Citation[edit | edit source]

Catherine A. Theohary & John Rollins, Terrorist Use of the Internet: Information Operations in Cyberspace (CRS Report R41674) (Mar. 8, 2011) (full-text).

Overview[edit | edit source]

This report describes the ways that international terrorists and insurgents use the Internet, strategically and tactically, in pursuit of their political agendas. This discussion covers terrorist information operations in cyberspace but does not discuss similar activities in other domains. The government response is also discussed in terms of information operations.

See also[edit | edit source]

Community content is available under CC-BY-SA unless otherwise noted.