Publication
8 Mar 2011
This report describes the ways that international terrorists and insurgents use the Internet, strategically and tactically, in pursuit of their political agendas. This discussion covers terrorist information operations in cyberspace but does not discuss similar activities in other domains. The government response is also discussed in terms of information operations.
Download |
English (PDF, 19 pages, 223 KB) |
---|---|
Author | Catherine A Theohary, John Rollins |
Series | US Congressional Research Service Reports |
Publisher | Congressional Research Service (CRS) |