1Barry Coins , "The Future of Cyberterrorism ," @ Crime andJustice International, March 1997, pp. 15-18.
2Mark M. Pollitt, "Cyberterrorism: Fact and Fancy", @Proceedings of the 20th National Information Systems Security Conference, October 1997, pp. 258-289.
3丹宁.《信息战与信息安全》[M].电子工业出版社,2003年版,第12页.
4Matthew J. Littleton, "Information-Age Terrorism," Master's thesis, Naval Postgratuate School, December 1995, pp. 75-76.
6http://news. xinhuanet. com/it/2003-12/18/content-1237599. hun.
7Bob Brewin, "Rogue Tmn,.m-fitter Knocks out GPS Signals,"Federrad Computer Week, April 13, 1998.
8Bob Schmitt, "An Intemet Answer to Repression," Washintion Post, March 31, 1997, p.21.
9John Arquilla, David Ronfeldt and Michele Zanini, "A Networks, Netwar, and Information-Age Terrorism, in countering the New Tew Terrorism," RAND, 1999, p. 65.