References

Cyber Threat and Hacktivist Research

“About Us.” REDHACK Voice of the Oppressed!,. N.p., n.d. Web. 22 Apr. 2014. .

Abrahms, Max. “What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy.” International Security 32.4 (2008): 78-105. Print.

Abrahms, Max. “Why Terrorism Does Not Work.” International Security 31.2 (2006): 42-78. JSTOR. Web. 19 Feb. 2014. .

“Al-Qa’ida’s Finances:.” – Evidence of Organizational Decline? N.p., n.d. Web. 19 Apr. 2014. .

“Anonymous (group).” Wikipedia. Wikimedia Foundation, 24 Feb. 2014. Web. 05 Mar. 2014. <http://en.wikipedia.org/wiki/Anonymous_%28group%29&gt;.

“Anonymous Hackers News.” Anonymous Hackers News. N.p., n.d. Web. 23 Mar. 2014. <http://www.anonymoushackers.org/news&gt;.
Arquila, John, and David Ronfeldt. “Site-wide Navigation.” The Advent Of Netwar. Rand Corporation, n.d. Web. 16 Apr. 2014. .
Bajoria, Jayshree, and Greg Bruno. “Al-Qaeda (a.k.a. Al-Qaida, Al-Qa’ida).” Council on Foreign Relations. Council on Foreign Relations, 06 June 2012. Web. 17 Apr. 2014. .
Bhatia, Michael V. “Fighting Words: Naming Terrorists, Bandits, Rebels and Other Violent Actors.” Third World Quarterly 26.1 (2005): 5-22. Print.
Carter, Ashton, John Deutch, and Philip Zelikow. “Catastrophic Terrorism: Tackling the New Danger.” Foreign Affairs 77.6 (1998): 80-94. JSTOR. Web. 19 Feb. 2014. .
“Cohler | Hezbollah: Analysis of Violence.” Cohler | Hezbollah: Analysis of Violence. American Diplomacy, n.d. Web. 19 Apr. 2014. .Used to define Hezbollah’s organizational structure.
Coleman, Gabriella. “Our Weirdness Is Free: The Logic of Anonymous-online Army, Agent of Chaos, and Seeker of Justice.” Triple Canopy. N.p., n.d. Web. 01 Mar. 2014.
“Denial-of-Service: The Estonian Cyberwar and Its Implications for U.S. National Security.” International Affairs Review. The Elliott School of Internatilonal Affairs at George Washington University, n.d. Web. 19 Apr. 2014. .
Dorgan, Byron. “Cyber Terror Is the New Language of War.” The Huffington Post. N.p., 28 Mar. 2013. Web. 28 Mar. 2014. <http%3a%2f%2fwww.huffingtonpost.com%2ftag%2fcyberterrorism>.
Doyle, Sean. “The IRA & Sinn Fein, Uncovering the Irish Republican Army.” PBS. PBS, 1 Aug. 1996. Web. 20 Apr. 2014. .
DuPuis, Roger. “Accused of Act of ‘cyber Terrorism,’ Dallas Student May Return to School.” Timesleader.com [Wilkes-Barre, Pa.] 31 Jan. 2013: n. pag. Print.
Entman, Robert M. “How the Media Affect What People Think: An Information Processing Approach.” The Journal of Politics 51.02 (1989): 347. Print.
Eskew, Carter. “Is the U.S. Prepared for Cyberterrorism?” The Washington Post. PostPartisan, 29 Mar. 2013. Web. 28 Mar. 2014. <http%3a%2f%2fwww.washingtonpost.com%2fblogs%2fpost-partisan%2fwp%2f2013%2f03%2f29%2fis-the-u-s-prepared-for-cyberterrorism%2f>.
FBI. FBI, 20 Aug. 2013. Web. 28 Mar. 2014. <http://www.fbi.gov/about-us/investigate/terrorism/terrorism-definition&gt;.
Fozoul, Hilfol. “Hilfolfozoul حلف الفضول: Cyber Armageddon: In Depth Analysis of What Syrian Electronic Army ‘can’ Do If US Attacks Syria.” Hilfolfozoul حلف الفضول: Cyber Armageddon: In Depth Analysis of What Syrian Electronic Army ‘can’ Do If US Attacks Syria. N.p., 1 Sept. 2013. Web. 16 Apr. 2014. .
Fuscaldo, Donna. “Protecting Small Businesses from Cyber Terrorism.” Fox Small Business Center. N.p., 08 Oct. 2010. Web. 28 Mar. 2014. .
Gabriel, Weimann. “Cyberterrorism: The Sum of All Fears?” Studies in Conflict and Terrorism. N.p.: Taylor and Francis, n.d. 129-49. Web.
Ganor, Boaz. “Defining Terrorism: Is One Man’s Terrorist Another Man’s Freedom Fighter?” (n.d.): n. pag. International Institute for Counter-Terrorism. Web.
Goldstein, Sasha. “YouTube Must Take down ‘Innocence of Muslims,’ Film That Sparked Outrage: Judge .” NY Daily News. N.p., 26 Feb. 2014. Web. 18 Apr. 2014. <http://www.nydailynews.com/news/world/youtube-innocence-muslims-judge-article-1.1702835&gt;.
Greenberg, Andy. “How The Syrian Electronic Army Hacked Us: A Detailed Timeline.” Forbes. Forbes Magazine, 20 Feb. 2014. Web. 22 Mar. 2014. <http://www.forbes.com/sites/andygreenberg/2014/02/20/how-the-syrian-electronic-army-hacked-us-a-detailed-timeline/&gt;.
Gregory, Kathryn. “Provisional Irish Republican Army (IRA) (aka, PIRA, “the Provos,” Óglaigh Na HÉireann) (UK Separatists).” Council on Foreign Relations. Council on Foreign Relations, 16 Mar. 2010. Web. 17 Apr. 2014. .
“Groups Hack MİT, TFF, Police Department’s Website – World Bulletin.” World Bulletin. N.p., n.d. Web. 22 Apr. 2014. .
“Hamas Evacuates Its Syrian External Headquarters: Overview and Initial Analysis.” Terrorism-info. The Meir Amit Intelligence and Terrorism Information Center, n.d. Web. 19 Apr. 2014. .Used for organizational structure of Hamas.
Harress, Christopher. “US Expecting Energy-Sector Cyberterrorism Wave?” International Business Times. N.p., 18 Feb. 2014. Web. 17 Apr. 2014. .
“Hilfolfozoul حلف الفضول: May 2013.” Hilfolfozoul حلف الفضول: May 2013. The Global Movement of Hilf-Ol-Fozoul, n.d. Web. 20 Apr. 2014. .
Horgan, John, and Max Taylor. “Join Academia.edu & Share Your Research with the World.” The Provisional Irish Republican Army: Command and Functional Structure. Academia.edu, n.d. Web. 25 Mar. 2014. <https://www.academia.edu/3882182/The_provisional_Irish_republican_army_Command_and_functional_structure&gt;.
Horgan, John, and Max. Taylor. “The Provisional Irish Republican Army: Command and Functional Structure.” Terrorism and Political Violence 9.3 (1997): 1-32. Print.
“Hype and Fear.” The Economist. The Economist Newspaper, 08 Dec. 2012. Web. 10 Mar. 2014. <http://www.economist.com/node/21567886/print&gt;.
“Hype and Fear.” The Economist. The Economist Newspaper, 08 Dec. 2012. Web. 19 Apr. 2014. <http://www.economist.com/node/21567886/&gt;.
“Inside The Terror Network, Background: Al Qaeda.” PBS. PBS, n.d. Web. 25 Mar. 2014.
“Institute for the Study of Violent Groups.” The. Institute for the Study of Violent Groups, n.d. Web. 19 Apr. 2014. .Used to obtain information about organizational structure.
International New York Times. “120 Science Papers Were Just Gibberish.” The Boston Globe 3 Mar. 2014, Business sec.: B7. Print.
Kolb, Joseph J. “Anonymous Linked to Hack of Albuquerque Police amid Shooting Protests.” Fox News. FOX News Network, 02 Apr. 2014. Web. 19 Apr. 2014. <http://www.foxnews.com/us/2014/04/02/anonymous-hacks-albuquerque-police-amid-shooting-protests/&gt;.
Kovacs, Eduard. “Citizens Bank Hit by DDOS Attack, Customers Warned of Intermittent Interruption.” Softpedia.com. N.p., 9 Aug. 2013. Web. 04 Mar. 2014.
Levitt, Matthew. “Hezbollah Finances:.” – Funding the Party of God. N.p., n.d. Web. 17 Apr. 2014. <http://www.washingtoninstitute.org/policy-analysis/view/hezbollah-finances-funding-the-party-of-god&gt;.
Masters, Jonathan. “Al-Shabab.” Council on Foreign Relations. Council on Foreign Relations, 23 Sept. 2013. Web. 23 Mar. 2014.
Masters, Jonathan. “Hamas.” Council on Foreign Relations. Council on Foreign Relations, 27 Nov. 2012. Web. 25 Mar. 2014.
Masters, Jonathan. “Hezbollah (a.k.a. Hizbollah, Hizbu’llah).” Council on Foreign Relations. Council on Foreign Relations, 03 Jan. 2014. Web. 18 Apr. 2014. .
Masters, Jonathan. “Hezbollah (a.k.a. Hizbollah, Hizbu’llah).” Council on Foreign Relations. Council on Foreign Relations, 03 Jan. 2014. Web. 25 Mar. 2014.
“National Security Agency / Central Security Service – Top Banner.” The NSA Overview. National Security Agency, 28 Apr. 2011. Web. 05 Mar. 2014….we’re finding new ways to detect, report and respond to cyber threats, intrusions, and attacks.”
Norton, Quinn. “Anonymous 101: Introduction to the Lulz.” Wired.com. Conde Nast Digital, 06 Nov. 0011. Web. 01 Mar. 2014.
Norton, Quinn. “Anonymous 101 Part Deux: Morals Triumph Over Lulz.” Wired.com. Conde Nast Digital, 28 Dec. 0011. Web. 01 Mar. 2014.
Obama, Barrak, President. “Remarks by the President on Securing Our Nation’s Cyber Infrastructure.” The White House. The White House, 29 May 2009. Web. 21 Apr. 2014. .
“Operation Ababil.” Wikipedia. Wikimedia Foundation, 16 Feb. 2014. Web. 05 Mar. 2014. .
Panetta, Leon E. “United States Department of Defense.” Defense.gov Transcript: Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City. N.p., 11 Oct. 2012. Web. 19 Apr. 2014. .
Passeri, Paolo. “Hackmageddon.com.” Hackmageddoncom. N.p., n.d. Web. 14 Mar. 2014. .
Pillar, Paul R. “Terrorism Goes Global: Extremist Groups Extend Their Reach Worldwide.” The Brookings Review 19.4 (2001): 34-37. JSTOR. Web. 22 Feb. 2014. .
“RedHack.” Wikipedia. Wikimedia Foundation, 23 Apr. 2014. Web. 23 Apr. 2014. .
“RedHacks.” Red Hacks. RedHack, n.d. Web. 20 Apr. 2014. <http%3a%2f%2fwww.redhacks.com%2f>.Gives hacking information
Richards, Jason. “Denial-of-Service: The Estonian Cyberwar and Its Implications for U.S. National Security.” International Affairs Review. The George Washington University Elliott School of International Affairs., n.d. Web. 21 Apr. 2014. .
Richardson, John H. “I Am Anonymous.” Esquire. N.p., 14 Oct. 2013. Web. 22 Mar. 2014. <http%3A%2F%2Fwww.esquire.com%2Ffeatures%2Fi-am-anonymous-1113>.
Rosenzweig, Paul. Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World. Santa Barbara, CA: Praeger, 2013. Print.
Schneidewind, Norman F. “Chapter XXVII.” Cyber Warfare and Cyber Terrorism. Hershey: IGI Global, 2007. 228-40. Print.
“Shamoon.” Wikipedia. Wikimedia Foundation, 16 Feb. 2014. Web. 05 Mar. 2014. .Cutting Sword of Justice group used Shamoon virus to launch attacks against Saudi Aramco and others.
“Syrian Electronic Army.” Wikipedia. Wikimedia Foundation, 03 Mar. 2014. Web. 05 Mar. 2014. <http://en.wikipedia.org/wiki/Syrian_Electronic_Army&gt;.
“Terrorism FAQs.” Central Intelligence Agency. Central Intelligence Agency, 19 Apr. 2013. Web. 29 Mar. 2014. <https://www.cia.gov/news-information/cia-the-war-on-terrorism/terrorism-faqs.html&gt;.
“Twitter.com/alqaeda.” N.p., n.d. Web. 25 Mar. 2014.
USA. Congressional Research Service. Congress. Hamas Background and Issues for Congress. By Jim Zanotti. Washington, DC: Congressional Research Service, Library of Congress, 2010. Web. 22 Mar. 2014. .
Verton, Dan. Black Ice: The Invisible Threat of Cyber-terrorism. New York: McGraw-Hill/Osborne, 2003. Print.
Wald, Matthew L., New York Times. “Power Grid Vulnerable to Cyberattack Report Says.” The Boston Globe 3 Mar. 2014, Business sec.: B1-B6. Print.
Weimann, Gabriel. “Cyberterrorism: The Sum of All Fears?” Studies in Conflict & Terroris 28 (2005): 129-49. Web. 26 Feb. 2014.
“Welcome to #irchelp.” Internet Relay Chat Help. N.p., n.d. Web. 02 Apr. 2014. .
“Welcome, Weary Internet Traveller, to AnonStillAlive!” AnonStillAlive. N.p., n.d. Web. 23 Mar. 2014. .
Wilcox, Dennis L., and Glen T. Cameron. “Chapter 9, Public Relations Opinion and Persuasion.” Public Relations: Strategies and Tactics. Harlow: Pearson Education Limited, 2014. 217-18. Print.
Yang, John. “Government Battles Cyber Crime.” ABC News. ABC News Network, n.d. Web. 20 Apr. 2014. <http://abcnews.go.com/WNT/story?id=130807&gt;.
Zimmerman, Katherine. The Al Qaeda Network, A New Framework for Defining the Enemy. N.p.: AEI, n.d. Criticalthreats.org. Sept. 2013. Web.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s