I'm not sure how much value this report would still have today. Software development is done using completely different models. Hacks seem to be the best and safest way to disrupt our technical infrastructure. Web 2.0 applications, and social networks are used by terrorists for recruitment and training.
Bookmarks