- Page 4 and 5: The research described in this repo
- Page 6 and 7: PREFACE The fight for the future ma
- Page 8 and 9: CONTENTS Preface Summary Acknowledg
- Page 10 and 11: SUMMARY Netwar is the lower-intensi
- Page 12 and 13: Another important level of analysis
- Page 14 and 15: Chapter One THE ADVENT OF NETWAR (R
- Page 16 and 17: Elsewhere, the concept cropped up i
- Page 18 and 19: Furthermore, some bad actors (e.g.,
- Page 20 and 21: But when communication is needed, t
- Page 22 and 23: targeting—a favored strategy in t
- Page 24 and 25: eplace all hierarchies with network
- Page 26 and 27: interesting, as the instances of ne
- Page 28 and 29: The final part considers the future
- Page 30 and 31: Ronfeldt, David, John Arquilla, Gra
- Page 32 and 33: Part I VIOLENCE-PRONE NETWARS
- Page 34 and 35: Ronfeldt have called “netwar.”
- Page 36 and 37: some elements working clandestinely
- Page 38 and 39: alongside bin Laden in the Afghan c
- Page 40 and 41: Osama bin Laden were arrested in Jo
- Page 42 and 43: Table 2.1 Sample of Web Sites Belon
- Page 44 and 45: interested in branching into comput
- Page 46 and 47: terrorists to adopt such techniques
- Page 48 and 49: most of their attacks in cyberspace
- Page 50 and 51: designs and strategies like those o
- Page 52 and 53:
della Sera, December 5, 1996b, p. 9
- Page 54 and 55:
played a role in the Riyadh and Kho
- Page 56 and 57:
punishment of people who publish ch
- Page 58 and 59:
elations rather than formal hierarc
- Page 60 and 61:
specifically to the nature of the c
- Page 62 and 63:
e jettisoned: After all, it is poss
- Page 64 and 65:
Union flooded into Israel, exploiti
- Page 66 and 67:
possible for law enforcement to inf
- Page 68 and 69:
Criminal Networks As Boundary Spann
- Page 70 and 71:
gives time, resources, and alternat
- Page 72 and 73:
from the world of business, governm
- Page 74 and 75:
often specializing in methamphetami
- Page 76 and 77:
Central figures in the scandal were
- Page 78 and 79:
ange from making operations more di
- Page 80 and 81:
Closely related to their ties to th
- Page 82 and 83:
trend toward intelligence-led law e
- Page 84 and 85:
Chapter Four GANGS, HOOLIGANS, AND
- Page 86 and 87:
activities. At the high end, some g
- Page 88 and 89:
ehavior that current societies cons
- Page 90 and 91:
phenomenon occurs when street gangs
- Page 92 and 93:
operate in 60-65 countries and incl
- Page 94 and 95:
establishing a nonprofit political
- Page 96 and 97:
Israel. Millenarian cults have also
- Page 98 and 99:
Lessons from Observing Social Activ
- Page 100 and 101:
forces are frequently too rigid or
- Page 102 and 103:
4 John Arquilla and David Ronfeldt,
- Page 104 and 105:
44 Ibid. 45 Additional discussion o
- Page 106 and 107:
Chapter Five NETWORKING DISSENT: CY
- Page 108 and 109:
egimes by widely exposing the offen
- Page 110 and 111:
Open Society Institute to purchase
- Page 112 and 113:
aggressive attempt to use the Inter
- Page 114 and 115:
eye. Once the drive to pass the sel
- Page 116 and 117:
Juves, who disputed the widespread
- Page 118 and 119:
When PepsiCo became a target of the
- Page 120 and 121:
university send letters to companie
- Page 122 and 123:
The Harvard group worked closely wi
- Page 124 and 125:
Using the Internet as a forum for t
- Page 126 and 127:
decisionmakers, the “cyber” equ
- Page 128 and 129:
government or corporation. Disadvan
- Page 130 and 131:
users, of course, is the fact that
- Page 132 and 133:
CONCLUSION In these cases of networ
- Page 134 and 135:
36 See Appendix C [in original full
- Page 136 and 137:
92 See Emery, 1996.
- Page 138 and 139:
THREE LAYERS TO THE ZAPATISTA MOVEM
- Page 140 and 141:
information revolution, was barely
- Page 142 and 143:
of these larger units, they remaine
- Page 144 and 145:
authoritarian and wrong in Mexico
- Page 146 and 147:
Throughout, the fact that the Catho
- Page 148 and 149:
After 12 days of hard, sometimes br
- Page 150 and 151:
intervention” (Castells, 1997, p.
- Page 152 and 153:
December 2000. Since assuming offic
- Page 154 and 155:
44-56. Hernandez, Luis, “The New
- Page 156 and 157:
many darts, and so many arrows, tha
- Page 158 and 159:
Chapter Seven NETWAR IN THE EMERALD
- Page 160 and 161:
The overall strategic goal of the D
- Page 162 and 163:
agencies are supporters of communit
- Page 164 and 165:
in national policy. The AFL-CIO pro
- Page 166 and 167:
fundamental failure of intelligence
- Page 168 and 169:
had officers barricaded in the hote
- Page 170 and 171:
Joiner refused. The veto, Joiner sa
- Page 172 and 173:
“organized” anarchist conspirac
- Page 174 and 175:
After speaking with Reno, Locke met
- Page 176 and 177:
Then, at 7:30 a.m. on Wednesday mor
- Page 178 and 179:
As demonstrators withdrew from the
- Page 180 and 181:
filled out arrest forms. Police Off
- Page 182 and 183:
indymedia network has an “all poi
- Page 184 and 185:
Part III ONCE AND FUTURE NETWARS
- Page 186 and 187:
intentionally did not bomb Internet
- Page 188 and 189:
they ultimately hope to influence.
- Page 190 and 191:
Practically anyone can afford to be
- Page 192 and 193:
Of course, not all of the messages
- Page 194 and 195:
Dialogue The Internet offers severa
- Page 196 and 197:
Coordination of Action Advocacy gro
- Page 198 and 199:
in a decisionmaking process of inte
- Page 200 and 201:
Congress to turn to other issues. W
- Page 202 and 203:
President Zedillo’s site did not
- Page 204 and 205:
incident. 80 The email bombing cons
- Page 206 and 207:
tests, although they admitted they
- Page 208 and 209:
The LoU does not support the damagi
- Page 210 and 211:
Figure 8.1—WANK Worm During the K
- Page 212 and 213:
Analyzing the plausibility of Colli
- Page 214 and 215:
In assessing the threat from both p
- Page 216 and 217:
8 Michael Dobbs, “The War on the
- Page 218 and 219:
62 Davis, 1999, p. 135. 63 Edward H
- Page 220 and 221:
Conference, October 1997, pp. 285-2
- Page 222 and 223:
SEGMENTARY Social movements have ma
- Page 224 and 225:
out to different populations. Some
- Page 226 and 227:
The diverse groups of a movement ar
- Page 228 and 229:
Linkages and Information Sharing Mo
- Page 230 and 231:
the popular lexicon the prefix “e
- Page 232 and 233:
1995). Wise Use is also diverse. It
- Page 234 and 235:
CONCLUSION Social movements that ar
- Page 236 and 237:
Environmental Activism.” Paper de
- Page 238 and 239:
example, some key 1960s writings ab
- Page 240 and 241:
In two other prominent usages, the
- Page 242 and 243:
observing that the network may be a
- Page 244 and 245:
Fukuyama’s view reflects mainly t
- Page 246 and 247:
Organizational Level To what extent
- Page 248 and 249:
and gangs, expanded on this point.
- Page 250 and 251:
on Israeli information infrastructu
- Page 252 and 253:
Germany, some of which are stockpil
- Page 254 and 255:
a rationale and a capability for
- Page 256 and 257:
Social Underpinnings The full funct
- Page 258 and 259:
access according to the principle o
- Page 260 and 261:
—Burma, Mexico, and Seattle—did
- Page 262 and 263:
cooperation among nations sufficien
- Page 264 and 265:
Deterrence and coercion will not di
- Page 266 and 267:
Order, New York: The Free Press, 19
- Page 268 and 269:
Pagels, Heinz R., The Dreams of Rea
- Page 270 and 271:
and Dye (1998), which address banki
- Page 272 and 273:
34 One role in an affinity group mi
- Page 274 and 275:
consulted include Florini (2000), R
- Page 276 and 277:
this network is a single hub design
- Page 278 and 279:
esult in successful early counterst
- Page 280 and 281:
6 A study with inputs from various
- Page 282:
ABOUT THE EDITORS John Arquilla is