Hacking Networks of Terror

  • Deibert R
  • Stein J
N/ACitations
Citations of this article
16Readers
Mendeley users who have this article in their library.

Abstract

That we in North America face a new kind of threat is beyond question. The attacks against the heartland of the United States, its corporate and military icons, and the killing of over 3,000 civilians, mark a watershed in thinking about security. It is almost two hundred years since civilians in North America have been the object of systematic attack, and even longer since the core of the hegemonic power was struck from the periphery. The important analytical and political questions are What kind of threat do we face? What is the appropriate response to that threat? In other words, what are the appropriate ways to think about dealing with a threat from a nonstate actor with no fixed location or permanently defined territorial assets?

Cite

CITATION STYLE

APA

Deibert, R. J., & Stein, J. G. (2002). Hacking Networks of Terror. Dialogue IO, 1(1), 1–14. https://doi.org/10.1017/s7777777702000018

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free