Учебно-методический комплекс «Современный терроризм: сущность, причины, модели и механизмы противодействия»



страница9/48
Дата17.10.2016
Размер11 Mb.
1   ...   5   6   7   8   9   10   11   12   ...   48

Контрольные вопросы:


  1. Факторы уязвимости информационной сферы современного общества. Тенденции усиления зависимости общества от функционирования информационно-коммуникативных систем.

  2. Состояние научной разработанности проблематики использования НИКТ в деструктивных целях.

  3. Исследование места и роли НИКТ в структуре деятельности террористических организаций; алгоритм анализа.

  4. Определения и обстоятельства появления в научном лексиконе понятий «информационный терроризм» и «кибертерроризм»; кибертерроризм и киберпреступность: разграничение понятий.

  5. Основные виды кибертерроризма.

  6. Структурно-функциональный подход к анализа террористической организации: основные виды деятельности.

  7. Стратегии террористических организаций, направленные на овладение и применение новых технологий.

  8. Процесс рекрутирования: идентификация целевых аудиторий, основные каналы и методы.

  9. Новые технологии в области ресурсного обеспечения террористических организаций.

  10. Практика и инновационные формы обучения в террористических организациях.

  11. Дезинформация, фальсификация и прочие формы подлога в деятельности террористических организаций: новации в технологической сфере.

  12. Разведка и рекогносцировка: инновационные формы и методы. Идентификация и определение целей, планирование террористических операций.

  13. Применение новых технологий в процессе осуществления теракта: потенциальные возможности и ограничения.

  14. Новые возможности информационного сопровождения террористических акций и пропаганды.

  15. Критерии привлекательности новых технологий для террористических организаций.

  16. Сетевые технологии, способствующие стратегическим и обеспечивающим видам деятельности.

  17. Сетевые технологии, повышающие результативность террористических акций.

  18. Симметричные и ассиметричные угрозы безопасности: к определению понятий.

  19. Современный терроризм как ассиметричная угроза.

  20. Сетевая форма организации против иерархической: сильные и слабые стороны.

  21. Концепция сетевой войны.

  22. Причины неадекватности политики безопасности современного государства перед лицом ассиметричных вызовов и угроз.

  23. Основные компоненты механизма обеспечения защищенности; меры атакующего характера (активная оборона, пассивная оборона, избегание).

  24. Механизм управления рисками и механизм интернационализации.

  25. Основные тенденции эволюции современного терроризма.

  26. Терроризм нового типа: инновации в организационной, доктринальной, стратегической, тактической и технологической областях.

  27. Концепция информационных операций с разрушающим эффектом.

  28. Терроризм завтрашнего дня: штрихи к портрету.

  29. Идентификация способов и методов противодействия применению террористами новых технологий: постановка аналитической задачи.

  30. Анализ роли, которую играет данная технология с точки зрения общей технологической стратегии террористической организации.

  31. Анализ баланса выгод и издержек (рисков) применения данной технологии с точки зрения как террористов, так и сил безопасности.

  32. Анализ вариантов реализации контрмер, доступных силам безопасности.

  33. Отказ террористам в доступе к той или иной технологии или ее применении. Противодействие оперативному использованию террористами той или иной технологии.

  34. Эксплуатация скрытых уязвимостей и дефектов технологии.

  35. Непротиводействие и концентрация ресурсов на других направлениях антитеррористической деятельности.

  36. Сравнительная оценка практик противодействия.

  37. Опыт противодействия применению террористами современных технологий США.

  38. Европейский опыт противодействия применению террористами современных технологий.

  39. Контуры системного подхода к противодействию использованию террористами новых технологий.

  40. Идентификация и привлечение к сотрудничеству кадров, обладающих необходимой квалификацией.

  41. Начальные шаги по имплементации предложенной системы мер.


Список рекомендуемой литературы и интернет-источников:


  1. Федеральный закон "О противодействии терроризму" от 06.03.2006 N 35-ФЗ.

  2. Артамонов И.И. Терроризм: способы предотвращения, методика расследования. – М.: Изд-ль Шумилова И.И., 2002

  3. Афанасьев Н.Н. Идеология терроризма // Социально-гуманитарное знание. – 2001. -№6. – С. 205-218 .

  4. Вахромеев А.В. Международный терроризм и национальная безопасность России // Социально гуманитарные знания. – 2004.- № 1.

  5. Вахрамеев А.В. Международный терроризм и национальная безопасность России // Социально гуманитарные знания. – 2004.- № 2.

  6. Гродненский Н. Первая Чеченская. Хроника вооруженного конфликта. Минск, ФУАинформ, 2007.

  7. Гушер А.И. Проблема терроризма на рубеже третьего тысячелетия новой эры человечества.

  8. Дробижева Л. М., Э.А.Паин. Политический терроризм и экстремизм. 2003

  9. Замков В.И. Терроризм – глобальная проблема современности М., 1996.

  10. Колобов О.А. Терроризм и контртерроризм в современном мире: Аналитические материалы, документы, глоссарий: Научно-справочное издание. Экслит, 2003.

  11. 10. Казинцев А. Россия над бездной. Дневник современника. 1991-1996. - М.: Наш современник, 1996.

  12. “К 2020 году на смену "Аль-Каиде" придут профессионалы террора” Отчет Национального совета по разведке США, 2004 / Электронная он-лайн библиотека национальной безопасности Российской Федерации: http://www.nationalsecurity.ru/library/00016/00016future.htm

  13. Как побеждать терроризм. «Эксперт» №41 (347)/4 ноября 2002.

  14. Кириллов И.А. О проблеме причин терроризма. Сибирский юридический вестник, 2002. № 2.

  15. Ковалев Н.Д. Актуальные проблемы международного сотрудничества в борьбе с терроризмом. // Мировое сообщество против глобализации преступности и терроризма. – М.: “Междунар. отношения”, 2002.

  16. Кожушко Е. Современный терроризм. Анализ основных направлений. – Мн.: Харвест, 2000.

  17. Комиссия Говорухина. - М.: Лавента, 1995.

  18. Куликов А.С. Вопросы противодействия терроризму. Доклад на Международном семинаре (28.06.2005) Веб-сайт World Anticriminal and Antiterrorist Forum (http://www.waaf.ru)

  19. Лазарев И.М. Терроризм как тип политического поведения // Социс. – 1993.- № 6.

  20. Ланцов С. А. Террор и террористы. СПб, 2004.

  21. Литвинов Н.Д. Международный терроризм. - М., 1999.

  22. Литвинов Н.Д. Террористические организации.- М., 1999.

  23. Лунеев В.В. Тенденции терроризма и уголовно-правовая борьба с ним. Государство и право, 2002. № 6.

  24. Международные террористические организации (данные доклада Государственного департамента США) / Электронная он-лайн библиотека национальной безопасности Российской Федерации: http://www.nationalsecurity.ru/library/00016/00016list.htm

  25. Морозов И.Л. «Политический экстремизм и Интернет»: www.morozov.vlz.ru.

  26. Невдашов И. «Уроки Бен Ладена для спецслужб». Современные технологии безопасности. №3-4 за 2006 год. www.daily.sec.ru.

  27. Новиков Я.Ю. Терроризм в Северной Ирландии: история и современность // Социально гуманитарные знания. – 2003. - № 6.

  28. Новикова Г.В. Сильная стратегия слабых (Террор в конце 20века) // Полис. – 2000.- № 1.

  29. Номоконов В.А. Глобализация – криминологические аспекты. Мировое сообщество против глобализации преступности и терроризма. – М.: “Междунар. отношения”, 2002.



  30. Ольшанский Д.В. Психология терроризма. – СПб.: Питер, 2002.

  31. "Особенности глобального терроризма в 2000 году". Выдержки из доклада Государственного департамента США.: http://www.agentura.ru/terrorism/theory/doklad/

  32. Переосмысляя современность (Материалы международной конференции). - М., 2003.

  33. Петров К.С. Структура концента «терроризм» // Полис.-2003.- № 4.

  34. Петрищев В. Новые вызовы современного терроризма. // Мировое сообщество против глобализации преступности и терроризма. – М.: “Междунар. отношения”, 2002.

  35. Сельцовский П.А. Разновидности и формы терроризма в современных условиях. // Социально-гуманитарное знание. № 4. – 2003.

  36. Требин М.П. Терроризм в XXI веке. – Мн.: Харвест, 2004.

  37. Туронок С.Г. Интернет в политике: политические аспекты новых информационно-коммуникативных технологий. – Москва, Международный Университет (в Москве), 2003 г.

  38. Угроза терроризма. Как с ней бороться? «Эксперт» №35 (576)/24 ноября 2007.

  39. Устинов В. Экстремизм и терроризм: проблемы разграничения и классификации. Российская юстиция, 2002. № 5.

  40. Хоффман Брюс. Терроризм. Взгляд изнутри. – М: УльтраКультура, 2003.

  41. Хохлов И.И. Глобальный джихад Салафи: международная террористическая сеть Аль-Каида. 2007 / Электронная он-лайн библиотека национальной безопасности Российской Федерации: http://www.nationalsecurity.ru/library/00016/index.htm

  42. Adams, James, he Financing of Terror: Behind the PLO, IRA, the Red Brigades, and M-19 Stand the Paymasters: How the Groups That Are Terrorizing the World Get the Money to Do It, New York: Simon and Schuster, 1986.

  43. Alberts, David S., John Garstka, and Frederick Stein, Network Centric Warfare: Developing and Leveraging Information Technology, Washington, D.C.: DoD, Command and Control Research Program Publication Series, 1999.

  44. Amato, Ivan, “Lying with Pixels,” Technology Review, January 11, 2002.: http://www.technologyreview.com/Infotech/12115

  45. Argyris, Chris, and Donald A. Schön, Organizational Learning: A Theory of Action Perspective, Reading, Mass.: Addison-Wesley Co., 1978.

  46. Armstrong, Ilena, “Hactivism: Protest or Petty Vandalism?” SC Magazine, September 2002.

  47. Arquilla, John, and David Ronfeldt, eds., Networks and Netwars: he Future of Terror, Crime, and Militancy, Santa Monica, Calif.: RAND Corporation, MR-1382-OSD, 2001.: http://www.rand.org/pubs/monograph_reports/MR1382/

  48. ———, eds., In Athena’s Camp: Preparing for Conflict in the Information Age, Santa Monica, Calif.: RAND Corporation, MR-880-OSD/RC, 1997.: http://www.rand.org/pubs/monograph_reports/MR880/

  49. ———,The Advent of Netwar, Santa Monica, Calif.: RAND Corporation, MR-789-OSD, 1996.: http://www.rand.org/pubs/monograph_reports/MR789/

  50. Associated Press, “FBI E-Mail Monitor to Be Monitored,” CBS News, August 10, 2000.: http://www.cbsnews.com/stories/2000/08/10/tech/main223613.shtml

  51. ———, “Alleged Suspects Shot ‘Casing Video’ of Capitol,” wcbstv.com, April 28, 2006.: http://wcbstv.com/911/local_story_118222108.html

  52. Baker, John C., ”Jemaah Islamiyah,” in Brian A. Jackson, John C. Baker, Peter Chalk, Kim Cragin, John V. Parachini, and Horacio R. Trujillo, Aptitude for Destruction, Vol. 2: Case Studies of Learning in Five Terrorist Groups, Santa Monica, Calif.: RAND Corporation, MG-332-NIJ, 2005, pp. 57–92.: http://www.rand.org/pubs/monographs/MG332/70

  53. Baker, John C., Beth E. Lachman, Dave R. Frelinger, Kevin M. O’Connell, Alexander C. Hou, Michael S. Tseng, David T. Orletsky, and Charles W. Yost, Mapping the Risks: Assessing the Homeland Security Implications of Publicly Available Geospatial Information, Santa Monica, Calif.: RAND Corporation, MG-142-NGA, 2004. : http://www.rand.org/pubs/monographs/MG142/

  54. Balkovich, Edward, Tora K. Bikson, and Gordon Bitko, 9 to 5: Do You Know if Your Boss Knows Where You Are? Case Studies of Radio Frequency Identification Usage in the Workplace, Santa Monica, Calif.: RAND Corporation, TR-197-RC, 2005.: http://www.rand.org/pubs/technical_reports/TR197/

  55. Bassham, Lawrence E., and W. Timothy Polk, Threat Assessment of Malicious Code and Human Threats, National Institute of Standards and Technology Computer Security Division, March 10, 1994.: http://csrc.nist.gov/publications/nistir/threats/

  56. Baumann, Michael, Terror or Love? Bommi Baumann’s Own Story of His Life as a West German Urban Guerrilla, New York: Grove Press, 1979.

  57. Bell, J. Bowyer, The Gun in Politics: An Analysis of Irish Political Conflict, 1916–1986, New Brunswick, N.J.: Transaction Books, 1987.

  58. ———,The Secret Army: A History of the IRA, Dublin, Ireland: Poolbeg, 1998.

  59. Banks, Sheila B., et al., Analysis Modeling and Simulation Master Plan Technology White Paper (Draft), Alexandria, Va.: Institute for Defense Analyses, 2006.

  60. Birchall, D. W., J. J. Chanaron, and K. Soderquist, “Managing Innovation in SME’s: A Comparison of Companies in the UK, France and Portugal,” International Journal of Technology Management, Vol. 12, No. 3, 1996, pp. 291–305.

  61. Birkler, John, C. Richard Neu, and Glenn A. Kent, Gaining New Military Capability: An Experiment in Concept Development, Santa Monica, Calif.: RAND Corporation, MR-912-OSD, 1998. See Appendix C on radar resonance detection of weapons.: http://www.rand.org/pubs/monograph_reports/MR912/

  62. B’nai B’rith, Dangerous Convictions: An Introduction to Extremist Activities in Prison, New York: ADL, 2002. : http://www.adl.org/learn/Ext_terr/Dangerous_Convictions.pdf

  63. Bonomo, James, Giacomo Bergamo, Dave Frelinger, John Gordon IV, and Brian A. Jackson, Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons, Santa Monica, Calif.: RAND Corporation, forthcoming.

  64. Bordewich, F. M. Target America: Terrorism in the U.S. today. New York, NY: S.P.I. Books/Shapolsky Publishers, Inc. (1995).

  65. Bracken, Jerome, et al., Analysis Modeling and Simulation Master Plan, Work Group 1: Traditional Warfare (Draft), Alexandria, Va.: Institute for Defense Analyses, 2006.

  66. Brodie, Bernard, “Strategy as a Science,” World Politics, Vol 1, No. 4, July 1949, pp. 467–488.

  67. Burns, Tom, and G. M. Stalker, The Management of Innovation, London: Tavistock Publications, 1961.

  68. Burwell, Frances G., David C. Gompert, Leslie S. Lebl, Jan M. Lodal, and Walter B. Slocombe. Transatlantic Transformation: Building a NATO-EU Security Architecture. Washington, D.C.: Atlantic Council, March 2006.

  69. Bush, George W., December 17, 2003, Homeland Security Presidential Directive/HSPD-7: Critical Infrastructure Identification, Prioritization, and Protection, Washington, D.C.: White House Office of the Press Secretary, 2003.: http://www.whitehouse.gov/news/releases/2003/12/20031217-5.html

  70. Campbell, Duncan, “How the Terror Trail Went Unseen,” Telepolis, October 8, 2001.: http://www.heise.de/tp/r4/artikel/9/9751/1.html

  71. Campen, Alan D., Douglas H. Dearth, and R. Thomas Goodden, eds., Cyberwar: Security, Strategy, and Conflict in the Information Age, Fairfax, Va.: AFCEA International Press, 1996.

  72. Central Intelligence Agency. Guide to the Analysis of Insurgency, Washington, D.C.:U.S. Government Printing Office, undated.

  73. Chalk P. Confronting “the enemy within”: security intelligence, the police, the counterterrorism in four democracies. RAND, 2004.

  74. Ceresa, Alessia, “The Impact of ‘New Technology’ on the ‘Red Brigades’ Italian Terrorist Organisation,” European Journal on Criminal Policy and Research, Vol. 11, No. 2, 2005, pp. 193–222.

  75. Chen, Rongxin, “Technological Expansion: The Interaction Between Diversification Strategy and Organizational Capability,” he Journal of Management Studies, Vol. 33, No. 5, 1996, pp. 649–666.

  76. Chen, Yuxin, Chakravarthi Narasimhan, and Z. John Zhang, “Individual Marketing with Imperfect Targetability: Being Imperfect in Targeting Is Perfect for Profit,” Marketing Science, Vol. 20, No. 1, Winter 2001, pp. 23–41.

  77. Cialdini, Robert B., Influence: Science and Practice, 3rd ed., New York: Harper Collins College Publishers, 1993.

  78. Clutterbuck, R., “Trends in Terrorist Weaponry,” in Paul Wilkinson, ed., Technology and Terrorism, London, UK, and Portland, Ore.: F. Cass, 1993, pp. 130–139.

  79. ———, Terrorism in an Unstable World, London and New York: Routledge, 1994.

  80. Coll, Steve, and Susan B. Glasser, “Terrorists Turn to the Web as Base of Operations,” he Washington Post, August 7, 2005, p. A1.

  81. Collins, Eamon, and Mick McGovern, Killing Rage, London, UK: Granta Books, 1998.

  82. Contemporary Trends in World Terrorism. Tel Aviv,. L.- N.Y.1987.

  83. “Conventional Terrorist Weapons,” United Nations Office on Drugs and Crime: http://www.unodc.org/unodc/terrorism_weapons_conventional.html

  84. Cordesman, Anthony H., The Lessons of Modern War, Volume III, London: Mansell Publishing Ltd., 1990.

  85. Core, M., et al., “Building Explainable Artificial Intelligence Systems,” in Proceedings of Eighteenth Conference on Innovative Applications of Artificial Intelligence, Boston, Mass., 2006.

  86. Cragin, Kim, “Hizballah, the Party of God,” in Brian A. Jackson, John C. Baker, Peter Chalk, Kim Cragin, John V. Parachini, and Horacio R. Trujillo, Aptitude for Destruction, Vol. 2: Case Studies of Organizational Learning in Five Terrorist Groups, Santa Monica, Calif.: RAND Corporation, MG-332-NIJ, 2005, pp. 37–56.

  87. Cragin, Kim, Peter Chalk, Sara A. Daly, and Brian A. Jackson, Sharing the Dragon’s Teeth: Terrorist Groups and the Exchange of New Technologies, Santa Monica, Calif.: RAND Corporation, MG-485-DHS, 2007.: http://www.rand.org/pubs/monographs/MG485/

  88. Cragin, Kim, and Sara A. Daly, he Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a Changing World, Santa Monica, Calif.: RAND Corporation, MR-1782-AF, 2004. : http://www.rand.org/pubs/monograph_reports/MR1782/

  89. Cragin, Kim, and Scott Gerwehr, Dissuading Terror: Strategic Influence and the Struggle Against Terrorism, Santa Monica, Calif.: RAND Corporation, MG-184-RC, 2005. : http://www.rand.org/pubs/monographs/MG184/

  90. Cullison, Alan, “Inside Al-Qaeda’s Hard Drive,” he Atlantic Monthly, September 2004, pp. 55–72.

  91. Daly, Sara A., and Scott Gerwehr, Al-Qaida: Terrorist Selection and Recruitment, Santa Monica, Calif.: RAND Corporation, RP-1214, 2006.: http://www.rand.org/pubs/reprints/RP1214/

  92. Dam, Kenneth W., and Herbert Lin, Cryptography’s Role in Securing the Information Society, Washington, D.C.: National Academy Press, 1996.72

  93. Dartmouth College, Examining the Cyber Capabilities of Islamic Terrorist Groups, Hanover, N.H.: Institute for Security Technology Studies at Dartmouth College, November 2003. : https://www.ists.dartmouth.edu/TAG/ITB/ITB%5F032004.pdf

  94. DARWARS, Department of Defense Game Developers’ Community, undated Web page. : http://www.dodgamecommunity.com/

  95. Davis, Catherine, “Afghans Remember Slain Resistance Hero,” BBC News, September 9, 2002.: http://news.bbc.co.uk/2/hi/south_asia/2245456.stm

  96. Davis, K. Paul “A Qualitative Multiresolution Model for Counterterrorism,” in Proceedings of Enabling Technologies for Modeling and Simulation, Bellingham, Wash.: International Society for Optical Engineering, 2006.

  97. Davis, K. Paul Analytic Architecture for Capabilities-Based Planning, Mission-System Analysis, and Transformation, Santa Monica, Calif.: RAND Corporation, 2002.

  98. Davis, K. Paul ed., New Challenges for Defense Planning: Rethinking How Much is Enough, Santa Monica, Calif.: RAND Corporation, 1994

  99. Denning, Dorothy E. Robling, Information Warfare and Security, New York: ACM Press, 1999.

  100. ———, Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy, San Francisco, Calif.: Nautilus Institute, December 10, 2001.: http://www.nautilus.org/archives/info-policy/workshop/papers/denning.html

  101. Denning, Dorothy E., and William E. Baugh, Jr., “Cases Involving Encryption in Crime and Terrorism,” The Cryptography Project, Georgetown University, Department of Computer Science, October 10, 1997.: http://www.cosc.georgetown.edu/~denning/crypto/cases.html

  102. Dewar, James, Assumption-Based Planning: A Tool for Reducing Avoidable Surprises, London, UK: Cambridge, 2003.

  103. Donahue, Arthur, “Terrorist Organizations and the Potential Use of Biological Weapons,” in David W. Siegrist and Janice M. Graham, eds., Countering Biological Terrorism in the US: An Understanding of Issues and Status, Dobbs Ferry, N.Y.: Oceana Publications, 1999, pp. 21–35.

  104. Drake, R. The Revolutionary mystique and Terrorism. Bloomington and Indianapolis. 1986.

  105. Fox, Daniel, “Using Exploratory Modeling,” in Stuart Johnson, Martin Libicki, and Gregory F. Treverton, eds., New Challenges, New Tools for Defense Decisionmaking, Santa Monica, Calif.: RAND Corporation, 2003, pp. 258–598.

  106. Dunnigan, James F., The Next War Zone: Confronting the Global Threat of Cyberterrorism, New York: Citadel Press, 2002.

  107. ———, “Iraqi Terrorists and the War on Terror,” Strategy Page, March 3, 2005.: http://www.strategypage.com/dls/articles2005/2005332.asp

  108. Emerson, Steven, “Testimony of Steven Emerson Before the House Committee on Financial Services Subcommittee on Oversight and Investigations, ‘Patriot Act Oversight: Investigating Patterns of Terrorist Fundraising’: Fund-Raising Methods and Procedures for International Terrorist Organizations,” February 12, 2002. : http://www.au.af.mil/au/awc/awcgate/congress/021202se.pdf

  109. Emery, Theo, “Video Research at MIT Puts Words into Mouths, with Startling Results,” Associated Press, June 30, 2002.

  110. Environmental Health Safety, “Air Modeling Software,” Web page, November 27, 2006.: http://www.ehsfreeware.com/amodclean.htm

  111. Fair, C. Christine, “Militant Recruitment in Pakistan: Implications for al Qaeda and Other Organizations,” Studies in Conflict and Terrorism, Vol. 27, No. 6, November–December 2004, pp. 489–504.

  112. Farrell, Nick, “Mobile Phone Detects Bad Breath,” he Inquirer, September 22, 2004.: http://www.theinquirer.net/?article=18613

  113. Federal Bureau of Investigation, “Indictment of Zacarias Moussaoui,” press release, Washington, D.C., December 11, 2001. : http://www.fbi.gov/pressrel/pressrel01/mueller121101.htmBibliography 73

  114. “Federal Communications Commission Releases Data on High-Speed Services for Internet Access,” press release, Federal Communications Commission, Washington, D.C., July 7, 2005.: http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-259870A1.pdf

  115. “Five Days in an IRA Training Camp,” Iris, Vol. 7, November 1983, pp. 39–45.

  116. Freeh, Louis J., Testimony of Louis J. Freeh, Director, FBI, Before the United States Senate, Committees on Appropriations, Armed Services, and Select Committee on Intelligence, May 10, 2001: Threat of Terrorism to the United States, May 10, 2001.: http://www.fbi.gov/congress/congress01/freeh051001.htm

  117. Freeman, Christopher, and Luc Soete, he Economics of Industrial Innovation, Cambridge, Mass.: MIT Press, 1997.

  118. Gade, Lisa, “Palm Treo 650 Palm OS Smartphone Review,” MobileTechReview, May 11, 2005.: http://www.mobiletechreview.com/Treo_650.htm

  119. Gellman, Barton, “Cyber-Attacks by al Qaeda Feared: Terrorists at Threshold of Using Internet as Tool of Bloodshed, Experts Say,” The Washington Post, June 27, 2002, p. A1.

  120. Geraghty, Tony, The Irish War: he Hidden Conflict Between the IRA and British Intelligence, Baltimore, Md.: Johns Hopkins University Press, 2000.

  121. Gerwehr, Scott, and Russell W. Glenn, The Art of Darkness: Deception and Urban Operations, Santa Monica, Calif.: RAND Corporation, MR-1132-A, 2000. : http://www.rand.org/pubs/monograph_reports/MR1132/

  122. ———,Unweaving the Web: Deception and Adaptation in Future Urban Operations, Santa Monica, Calif.: RAND Corporation, MR-1495-A, 2003. : http://www.rand.org/pubs/monograph_reports/MR1495/

  123. Goertzel, T. Conceptualization of terrorism. American Sociological Review, 54, 329240 (1988).

  124. Goffman, Erving, Behavior in Public Places: Notes on the Social Organization of Gatherings, New York: Free Press of Glencoe, 1963.

  125. Goldberg, Ian, “Privacy-Enhancing Technologies for the Internet, II: Five Years Later,”: http://www.cypherpunks.ca/~iang/pubs/pet2.pdf

  126. Goldberg, Ian, David Wagner, and Eric Brewer, “Privacy-Enhancing Technologies for the Internet,” January 21, 1997. : http://www.cs.berkeley.edu/~daw/papers/privacy-compcon97-www/privacy-html.html

  127. Gompert, David C., Heads We Win: The Cognitive Side of Counterinsurgency(COIN): RAND Counterinsurgency Study—Paper 1, Santa Monica, Calif.: RAND Corporation, OP-168-OSD, 2007.

  128. Gompert, David C., Irving Lachow, and Justin Perkins. Battle-Wise: Seeking Time-Information Superiority in Networked Warfare. Washington, D.C.: Center for Technology and National Security Policy, National Defense University, July 2006.

  129. Gosling, John, “War of the Worlds: Invasion: he Historical Perspective,”: http://www.war-ofthe-worlds.co.uk/war_worlds_orson_welles_mercury.htm

  130. Gunaratna, Rohan, Inside al Qaeda: Global Network of Terror, New York: Columbia University Press, 2002.

  131. Habeck, Mary. Knowing the Enemy: Jihadist Ideology and the War on Terror. Foreign Policy Research Institute, November 2006.

  132. Haimes, Yacov, Risk Modeling, Assessment, and Management, New York: John Wiley & Sons, 1998.

  133. Harnden, Toby, “Bandit Country”: the IRA and South Armagh, London: Coronet Books, 2000.

  134. ———, “Video Games Attract Young to Hizbollah,” he Daily Telegraph (London), February 21, 2004, p. 18.

  135. Heaton-Armstrong, Anthony, Eric Shepherd, and David Wolchover, eds., Analysing Witness Testimony: A Guide for Legal Practitioners and Other Professionals, London: Blackstone Press, 1999

  136. Hillestad, Richard, and Paul K Davis, Resource Allocation for the New Defense Strategy: The DynaRank Decision-Support System, Santa Monica, Calif.: RAND Corporation, 1998.

  137. Hinnen, Todd M., “he Cyber-Front in the War on Terrorism: Curbing Terrorist Use of the Internet,” he Columbia Science and Technology Law Review, Vol. 5, No. 5, April 19, 2004, pp. 1–42. : http://www.stlr.org/html/volume5/hinnen.pdf74

  138. Hoffman, Bruce, Terrorist Targeting: Tactics, Trends, and Potentialities, Santa Monica, Calif.: RAND Corporation, P-7801, 1992. : http://www.rand.org/pubs/papers/P7801/

  139. ———, Inside Terrorism, New York: Columbia University Press, 1998.

  140. ———, Terrorism and Weapons of Mass Destruction: An Analysis of Trends and Motivations, Santa Monica, Calif.: RAND Corporation, P-8039-1, 1999a. : http://www.rand.org/pubs/papers/P8039-1/

  141. ———, “Terrorism Trends and Prospects,” in Ian O. Lesser, Bruce Hoffman, John Arquilla, David Ronfeldt, Michele Zanini, and Brian Michael Jenkins, Countering the New Terrorism, Santa Monica, Calif.: RAND Corporation, MR-989-AF, 1999b, pp. 7–38. : http://www.rand.org/pubs/monograph_reports/MR989/

  142. ———, “Change and Continuity in Terrorism,” Studies in Conflict and Terrorism, Vol. 24, No. 5, 2001, pp. 417–428.

  143. ———, Insurgency and Counterinsurgency in Iraq, Santa Monica, Calif.: RAND Corporation, OP-127-IPC/CMEPP, 2004. : http://www.rand.org/pubs/occasional_papers/OP127/

  144. Horchem, H. J., “West Germany’s Red Army Anarchists,” in William Frank Gutteridge, ed., Contemporary Terrorism, New York: Facts on File, 1986, pp. 119–216.

  145. Horgan, John, and Max Taylor, “Playing the ‘Green Card’: Financing the Provisional IRA: Part 1,” Terrorism and Political Violence, Vol. 11, No. 2, 1999, pp. 1–38.

  146. ———, “Playing the ‘Green Card’: Financing the Provisional IRA: Part 2,” Terrorism and Political Violence,Vol. 15, No. 2, 2003, pp. 1–

  147. Hubbard, D.G. Winning back the sky. A Tactical Analysis of Terrorism. San-Francisco, 1989.

  148. Hughes, Wayne, ed., Military Modeling, 2nd ed., Alexandria, Va.: Military Operations Research Society, 1989.

  149. Hydra of Carnage. Lexington. 1986.

  150. Ilachinski, Andrew, Artificial War: Multiagent-Based Simulation of Combat, Hackensack, N.J.: World Scientific Publishing Company, 2004.

  151. “Internet Makes Drug Traffickers Hard to Catch: DEA,” Reuters, March 18, 2004.

  152. Jackson, Brian, “Technology Acquisition by Terrorist Groups: Threat Assessment Informed by Lessons from Private Sector Technology Adoption,” Studies in Conflict and Terrorism, Vol. 24, No. 3, May 1, 2001, pp. 183–214.

  153. ———, “Provisional Irish Republican Army,” in Brian A. Jackson, John C. Baker, Peter Chalk, Kim Cragin, John V. Parachini, and Horacio R. Trujillo, Aptitude for Destruction, Vol . 2: Case Studies of Organizational Learning in Five Terrorist Groups, Santa Monica, Calif.: RAND Corporation, MG-332-NIJ, 2005, pp. 93–140. : http://www.rand.org/pubs/monographs/MG332/

  154. ———, Technology Strategies for Homeland Security: Adaptation and Coevolution of Offense and Defense, unpublished RAND research, 2006a.

  155. ———, “Training for Urban Resistance: he Case of the Provisional Irish Republican Army,” in James J. F. Forest, ed., The Making of a Terrorist: Recruitment, Training, and Root Causes, Westport, Conn.: Praeger Security International, 2006b, pp. 119–135.

  156. Jackson, Brian A., John C. Baker, Peter Chalk, Kim Cragin, John V. Parachini, and Horacio R. Trujillo, Aptitude for Destruction, Vol. 1: Organizational Learning in Terrorist Groups and Its Implication for Combating Terrorism, Santa Monica, Calif.: RAND Corporation, MG-331-NIJ, 2005a. : http://www.rand.org/pubs/monographs/MG331/Bibliography 75

  157. ———, Aptitude for Destruction, Vol . 2: Case Studies of Organizational Learning in Five Terrorist Groups, Santa Monica, Calif.: RAND Corporation, MG-332-NIJ, 2005b. : http://www.rand.org/pubs/monographs/MG332/

  158. Jackson, Brian A., Peter Chalk, Kim Cragin, Bruce Newsome, John V. Parachini, William Rosenau, Erin M. Simpson, Melanie Sisson, and Donald Temple, Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies, Santa Monica, Calif.: RAND Corporation, MG-481-DHS, 2007.: http://www.rand.org/pubs/monographs/MG481/

  159. Jakobsson, Mikael, and T. L. Taylor, “The Sopranos Meets EverQuest: Social Networking in Massively Multiplayer Online Games,” paper presented at Melbourne DAC, the Fifth International Digital Arts and Culture Conference, Melbourne, Australia, May 19–23, 2003. : http://hypertext.rmit.edu.au/dac/papers/Jakobsson.pdf

  160. Jarman, Neil, “Painting Landscapes: The Place of Murals in the Symbolic Construction of Urban Space,” in Anthony D. Buckley, ed., Symbols in Northern Ireland, Belfast: Institute of Irish Studies, Queen’s University of Belfast, 1998.

  161. Jenkins, Brian Michael, High Technology Terrorism and Surrogate War: The Impact of New Technology on Low-Level Violence, Santa Monica, Calif.: RAND Corporation, P-5339, 1975.: http://www.rand.org/pubs/papers/P5339/

  162. Kelley, Jack, “Terror Groups Hide Behind Web Encryption,” USA Today, February 5, 2001.: http://www.usatoday.com/tech/news/2001-02-05-binladen.htm

  163. Kennedy, John, “1Gbps Wireless Broadband Trials to Begin,” siliconrepublic.com, August 9, 2005.: http://www.siliconrepublic.com/news/news.nv?storyid=single5205

  164. Kent, Glenn A., “Looking Back: Four Decades of Analysis,” Operations Research, Vol. 50, No. 1, 2002, pp.122–224.

  165. Kramer, Franklin D., Larry Wentz, and Stuart Starr. I-Power: The Information Revolution and Stability Operations. Washington, D.C., Center for Technology and National Security Policy, National Defense University, Defense Horizons Paper No. 55, February 2007.

  166. Laffin, J. Diplomacy from below: International terrorism and American foreign relations 1945-1962. Terrorism:An International Journal, 14,3148. (1988).

  167. Lamb, Christina, “Terrorist Video Shows Training for Hotel Attack,” The Daily Telegraph (London), November 16, 2002. : http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2002/11/17/wyemen317.xml

  168. Lanchester, Fredrick William, “Mathematics in Warfare,” in The World of Mathematics, Redmond, Wash.: Tempus Books, 1956.

  169. Larnder, Harold, “The Origins of Operational Research,” in Operations Research, Vol. 32, No. 2, March–April, 1984

  170. Lau, Stephen, “An Analysis of Terrorist Groups’ Potential Use of Electronic Steganography,” Bethesda, Md.: SANS Institute, February 18, 2003.: http://www.sans.org/reading_room/whitepapers/stenganography/554.php

  171. Leader, Stefan H., and Peter Probst, “The Earth Liberation Front and Environmental Terrorism,” Terrorism and Political Violence, Vol. 15, No. 4, 2003, pp. 37–58.

  172. “Leaders—Mobile Phones and Development: Less Is More,” The Economist, Vol. 376, No. 8434, 2005, p. 11.

  173. Lempert, Robert J., Steven W. Popper, and Steven C. Bankes, Shaping the Next One Hundred Years: New Methods for Quantitative, Long-Term Policy Analysis, Santa Monica, Calif.: RAND Corporation, 2003.

  174. Lewis, Nick, “Dangerous Games: How the Seductive Power of Video Games Is Being Harnessed to Push Deadly Agendas,” The Calgary Herald, July 9, 2005, p. C11.

  175. Libicki, Martin C., David C. Gompert, David R. Frelinger, and Raymond Smith.Byting Back—Regaining Information Superiority Against 21st-Century Insurgents:RAND Counterinsurgency Study—Volume 1. Santa Monica, Calif.: RAND Corporation, MG-595/1-OSD, 2007.

  176. Livingstone, N. The War against Terrorism. Lexington (Mass.), 1982.

  177. Loftus, Tom, “Virtual Worlds Wind Up in Real World’s Courts,” MSNBC.com, February 7, 2005. : http://www.msnbc.msn.com/id/6870901

  178. Long, Austin. On “Other War”: Lessons from Five Decades of RAND Counterinsurgency Research. Santa Monica, Calif.: RAND Corporation, MG-42-OSD, 2006.

  179. Maxon, Terry, “Cell Phone Companies Add Tracking Abilities,” FSView and Florida Flambeau, July 25, 2005.: http://media.www.fsunews.com/media/storage/paper920/news/2005/07/25/Lifestyles/Cell-Phone.Companies.Add.Tracking.Abilities-2355874.shtml

  180. Miller, R. Holy war: Islam fights. London: Grafton Books. (1988).

  181. Mishra, Shitanshu, “Exploitation of Information and Communications Technology by Terrorist Organizations,” Strategic Analysis, Vol. 27, No. 3, July–September 2003, pp. 439–462.

  182. Mixed Reality Lab, “Human Pacman,” August 5, 2006.: http://www.mixedreality.nus.edu.sg/index.php?option=com_content&task=view&id=42&Itemid=36

  183. Mobile Pipeline, “Philips Platform Aims at Seamless Cell, Wi-Fi Handoffs,” CommWeb: the Telecommunications Pipeline, March 14, 2005.

  184. Molander, Roger C., B. David Mussington, and Peter A. Wilson, Cyberpayments and Money Laundering: Problems and Promise, Santa Monica, Calif.: RAND Corporation, MR-965-OSTP/FINCEN, 1998. : http://www.rand.org/pubs/monograph_reports/MR965/

  185. Molander, Roger C., Andrew Riddile, and Peter A. Wilson, Strategic Information Warfare: A New Face of War,Santa Monica, Calif.: RAND Corporation, MR-661-OSD, 1996. : http://www.rand.org/pubs/monograph_reports/MR661/

  186. “Money-Transfer Systems, Hawala Style,” CBC News Online, June 11, 2004. : http://www.cbc.ca/news/background/banking/hawala.html

  187. Morris, Chris, “he Greatest Story Never Played,” CNNMoney.com, July 6, 2005.: http://money.cnn.com/2005/07/06/commentary/game_over/column_gaming/index.htm

  188. Musgrove, Mike, “Intel Unveils Long-Range Wireless Technology,” he Washington Post, April 19, 2005, p. E4.: http://www.washingtonpost.com/wp-dyn/articles/A63987-2005Apr18.html

  189. Mussington, David, “The ‘Day After’ Methodology and National Security Analysis,” in Stuart Johnson, Martin Libicki, and Gregory F. Treverton, eds., New Challenges, New Tools for Defense Decisionmaking, Santa Monica, Calif.: RAND Corporation, 2003.

  190. National Commission on Terrorist Attacks upon the United States, The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States, New York: Norton, 2004. : http://www.gpoaccess.gov/911/index.html

  191. National Communications System, he Electronic Intrusion Threat to National Security and Emergency Preparedness (NS/EP) Internet Communications: An Awareness Document, Arlington, Va.: Office of the Manager, National Communications System, 2000.: http://purl.access.gpo.gov/GPO/LPS18833

  192. National Research Council, Making the Nation Safer: he Role of Science and Technology in Countering Terrorism, Washington, D.C.: National Academy Press, 2002.

  193. National Research Council, Modeling and Simulation, Vol. 9 of Technology for the United States Navy and Marine Corps: 2000–2035, Washington, D.C.: National Academy Press, 1997.

  194. National Research Council, Modeling Human and Organizational Behavior: Application to Military Simulation, Washington, D.C.: National Academy Press, 1998.

  195. National Research Council, Developing Modeling, Simulation, and Analysis: Meeting the Challenge, Washington, D.C.: National Academies Press, 2006.

  196. Negroponte, Nicholas, Being Digital, New York: Knopf, 1995.

  197. ———, “Being Wireless,” Wired, Vol. 10, No. 10, October 2002.: http://www.wired.com/wired/archive/10.10/wireless.html

  198. Nelan, Bruce W., “How they Did It,” Time, May 5, 1997, p. 149.

  199. O’Callaghan, Sean, The Informer, London, UK: Corgi, 1999.

  200. O’Neill, Bard E. Insurgency and Terrorism, Inside Modern Revolutionary Warfare. Washington, D.C.: Brassey’s, 1990.

  201. Olson, P. A. The need for international cooperation in combating terrorism. Terrorism: (1988, Summer).

  202. Operational Analysis and the Counter-IED Fight, Briefing by the U.S. Joint IED Defeat Organization, March 2007.

  203. Parachini, John V., “Aum Shinrikyo,” in Brian A. Jackson, John C. Baker, Peter Chalk, Kim Cragin, John V. Parachini, and Horacio R. Trujillo, Aptitude for Destruction, Vol. 2: Case Studies of Learning in Five Terrorist Groups, Santa Monica, Calif.: RAND Corporation, 2004, pp. 11–36.

  204. Parnell, Greg, “Value-Focused Thinking Using Multiple Objective Decision Analysis,” in Methods for Conducting Military Operational Analysis: Best Practices in Use Throughout the Department of Defense, 2004.

  205. Patterns of global terrorism: 1990. Terrorism: An International Journal, 14, 253278. U.S. Department of Justice, FBI. (1990).

  206. Pluchinsky, D. A. The terrorist and the terrorized: Some Psychoanalytic considerations. The Journal of Psychohistory, 76(1), 53,54. (1991).

  207. Perry, Walter L., David Signori, and John E. Boon, Jr, Exploring InformationSuperiority: A Methodology for Measuring the Quality of Information and Its Impacton Shared Awareness, Santa Monica Calif.: RAND Corporation, MR 1467-OSD,2004.

  208. Post, Jerrold, “From Car Bombs to Logic Bombs: The Growing Threat from Information Terrorism,” Terrorism and Political Violence, Vol. 12, No. 2, Summer 2000, pp. 97–122.

  209. Predd, Joel, “On-Line Learning and IEDs: Exploring the Possibilities,” RAND Briefing, November 2006.

  210. Ramakrishna, Kumar, “Constructing” the Jemaah Islamiyah Terrorist: A Preliminary Inquiry, Singapore: Institute of Defence and Strategic Studies, Nanyang Technological University, 2004.

  211. Raman, B., “Terrorism in Thailand: Tech and Tactics Savvy,” South Asia Analysis Group Paper No. 1321, April 5, 2005.: http://www.saag.org/papers14/paper1321.html

  212. Ranstrop, Magnus, “Hizbollah’s Command Leadership: Its Structure, Decision-Making and Relationship with Iranian Clergy and Institutions,” Terrorism and Political Violence, Vol. 6, No. 3, 1994, pp. 303–339.

  213. Rasmussen, Eric, Games and Information, 3rd ed., Oxford, UK: Blackwell, 2001.

  214. Rathmell, Andrew, “Cyber-Terrorism: The Shape of Future Conflict?” Journal of the Royal United Service Institution, October 1997, pp. 40–46.

  215. Raymond, Louis, Pierre-Andre Julien, Jean-Bernard Carriere, and Richard Lachance, “Managing Technological Change in Manufacturing SMEs: A Multiple Case Analysis,” International Journal of Technology Management, Vol. 11, No. 3/4, 1996, pp. 270–285.

  216. Revell, O.B. Middle Eastern Terrorism in Europe: Trends and prospects. Terrorism: An International Journal, 14, 6776. (1991).

  217. “Ridge Wants Tech Firms to Enlist in Terrorism Fight,” USA Today, April 24, 2002. : http://www.usatoday.com/tech/news/2002/04/24/homeland-security.htm

  218. Ronfeldt, David, John Arquilla, Graham Fuller, and Melissa Fuller, he Zapatista “Social Netwar” in Mexico, Santa Monica, Calif.: RAND Corporation, MR-994-A, 1998.: http://www.rand.org/pubs/monograph_reports/MR994/

  219. Roos, Gina, “Sensor Touts Industry-First G-Selectable Capability,” Automotive Design Line, May 11, 2005.: http://www.automotivedesignline.com/showArticle.jhtml?printableArticle=true&articleId=163101454

  220. Roth, John, Douglas Greenburg, and Serena B. Wille, Monograph on Terrorist Financing: Staff Report to the Commission, Washington, D.C.: National Commission on Terrorist Attacks upon the United States, 2004. : http://purl.access.gpo.gov/GPO/LPS53198

  221. Sageman, Marc. Understanding Terror Networks. University of Pennsylvania Press, 2005.

  222. Saper, B. Structure of counterterrorism planning and operations in the United States, Federal Bureau of Investigation, Washington, D.C. Terrorism: An International Journal, (1988).

  223. Sawyer, Ben, Serious Games: Improving Public Policy Through Game-Based Learning and Simulation,: http://www.wilsoncenter.org/index.cfm?topic_id=1414&fuseaction=topics.documents&group_id=10264

  224. Schaffer, Marvin B., “The Missile threat to Civil Aviation,” Terrorism and Political Violence, Vol. 10, No. 3, 1998, pp. 70–82.

  225. Schmid, Alex Peter, and Janny de Graaf, Violence as Communication: Insurgent Terrorism and the Western News Media, London and Beverly Hills: Sage, 1982.

  226. Schneier, Bruce, Secrets and Lies: Digital Security in a Networked World, New York: John Wiley, 2000.

  227. Schwartau, Winn, Information Warfare: Chaos on the Electronic Superhighway, New York: Thunder’s Mouth Press, 1994.78

  228. Schwartz, Peter, The Art of the Long View: Planning for the Future in an Uncertain World, New York: Currency, 1995.

  229. Singapore Ministry of Home Affairs, he Jemaah Islamiyah Arrests and the Threat of Terrorism: White Paper, Singapore: Ministry of Home Affairs, Republic of Singapore, 2003.

  230. SITE Institute, “The Search for International Terrorist Entities,” undated homepage.: http://www.siteinstitute.org/

  231. Squitieri, Tom, “Cyberspace Full of Terror Targets,” USA Today, May 5, 2002.: http://www.usatoday.com/tech/news/2002/05/06/cyber-terror.htm

  232. Steinkuehler, Constance A., “Online Learning Studies,” unpublished, undated research.

  233. Stitt, Jason, and Les Chappell, “Games That Make Leaders: Top Researchers on the Rise of Play in Business and Education,” Wisconsin Technology Network, January 20, 2005. : http://wistechnology.com/article.php?id=1504

  234. Sui, Hongfei, Jianxin Wang, Jianer Chen, and Songqiao Chen, “The Cost of Becoming Anonymous: On the Participant Payload in Crowds,” Information Processing Letters, Vol. 90, No. 2, April 30, 2004, pp. 81–86.

  235. Sullivan, Thomas, and Walter L. Perry, “Identifying Indicators of Chemical,Biological, Radiological and Nuclear (CBRN) Weapons Development Activity in Sub-National Terrorist Groups,” Journal of the Operational Research Society, Vol.55, 2004, pp. 361–374.

  236. Taylor, M. The Terrorist. L.- N.Y. 1988.

  237. Taylor, J., & Francis, B. On learning terrorism. Terrorism: An International Journal, 11, 1327. (1989).

  238. Taylor, Peter, “The New Al-Qaedo: Jihad.com,” BBC Television, July 20, 2005. : http://news.bbc.co.uk/2/hi/programmes/4683403.stm

  239. The Annual on Terrorism. Dordrecht etc. 1986.

  240. Terrorism,Ideology and Revolution. Brighton. 1986.

  241. The Morality of Terrorism. N.Y. 1982.

  242. Tomes, Robert M. Relearning Counterinsurgency Warfare. Parameters, Spring 2004, pp. 16–28.

  243. Volkam, V. D. Terrorism in the United States 1990. Washington, DC: Terrorist Research and Analytical Center, Counterterrorism Section, Criminal Investigative Division. (1985).

  244. Thomas, Timothy L., “Al Qaeda and the Internet: The Danger of ‘Cyberplanning,’” Parameters, Vol. 33, No. 3, Spring 2003, pp. 112–123.

  245. Wilson, Alyson G., Gregory D. Wilson, and David H. Olwell, eds., Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication, New York: Springer, 2006.

  246. United States v. Mokhtar Haouari, S4 00 Cr. 15 (JFK), S.D.N.Y., July 3, 2001.

  247. United States v. Usama bin Laden, S(7)98 Cr. 1023, S.D.N.Y., February 21, 2001.

  248. U.S. Army, America’s Army : http://www.americasarmy.com/

  249. U.S. Army Training and Doctrine Command, “A Military Guide to Terrorism in the Twenty-First Century,” Fort Leavenworth, Kan.: U.S. Army Training and Doctrine Command, Deputy Chief of Staff for Intelligence, 2005.: http://www.au.af.mil/au/awc/awcgate/army/guidterr/

  250. U.S. Department of Commerce, National Oceanic and Atmospheric Administration, “NOAA ARL HYSPLIT Model,” undated Web page.: http://www.arl.noaa.gov/ready/hysplit4.html

  251. U.S. Department of Homeland Security, Information Bulletin, Terrorist Target Selection, Washington, D.C., July 2005. Government publication; not releasable to the general public.

  252. U.S. Department of Justice, Al Qaeda Training Manual, undated.: http://www.au.af.mil/au/awc/awcgate/terrorism/alqaida%5Fmanual/

  253. U.S. Department of State and U.S. Department of Defense. Counterinsurgency in the 21st Century: Creating a National Framework. Conference report. Washington, D.C.: U.S. Government Interagency Counterinsurgency Initiative, 2006.

  254. U.S. Department of State. Country Reports on Terrorism 2006. Washington, D.C.: U.S. Department of State, 2007. As of October 23, 2007

  255. U.S. Environmental Protection Agency, “Computer-Aided Management of Emergency Operations (CAMEO®),” Web page, February 9, 2006.: http://www.epa.gov/ceppo/cameo/cameo.htm

  256. U.S. General Accounting Office, Information Security: Computer Attacks at Department of Defense Pose Increasing Risks: Report to Congressional Requesters, Washington, D.C.: U.S. General Accounting Office, 1996.

  257. ———, Information Security: Serious Weaknesses Place Critical Federal Operations and Assets at Risk: Report to the Committee on Governmental Affairs, U.S. Senate, Washington, D.C.: U.S. General Accounting Office, 1998.: http://purl.access.gpo.gov/GPO/LPS17487

  258. U.S. Secret Service, Carnegie Mellon University, and CERT Coordination Center, 2004 E-Crime Watch Survey: Summary of Findings, Pittsburgh, Pa.: CERT, 2004.: http://www.cert.org/archive/pdf/2004eCrimeWatchSummary.pdf

  259. Wechsler, William F., “Terror’s Money Trail,” he New York Times, September 26, 2001, p. A19.

  260. Weimann, Gabriel, Www.Terror.Net: How Modern Terrorism Uses the Internet, Washington, D.C.: U.S. Institute of Peace, March 2004. : http://purl.access.gpo.gov/GPO/LPS47607

  261. Wells, H. G., he War of the Worlds, London: William Heinemann, 1898.

  262. Whine, Michael, “Cyberspace—A New Medium for Communication, Command, and Control by Extremists,” Studies in Conflict and Terrorism, Vol. 22, No. 3, August 1, 1999, pp. 231–246.

  263. Wilkinson, Paul, ”he Media and Terrorism: A Reassessment,” Terrorism and Political Violence, Vol. 9, No. 2, 1997, pp. 51–64.

  264. Wilson, Peter A., and Roger C. Molander, Exploring Money Laundering Vulnerabilities hrough Emerging Cyberspace Technologies: A Caribbean-Based Exercise, Santa Monica, Calif.: RAND Corporation, MR-1005-OSTP/FINCEN, 1998. : http://www.rand.org/pubs/monograph_reports/MR1005/

  265. Windrem, Robert, “he Frightening Evolution of al-Qaida,” Dateline NBC, June 24, 2005.: http://www.msnbc.msn.com/id/8307333/

  266. Woodcock, Bruce Sterling, “An Analysis of MMOG Subscription Growth,” mmogchart.com, undated Web page.: http://www.mmogchart.com

  267. Yee, Nick, “The Demographics, Motivations, and Derived Experiences of Users of Massively Multi-User Online Graphical Environments,” Presence: Teleoperators and Virtual Environments, Vol. 15, No. 3, 2006a, pp. 309–329.

  268. ———, “The Psychology of Massively Multi-User Online Role-Playing Games: Motivations, Emotional Investment, Relationships and Problemative Usage,” in Ralph Schroeder and Ann-Sofie Axelsson, eds., Avatars at Work and Play: Collaboration and Interaction in Shared Virtual Environments, Dordrecht, he Netherlands: Springer, 2006b, pp. 187–208.

  269. Zanini, Michele, “Middle Eastern Terrorism and Netwar,” Studies in Conflict and Terrorism, Vol. 22, No. 3, August 1, 1999, pp. 247–256.

  270. Zanini, Michele, and Sean J. A. Edwards, “The Networking of Terror in the Information Age,” in John Arquilla and David Ronfeldt, eds., Networks and Netwars: he Future of Terror, Crime, and Militancy, Santa Monica, Calif.: RAND Corporation, MR-1382-OSD, 2001, pp. 29–60.

  271. Zimbardo, Philip G., and Cynthia F. Hartley, “Cults Go to High School: A theoretical and Empirical Analysis of the Initial Stage in the Recruitment Process,” Cultic Studies Journal, Vol. 2, No. 1, 1985, pp. 91–147

РАЗДЕЛ 15. ПСИХОЛОГИЯ МЕЖЭТНИЧЕСКОЙ НАПРЯЖЕННОСТИ И ПРОФИЛАКТИКИ ТЕРРОРИЗМА

Авторы: Г.У. Солдатова, д. психол. н., профессор, Т. А. Нестик, к. психол. н., ассистент.
Цель курса: формирование у слушателей представления об основах психологии межэтнической напряженности, истоках и механизмах роста межэтнической напряженности, различных формах интолерантности и ксенофобии, социально-психологических факторах и механизмах воздействия террористической деятельности на общество, а также умения учитывать все эти знания при профилактике терроризма и ликвидации его последствий.

Данный курс предназначен для государственных служащих, обучающихся в рамках программ повышения квалификации.

Учебная программа рассчитана на 30 часов, из них 18 часов – лекционных, 12 часов – практические занятия.

Учебный процесс, основанный на данном учебно-методическом материале, направлен на формирование следующих компетенций:

- знание механизмов и особенностей роста межэтнической и социальной напряженности в обществе,

- знание методов и способов снижения напряженности в обществе, раннего предупреждения и профилактики конфликтов

- представление о социо-культурных истоках современного терроризма и его последствий для общества;

- представление о социально-психологических аспектах профилактики терроризма;

- знание основных психологических концепций возникновения терроризма и его воздействия на общество;

- знание основных методов психологической помощи прямым и косвенным жертвам терактов;

- владение базовыми навыками посредничества при урегулировании межэтнических конфликтов;

- навыки социально-психологического анализа кризисной ситуации, связанной с совершенным терактом;

- умение оценивать психологические последствия собственных управленческих решений при ликвидации последствий терактов.

СОДЕРЖАНИЕ КУРСА


Радел I. Социально-психологические аспекты снижения межэтнической напряженности и профилактики терроризма.


Поделитесь с Вашими друзьями:
1   ...   5   6   7   8   9   10   11   12   ...   48


База данных защищена авторским правом ©grazit.ru 2017
обратиться к администрации

    Главная страница