"Stand on the shoulders of giants"
- Bernard of Chartes
References
Anonymous (2010, April12). Abuses of Surveillance Cameras. Retrieved from http://www.notbored.org/camera-abuses.html
Anonymous. (n.d.) How it works: Advanced Imaging Technology. Retrieved from http://www.tsa.gov/approach/tech/ait/how_it_works.shtm
Anonymous (n.d.). Surveillance Cameras and Privacy. Retrieved from http://www.vedosoft.com/articles/surveillance-camera-privacy.html
Anonymous (2010, May 4). Times Square Car Bomb Suspect Faces Terrorism Charges After Admitting to Plot. Retrieved from http://www.foxnews.com/us/2010/05/04/pakistani-american-arrested-times-square-plot/
Anonymous (2011) Toward a Secure Future. Retrieved from http://www.asianaviation.com/articles/129/Towards-a-secure-future
Barbara Mantel. (November 2009) Terrorism and the Internet. Retrieved 5 October 2011 from
http://www.sagepub.com/upm-data/36306_6.pdf
Docherty, A. (n.d.) New bomb disposal team - with a sting in the tail. Retrieved from http://www.martinfrost.ws/htmlfiles/jan2010/bomb-detectors.html
Fiorino, Feances, Comaprt, Andrew, Wall & Robert. (2010). Technology vs Terrorism. Aviation Week & Space Technology, 00052175, 1/4/2010, Vol. 172, Issue 1
Gill Hitchcock. (9 June 2011) Theresa May launches counter-terrorism IT measures. Retrieved 14 October 2011 from http://www.guardian.co.uk/government-computing-network/2011/jun/09/prevent-counter-terrorism-it-initiatives-ther)sa-may
Gill, M (2005, August 1). Surveillance Cameras and Fight against Terrorism. Retrieved from http://www.npr.org/templates/transcript/transcript.php?storyId=4780612
Gold, S. (2011). Terrorism and bluetooth.
Grootscholten, N. (2008, July 25). The social effects of the global positioning system. Retrieved from http://knol.google.com/k/the-social-effects-of-the-global-positioning-system
Hall J.M., Asztalos S., Biltoft P., Church J., Descalle M.A., Luu T., Manatt D., …, Slaughter D. (2007). The Nuclear Car Wash: Neutron interrogation of cargo containers to detect hidden SNM. Retrieved from http://cog.llnl.gov/NIMB261-2007-337.pdf
Hambling, D (2010, May 10). In the Petabyte Age of Surveillance, Software Policies. Retrieved from http://www.popularmechanics.com/technology/how-to/computer-security/surveillance-cameras-and-data
Handelman, S. (2006). SPECIAL REPORT: Technology vs. Terrorism. Retrieved from http://www.popsci.com/scitech/article/2006-09/special-reporttechnology-vs-terrorism?page=1
Helmi Norman. (n.d) Middle East and North Africa. Retrieved 14 October 2011 from http://opennet.net/research/regions/mena
Kaplan, E. (2009). Terrorists and the Internet. In Council on Foreign Relations. Retrieved November 1, 2011 from http://www.cfr.org/terrorism-and-technology/terrorists-internet/p10005
Lakshmi, R. (2008, December 02). Mumbai attackers made sophisticated use of technology. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2008/12/02/AR2008120203519.html?sid=ST2008120203535
Liat Shetret. (February 2011) Use of the Internet for Counter-Terrorism Purposes. Retrieved 14 October 2011 from http://www.humansecuritygateway.com/documents/CGCC_UseoftheInternetforCounterTerroristPurposes.pdf
Rosenberg, M. (n.d.). Global positioning system - an overview of the global positioning system. Retrieved from http://geography.about.com/od/geographictechnology/a/gps.htm
Tillema, X. (2010). Terrorism and Technology. In T.K. Ghosh (Ed.), Science and Technology of Counterterrorism and Terrorism (pp. 14-30). Boca Raton: CRC Press.
United Nations Counter-Terrorism Implementation Task Force. (2009). Report of the Working Group on Countering the Use of the Internet for Terrorist Purposes. Retrieved November 1, 2011 from http://www.un.org/terrorism/pdfs/wg6-internet_rev1.pdf
Ustaz Mohamed Bin Ali. (n.d). Responding to Terror Ideology on the Internet: The Singapore Experience. Retrieved 14 October 2011 from http://www.pvtr.org/pdf/Ideology%20Response/Responding%20to%20terror%20ideology%20in%20the%20internet.pdf
Weimann, G. (2004). How modern terrorism uses the Internet. Retrieved November 1, 2011 from http://www.securityaffairs.org/issues/2005/08/weimann.php
Weimann, G. (2010). Terror on Facebook, Twitter and Youtube. Brown Journal of World Affairs. 16 (2), 45-54.
Wiki/Explosive_detection. (2011, October 6). Retrieved October 15, 2011 from http://en.wikipedia.org/wiki/Explosive_detection
Wiki/Explosives_trace-detection_portal_machine. (2011, August 20). Retrieved October 15, 2011 from http://en.wikipedia.org/wiki/Explosives_trace-detection_portal_machine