Skip to main content Accessibility help
×
×
Home

Hacking Networks of Terror

  • Ronald J. Deibert and Janice Gross Stein
Extract

That we in North America face a new kind of threat is beyond question. The attacks against the heartland of the United States, its corporate and military icons, and the killing of over 3,000 civilians, mark a watershed in thinking about security. It is almost two hundred years since civilians in North America have been the object of systematic attack, and even longer since the core of the hegemonic power was struck from the periphery. The important analytical and political questions are What kind of threat do we face? What is the appropriate response to that threat? In other words, what are the appropriate ways to think about dealing with a threat from a nonstate actor with no fixed location or permanently defined territorial assets?

    • Send article to Kindle

      To send this article to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about sending to your Kindle. Find out more about sending to your Kindle.

      Note you can select to send to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be sent to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

      Find out more about the Kindle Personal Document Service.

      Hacking Networks of Terror
      Available formats
      ×
      Send article to Dropbox

      To send this article to your Dropbox account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your <service> account. Find out more about sending content to Dropbox.

      Hacking Networks of Terror
      Available formats
      ×
      Send article to Google Drive

      To send this article to your Google Drive account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your <service> account. Find out more about sending content to Google Drive.

      Hacking Networks of Terror
      Available formats
      ×
Copyright
Recommend this journal

Email your librarian or administrator to recommend adding this journal to your organisation's collection.

Dialogue IO
  • ISSN: -
  • EISSN: -
  • URL: /core/journals/dialogue-io
Please enter your name
Please enter a valid email address
Who would you like to send this to? *
×

Metrics

Full text views

Total number of HTML views: 0
Total number of PDF views: 0 *
Loading metrics...

Abstract views

Total abstract views: 0 *
Loading metrics...

* Views captured on Cambridge Core between <date>. This data will be updated every 24 hours.

Usage data cannot currently be displayed