Associated Press, Beijing, May 9, 1999. 99 Niall McKay, “China: The Great Firewall,” Wired News, December 1, 1998. See also Sarah Elton, “Hacking in the Name of Democracy in China,” The Toronto Star, July 4, 1999. 100 Neil Taylor, “CDC Says Hackers Are Threat,” IT Daily, August 26, 1999. 101 Maggie Farley, “Dissidents Hack Holes in China’s New Wall,” Los Angeles Times, January 4, 1999. 102 See www.hacknews.com/archive.html?122998.html. 103 Letter of January 7, 1999. 104 Statement of January 7, 1999. 105 James Glave, “Confusion Over ‘Cyberwar,’” Wired News, January 12, 1999. 106 “Pro-China Hacker Attacks Taiwan Government Web Sites,” Reuters, August 9, 1999. 107 Annie Huang, “Hackers’ War Erupts Between Taiwan, China,” Associated Press, Taipei, Taiwan, August 9, 1999. 108 “Beijing Tries to Hack U.S. Web Sites,” Associated Press, July 30, 1999. McWee’s web site is at www.falunusa.net. 109 “Web Sites of Falun Gong Hit,” South China Morning Post, April 14, 2000. 110 See www.infosecuritymag.com/articles/1999/julycover.shtml/. 111 Clark Staten, private email, July 19, 1999. 112 Richard Power, “1999 CSI/FBI Computer Crime and Security Survey,” Computer Security Issues & Trends, Vol. V, No. 1, Winter 1999. 113 Ted Bridis, “Hackers Become an Increasing Threat,” Associated Press, July 7, 1999. 114 Ibid. 115 Tom Gross, “Israeli Claims to Have Hacked Saddam Off the Net,” London Sunday Telegraph, February 7, 1999. 116 Ibid. 117 Ibid. 118 mi2g Cyber Warfare Advisory Number 2, April 17, 1999, M2 Communications, April 19, 1999. 119 M2 Communications, April 8, 1999. 120 Barry Collin, “The Future of Cyberterrorism,” Crime and Justice International, March 1997, pp. 15–18. 121 Mark M. Pollitt, “Cyberterrorism: Fact or Fancy?” Proceedings of the 20th National Information Systems Security
- Page 3 and 4:
The Future of Terror, Crime, and Mi
- Page 5 and 6:
To Dick O’Neill, for his stalwart
- Page 7 and 8:
Defense, the Joint Staff, the unifi
- Page 9 and 10:
Chapter Eight ACTIVISM, HACKTIVISM,
- Page 11 and 12:
must continue to keep an eye on the
- Page 13 and 14:
ACKNOWLEDGMENTS We are deeply grate
- Page 15 and 16:
as a looming mode of military confl
- Page 17 and 18:
With respect to Serbia, then, a bet
- Page 19 and 20:
of any node included in it, may be
- Page 21 and 22:
more about technology than organiza
- Page 23 and 24:
charged with taking care of specifi
- Page 25 and 26:
The limits on some successes and th
- Page 27 and 28:
the rise of netwar should prompt a
- Page 29 and 30:
Brin, David, The Transparent Societ
- Page 31 and 32:
9 This is just a short exemplary st
- Page 33 and 34:
Chapter Two THE NETWORKING OF TERRO
- Page 35 and 36:
The Emergence of Networked Terroris
- Page 37 and 38:
integration of communication and co
- Page 39 and 40:
technologies such as encryption all
- Page 41 and 42:
(Hoffman, 1998, p. 131). Terrorists
- Page 43 and 44:
terrorists who rely on the Internet
- Page 45 and 46:
Future Developments in Information-
- Page 47 and 48:
Figure 2.1—Possible Shifts in the
- Page 49 and 50:
hire,” and the availability of ef
- Page 51 and 52:
www.fas.org/irp/threat/commission.h
- Page 53 and 54:
Nohria, Nitin, and Robert Eccles, e
- Page 55 and 56:
Department of the Army, 1997. 19 Fo
- Page 57 and 58:
Chapter Three TRANSNATIONAL CRIMINA
- Page 59 and 60:
policymakers concerned with develop
- Page 61 and 62:
there are relatively strong, direct
- Page 63 and 64:
Other networks will have a more end
- Page 65 and 66:
network a capacity to operate with
- Page 67 and 68:
deals. The importance of these netw
- Page 69 and 70:
The specific connections that facil
- Page 71 and 72:
superiority—the equivalent of an
- Page 73 and 74:
was a fascinating mix. It included
- Page 75 and 76:
elationships between the Christian
- Page 77 and 78:
organizations have hierarchical str
- Page 79 and 80:
example, in identifying some of the
- Page 81 and 82:
provide an important value-added ap
- Page 83 and 84:
Transformations,” in Stark and Gr
- Page 85 and 86:
changes benefit from these new tech
- Page 87 and 88:
outside of the realm of true terror
- Page 89 and 90:
hardcore Category C nucleus. Catego
- Page 91 and 92:
millennialist cults and such transn
- Page 93 and 94:
For the most part, these gangs are
- Page 95 and 96:
attling gangs in Cape Town and the
- Page 97 and 98:
Colombian cartels, and the imprison
- Page 99 and 100:
unknown actors in Seattle and elsew
- Page 101 and 102:
esponse. Finally, TEW utilizes an
- Page 103 and 104:
23 Consider Japan’s intelligence
- Page 105 and 106:
Part II SOCIAL NETWARS
- Page 107 and 108:
Burma (a small, and to many, obscur
- Page 109 and 110:
Whereas McLuhan declared “the med
- Page 111 and 112:
years and fines of up to $5,000 for
- Page 113 and 114:
Massachusetts. The “selective pur
- Page 115 and 116:
central in using electronic communi
- Page 117 and 118:
THE FREE BURMA COALITION AND THE PE
- Page 119 and 120:
Students at Harvard tapped into the
- Page 121 and 122:
eleased a list of their suppliers f
- Page 123 and 124:
Simons was in his high school Amnes
- Page 125 and 126:
Case studies and an Internet activi
- Page 127 and 128:
when a campaign scores successes. T
- Page 129 and 130:
transmit, almost in real-time, debr
- Page 131 and 132:
warning was made virtually unanimou
- Page 133 and 134:
7 See, for example, Marshall McLuha
- Page 135 and 136:
investment, the standard of living
- Page 137 and 138:
Chapter Six EMERGENCE AND INFLUENCE
- Page 139 and 140:
hierarchical layer—at least initi
- Page 141 and 142:
Chiapas and Mexico City in “swarm
- Page 143 and 144:
Transnational NGO Mobilization—A
- Page 145 and 146:
Acting in tandem with these organiz
- Page 147 and 148:
only to the conflict in Chiapas but
- Page 149 and 150:
comment outside as well as inside M
- Page 151 and 152:
and political ideals and similar co
- Page 153 and 154:
Cleaver, Harry, “The Zapatista Ef
- Page 155 and 156:
Thomas, Hugh, Conquest: Montezuma,
- Page 157 and 158:
The success of that networking was
- Page 159 and 160:
outlining their strategies and tact
- Page 161 and 162:
conference, rather than the success
- Page 163 and 164:
vandalism and nearly all of the loo
- Page 165 and 166:
direct transmissions from roving in
- Page 167 and 168: Network planned to shut down the WT
- Page 169 and 170: gas was an attempt to expand and re
- Page 171 and 172: Assistant Chief Joiner was turning
- Page 173 and 174: The Black Bloc engaged in vandalism
- Page 175 and 176: of the AFL-CIO retreat from downtow
- Page 177 and 178: for the four hours that President C
- Page 179 and 180: Around midnight, the disorder had d
- Page 181 and 182: vandalism by anarchists, or a divid
- Page 183 and 184: summer of 2001 in Genoa indicate th
- Page 185 and 186: Chapter Eight ACTIVISM, HACKTIVISM,
- Page 187 and 188: The following sections discuss and
- Page 189 and 190: including Western news sites. In Ap
- Page 191 and 192: devastation, the latter caused not
- Page 193 and 194: Privacy Information Center (EPIC),
- Page 195 and 196: open.” On the downside, some post
- Page 197 and 198: independence, sustained air strikes
- Page 199 and 200: about an esoteric bank regulation,
- Page 201 and 202: generate so much traffic against th
- Page 203 and 204: actions to defend against an attack
- Page 205 and 206: on three continents. Chris Ellison,
- Page 207 and 208: purpose is, NATO led by U.S.A. must
- Page 209 and 210: eported intrusions from outsiders.
- Page 211 and 212: In the 1980s, Barry Collin, a senio
- Page 213 and 214: Cyberdefense The main effect of cyb
- Page 215 and 216: policymakers. It supports both open
- Page 217: 37 Andrew Brown, “Editors Wanted,
- Page 221 and 222: Chapter Nine THE STRUCTURE OF SOCIA
- Page 223 and 224: enough expert agreement to support
- Page 225 and 226: While the press often picks out an
- Page 227 and 228: It is not only those famed as evang
- Page 229 and 230: and united counteraction by the “
- Page 231 and 232: ADAPTIVE FUNCTIONS The type of orga
- Page 233 and 234: pass a bill to establish the Bounda
- Page 235 and 236: Gerlach, Luther P. 1978. “The Gre
- Page 237 and 238: Chapter Ten WHAT NEXT FOR NETWORKS
- Page 239 and 240: and “have-nots” portends a new
- Page 241 and 242: Classic studies concern topics like
- Page 243 and 244: still do) as to precisely what is a
- Page 245 and 246: also characterize some sprawling te
- Page 247 and 248: speed. It shows that such a partner
- Page 249 and 250: and social scenes of Medellin and C
- Page 251 and 252: depend on the existence of shared p
- Page 253 and 254: gas and clubs, another would move i
- Page 255 and 256: from other interesting cases of net
- Page 257 and 258: THE PRACTICE OF NETWAR (AND COUNTER
- Page 259 and 260: But today’s concept of globalizat
- Page 261 and 262: Figure 10.1—The Two Axes of Strat
- Page 263 and 264: world today, we see little sustaine
- Page 265 and 266: Carr, Edward Hallett, The Twenty Ye
- Page 267 and 268: Kumar, Kuldeep, and Han G. van Diss
- Page 269 and 270:
Shaw, Marvin, Group Dynamics: The P
- Page 271 and 272:
22 From Dan Barry and Al Baker, “
- Page 273 and 274:
02, Central Intelligence Agency, De
- Page 275 and 276:
AFTERWORD (SEPTEMBER 2001): THE SHA
- Page 277 and 278:
was no doubt the bombing of the Kho
- Page 279 and 280:
Harper & Row, 1951. Johnson, Steven
- Page 281 and 282:
CONTRIBUTORS Paul de Armond is dire