This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Watchdog vs lapdog journalism Benefits & Weaknesses of technology relative to terrorism Soft vs hard targets Ways to Reduce the soft target risk Soft targets (sectors of US economy) How hate websites thwart attempts to shut them down Terrorist uses of the internet Phishing Denial of Service attack (DOS) Cyber-Viruses Malicious code & applications Cryptanalysis Parasite code Code Encryption Kerckhoffs Principle Algorithms & keys Rise in Second generation or homegrown terrorists Symmetric vs asymmetric cryptography The philosophy of the bomb Current popular Tactics of terrorism (S)VBIED How bombs kill/damage/destroy Biological weapons Thermobaric bombs (FAEs) Dirty bombs Four types of biological Agents Nuclear fission vs fusion Catastrophic terrorism Fissile material Little boy & Fat Man- LB States that possess nuclear weapons Uranium 235 & plutonium 239 REVIEW EXAMS 1 &2 Huntington Berman Qutb Laqueur Hoffman...
View Full Document
This note was uploaded on 07/02/2011 for the course POLI 391T taught by Professor Beaudoin during the Spring '11 term at South Carolina.
- Spring '11
- United Nations