Code wars: Steganography, signals intelligence, and terrorism

Knowledge, Technology & Policy 16 (2):45-62 (2003)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 93,069

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Terrorism as technology: A discussion of the theoretical underpinnings.Toby Blyth - 2003 - Knowledge, Technology & Policy 16 (1):45-55.
Risk, terrorism, and the internet.Alison G. Anderson - 2003 - Knowledge, Technology & Policy 16 (2):24-33.
Terrorism research and the diffusion of ideas.Edna O. F. Reid - 1993 - Knowledge, Technology & Policy 6 (1):17-37.
Terrorism and the internet: Resistance in the information age.Lindsey Wade - 2003 - Knowledge, Technology & Policy 16 (1):104-127.
A brief history of terrorism in the United States.Ann Larabee - 2003 - Knowledge, Technology & Policy 16 (1):21-38.
Code and Other Laws of Cyberspace.J. Magney - 2000 - Knowledge, Technology & Policy 13 (1):104-105.

Analytics

Added to PP
2014-01-21

Downloads
46 (#355,781)

6 months
9 (#355,272)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

Add more references