Quote Originally Posted by Jedburgh View Post
RAND reprint of a Brian Jackson article that originally appeared in Studies in Conflict and Terrorism back in 2001: Technology Acquisition by Terrorist Groups: Threat Assessment Informed by Lessons from Private Sector Technology Adoption
I'm not sure how much value this report would still have today. Software development is done using completely different models. Hacks seem to be the best and safest way to disrupt our technical infrastructure. Web 2.0 applications, and social networks are used by terrorists for recruitment and training.