The IT Law Wiki
Register
Advertisement

Citation[]

Catherine A. Theohary & John Rollins, Terrorist Use of the Internet: Information Operations in Cyberspace (CRS Report R41674) (Mar. 8, 2011) (full-text).

Overview[]

This report describes the ways that international terrorists and insurgents use the Internet, strategically and tactically, in pursuit of their political agendas. This discussion covers terrorist information operations in cyberspace but does not discuss similar activities in other domains. The government response is also discussed in terms of information operations.

See also[]

Advertisement