Open-Source Warfare Transcripts

From three of the author's interviews

1 min read

For exclusive insights into how terrorist and insurgent groups are leveraging information technology to organize, recruit, and learn see Robert Charette's interviews with:

Lawrence Husick on how insurgents spread their message via the Web

Tom Kellermann on how terrorists are using the Internet for money laundering, fundraising, and identify theft

Michael Kenney on how extremists are really using the Internet

See the original article,Open-Source Warfare by Robert N. Charette

This article is for IEEE members only. Join IEEE to access our full archive.

Join the world’s largest professional organization devoted to engineering and applied sciences and get access to all of Spectrum’s articles, podcasts, and special reports. Learn more →

If you're already an IEEE member, please sign in to continue reading.

Membership includes:

  • Get unlimited access to IEEE Spectrum content
  • Follow your favorite topics to create a personalized feed of IEEE Spectrum content
  • Save Spectrum articles to read later
  • Network with other technology professionals
  • Establish a professional profile
  • Create a group to share and collaborate on projects
  • Discover IEEE events and activities
  • Join and participate in discussions