Information Technology for Counterterrorism

Information Technology for Counterterrorism

This report concludes that the most devastating consequences of a terrorist attack would occur if it were on or used IT as part of a broader attack.


The report presents two recommendations on what can be done in the short term to protect the nation s communications and information systems and several recommendations about what can be done over the longer term.

Table of Contents

  • Background and Introduction
  • Types of Threats Associated with Information Technology Infrastructure
  • Investing in Information Technology Research
  • What Can Be Done Now?
  • Rationalizing the Future Research Agenda

Book Details

Author(s): John L. Hennessy, David A. Patterson, and Herbert S. Lin
Format(s): PDF
Number of pages: 144
Link: Download.

Leave a Reply