IWS - The Information Warfare Site
News Watch Make a  donation to IWS - The Information Warfare Site Use it for navigation in case java scripts are disabled

Computer Terrorism: What are the risks ?




Bibliography

[BLANCH95]
BLANCHARD Philippe
Pirates de l'informatique
Enquête sur les hackers français
Addison Wesley, 1995
[BONA94]
BONANATE Luigi
Le terrorisme international
coll. XXe siècle
Casterman, Giunti, 1994
 
[BRANDT95] BRANDT Daniel
Infowar and Disinformation : From the Pentogone to the Net
Octobre 1995
http://www.cs.albany.edu/~ault/security/infowar.html
[CARTER92] CARTER David L.
Computer Crime Categories:
How Techno-criminals Operate
FBI Law Enforcement Bulletin, 1992
http://nsi.org/Library/Compsec/crimecom.html
[COHEN93] COHEN Frederick B.
Information Warfare Considerations
http://all.net/books/iw/iwardoc.html
[COHEN95] COHEN Frederick B.
Protection and Security on the Information Superhighway
John Wiley & Sons, Inc. , 1995
[CLOUGH93] CLOUGH Bryan, MUNGO Paul
La Délinquance Assistée par Ordinateur
DunodTech, 1993
[DEVOST1] DEVOST Matthew G.
The Digital Threat : United Statee National Security and Computers
http://www.mnsinc.com/mdevost/hackers4.html
http://deercamp.net/matt/hackers4.html (old URL)
[DEVOST95] DEVOST Matthew G.
Political Aspects of Class III Information Warfare
Global Conflict and Terrorism
Janvier 1995
http://deercamp.net/matt/montreal.html 
[DORAN96] DORAN Serge le, ROSÉ Phillipe
Cyber Thrillers, 35 histoires vraies de la délinquance informatique
Albin Michel, 1996
[ENCYCL89] Encyclopaedia Universalis
1989
[FANNING95] FANNING Paul
Terrorism: Past Present, and Future
http://www.acsp.uic.edu/oicj/pubs/cja/080501.htm 
[GARIG1] GARIGUE R.
Information Warfare, Developing a Conceptual Framework
http://www.cse.dnd.ca/~formis/overview/iw

R. Garigue's home page
[GUISNEL95] GUISNEL Jean
Guerres dans le cyberespace. Services secrets et Internet
La Découverte, 1995
[HAENI95] HAENI Reto
An Introduction to Information Warfare
Décembre 1995
http://www.seas.gwu.edu/student/reto/infowar/info-war.html 
[ICOVE95] ICOVE David, SEGER Karl, Von STORCH William
Computer Crime : A Crimefighter Handbook
O'Reilly, 1995
http://www.ora.com/gnn/bus/ora/features/crime/crime1.html 
[JONES96] JONES Frank
Nowhere to run... Nowhere to hide... The vulnerability of CRT's, CPU's
and peripherals to TEMPEST monitoring in the real world
1996
http://www.thecodex.com/c_tempest.html
[LAB90_1] Legal Advisory Board,
Commision of the European Communities
Access to public-sector information,
data protection and computer crime.
janvier-février 1990
[LAB90_4] Legal Advisory Board,
Commision of the European Communities
Computer crime in the Netherlands
avril 1990
[LAROUS83] Petit Larousse illustré
1983
[LIBICKI95] LIBICKI Martin
What is Information Warfare ?
Août 1995
http://www.ndu.edu/ndu/inss/actpubs/act003/a003cont.html 
[MUNRO95] MUNRO Neil
The Pentagone's New Nightmare : An Electronic Pearl Harbor
Washington Post, Juillet 95
http://vislab-www.nps.navy.mil/~sdjames/pentagon_nightmare.html 
[RAND95] Information Warfare: A Two-Edged Sword
RAND Corp. , 1995
http://www.rand.org/publications/RRR/RRR.fall95.cyber/infowar.html 
[RISKS1062] Severed Phone Line Disrupts Chicago Zone
The New York Times, 16 octobre 1990
Risks Forum Digest, 10.62
http://catless.ncl.ac.uk/Risks
[ROUSH92] ROUSH Wade
Hackers: Taking a Byte Out of Computer Crime
1995
http://web.mit.edu/afs/athena/org/t/techreview/www/articles/apr95/Roush.html 
[SCHWAR93] SCHWARTAU Winn
Terminal Compromise
1993
ftp://ftp.ircom.fr/pub/misc/novel/termcomp.1 .2 .3 .4
[SELINE89] SELINE Christopher
Eavesdropping On The Electromagnetic Emanations of Digital Equipements:
The Laws of Canada, England and United States
1989
http://csrc.ncsl.nist.gov/secpubs/tempest.txt
[STERLING92] STERLING Bruce
The Hacker Crackdown,
Law and Disorder on the Electronic Frontier
1992
http://gopher.well.sf.ca.us:70/1/Publications/authors/Sterling/hc 
[SZAFR1] SZAFRANSKI Richard, Colonel USAF
A Theory of Information Warfare
http://www.cdsar.af.mil/apj/szfran.html
[THOMP84] THOMPSON Ken
Reflections on Trusting Trust
Communication of the ACM, Vol 27, No 8, Août 1984
http://www.acm.org/classics/sep95/
[THOMPM95] THOMPSON Mark
If War Comes Home
A strategic exercise simulates an info attack on the U.S. and its allies
TIME Magazine, 21 août 1995, Vol. 146, No 8
[VOIR1] Guérilla électronique, la guerre du future
VOIR, 26 janvier 1995
http://www.lanternette.com/hugo/infowar.html
[WALLER95] WALLER Douglas
Onward Cyber Soldiers
TIME Magazine, vol 146, No 8, Août 95
http://ei.cs.vt.edu/~cs3604/fall.95/Hacking/Cyberwar.html 



I have mainly used this search engine :

Altavista


If you find mistakes in the above links, if the servers are no more reachable, if they have moved, please let me know.


Content