Computer Terrorism: What are the risks ?




Bibliography

[BLANCH95] BLANCHARD Philippe
Pirates de l'informatique
Enquête sur les hackers français
Addison Wesley, 1995
 
[BONA94] BONANATE Luigi
Le terrorisme international
coll. XXe siècle
Casterman, Giunti, 1994
 
[BRANDT95] BRANDT Daniel
Infowar and Disinformation : From the Pentogone to the Net
Octobre 1995
http://www.cs.albany.edu/~ault/security/infowar.html
 
[CARTER92] CARTER David L.
Computer Crime Categories:
How Techno-criminals Operate
FBI Law Enforcement Bulletin, 1992
http://nsi.org/Library/Compsec/crimecom.html
 
[COHEN93] COHEN Frederick B.
Information Warfare Considerations
http://all.net/books/iw/iwardoc.html
 
[COHEN95] COHEN Frederick B.
Protection and Security on the Information Superhighway
John Wiley & Sons, Inc. , 1995
 
[CLOUGH93] CLOUGH Bryan, MUNGO Paul
La Délinquance Assistée par Ordinateur
DunodTech, 1993
 
[DEVOST1] DEVOST Matthew G.
The Digital Threat : United Statee National Security and Computers
http://www.mnsinc.com/mdevost/hackers4.html
http://deercamp.net/matt/hackers4.html (old URL)
 
[DEVOST95] DEVOST Matthew G.
Political Aspects of Class III Information Warfare
Global Conflict and Terrorism
Janvier 1995
http://deercamp.net/matt/montreal.html
 
[DORAN96] DORAN Serge le, ROSÉ Phillipe
Cyber Thrillers, 35 histoires vraies de la délinquance informatique
Albin Michel, 1996
 
[ENCYCL89] Encyclopaedia Universalis
1989
 
[FANNING95] FANNING Paul
Terrorism: Past Present, and Future
http://www.acsp.uic.edu/oicj/pubs/cja/080501.htm
 
[GARIG1] GARIGUE R.
Information Warfare, Developing a Conceptual Framework
http://www.cse.dnd.ca/~formis/overview/iw

R. Garigue's home page
 
[GUISNEL95] GUISNEL Jean
Guerres dans le cyberespace. Services secrets et Internet
La Découverte, 1995
 
[HAENI95] HAENI Reto
An Introduction to Information Warfare
Décembre 1995
http://www.seas.gwu.edu/student/reto/infowar/info-war.html
 
[ICOVE95] ICOVE David, SEGER Karl, Von STORCH William
Computer Crime : A Crimefighter Handbook
O'Reilly, 1995
http://www.ora.com/gnn/bus/ora/features/crime/crime1.html
 
[JONES96] JONES Frank
Nowhere to run... Nowhere to hide... The vulnerability of CRT's, CPU's
and peripherals to TEMPEST monitoring in the real world
1996
http://www.thecodex.com/c_tempest.html
 
[LAB90_1] Legal Advisory Board,
Commision of the European Communities
Access to public-sector information,
data protection and computer crime.
janvier-février 1990
 
[LAB90_4] Legal Advisory Board,
Commision of the European Communities
Computer crime in the Netherlands
avril 1990
 
[LAROUS83] Petit Larousse illustré
1983
 
[LIBICKI95] LIBICKI Martin
What is Information Warfare ?
Août 1995
http://www.ndu.edu/ndu/inss/actpubs/act003/a003cont.html
 
[MUNRO95] MUNRO Neil
The Pentagone's New Nightmare : An Electronic Pearl Harbor
Washington Post, Juillet 95
http://vislab-www.nps.navy.mil/~sdjames/pentagon_nightmare.html
 
[RAND95] Information Warfare: A Two-Edged Sword
RAND Corp. , 1995
http://www.rand.org/publications/RRR/RRR.fall95.cyber/infowar.html
 
[RISKS1062] Severed Phone Line Disrupts Chicago Zone
The New York Times, 16 octobre 1990
Risks Forum Digest, 10.62
http://catless.ncl.ac.uk/Risks
 
[ROUSH92] ROUSH Wade
Hackers: Taking a Byte Out of Computer Crime
1995
http://web.mit.edu/afs/athena/org/t/techreview/www/articles/apr95/Roush.html
 
[SCHWAR93] SCHWARTAU Winn
Terminal Compromise
1993
ftp://ftp.ircom.fr/pub/misc/novel/termcomp.1 .2 .3 .4
 
[SELINE89] SELINE Christopher
Eavesdropping On The Electromagnetic Emanations of Digital Equipements:
The Laws of Canada, England and United States
1989
http://csrc.ncsl.nist.gov/secpubs/tempest.txt
 
[STERLING92] STERLING Bruce
The Hacker Crackdown,
Law and Disorder on the Electronic Frontier
1992
http://gopher.well.sf.ca.us:70/1/Publications/authors/Sterling/hc
 
[SZAFR1] SZAFRANSKI Richard, Colonel USAF
A Theory of Information Warfare
http://www.cdsar.af.mil/apj/szfran.html
 
[THOMP84] THOMPSON Ken
Reflections on Trusting Trust
Communication of the ACM, Vol 27, No 8, Août 1984
http://www.acm.org/classics/sep95/
 
[THOMPM95] THOMPSON Mark
If War Comes Home
A strategic exercise simulates an info attack on the U.S. and its allies
TIME Magazine, 21 août 1995, Vol. 146, No 8
 
[VOIR1] Guérilla électronique, la guerre du future
VOIR, 26 janvier 1995
http://www.lanternette.com/hugo/infowar.html
 
[WALLER95] WALLER Douglas
Onward Cyber Soldiers
TIME Magazine, vol 146, No 8, Août 95
http://ei.cs.vt.edu/~cs3604/fall.95/Hacking/Cyberwar.html
 



I have mainly used this search engine :

Altavista


If you find mistakes in the above links, if the servers are no more reachable, if they have moved, please let me know.


Content


Please, send your comments to

Patrick Galley (Patrick.Galley@theoffice.net)

Last updated: July 1, 1998


Return to the computer security page
Return to my home page