• Home
  • Terrorism
    • The Internet>
      • Information Source
        • Content Dissemination
          • Communication
          • Bluetooth Technology
            • Cellular Hacking
              • GPS & Mobile Devices
              • Counter-terrorism
                • The Internet>
                  • Monitoring
                    • Propaganda
                    • Surveillance Camera
                      • Transport Security>
                        • Neutron Car Wash
                          • Vazor 136
                            • Scanner Machines
                          • Summary
                          • References
                          • About us
                            • Contact Us
                            Technology in Terrorism & Counter-terrorism

                            "Stand on the shoulders of giants"
                                                                                                                                                  - Bernard of Chartes                                                          

                            References


                            Anonymous (2010, April12). Abuses of Surveillance Cameras. Retrieved from http://www.notbored.org/camera-abuses.html

                            Anonymous. (n.d.) How it works: Advanced Imaging Technology. Retrieved from http://www.tsa.gov/approach/tech/ait/how_it_works.shtm

                            Anonymous (n.d.). Surveillance Cameras and Privacy. Retrieved from http://www.vedosoft.com/articles/surveillance-camera-privacy.html

                            Anonymous (2010, May 4). Times Square Car Bomb Suspect Faces Terrorism Charges After Admitting to Plot. Retrieved from http://www.foxnews.com/us/2010/05/04/pakistani-american-arrested-times-square-plot/

                            Anonymous (2011) Toward a Secure Future. Retrieved from http://www.asianaviation.com/articles/129/Towards-a-secure-future

                            Barbara Mantel. (November 2009) Terrorism and the Internet. Retrieved 5 October 2011 from 
                            http://www.sagepub.com/upm-data/36306_6.pdf

                            Docherty, A. (n.d.) New bomb disposal team -  with a sting in the tail. Retrieved from http://www.martinfrost.ws/htmlfiles/jan2010/bomb-detectors.html

                            Fiorino, Feances, Comaprt, Andrew, Wall & Robert. (2010). Technology vs Terrorism. Aviation Week & Space Technology, 00052175, 1/4/2010, Vol. 172, Issue 1
                            Gill Hitchcock. (9 June 2011) Theresa May launches counter-terrorism IT measures. Retrieved 14 October 2011 from http://www.guardian.co.uk/government-computing-network/2011/jun/09/prevent-counter-terrorism-it-initiatives-ther)sa-may

                            Gill, M (2005, August 1). Surveillance Cameras and Fight against Terrorism. Retrieved from http://www.npr.org/templates/transcript/transcript.php?storyId=4780612

                            Gold, S. (2011). Terrorism and bluetooth.

                            Grootscholten, N. (2008, July 25). The social effects of the global positioning system. Retrieved from http://knol.google.com/k/the-social-effects-of-the-global-positioning-system

                            Hall J.M., Asztalos S., Biltoft P., Church J.,  Descalle M.A., Luu T., Manatt D., …, Slaughter D. (2007). The Nuclear Car Wash: Neutron interrogation of cargo containers to detect hidden SNM. Retrieved from http://cog.llnl.gov/NIMB261-2007-337.pdf

                            Hambling, D (2010, May 10). In the Petabyte Age of Surveillance, Software Policies. Retrieved from http://www.popularmechanics.com/technology/how-to/computer-security/surveillance-cameras-and-data

                            Handelman, S. (2006). SPECIAL REPORT: Technology vs. Terrorism. Retrieved from http://www.popsci.com/scitech/article/2006-09/special-reporttechnology-vs-terrorism?page=1

                            Helmi Norman. (n.d) Middle East and North Africa. Retrieved 14 October 2011 from http://opennet.net/research/regions/mena

                            Kaplan, E. (2009). Terrorists and the Internet. In Council on Foreign Relations. Retrieved November 1, 2011 from http://www.cfr.org/terrorism-and-technology/terrorists-internet/p10005

                            Lakshmi, R. (2008, December 02). Mumbai attackers made sophisticated use of technology. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2008/12/02/AR2008120203519.html?sid=ST2008120203535

                            Liat Shetret. (February 2011) Use of the Internet for Counter-Terrorism Purposes. Retrieved 14 October 2011 from http://www.humansecuritygateway.com/documents/CGCC_UseoftheInternetforCounterTerroristPurposes.pdf

                            Rosenberg, M. (n.d.). Global positioning system - an overview of the global positioning system. Retrieved from http://geography.about.com/od/geographictechnology/a/gps.htm

                            Tillema, X. (2010). Terrorism and Technology. In T.K. Ghosh (Ed.), Science and Technology of Counterterrorism and Terrorism (pp. 14-30). Boca Raton: CRC Press.

                            United Nations Counter-Terrorism Implementation Task Force. (2009). Report of the Working Group on Countering the Use of the Internet for Terrorist Purposes.  Retrieved November 1, 2011 from http://www.un.org/terrorism/pdfs/wg6-internet_rev1.pdf

                            Ustaz Mohamed Bin Ali. (n.d). Responding to Terror Ideology on the Internet: The Singapore Experience. Retrieved 14 October 2011 from http://www.pvtr.org/pdf/Ideology%20Response/Responding%20to%20terror%20ideology%20in%20the%20internet.pdf

                            Weimann, G. (2004). How modern terrorism uses the Internet. Retrieved November 1, 2011 from http://www.securityaffairs.org/issues/2005/08/weimann.php

                            Weimann, G. (2010). Terror on Facebook, Twitter and Youtube. Brown Journal of World Affairs. 16 (2), 45-54. 

                            Wiki/Explosive_detection. (2011, October 6). Retrieved October 15, 2011 from http://en.wikipedia.org/wiki/Explosive_detection

                            Wiki/Explosives_trace-detection_portal_machine. (2011, August 20). Retrieved October 15, 2011 from http://en.wikipedia.org/wiki/Explosives_trace-detection_portal_machine

                            Powered by Create your own unique website with customizable templates.