Networks and netwars: the future of terror, crime, and militancy
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA
Rand
2001
|
Schriftenreihe: | MR (Series)
MR-1382-OSD. |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Prepared for the Office of the Secretary of Defense." Includes bibliographical references The advent of netwar (revisited / John Arquilla and David Ronfeldt -- The networking of terror in the information age / Michele Zanini and Sean J.A. Edwards -- Transnational criminal networks / Paul Williams -- Gangs, hooligans, and anarchists -- The vanguard of netwar in the streets / John P. Sullivan -- Networking dissent: Cyber activists use the Internet to promote democracy in Burma / Tiffany Danitz and Warren P. Strobel -- Emergence and influence of the Zapatista social netwar / David Ronfeldt and John Arquilla -- Netwar in the Emerald City: WTO protest strategy and tactics / Paul de Armond -- Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy / Dorothy E. Denning -- The structure of social movements: Environmental activism and its opponents / Luther P. Gerlach -- What next for networks and netwars? / David Ronfeldt and John Arquilla -- Afterword (September 2001): The sharpening fight for the future / John Arquilla and David Ronfeldt Netwar is the lower-intensity, societal-level counterpart to the editors' earlier, mostly military concept of cyberwar. This volume studies major instances of netwar that have occurred over the past several years--from Osama bin Laden's networked terrorists to the Battle of Seattle's social activists--and finds, among other things, that netwar works very well. Whether the protagonists are civil-society activists or uncivil-society criminals and terrorists, their netwars have generally been successful. Strategists and policymakers in Washington, and elsewhere, have already begun to discern the dark side of the netwar phenomenon, especially as manifested in terrorist and criminal organizations. In this volume, the editors and their colleagues examine various types of netwar, from the most violent to the most socially activist. In doing so, they find that, despite the variety, all networks that have been built for waging netwar may be analyzed in terms of a common analytic framework. There are five levels of theory and practice that matter--the technological, social, narrative, organizational, and doctrinal levels. A netwar actor must get all five right to be fully effective. The most potent netwarriors will not only be highly networked and have the capacity for mounting "swarming" attacks, they will also be held together by strong social ties, have secure communications technologies, and project a common story about why they are together and what they need to do. These will be the most serious adversaries. But even those networks that are weak on some levels may pose stiff challenges to their nation-state adversaries. With this in mind, it is necessary to go beyond just diagnosing the nature of the networked nonstate opponent in a given conflict. It will become crucial for governments and their military and law enforcement establishments to begin networking themselves |
Beschreibung: | 1 Online-Ressource (xiv, 375 pages) |
ISBN: | 0833030302 0833032356 9780833030306 9780833032355 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043154422 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2001 |||| o||u| ||||||eng d | ||
020 | |a 0833030302 |9 0-8330-3030-2 | ||
020 | |a 0833032356 |c electronic bk. |9 0-8330-3235-6 | ||
020 | |a 9780833030306 |9 978-0-8330-3030-6 | ||
020 | |a 9780833032355 |c electronic bk. |9 978-0-8330-3235-5 | ||
035 | |a (OCoLC)50851159 | ||
035 | |a (DE-599)BVBBV043154422 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 303.6/25 |2 21 | |
245 | 1 | 0 | |a Networks and netwars |b the future of terror, crime, and militancy |c edited by John Arquilla and David Ronfeldt |
264 | 1 | |a Santa Monica, CA |b Rand |c 2001 | |
300 | |a 1 Online-Ressource (xiv, 375 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a MR (Series) |v MR-1382-OSD. | |
500 | |a "Prepared for the Office of the Secretary of Defense." | ||
500 | |a Includes bibliographical references | ||
500 | |a The advent of netwar (revisited / John Arquilla and David Ronfeldt -- The networking of terror in the information age / Michele Zanini and Sean J.A. Edwards -- Transnational criminal networks / Paul Williams -- Gangs, hooligans, and anarchists -- The vanguard of netwar in the streets / John P. Sullivan -- Networking dissent: Cyber activists use the Internet to promote democracy in Burma / Tiffany Danitz and Warren P. Strobel -- Emergence and influence of the Zapatista social netwar / David Ronfeldt and John Arquilla -- Netwar in the Emerald City: WTO protest strategy and tactics / Paul de Armond -- Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy / Dorothy E. Denning -- The structure of social movements: Environmental activism and its opponents / Luther P. Gerlach -- What next for networks and netwars? / David Ronfeldt and John Arquilla -- Afterword (September 2001): The sharpening fight for the future / John Arquilla and David Ronfeldt | ||
500 | |a Netwar is the lower-intensity, societal-level counterpart to the editors' earlier, mostly military concept of cyberwar. This volume studies major instances of netwar that have occurred over the past several years--from Osama bin Laden's networked terrorists to the Battle of Seattle's social activists--and finds, among other things, that netwar works very well. Whether the protagonists are civil-society activists or uncivil-society criminals and terrorists, their netwars have generally been successful. Strategists and policymakers in Washington, and elsewhere, have already begun to discern the dark side of the netwar phenomenon, especially as manifested in terrorist and criminal organizations. In this volume, the editors and their colleagues examine various types of netwar, from the most violent to the most socially activist. In doing so, they find that, despite the variety, all networks that have been built for waging netwar may be analyzed in terms of a common analytic framework. There are five levels of theory and practice that matter--the technological, social, narrative, organizational, and doctrinal levels. A netwar actor must get all five right to be fully effective. The most potent netwarriors will not only be highly networked and have the capacity for mounting "swarming" attacks, they will also be held together by strong social ties, have secure communications technologies, and project a common story about why they are together and what they need to do. These will be the most serious adversaries. But even those networks that are weak on some levels may pose stiff challenges to their nation-state adversaries. With this in mind, it is necessary to go beyond just diagnosing the nature of the networked nonstate opponent in a given conflict. It will become crucial for governments and their military and law enforcement establishments to begin networking themselves | ||
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE / Terrorism |2 bisacsh | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
650 | 7 | |a Internet |2 gtt | |
650 | 7 | |a Terrorisme |2 gtt | |
650 | 7 | |a Activisme |2 gtt | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Information warfare | |
650 | 4 | |a Cyberterrorism | |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Arquilla, John |e Sonstige |4 oth | |
700 | 1 | |a Ronfeldt, David F. |e Sonstige |4 oth | |
710 | 2 | |a United States |b Department of Defense |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=72761 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028578613 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=72761 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=72761 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175617953890304 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043154422 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)50851159 (DE-599)BVBBV043154422 |
dewey-full | 303.6/25 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 303 - Social processes |
dewey-raw | 303.6/25 |
dewey-search | 303.6/25 |
dewey-sort | 3303.6 225 |
dewey-tens | 300 - Social sciences |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05658nmm a2200673zcb4500</leader><controlfield tag="001">BV043154422</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2001 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833030302</subfield><subfield code="9">0-8330-3030-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833032356</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-8330-3235-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833030306</subfield><subfield code="9">978-0-8330-3030-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833032355</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-8330-3235-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)50851159</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043154422</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">303.6/25</subfield><subfield code="2">21</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Networks and netwars</subfield><subfield code="b">the future of terror, crime, and militancy</subfield><subfield code="c">edited by John Arquilla and David Ronfeldt</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, CA</subfield><subfield code="b">Rand</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 375 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">MR (Series)</subfield><subfield code="v">MR-1382-OSD.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Prepared for the Office of the Secretary of Defense."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The advent of netwar (revisited / John Arquilla and David Ronfeldt -- The networking of terror in the information age / Michele Zanini and Sean J.A. Edwards -- Transnational criminal networks / Paul Williams -- Gangs, hooligans, and anarchists -- The vanguard of netwar in the streets / John P. Sullivan -- Networking dissent: Cyber activists use the Internet to promote democracy in Burma / Tiffany Danitz and Warren P. Strobel -- Emergence and influence of the Zapatista social netwar / David Ronfeldt and John Arquilla -- Netwar in the Emerald City: WTO protest strategy and tactics / Paul de Armond -- Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy / Dorothy E. Denning -- The structure of social movements: Environmental activism and its opponents / Luther P. Gerlach -- What next for networks and netwars? / David Ronfeldt and John Arquilla -- Afterword (September 2001): The sharpening fight for the future / John Arquilla and David Ronfeldt</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Netwar is the lower-intensity, societal-level counterpart to the editors' earlier, mostly military concept of cyberwar. This volume studies major instances of netwar that have occurred over the past several years--from Osama bin Laden's networked terrorists to the Battle of Seattle's social activists--and finds, among other things, that netwar works very well. Whether the protagonists are civil-society activists or uncivil-society criminals and terrorists, their netwars have generally been successful. Strategists and policymakers in Washington, and elsewhere, have already begun to discern the dark side of the netwar phenomenon, especially as manifested in terrorist and criminal organizations. In this volume, the editors and their colleagues examine various types of netwar, from the most violent to the most socially activist. In doing so, they find that, despite the variety, all networks that have been built for waging netwar may be analyzed in terms of a common analytic framework. There are five levels of theory and practice that matter--the technological, social, narrative, organizational, and doctrinal levels. A netwar actor must get all five right to be fully effective. The most potent netwarriors will not only be highly networked and have the capacity for mounting "swarming" attacks, they will also be held together by strong social ties, have secure communications technologies, and project a common story about why they are together and what they need to do. These will be the most serious adversaries. But even those networks that are weak on some levels may pose stiff challenges to their nation-state adversaries. With this in mind, it is necessary to go beyond just diagnosing the nature of the networked nonstate opponent in a given conflict. It will become crucial for governments and their military and law enforcement establishments to begin networking themselves</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorisme</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Activisme</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Arquilla, John</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ronfeldt, David F.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">United States</subfield><subfield code="b">Department of Defense</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=72761</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028578613</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=72761</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=72761</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043154422 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:09Z |
institution | BVB |
isbn | 0833030302 0833032356 9780833030306 9780833032355 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028578613 |
oclc_num | 50851159 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xiv, 375 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Rand |
record_format | marc |
series2 | MR (Series) |
spelling | Networks and netwars the future of terror, crime, and militancy edited by John Arquilla and David Ronfeldt Santa Monica, CA Rand 2001 1 Online-Ressource (xiv, 375 pages) txt rdacontent c rdamedia cr rdacarrier MR (Series) MR-1382-OSD. "Prepared for the Office of the Secretary of Defense." Includes bibliographical references The advent of netwar (revisited / John Arquilla and David Ronfeldt -- The networking of terror in the information age / Michele Zanini and Sean J.A. Edwards -- Transnational criminal networks / Paul Williams -- Gangs, hooligans, and anarchists -- The vanguard of netwar in the streets / John P. Sullivan -- Networking dissent: Cyber activists use the Internet to promote democracy in Burma / Tiffany Danitz and Warren P. Strobel -- Emergence and influence of the Zapatista social netwar / David Ronfeldt and John Arquilla -- Netwar in the Emerald City: WTO protest strategy and tactics / Paul de Armond -- Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy / Dorothy E. Denning -- The structure of social movements: Environmental activism and its opponents / Luther P. Gerlach -- What next for networks and netwars? / David Ronfeldt and John Arquilla -- Afterword (September 2001): The sharpening fight for the future / John Arquilla and David Ronfeldt Netwar is the lower-intensity, societal-level counterpart to the editors' earlier, mostly military concept of cyberwar. This volume studies major instances of netwar that have occurred over the past several years--from Osama bin Laden's networked terrorists to the Battle of Seattle's social activists--and finds, among other things, that netwar works very well. Whether the protagonists are civil-society activists or uncivil-society criminals and terrorists, their netwars have generally been successful. Strategists and policymakers in Washington, and elsewhere, have already begun to discern the dark side of the netwar phenomenon, especially as manifested in terrorist and criminal organizations. In this volume, the editors and their colleagues examine various types of netwar, from the most violent to the most socially activist. In doing so, they find that, despite the variety, all networks that have been built for waging netwar may be analyzed in terms of a common analytic framework. There are five levels of theory and practice that matter--the technological, social, narrative, organizational, and doctrinal levels. A netwar actor must get all five right to be fully effective. The most potent netwarriors will not only be highly networked and have the capacity for mounting "swarming" attacks, they will also be held together by strong social ties, have secure communications technologies, and project a common story about why they are together and what they need to do. These will be the most serious adversaries. But even those networks that are weak on some levels may pose stiff challenges to their nation-state adversaries. With this in mind, it is necessary to go beyond just diagnosing the nature of the networked nonstate opponent in a given conflict. It will become crucial for governments and their military and law enforcement establishments to begin networking themselves POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh POLITICAL SCIENCE / Terrorism bisacsh Cyberterrorism fast Information warfare fast Internet gtt Terrorisme gtt Activisme gtt Terrorismus Information warfare Cyberterrorism Cyberspace (DE-588)4266146-8 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf Cyberspace (DE-588)4266146-8 s Terrorismus (DE-588)4059534-1 s 1\p DE-604 Information warfare (DE-588)4461975-3 s 2\p DE-604 Arquilla, John Sonstige oth Ronfeldt, David F. Sonstige oth United States Department of Defense Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=72761 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Networks and netwars the future of terror, crime, and militancy POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh POLITICAL SCIENCE / Terrorism bisacsh Cyberterrorism fast Information warfare fast Internet gtt Terrorisme gtt Activisme gtt Terrorismus Information warfare Cyberterrorism Cyberspace (DE-588)4266146-8 gnd Information warfare (DE-588)4461975-3 gnd Terrorismus (DE-588)4059534-1 gnd |
subject_GND | (DE-588)4266146-8 (DE-588)4461975-3 (DE-588)4059534-1 |
title | Networks and netwars the future of terror, crime, and militancy |
title_auth | Networks and netwars the future of terror, crime, and militancy |
title_exact_search | Networks and netwars the future of terror, crime, and militancy |
title_full | Networks and netwars the future of terror, crime, and militancy edited by John Arquilla and David Ronfeldt |
title_fullStr | Networks and netwars the future of terror, crime, and militancy edited by John Arquilla and David Ronfeldt |
title_full_unstemmed | Networks and netwars the future of terror, crime, and militancy edited by John Arquilla and David Ronfeldt |
title_short | Networks and netwars |
title_sort | networks and netwars the future of terror crime and militancy |
title_sub | the future of terror, crime, and militancy |
topic | POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh POLITICAL SCIENCE / Terrorism bisacsh Cyberterrorism fast Information warfare fast Internet gtt Terrorisme gtt Activisme gtt Terrorismus Information warfare Cyberterrorism Cyberspace (DE-588)4266146-8 gnd Information warfare (DE-588)4461975-3 gnd Terrorismus (DE-588)4059534-1 gnd |
topic_facet | POLITICAL SCIENCE / Political Freedom & Security / Terrorism POLITICAL SCIENCE / Terrorism Cyberterrorism Information warfare Internet Terrorisme Activisme Terrorismus Cyberspace |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=72761 |
work_keys_str_mv | AT arquillajohn networksandnetwarsthefutureofterrorcrimeandmilitancy AT ronfeldtdavidf networksandnetwarsthefutureofterrorcrimeandmilitancy AT unitedstatesdepartmentofdefense networksandnetwarsthefutureofterrorcrimeandmilitancy |