Matches in SemOpenAlex for { <https://semopenalex.org/work/W302985343> ?p ?o ?g. }
Showing items 1 to 65 of
65
with 100 items per page.
- W302985343 startingPage "32" @default.
- W302985343 abstract "Concern over easy access to imagery for target planning was demonstrated immediately after 11 September as several websites removed photos and data that suddenly appeared too sensitive. On 18 October, Pentagon purchased all rights to pictures of Afghanistan taken by Space Imaging Incorporated's IKONOS satellite, which can discern space objects as small as I square meter on ground. THE 11 SEPTEMBER 2001 attack on America radically changed way nations and international organizations think about terrorism. For example, President George W. Bush stated that United States would begin a long war against and Secretary of Defense Donald H. Rumsfeld received extra budget concessions for counterterrorism fight. For first time in history NATO implemented Article 5 of 1949 Washington Treaty, which recognizes that an attack against one NATO member should be considered an attack against all members. This lifted political constraints normally associated with using military to fight terrorism. As investigation unfolded, power of information-age tools, such as Internet, as a terrorist planning and execution asset was exposed. The revolution's promise of globalization and its implicit lower communication costs and integrated economies has other, more sinister, uses when placed in terrorists' hands. This article defines terrorism in age and examines how enables terrorists to further their goals. Recommendations are also offered as a de-terror-en ce policy to fight this new threat.1 Information Terrorism Traditionally, terrorism focuses on using violence-threats or outright acts-to cause fear or alarm. usually for some political goal. Terrorists exploit formal structure of civilized world to accomplish these goals. Among other things this exploitation includes a nation-states' legal and intelligence constraints to act; its objectivity in news telecasts, and its infrastructure and operating principles. Nearly everything in nation-state is open for its citizens to examine and use, and hence terrorist as well. The terrorist can live in almost total anonymity until an act of violence or crime is perpetrated. lie usually trains on very systems he will use in an attack. This enables weak to confront and combat strong. A terrorist lives in opposite world, one of near total secrecy. Usually only sketchy is available about a terrorist's operating principles and infrastructure, if they are known at all, and terrorist has no constraints on collecting intelligence or conducting illegal activities. Terrorists are criminals who can use indiscriminate force against populations. They realize that police or military responses may be limited because of civil liberty and security concerns. Terrorists have access to everything average citizen does and thus are leeches who live off others to support their anger. Their methods may be deemed asymmetric because their system of operation and that of civilized world are not comparable. Destroying World Trade Center with a flying fuel cell, terrorizing America with anthrax-- laced mail, planning to exploit trucking industry and crop dusters to transport or spread biological or chemical agents, and killing leader of Northern Alliance in Afghanistan with an explosive device hidden in a camera during an interview are good examples of asymmetric tools available to terrorists. The Federal Bureau of Investigation (FBI) defines terrorism as the unlawful use of force or violence against persons or property to intimidate or coerce a government, civilian population, or any segments thereof, in furtherance of political or social objectives.2 In age, terrorism has expanded its scope and has found a ready ally in instruments such as Internet to facilitate these efforts. Some have even coined process of exploiting Internet for terrorist purposes as information terrorism, defining it as nexus between criminal system fraud or abuse and physical violence of terrorism; and intentionally abusing a digital system, network, or component toward an end that supports or facilitates a terrorist campaign or action. …" @default.
- W302985343 created "2016-06-24" @default.
- W302985343 creator A5053527425 @default.
- W302985343 date "2001-12-31" @default.
- W302985343 modified "2023-09-24" @default.
- W302985343 title "Information-Age De-Terror-Ence" @default.
- W302985343 hasPublicationYear "2001" @default.
- W302985343 type Work @default.
- W302985343 sameAs 302985343 @default.
- W302985343 citedByCount "3" @default.
- W302985343 countsByYear W3029853432013 @default.
- W302985343 crossrefType "journal-article" @default.
- W302985343 hasAuthorship W302985343A5053527425 @default.
- W302985343 hasConcept C144024400 @default.
- W302985343 hasConcept C165696696 @default.
- W302985343 hasConcept C17744445 @default.
- W302985343 hasConcept C199539241 @default.
- W302985343 hasConcept C203133693 @default.
- W302985343 hasConcept C2119116 @default.
- W302985343 hasConcept C2779010840 @default.
- W302985343 hasConcept C2779965921 @default.
- W302985343 hasConcept C38652104 @default.
- W302985343 hasConcept C41008148 @default.
- W302985343 hasConcept C94625758 @default.
- W302985343 hasConceptScore W302985343C144024400 @default.
- W302985343 hasConceptScore W302985343C165696696 @default.
- W302985343 hasConceptScore W302985343C17744445 @default.
- W302985343 hasConceptScore W302985343C199539241 @default.
- W302985343 hasConceptScore W302985343C203133693 @default.
- W302985343 hasConceptScore W302985343C2119116 @default.
- W302985343 hasConceptScore W302985343C2779010840 @default.
- W302985343 hasConceptScore W302985343C2779965921 @default.
- W302985343 hasConceptScore W302985343C38652104 @default.
- W302985343 hasConceptScore W302985343C41008148 @default.
- W302985343 hasConceptScore W302985343C94625758 @default.
- W302985343 hasIssue "1" @default.
- W302985343 hasLocation W3029853431 @default.
- W302985343 hasOpenAccess W302985343 @default.
- W302985343 hasPrimaryLocation W3029853431 @default.
- W302985343 hasRelatedWork W139295424 @default.
- W302985343 hasRelatedWork W1531081645 @default.
- W302985343 hasRelatedWork W1680758168 @default.
- W302985343 hasRelatedWork W2055608965 @default.
- W302985343 hasRelatedWork W2153054056 @default.
- W302985343 hasRelatedWork W2153435121 @default.
- W302985343 hasRelatedWork W2202727631 @default.
- W302985343 hasRelatedWork W2324717585 @default.
- W302985343 hasRelatedWork W235025107 @default.
- W302985343 hasRelatedWork W2465013978 @default.
- W302985343 hasRelatedWork W282277699 @default.
- W302985343 hasRelatedWork W3164505755 @default.
- W302985343 hasRelatedWork W3169463140 @default.
- W302985343 hasRelatedWork W756101424 @default.
- W302985343 hasRelatedWork W916258141 @default.
- W302985343 hasRelatedWork W9671636 @default.
- W302985343 hasRelatedWork W120866660 @default.
- W302985343 hasRelatedWork W2187945507 @default.
- W302985343 hasRelatedWork W229936885 @default.
- W302985343 hasRelatedWork W241977903 @default.
- W302985343 hasVolume "82" @default.
- W302985343 isParatext "false" @default.
- W302985343 isRetracted "false" @default.
- W302985343 magId "302985343" @default.
- W302985343 workType "article" @default.