, to see if you have full access to this publication.
Edited Book No access

Analyse sicherheitspolitischer Bedrohungen und Risiken unter Aspekten der Zivilen Verteidigung und des Zivilschutzes

Editors:
Publisher:
 2015


Bibliographic data

Copyright year
2015
ISBN-Print
978-3-8487-2574-8
ISBN-Online
978-3-8452-6676-3
Publisher
Nomos, Baden-Baden
Series
Demokratie, Sicherheit, Frieden
Volume
216
Language
German
Pages
218
Product type
Edited Book

Table of contents

ChapterPages
  1. Titelei/Inhaltsverzeichnis No access Pages 1 - 10
  2. Vorwort No access Pages 11 - 12
  3. Einleitung No access Pages 13 - 22 Hans-Georg Ehrhart, Götz Neuneck, Michael Brzoska
  4. Kurz- und mittelfristige technologische Bedrohungen und Risiken No access Pages 23 - 79 Christian Alwardt, Götz Neuneck
  5. Kurz- und mittelfristige militärische Bedrohungen und Risiken No access Pages 80 - 112 Hans-Georg Ehrhart, Sybille Reinke de Buitrago, Johann Schmid
  6. Kurz- und mittelfristige terroristische Bedrohungen und Risiken No access Pages 113 - 147 Hendrik Hegemann, Martin Kahl, Sybille Reinke de Buitrago
  7. Langfristige militärische Risiken No access Pages 148 - 174 Heinz-Dieter Jopp, Roland Kästner
  8. Gemeinsame Schlussfolgerungen No access Pages 175 - 185
  9. Anhang No access Pages 186 - 186
  10. Abbildungs- und Tabellenverzeichnis No access Pages 186 - 187
  11. Tabellen und Abbildungen No access Pages 188 - 199
  12. Abkürzungsverzeichnis No access Pages 200 - 201
  13. Literaturverzeichnis No access Pages 202 - 218

Bibliography (275 entries)

  1. Ackerman, Gary A. und Kevin S. Moran. 2004. Bioterrorism and Threat Assessment. Monterey Institute of International Studies, Monterey, CA. Open Google Scholar
  2. Ackerman, Gary A., Bale, Jeffrey M. und Kevin S. Moran. 2006. Assessing the Threat to Critical Infrastructure, in: Forest, James J.F. (Hrsg.). Homeland Security. Protecting America’s Targets. Praeger Security, Santa Barbara, CA, S. 33-59. Open Google Scholar
  3. Ackerman, Gary A. et al. 2007. Assessing Terrorist Motivations for Attacking Critical Infrastructure. Monterey Institute for International Studies, Monterey, CA. Open Google Scholar
  4. Ackerman, Gary A. 2009. The Future of Jihadists and WMD. Trends and Emerging Threats, in: Ackerman, G. und J. Tamsett (Hrsg.). Jihadists and Weapons of Mass Destruction. CRC Press, Boca Raton, FL, S. 359-400. Open Google Scholar doi.org/10.1201/9781420069679.ch14
  5. Ackerman, Gary A. und Lauren E. Pinson. 2014. An Army of One. Assessing CBRN Pursuit and Use by Lone Wolves and Autonomous Cells, in: Terrorism and Political Violence 26, S. 226-245. Open Google Scholar doi.org/10.1080/09546553.2014.849945
  6. Alberts, David S., Garstka, John J. und Frederick P. Stein. 1999. Network Centric Warfare. DoD Command and Control Research Program, Washington, DC. Open Google Scholar
  7. Alexander, John B. 2004. The Evolution of Conflict Through 2020: Demands on Personnel, Machines, and Missions. A Joint Special Operations University Paper prepared for the Conference on the “Changing Nature of Warfare,” in support of the “Global Trends 2020” Project of the U.S. National Intelligence Council, http://www.offnews.info/ downloads/2020evol_conflict.pdf, Zugriff: 19.06.2014. Open Google Scholar
  8. Alwardt, Christian, Brzoska, Michael und Hans-Georg Ehrhart et al. 2013. Braucht Deutschland Kampfdrohnen? Hamburger Informationen zur Friedensforschung und Sicherheitspolitik, Nr. 50, Institut für Friedensforschung und Sicherheitspolitik an der Universität Hamburg (IFSH), Hamburg. Open Google Scholar
  9. Arbeitsgemeinschaft Kriegsursachenforschung (AKUF). Kriegstypologie. http://www. sozial¬wiss.uni-hamburg.de/ publish/Ipw/Akuf/kriege_aktuell.htm#Typ, Zugriff: 18.06.2014. Open Google Scholar
  10. Arms Control Association (ACA). 2014. Chemical and Biological Weapons Status at a Glance. Arms Control Association Fact Sheet, https://www.armscontrol.org/ factsheets/cbwprolif, Zugriff: 17.06.2014. Open Google Scholar
  11. Asal, Victor H., Ackerman, Gary A. und Karl R. Rethemeyer. 2012. Connections Can Be Toxic. Terrorist Organizational Factors and the Pursuit of CBRN Weapons, in: Studies in Conflict & Terrorism 35, S. 229-254. Open Google Scholar doi.org/10.1080/1057610X.2012.648156
  12. Atlantic Organization for Security (AOFS). 2012. Conceptual Views on the Activities of the Armed Forces of the Russian federation in Information Space (Auszüge), in: Atlantic Organization for Security. Russia’s Cyber Strategy Published. 05.04.2012, http://www. aofs.org/wp-content/uploads/2012/04/120414-Russias-Cyber-Strategy-translation.pdf, Zugriff: 18.06.2014. Open Google Scholar
  13. Auswärtiges Amt. Cyber-Außenpolitik. http://www.auswaertiges-amt.de/DE/Aussen-politik/ Globale Fragen/Cyber-Aussenpolitik/KS_Cyber-Aussenpolitik_node. html, Zugriff: 18.06.2014. Open Google Scholar
  14. Bale, Jeffrey M. und Gary A. Ackerman. 2005. Recommendations on the Development of Methodologies and Attributes for Assessing Terrorist Threats of WMD Terrorism. Monterey Institute of International Studies, Monterey, CA. Open Google Scholar
  15. Barenblatt, Daniel. 2004. A Plague upon Humanity. HarperCollins, New York. Open Google Scholar
  16. Barnard, Anne. 2014. Three Years of Strife and Cruelty Puts Syria in Free Fall, in: The New York Times, 17.03.2014, http://www.nytimes.com/2014/03/18/world/ middleeast/three-years-of-strife-and-cruelty-put-syria-in-tail¬spin.html, Zugriff: 18.06.2014. Open Google Scholar
  17. Barnard, Anne und Ben Hubbard. 2014. Gas attack on civilians is reported in Syria, in: International New York Times, 14.04.2014. Open Google Scholar
  18. Bayerischer Rundfunk. 2013. Infografik: Reaktoren stillgelegt oder in Betrieb. http://www.br. de/nachrichten/europa-akws-100.html, Zugriff: 18.06.2014. Open Google Scholar
  19. Beck, Ulrich. 2007. Weltrisikogesellschaft. Suhrkamp, Frankfurt a.M. Open Google Scholar
  20. Becker, Oda. 2010a. Terrorangriff aus der Luft auf (ältere) deutsche Atomkraftwerke. Studie erstellt von Scientific Consulting for Energy and the Environment im Auftrag von Greenpeace Deutschland e.V., Greenpeace e.V., Hamburg. Open Google Scholar
  21. Becker, Oda. 2010b. Terrorangriff mit der panzerbrechenden Waffe AT-14 Kornet-E auf deutsche Atomkraftwerke. Bericht, gekürzte Fassung, erstellt im Auftrag von Greenpeace Deutschland e.V., Greenpeace e.V., Hamburg. Open Google Scholar
  22. Berwinkel, Holger. 2005. Vegetius und „vegezianische“ Kriegführung im Mittelalter. Umrisse eines Forschungsproblems, in: Arbeitskreis Militärgeschichte e.V. (Hrsg.). Newsletter 10 (2), S. 27-30. Open Google Scholar
  23. Berzins, Janis. 2014. Russia’s New Generation Warfare in Ukraine: Implications for Latvian Defence Policy. http://www.naa.mil.lv/~/media/NAA/AZPC/Publi¬kacijas/ PP%2002-2014.ashx, Zugriff: 20.5.2014. Open Google Scholar
  24. Boot, Max. 2003. The New American Way of War, in: Foreign Affairs 82 (4), S. 41-58. Open Google Scholar doi.org/10.2307/20033648
  25. Brenner, Joel. 2011. America, the Vulnerable. Inside the New Threat Matrix of Digital Crime, Espionage and Warfare, Penguin, London. Open Google Scholar
  26. Brzezinski, Zbigniew. 2001. Die einzige Weltmacht. Amerikas Strategie der Vorherrschaft, Fischer Taschenbuch Verlag, Frankfurt a.M. Open Google Scholar
  27. Brzoska, Michael, Link, Michael und Götz Neuneck. 2012. Direkte Eingriffe ins Klima. Eine friedenspolitische Herausforderung? Tagung am Klima Campus Hamburg, 10./11. November 2011, in: Sicherheit und Frieden 30 (2), S. 185-193. Open Google Scholar doi.org/10.5771/0175-274x-2012-4-185
  28. Brzoska, Michael und Götz Neuneck. 2013. Vagabundierende Atomwaffen? Das sowjetische Arsenal nach 1991, in: Bernd Greiner, Tim B. Müller und Klaas Voß (Hrsg.): Erbe des Kalten Krieges, Hamburger Edition HIS Verlag, Hamburg, S. 274-292. Open Google Scholar
  29. Briedigkeit, Jörg/PIZ Einsatzführungskommando. 2011. Die Operation Pegasus. http://www.bundeswehr.de/portal/ a/bwde/!ut/p/c4/NUzBCoMwFPujPguDjt0Ud9jYycvmLqXapzzQVt6eE2Qfv3awBBJCQuAJicG9aXRCMbgJHtD2dOo21W0eFVJ4OZQdFc32F2S3w4psPQY7MGFyuOeXtO5jQMkqGISSjuwksloiy5SblTk1ijy0ha4rbYo_9Od4vl3r0phDfakaWOa5_AIEa6xO/, Zugriff: 18.06.2014. Open Google Scholar
  30. Bundesakademie für Sicherheitspolitik. 2004. Sicherheitspolitik in neuen Dimensionen. Kompendium zum erweiterten Sicherheitsbegriff, Mittler & Sohn, Hamburg/Berlin/Bonn. Open Google Scholar
  31. Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK) (Hrsg.). 2005. Problemstudie: Risiken in Deutschland, Teil 2. Gefahrenpotentiale und Gefahrenprävention für Staat, Wirtschaft und Gesellschaft aus Sicht des Bevölkerungsschutzes, BBK, Bonn. Open Google Scholar
  32. Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK) (Hrsg.). 2006. Dritter Gefahrenbericht der Schutzkommission beim Bundesminister des Innern. Bericht über mögliche Gefahren für die Bevölkerung bei Großkatastrophen und im Verteidigungsfall, Schriftenreihe der Schutzkommission beim Bundesminister des Innern, Bd. 59, BBK, Bonn. Open Google Scholar
  33. Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK) (Hrsg.). 2010. Methode für die Risikoanalyse im Bevölkerungsschutz. BBK, Bonn. Open Google Scholar
  34. Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK). 2010. Neue Strategie zum Schutz der Bevölkerung. 2. Auflage, Bonn: Bundesamt für Bevölkerungsschutz und Katastrophenhilfe Open Google Scholar
  35. Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK). Schutzgut. Glossar des BBK, http://www.bbk. bund.de/SharedDocs/Glossareintraege/BBK/ DE/S/ Schutzgut.html, Zugriff: 18.06.2014. Open Google Scholar
  36. Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK). Risiko. Glossar des BBK, http://www.bbk. bund.de/SharedDocs/Glossareintraege/BBK/DE/R/ Risiko.html, Zugriff: 18.06.2014. Open Google Scholar
  37. Bundesamt für Verfassungsschutz. 2013. Verfassungsschutzbericht 2012. 11. Juni 2013, Berlin. Open Google Scholar
  38. Bundesamt für Verfassungsschutz. 2014. Verfassungsschutzbericht 2013. 18. Mai 2014. Berlin. Open Google Scholar
  39. Bundeskanzleramt Österreich. 2013. Österreichische Sicherheitsstrategie: Sicherheit in einer neuen Dekade – Sicherheit gestalten. http://www.bmi.gv.at/cms/BMI_ Service/STS/130717_ Sicherheitsstrategie_Kern_A4_WEB_barriere¬frei.pdf, Zugriff: 15.10.2013. Open Google Scholar
  40. Bundesministerium der Verteidigung. 2011. Verteidigungspolitische Richtlinien, 27.05.2011. Open Google Scholar
  41. Bundesministerium der Verteidigung. 2013. Konzeption der Bundeswehr, 01.07.2013. Open Google Scholar
  42. Bundesministerium des Inneren. 2008. Leitfaden für Unternehmen und Behörden, Schutz Kritischer Infrastrukturen – Risiko- und Krisenmanagement. BMI, Berlin. Open Google Scholar
  43. Bundesministerium des Inneren. 2009. Nationale Strategie zum Schutz Kritischer Infrastrukturen (KRITIS-Strategie). http://www.bmi.bund.de/cae/servlet/contentblob/598730/publicationFile/34416/kritis.pdf, Zugriff: 18.06. 2014. Open Google Scholar
  44. Bundeszentrale für politische Bildung (bpb). Chemische Waffen. Informationsportal Krieg und Frieden, http://sicherheitspolitik.bpb.de/index.php?page=Chemische-Waffen, Zugriff: 10.04.2014. Open Google Scholar
  45. Bunker, R. J. 2008. Terrorists and laser weapons use: An emerging threat, in: Studies in Conflict & Terrorism 31, S. 434-455. Open Google Scholar doi.org/10.1080/10576100801980294
  46. Byman, Daniel. 2007. Deadly Connections. States that Sponsor Terrorism, Cambridge University Press, Cambridge, MA. Open Google Scholar
  47. Carlisle, David. 2007. Dhiren Barot. Was He an Al Qaeda Mastermind or Merely a Hapless Plotter?, in: Studies in Conflict and Terrorism 30, S. 1057-1071. Open Google Scholar doi.org/10.1080/10576100701670979
  48. Castagnino, Analucia. 2012. Economic effects of the atomic bombs at Hiroshima and Nagasaki. http://miblogdeblogs-blog.blogspot.de/2012/08/economic-effects-of-atomic-bombs-at.html, Zugriff: 04.04.2014. Open Google Scholar
  49. Chalk, Peter. 2004. Hitting America’s Soft Underbelly. The Potential Threat of Deliberate Biological Attacks Against the U.S. Agricultural and Food Industry, RAND Corporation, Santa Monica, CA/Arlington, VA/Pittsburgh, PA. Open Google Scholar
  50. Chynoweth, Brandon. (o. J.) Environmental Effects of Nuclear Weapons, the Basics. http://isnap. nd.edu/Lectures/nuclear_warfare/Environmental_Effects_of_Nuclear_War.pdf, Zugriff: 18.06. 2014. Open Google Scholar
  51. Clapper, James R. 2014. Statement for the Record. Worldwide Threat Assessment of the US Intelligence Community, http://www.intelligence.senate.gov/130312/ clapper.pdf, Zugriff: 17.06.2014. Open Google Scholar
  52. Clark, Colin. 2010. Excalibur Use Rises In Afghanistan, in: DoDBuzz, 27.10.2010, http://www. dodbuzz.com/2010/10/ 27/excalibur-use-rises-in-afghanistan/; Zu¬griff: 02.02.2014. Open Google Scholar
  53. Clausewitz, Carl von. 1832. Vom Kriege: Hinterlassenes Werk des Generals Carl von Clausewitz. 19. Aufl., Dümmler, Bonn, 1980. Open Google Scholar
  54. Collins, Stephen D. 2014. State-Sponsored Terrorism. In Decline, Yet Still a Potent Threat, in: Politics & Policy 42, S. 131-159. Open Google Scholar doi.org/10.1111/polp.12061
  55. Conway, Maura. 2012. What is Cyberterrorism and How Real is the Threat? A Review of the Academic Literature, 1996-2009, in: Reich, Pauline C., Gelbstein Eduardo (Hrsg.). Law, Policy and Technology. Cyberterrorism, Information Warfare, and Internet Mobilization. IGI Global, Hershey, PA, S. 279-307. Open Google Scholar doi.org/10.4018/978-1-61520-831-9.ch011
  56. Cook, Aletha H. und Marie Olson Lounsberry. 2011. Assessing the Risk Posed by Terrorist Groups. Identifying Motivating Factors and Threats, in: Terrorism and Political Violence 23, S. 711-729. Open Google Scholar doi.org/10.1080/09546553.2011.608816
  57. Creveld, Martin van. 1998. Die Zukunft des Krieges. Gerling Akademie Verlag, München. Open Google Scholar
  58. Cronin, Audrey K. 2002. Behind the Curve. Globalization and International Terrorism, in: International Security 27, S. 30-58. Open Google Scholar
  59. Cronin, Audrey K. 2003. Terrorist Motivations for Chemical and Biological Weapons Use. Placing the Threat in Context, CRS Report for Congress, Congressional Research Service, Washington, DC. Open Google Scholar
  60. Daalgard-Nielsen, Anja. 2010. Violent Radicalization in Europe. What We Know and What We Don’t Know, in: Studies in Conflict and Terrorism 33, S. 797-814. Open Google Scholar
  61. Daase, Christopher. 2001. Terrorismus – Begriffe, Theorien und Gegenstrategien. Ergebnisse und Probleme sozialwissenschaftlicher Forschung, in: Friedens-Warte 76, S. 55-79. Open Google Scholar
  62. Daase, Christopher. 2002. Terrorismus. Der Wandel von einer reaktiven zu einer proaktiven Sicherheitspolitik der USA nach dem 11. September 2001, in: Daase, Christopher et al. (Hrsg.). Internationale Risikopolitik. Der Umgang mit neuen Gefahren in den internationalen Beziehungen, Nomos, Baden-Baden, S. 113-142. Open Google Scholar
  63. Daase, Christopher. 2005. Terrorgruppen und Massenvernichtungswaffen, in: Aus Politik und Zeitgeschichte, Nr. 48, http://www.bpb.de/apuz/28663/ter¬ror¬gruppen-und-massenvernichtungs¬waffen, Zugriff: 17.06.2014. Open Google Scholar
  64. Daase, Christopher und Alexander Spencer. 2010. Terrorismus, in: Masala, Carlo et al. (Hrsg.). Handbuch der internationalen Politik. VS Verlag für Sozialwissenschaften, Wiesbaden, S. 403-425. Open Google Scholar doi.org/10.1007/978-3-531-92148-8_25
  65. Davis, Lynn E., McNerney, Michael J., Chow, James, Hamilton, Thomas, Harting, Sarah und Daniel Byman. 2014. Armed and Dangerous? UAVs and U.S. Security. RAND Research Report, RR-449-RC, http://www.rand.org/content/dam/rand/ pubs/research_reports/RR400/ RR449/ RAND_RR449.pdf, Zugriff: 19.06.2014. Open Google Scholar
  66. Davis, Paul K. 2001. Effects-Based Operations – A Grand Challenge for the Analytical Community. RAND Monograph Report, R-1477-USJFCOM/AF, http://www. rand.org/content/dam/ rand/pubs/monograph_reports/ 2006/ MR1477.pdf, Zugriff: 19.06.2014. Open Google Scholar
  67. Defense Science Board (DSB). 2013. Task Force Report: Resilient Military Systems and the Advanced Cyber Threat,http://www.acq.osd.mil/dsb/reports/ Resilient MilitarySystems. Cyber Threat.pdf, Zugriff: 12.07.2013. Open Google Scholar
  68. De Grazia, Alfred. 1985. A Cloud Over Bhopal. Causes, Consequences, and Constructive Solutions, http://www.grazian-archive.com/governing/bhopal/ Publishers%20Note.html, Zugriff: 28.04.2014. Open Google Scholar
  69. Deptula, David A. 2001. Effects-Based Operations: Change In the Nature of Warfare. Aerospace Education Foundation, Arlington, VA. Open Google Scholar
  70. Deutscher Bundestag. 2011. Unterrichtung durch die Bundesregierung. Bericht zur Risikoanalyse im Bevölkerungsschutz, Drucksache 17/8250, Berlin. Open Google Scholar
  71. Deutscher Bundestag. 2013. Antwort der Bundesregierung auf die Kleine Anfrage der Abgeordneten Ulla Jelpke, Annette Groth, Niema Movassat, weiterer Abgeordneter und der Fraktion DIE LINKE. Drucksache 18/147, 09.12.2013, Deutscher Bundestag, Berlin. Open Google Scholar
  72. Doro-on, Anna. 2012. Risk Assessment for Water Infrastructure Safety and Security. CRC Press, Boca Raton, FL. Open Google Scholar
  73. Echevarria II, Antulio J. 2003. Globalization and the Nature of War. Strategic Studies Institute, US Army War College, Carlisle, PA. Open Google Scholar doi.org/10.1080/10848770309442
  74. Echevarria II, Antulio J. 2005. Fourth Generation War And Other Myths. http:// www.strategic studiesinstitute. army.mil/pubs/download.cfm?q=632, Zugriff: 18.06.2014. Open Google Scholar
  75. Eden, Lynn. 2003. Whole World on Fire: Organizations, Knowledge, and Nuclear Weapons Devastation. Ithaca, N.Y.: Cornell University Press. Open Google Scholar
  76. Ehrhart, Hans-Georg, Petretto, Kerstin und Patricia Schneider. 2013. Indikatoren zur Erfassung der Risikolagen im maritimen Raum, in: Dies. et al (Hrsg.). Piraterie und maritimer Terrorismus als Herausforderung für die Seehandelssicherheit Deutschlands. Nomos, Baden-Baden. Open Google Scholar doi.org/10.5771/9783845246123
  77. Ehrhart, Hans-Georg, Hegemann, Hendrik und Martin Kahl (Hrsg.). 2014. Putting Security Governance to the Test, in: European Security 23 (2), Special Issue, S. 119-125. Open Google Scholar doi.org/10.1080/09662839.2013.851676
  78. Ehrhart, Hans-Georg und Roland Kaestner. 2012. US/NATO Counterinsurgency in Afghanistan. Evaluating Concepts and Practices, in: Ehrhart, Hans-Georg, Gareis, Sven und Charles Pentland (Hrsg.). 2012. Afghanistan in the Balance. Counterinsurgency, Comprehensive Approach and Political Order, Montreal/Kingston:McGill-Queens University Press, S. 13-35. Open Google Scholar
  79. Eilstrup-Sangiovanni, Mette und Colvert Jones. 2008. Assessing the Danger of Illicit Networks: Why al-Qaida May Be Less Threatening Than Many Think, in: International Security 33, S. 7-44. Open Google Scholar doi.org/10.1162/isec.2008.33.2.7
  80. Ellis, Patrick D. 2014. Lone Wolf Terrorism and Weapons of Mass Destruction. An Examination of Capabilities and Countermeasures, in: Terrorism and Political Violence 26, S. 211-225. Open Google Scholar doi.org/10.1080/09546553.2014.849935
  81. Europäische Union. 2003. Ein sicheres Europa in einer besseren Welt – Europäische Sicherheitsstrategie. http://consilium.europa.eu/uedocs/cmsUpload/031208ESSIIDE.pdf, Zugriff: 15.10. 2013. Open Google Scholar
  82. Europol. 2014. TE-SAT 2014. EU Terrorism and Situation Trend Reports. 28. Mai 2014. The Hague. Open Google Scholar
  83. Even, Shmuel und Siman-Tov, David. 2012. Cyber Warfare: Concepts and Strategic Trends. Memorandum No. 117, Institute for National Security Studies, Tel Aviv. Open Google Scholar
  84. Fatwa von Osama Bin Ladens Organisation. http://www.investigative¬project. org/documents/ misc/180.pdf, Zugriff: 31.03.2014. Open Google Scholar
  85. Fink, Willi. 2013. Satellitennavigation – Wunderwerk der Technik oder Waffe zur elektronischen Kriegsführung?, in: Wehrtechnik II/2013, S. 39-41. Open Google Scholar
  86. Firstpost. 2012. Dropping Thermobaric Bombs on Residential Areas in Syria. 05.11.2012, http://www.firstpost. com/topic/place/syria-dropping-thermobaric-bombs-on-residential-areas-in-syria-nov-video-cdd0LNnTD88-15-1.html, Zugriff: 18.06.2014. Open Google Scholar
  87. Fishman, Brian und James J. F. Forest. 2009. WMD and the Four Dimensions of al-Qaeda, in: Ranstorp, Magnus und Magnus Normark (Hrsg.). Unconventional Weapons and International Terrorism. Challenges and New Opportunities, Routledge, London/New York, S. 29-49. Open Google Scholar doi.org/10.4324/9780203881958.ch2
  88. Franco, Crystal und Nidhi Bouri. 2010. Environmental Decontamination Following a Large-Scale Bioterrorism Attack: Federal Progress and Remaining Gaps, in: Bio-security and Bioterrorism: Biodefense Strategy, Practice, and Science 8 (2), 2010. Open Google Scholar doi.org/10.1089/bsp.2010.0009
  89. Freudenberg, Dirk. 2008. Theorie des Irregulären. VS Verlag für Sozialwissenschaften, Wiesbaden. Open Google Scholar
  90. Freudenberg, Dirk. 2011. Risikoanalyse, Simulation und Irreguläre Kräfte, in: Military Power Review der Schweizer Armee 2, S. 11-19. Open Google Scholar
  91. Friedman, George. 2009. The Next 100 Years. A Forecast for the 21st Century, Anchor Books, New York. Open Google Scholar
  92. Frischknecht, Friedrich. 2003. The history of biological warfare, in: EMPO reports 4, S. 47-52. Open Google Scholar doi.org/10.1038/sj.embor.embor849
  93. Geis, Anna. 2006. Den Krieg überdenken. Kriegsbegriffe und Kriegstheorien in der Kontroverse, in: Geis, Anna (Hrsg.). Den Krieg überdenken. Nomos, Baden-Baden. Open Google Scholar
  94. Geis, Anna und Harald Müller. 2013. The Appropriateness of the Liberal Use of Force: ‘Democratic Wars’ Under US Hegemony, in: Geis, A., Müller, H. und N. Schörnig (Hrsg.). The Militant Face of Democracy. The Liberal Forces for Good, Cambridge University Press, Cambridge, MA, S. 345-367. Open Google Scholar doi.org/10.1017/CBO9781139764391.014
  95. Gerstein, Josh. 2010. President Obama's high-stakes nuclear meet, in: Politico, 11.04.2010, http://www.politico.com/ news/stories/0410/35633.html, Zugriff: 19.06.2014. Open Google Scholar
  96. Gibbs, W. Wayt, Soares, Christine und Achim G. Schneider. 2005. Sind wir gegen eine Pandemie gewappnet? in: Spektrum der Wissenschaft, 15.12.2005, http://www.spektrum.de/alias/ influenza/sind-wir-gegen-eine-pandemie-ge¬wap¬pnet/ 836433, Zugriff: 18.02.2014. Open Google Scholar
  97. Gigerenzer, Gerd. 2004. Dread Risk, September 11, and Fatal Traffic Accidents, in: Psychological Science 15, S. 286-287. Open Google Scholar doi.org/10.1111/j.0956-7976.2004.00668.x
  98. Glasstone, Samuel, Dolan, Philip J (Hrsg.). 1977. The Effects of Nuclear Weapons. US Department of Defense und Energy Research and Development Administration, Washington, DC. Open Google Scholar doi.org/10.21236/ADA087568
  99. Goodwin, Robin, Wilson, Michelle and Gaines, Stanley Jr. 2005. Terrorist Threat Perception and Its Consequences in Contemporary Britain. British Journal of Psychology 96: 389-406. Open Google Scholar doi.org/10.1348/000712605X62786
  100. Graham, Bob, Talent, Jim et al. 2008. World at Risk – The Report of the Commission on the Prevention of WMD Proliferation and Terrorism. Vintage Books, New York/Toronto. Open Google Scholar
  101. Grau, Lester W. und Timothy Smith. 2000. A 'Crushing' Victory: Fuel-Air Explosives and Grozny 2000, in: Marine Corps Gazette,http://fmso.leavenworth.army.mil/ documents/fuelair/ fuelair.htm, Zugriff: 02.02.2014. Open Google Scholar
  102. Guest, Jenna. 2011. Advancing Weapons Technology and the Future of Warfare: Strategic, Legal and Ethical Perspectives. University of Canterbury, Christchurch. Open Google Scholar
  103. Gurr, Nadine und Benjamin Cole. 2005. The New Face of Terrorism. Threats from Weapons of Mass Destruction, Tauris, New York. Open Google Scholar
  104. Hamdan, Fouad. 2001. Umweltzerstörung – Ursache und Folge von Kriegen. Führungsakademie der Bundeswehr, Hamburg, 16. Mai 2001, http://www. Fouad-hamdan.org/cms/upload/pdf/Environ¬mentalDestructionwar_FouadHamdan_ Ger-manArmyAcademy_25pages_Hamburg_ GERMAN_16may2003.pdf, Zugriff: 16.04.2014. Open Google Scholar
  105. Hammes, Thomas X. 2004. 4th-generation Warfare: Our Enemies Play to Their Strengths, in: Armed Forces Journal, November, S. 40-44. Open Google Scholar
  106. Hansen, Stefan. 2009. Neue deutsche Sicherheitsarchitektur. Ist eine Reform der Kompetenzverteilung zwischen Polizeibehörden, Nachrichtendiensten und den Streitkräften notwendig?. Peter Lang Verlag, Frankfurt a.M. Open Google Scholar
  107. Heidelberg Institut für Internationale Konfliktforschung (HIIK). 2013. Conflict Barometer 2012. Disputes, non-violent crises, violent crises, limited wars, wars, Nr. 21, HIIK, Heidelberg. Open Google Scholar
  108. Heidelberger Institut für Internationale Konfliktforschung (HIIK). Methodik. http://www.hiik.de/ de/methodik/in¬dex.html, Zugriff: 18.06.2014. Open Google Scholar
  109. Heupel, Monika. 2010. Prekäre Staaten als Gefahrenherde. Terrorismus und Massenvernichtungswaffen, in: Braml, J., Risse, T. und E. Sandschneider (Hrsg.). Einsatz für den Frieden. Sicherheit und Entwicklung in Räumen begrenzter Staatlichkeit, Oldenbourg, München, S. 64-71. Open Google Scholar doi.org/10.1524/9783486713374.64
  110. Hirsch, Helmut. 2008. Terrorgefahren und Atomkraftwerke – sieben Jahre nach dem 11. September 2001. BUND-Hintergrundpapier, http://www.bund.net/fileadmin/ bundnet/publikationen/ atomkraft/20080904_atomkraft_ terror_akw_hintergrund. pdf, Zugriff: 17.06.2014. Open Google Scholar
  111. Hitchens, Theresa, Lewis, James und Götz Neuneck (Hrsg.). 2013. The Cyber Index. International Security Trend and Realities, United Nations Publications, UNIDIR/2013/3, http://www.unidir. org/files/publications/pdfs/cyber-index-2013-en-463.pdf, Zugriff: 17.06.2014. Open Google Scholar
  112. Hobsbawm, Eric. 2002. Das Gesicht des 21. Jahrhunderts. dtv, München. Open Google Scholar
  113. Hoffman, Bruce. 1999. Terrorism and Weapons of Mass Destruction: The Analysis of Trends and Motivations. RAND Corporation, Santa Monica, CA/Arlington, VA/Pittsburgh, PA. Open Google Scholar
  114. Hoffman, Bruce. 2006. Inside Terrorism. Columbia University Press, New York. Open Google Scholar
  115. Hoffman, Bruce. 2013. Al Qaeda’s Uncertain Future, in: Studies in Conflict & Terrorism 36, S. 635-653. Open Google Scholar doi.org/10.1080/1057610X.2013.802973
  116. Hoffman, Frank. 2007. The Rise of Hybrid Wars. Potomac Institute for Policy Studies, Arlington, VA. Open Google Scholar
  117. HM Government. 2010. A Strong Britain in a World of Uncertainty – National Security Strategy. https://www.gov.uk/ government/uploads/system/uploads/attach-ment_data/file/61936/national-security-strategy.pdf, Zugriff: 18.06. 2014. Open Google Scholar
  118. Hudson, Christopher. 2007. Doctors of Depravity, in: Daily Mail, 02.03.2007. Open Google Scholar doi.org/10.1179/str.2007.54.3.005
  119. Human Security Report 2013. 2014. The Decline in Global Violence: Evidence, Explanation, and Contestation, Vancouver: Human Security Press. Open Google Scholar
  120. Hummel, Stephen. 2013. The Risk of Non-State Actors Acquiring Chemical Weapons in Syria, in: CTC Centinel 6, S. 1-4. Open Google Scholar
  121. Institut für Friedensforschung und Sicherheitspolitik an der Universität Hamburg (IFSH). 2013. Friedensstrategien heute – Friedens-und Sicherheitspolitik an den Bruchstellen der Globalisierung. Mittelfristiges Arbeitsprogramm des IFSH, http://ifsh.de/forschung/mittelfristiges-arbeitsprogramm/, Zugriff: 17.06.2014. Open Google Scholar doi.org/10.5771/9783845259680
  122. Institut für Strahlenbiologie der GSF. Gesundheitliche Strahlenwirkung. Hintergrundinformation zum Abwurf der Atombomben auf Hiroshima und Nagasaki, http://www.gesundheitsamt.de/alle/ umwelt/physik/strahl/ion/ ra/hirosh.htm, Zugriff: 18.06.2014. Open Google Scholar
  123. International Atomic Energy Agency (IAEA). 2009. Annual Report 2008. GC(53)/7, IAEA, Wien. Open Google Scholar
  124. International Atomic Energy Agency (IAEA). 2009. Communication Received from Germany Concerning its Policies Regarding the Management of Plutonium. Information Circular, INFCIRC/549/Add.2/12, http://www.iaea.org/ Publications/Documents/Infcircs/2009/ infcirc 549a2-12.pdf, Zugriff: 17.06.2014. Open Google Scholar
  125. International Atomic Energy Agency (IAEA). Incident and Trafficking Database (ITDB) – 2014 Supplementary Information Sheet. http://www-ns.iaea.org/ security/itdb.asp, Zugriff: 17.06.2014. Open Google Scholar
  126. International Panel on Fissile Materials. 2013. Global Fissile Material Report. http://fis-sile¬materials.org/library/ gfmr13.pdf, Zugriff: 17.06.2014. Open Google Scholar
  127. Internet World Statistics. 2013. Internet Growth Statistics. http://www.internet-world¬stats.com/ emarketing.htm, Zugriff: 17.06.2014. Open Google Scholar
  128. Interpol. 2014. Chemical and Explosives Terrorism. CBRNE Terrorism Prevention Programme, http://www.inter¬pol.int/Crime-areas/Terrorism/CBRNE-Terrorism-Prevention-Pro¬gramme/Chemical-and-explosives-terrorism, Zugriff: 13.02.2014. Open Google Scholar
  129. Jackson, Brian A. und David R. Frelinger. 2009. Emerging threats and security planning: how should we decide what hypothetical threats to worry about?. RAND Corporation, Santa Monica, CA/Arlington, VA/Pittsburgh, PA. Open Google Scholar doi.org/10.7249/OP256
  130. James Martin Center for Nonproliferation Studies (CNS). 2014. CNS Global Incidents and Trafficking Database – 2013 Annual Report. James Martin Center for Nonproliferation Studies, http:// www.nti.org/media/pdfs/ global_trafficking_ report.pdf?_=1395275964, Zugriff: 17.06. 2014. Open Google Scholar
  131. Jenkins, Brian M. 2011. Al Qaeda after Bin Laden. Implications for American Strategy. RAND Corporation, Santa MonicaCA/Arlington, VA/Pittsburgh, PA. Open Google Scholar
  132. Johnson, David E. 2007. Learning Large Lessons - The Evolving Roles of Ground Power and Air Power in the Post–Cold War Era, RAND Monograph, MG-405-1-AF, http://www.rand.org/ content/dam/rand/pubs/mono¬graphs/2007/RAND_MG 405-1.pdf, Zugriff: 19.06.2014. Open Google Scholar
  133. Kaldor, Mary. 1999. New & Old Wars. Organized Violence in a Global Era, Oxford University Press, Oxford. Open Google Scholar
  134. Kenney, Michael. 2010. ‘Dumb’ Yet Deadly. Local Knowledge and Poor Tradecraft among Islamist Militants in Britain and Spain, in: Studies in Conflict & Terrorism 33, S. 911-932. Open Google Scholar doi.org/10.1080/1057610X.2010.508508
  135. Kilcullen, David. 2009. The Accidental Guerrilla. Fighting Small Wars in the Midst of a Big One, Oxford University Press, Oxford. Open Google Scholar
  136. Kissinger, Henry A. 1974. Kernwaffen und Auswärtige Politik. 2. Ausgabe, Olden-bourg, München. Open Google Scholar doi.org/10.1525/jps.1974.3.2.00p01902
  137. Kjøk, Åshild, Hegghammer, Thomas, Hansen, Annika und Jørgen Kjetil Knudsen. 2004. Restoring Peace or Provoking Terrorism? Exploring the Links between Multilateral Military Interventions and International Terrorism, Norwegian Defence Research Establishment, Kjeller. Open Google Scholar
  138. Klimburg, Alexander. 2014. Roots Unknown – Cyberconflict Past, Present and Future, in: Sicherheit und Frieden 32 (1), S. 1- 8. Open Google Scholar doi.org/10.5771/0175-274x-2014-1-1
  139. Koch, Amanda N. und Burke K. Zimmerman. 2006. Do Recent Scientific and Technological Advances Lower the Threshold for the Proliferation of Biological Weapons? NTI Article, 18.12.2006, http://www.nti.org/analysis/articles/ advances-lower-proliferation/, Zugriff: 17.06.2014. Open Google Scholar
  140. Koch, Stéphane. 2006. Modern warfare – the battle for public opinion, in: Défense nationale et sécurité collective, October, S. 175-180. Open Google Scholar
  141. Kollias, Christos und Stefanos Papadamou. 2012. Terrorism and Market Jitters. EUSECON Policy Brief, Economics of Secuirty, Berlin. Open Google Scholar
  142. Kraatz-Wadsack, Gabriele. 2009. Capacity-building and Proliferation. Biological Terrorism, in: Ranstorp, Magnus und Magnus Normark (Hrsg.). Unconventional Weapons and International Terrorism. Challenges and New Approaches, Routledge, London/New York, S. 95-108. Open Google Scholar doi.org/10.4324/9780203881958.ch5
  143. Kuhn, Jan und Götz Neuneck. 2005. Terrorgefahr und die Verwundbarkeit moderner Industriegesellschaften: Wie gut ist Deutschland vorbereitet?. IFAR² Working Paper Nr. 6, Institut für Friedensforschung und Sicherheitspolitik an der Universität Hamburg (IFSH), Hamburg. Open Google Scholar
  144. Kuntze, Oscar-Erich. 2002. Großbritannien: No bust, no boom, in: ifo-Schnelldienst 55 (7), S. 17-23. Open Google Scholar
  145. Laqueur, Walter. 1999. The New Terrorism. Fanaticism and the Arms of Mass Destruction. Oxford University Press, Oxford. Open Google Scholar
  146. Lange, Hans-Jürgen, Öhly, H. Peter und Jo Reichertz (Hrsg.). 2001. Auf der Suche nach neuer Sicherheit. Fakten, Theorien, Folgen, VS Verlag für Sozialwissenschaften, Wiesbaden. Open Google Scholar
  147. Langner, Ralph. 2013. To Kill a Centrifuge - A Technical Analysis of What Stuxnet’s Creators Tried to Achieve. The Langner Group, Arlington, VA)/Hamburg/ Mün-chen. Open Google Scholar
  148. Latham, Andrew. 2002. Warfare Transformed. A Braudelian Perspective on the ‘Revolution in Military Affairs’, in: European Journal of International Relations 8 (2), S. 231-266. Open Google Scholar doi.org/10.1177/1354066102008002003
  149. Leitenberg, Milton, Zilinskas, Raymond A. und Jens H. Kuhn. 2012. The Soviet Biological Weapons Program: A History. Harvard University Press, Cambridge, MA/London. Open Google Scholar doi.org/10.4159/harvard.9780674065260
  150. Liang, Qiao und Wang Xiangsui. 1999. Unrestricted Warfare. PLA Literature and Arts Publishing House, Beijing. Open Google Scholar
  151. Lieber, Keir A. und Daryl C. Press. 2013. Why States Won’t Give Nuclear Weapons to Terrorists, in: International Security 38, S. 80-104. Open Google Scholar doi.org/10.1162/ISEC_a_00127
  152. Lyons, Marty. 2005. Threat Assessment of Cyber Warfare. A White Paper, University of Washington, Homeland Security – CSE P590TU, http://courses.cs. washington.edu/courses/ csep590/ 05au/whitepaper_turnin/Lyons-P590TU-White%20 paper.pdf, Zugriff: 17.06.2014. Open Google Scholar
  153. Mack, Andrew (Hrsg.). 2014. Human Security Report 2013. The Decline in Global Violence, Evidence, Explication, and Contestation, Human Security Press, Vancouver. Open Google Scholar
  154. Mahadevan, Prem. 2013. The Glocalisation of Al Qaedism, in: Thränert, Oliver (Hrsg.). Strategic Trends 2013. Key Developments in Global Affairs, Center for Security Studies, Zürich, S. 83-101. Open Google Scholar
  155. Manyika, James; Chui, Michael; Bughin, Jacques; Dobbs, Richard; Bisson, Peter und Alex Marrs. 2013. Disruptive technologies: Advances that will transform life, business, and the global economy, McKinsey Global Institute, McKinsey & Company, Seoul/San Francisco. Open Google Scholar
  156. Martinetz, Dieter. 1996. Vom Giftpfeil zum Chemiewaffenverbot. Verlag Harri Deutsch, Thun/Frankfurt a.M. Open Google Scholar
  157. McCarthy, Christopher J. (o. J.). Anti-Access/Area Denial: The Evolution of Modern Warfare.http://www.usnwc.edu/ Lucent/OpenPdf.aspx?id=95&Title=The%20Global%20System%20in%20Transition, Zugriff: 20.04.2014. Open Google Scholar
  158. McKinzie, Matthew G., Cochran, Thomas B., Norris, Robert S. und William M. Arkin. 2001. The US Nuclear War Plan: A Time For Change. Natural Resources Defence Council, New York. Open Google Scholar
  159. Medalia, Jonathan. 2011. “Dirty Bomb”: Technical Background, Attack Prevention and Response, Issues for Congress. CRS Report for Congress, Congressional Research Service, http://www. fas.org/sgp/crs/nuke/R41890.pdf, Zugriff: 17.06.2014. Open Google Scholar
  160. Metz, Steven und Raymond A. Millen. 2003. Future War/Future Battlespace: The Strategic Role of American Landpower. Strategic Studies Institute (SSI), US Army War College, Carlisle, PA. Open Google Scholar
  161. Meyer-Teschendorf, Klaus-Georg. 2009. Fortentwicklung der Rechtsgrundlagen für den Bevölkerungsschutz, in: Deutsches Verwaltungsblatt 19, S. 1221-1229. Open Google Scholar
  162. Mistry, Dinshaw. 2003. Containing Missile Proliferation – Strategic Technology, Security Regimes, and International Cooperation in Arms Control. University of Washington Press, Seattle, WA. Open Google Scholar
  163. Möckli, Daniel. 2011. Ten Years On: Terrorism as a Manageable Risk, in: Möckli, Daniel (Hrsg.). Strategic Trends 2011. Key Developments in Global Affairs, Center for Security Studies, Zürich, S. 67-88. Open Google Scholar doi.org/10.1080/14794012.2011.622933
  164. Mueller, John. 2007. Radioactive Hype, in: The National Interest, September/Oktober 2007. Open Google Scholar
  165. Mueller, John. 2010. Atomic Obsession. Nuclear Alarmism from Hiroshima to Al-Qaeda, Oxford University Press, Oxford. Open Google Scholar
  166. Münkler, Herfried. 2002. Die neuen Kriege. Rowohlt, Reinbek bei Hamburg. Open Google Scholar
  167. Münkler, Herfried. 2006. Der Wandel des Krieges. Von der Symmetrie zur Asymmetrie, Velbrück, Weilerswist. Open Google Scholar
  168. Münkler, Herfried, Bohlender, Matthias und Sabine Meurer (Hrsg.). 2010. Sicherheit und Risiko. Über den Umgang mit Gefahr im 21. Jahrhundert, Transcript, Bielefeld. Open Google Scholar doi.org/10.14361/9783839412299
  169. Nassauer, Otfried. 2012. US Atomwaffen in Deutschland und Europa. http://www. bits.de/ public/stichwort/atomwaf¬fen-d-eu.htm, Zugriff: 18.06.2014. Open Google Scholar
  170. NATO. 2010. Strategic Concept for the Defence and Security of The Members of the North Atlantic Treaty Organization. http://www.isn.ethz.ch/Digital-Library/Publi-cations/Detail/?ots591 =cab359a3-9328-19cc-a1d2-8023e646b22c&lng=en&id= 157124, Zugriff: 15.10.2013. Open Google Scholar
  171. Nerlich, Brigitte, Hamilton, Craig A. und Victoria Rowe. 2002. Conceptualising Foot and Mouth Disease: The Socio-Cultural Role of Metaphors, Frames and Narratives, in: metaphorik.de 02/2002, http://www.metaphorik.de/ sites/www.meta-phorik.de/files/journal-pdf/02_2002_ nerlich.pdf, Zugriff: 18.02.2014. Open Google Scholar
  172. Neumann, Peter R. 2013. The Trouble with Radicalization, in: International Affairs 89, S. 873-893. Open Google Scholar doi.org/10.1111/1468-2346.12049
  173. Neuneck, Götz und Jürgen Altmann. 2001. Technologische Dynamik und präventive Rüstungskontrolle – Veränderungen 1995-2000, Deutscher Bundestag vertreten durch das Büro für Technikfolgenabschätzung (TAB) (Oktober - Dezember 2000), Berlin. Open Google Scholar
  174. Neuneck, Götz, Alwardt, Christian und Hans Christian Gils. 2012. Raketenabwehr in Europa – Theaterdonner oder Rückkehr des Kalten Krieges, in: Wissenschaft und Frieden, 2012-1, S. 36-38. Open Google Scholar
  175. Norris, Robert S. und Hans M. Kristensen. Nuclear Notebook, jeweilige Länderberichte/Zusam¬menfassungen, in: Bulletin of Atomic Scientists, http://bos. sagepub.com/cgi/collection/nuclear¬notebook, Zugriff: 17.02.2013. Open Google Scholar
  176. Nuclear Threat Initiative (NTI). Länderprofil Russland. http://www.nti.org/country-profiles/russia/, Zugriff: 17.06.2014. Open Google Scholar
  177. Nuclear Threat Initiative (NTI). Länderprofil USA. http://www.nti.org/country-profiles/united-states/, Zugriff: 17.06.2014. Open Google Scholar
  178. Nuclear Threat Initiative (NTI). 2014. NTI Nuclear Materials Security Index: Building a Framework for Accountability, Assurance and Action. http://ntiindex.org/ wp-content/uploads/2014/01/2014-NTI-Index-Report1.pdf, Zugriff: 17.06.2014. Open Google Scholar
  179. Nuzzo, Jennifer B. 2006. The Biological Threat to US Water Supplies. Toward a National Water Security Policy, in: Biosecurity and Bioterrorism 4, S. 147-159. Open Google Scholar doi.org/10.1089/bsp.2006.4.147
  180. Nye, Joseph. 2011. The Future of Power. Public Affairs, New York. Open Google Scholar
  181. Obama, Barack. 2009. Remarks by the President on Securing Our Nation’s Cyber Infrastructure. 29.05.2009, http://www.whitehouse.gov/the-press-office/remarks-president-securing-our-nations-cyber-infrastructure, Zugriff: 17.06.2014. Open Google Scholar
  182. Öko-Institut e.V. 2014. Entsorgungsanlagen in Deutschland. https://www.flickr.com/ photos/oekoinstitut/13889675215/in/set-72157634045212172, Zugriff: 18.06. 2014. Open Google Scholar
  183. Oren, Ido und Ty Solomon. 2013. WMD. The Career of a Concept, in: New Political Science 35, S. 109-135. Open Google Scholar doi.org/10.1080/07393148.2012.754683
  184. O’Rourke, Ronald. 2012. Navy Shipboard Lasers for Surface, Air, and Missile Defense: Background and Issues for Congress. CRS Report for Congress, Congressional Research Service, http://www.fas.org/sgp/crs/weapons/ R41526.pdf, Zugriff: 18.06.2014. Open Google Scholar
  185. Organization for Security and Co-operation in Europe (OSCE). 2003. Strategy to Address Threats to Security and Stability in the 21st Century. http://www. osce.org/mc/17504, Zugriff: 15.10.2013. Open Google Scholar
  186. Owens, William A., Dam, Kenneth W., and Herbert S. Lin (Hrsg.). 2009. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. The National Academies Press, Washington, DC. Open Google Scholar doi.org/10.1007/978-3-540-92681-8_10
  187. Parachini, John V. 2001. Comparing Motives and Outcomes. Motives of Mass Casualty Involving Conventional and Unconventional Weapons, in: Studies in Conflict & Terrorism 24, S. 389-406, S. 390-391. Open Google Scholar doi.org/10.1080/105761001750434240
  188. Parachini, John V. 2003. Putting WMD Terrorism into Perspective, in: The Washington Quarterly 46, S. 37-50. Open Google Scholar doi.org/10.1162/016366003322387091
  189. Petermann, Thomas, Bradke, Harald, Lüllmann, Arne, Poetzsch, Maik und Ulrich Riehm. 2010. Gefährdung und Verletzbarkeit moderner Gesellschaften – am Beispiel eines großräumigen Ausfalls der Stromversorgung. Arbeitsbericht Nr. 141 des Büros für Technikfolgen-Abschätzung beim Deutschen Bundestag, Berlin. Open Google Scholar
  190. Petermann, Thomas, Bradke, Harald, Lüllmann, Arne, Poetzsch, Maik und Ulrich Riehm. 2011. Was bei einem Blackout geschieht – Folgen eines langandauernden und großräumigen Stromausfalls. Studien des Büros für Technikfolgen-Abschätzung beim Deutschen Bundestag, Bd. 33, Edition Sigma, Berlin. Open Google Scholar doi.org/10.5771/9783845270210-63
  191. Piazza, James A. 2009. Is Islamist Terrorism More Dangerous? An Empirical Study of Group Ideology, Organization, and Goal Structure, in: Terrorism and Political Violence 21, S. 62-88. Open Google Scholar doi.org/10.1080/09546550802544698
  192. Pinker, Steven. 2011. The Better Angels of Our Nature. Why Violence Has Declined, Viking, New York. Open Google Scholar
  193. Pistner, Christoph und Christian Küppers. 2007. Analyse des Bedrohungspotenzials „gezielter Flugzeugabsturz“ am Beispiel der Anlage Biblis-A. EUROSOLAR-Studie, Öko-Institut e.V., Darmstadt. Open Google Scholar
  194. Planungsamt der Bundeswehr (Hrsg.). 2012. Future Topic: Geoengineering, Streitkräfte, Fähigkeiten und Technologien im 21. Jahrhundert. Zukunftsanalysen, Planungsamt der Bundeswehr, Berlin. Open Google Scholar
  195. Pluta, Werner. 2010. Experten warnen vor Gefahren für GPS, in: Golem, 24.02.2010, http://www.golem.de/1002/ 73377.html, Zugriff: 18.06.2014. Open Google Scholar
  196. Ranstorp, Magnus. 2009. Mapping Terrorism Studies after 9/11. An Academic Field of Old Problems and New Prospects, in: Jackson, R. (Hrsg.). Critical Terrorism Studies. A New Research Agenda, Routledge, London/New York, S. 13-33. Open Google Scholar
  197. Reemtsma, Jan Philipp. 2009. Vertrauen und Gewalt. Pantheon Verlag, München. Open Google Scholar
  198. Renn, Ortwin. 2008. Risk Governance. Coping with Uncertainty in a Complex World, Earthscan,London. Open Google Scholar
  199. Robock, Alan. 2008. Time to Bury a Dangerous Legacy – Part II. Climatic catastrophe would follow regional nuclear conflict, in: YaleGlobal, 17.03.2008, http://yaleglobal.yale.edu/content/time-bury-dangerous-legacy-%25E2% 2580% 2593-part-ii, Zugriff: 02.11.2013. Open Google Scholar
  200. Rollins, John und Clay Wilson. 2007. Terrorist Capabilities for Cyberattack: Overview and Policy Issues. CRS Report for Congress, Congressional Research Service, http://www.fas.org/sgp/ crs/terror/RL33123.pdf, Zugriff: 17.06.2014. Open Google Scholar
  201. Rosa, Hartmut. 2005. Beschleunigung - Die Veränderung der Zeitstrukturen in der Moderne. Suhrkamp Verlag, Frankfurt a.M. Open Google Scholar
  202. Saalman, Lora. 2014. Prompt Global Strike: China and the Spear. Asia-Pacific Center for Security Studies, Honolulu, http://www.apcss.org/wp-content/uploads/2014/ 04/APCSS_Saal¬man_ PGS_China_Apr2014.pdf, Zugriff: 20.04.2014. Open Google Scholar
  203. Sagan, Carl. 1983. The Atmospheric and Climatic Consequences of Nuclear War. 31.10.1983, http://www.mind¬fully.org/Nucs/Sagan-Nuclear-Consequences31 oct83.htm, Zugriff: 02.11.2013. Open Google Scholar doi.org/10.2307/20041818
  204. Sageman, Marc. 2008. Leaderless Jihad. Terror Networks in the Twenty-First Century, University of Pennsylvania Press, Philadelphia, PA. Open Google Scholar doi.org/10.9783/9780812206784
  205. Salama, Sammy und Lydia Hansell. 2005. Does Intent Equal Capability? Al-Qaeda and Weapons of Mass Destruction, in: The Nonproliferation Review 12, S. 615-653. Open Google Scholar doi.org/10.1080/10736700600601236
  206. Sanger, David. 2012. Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power. Crown Publishing Group, New York. Open Google Scholar
  207. Sauer, Frank. 2007. Nuklearterrorismus. Akute Bedrohung oder politisches Schreckgespenst?. HSFK-Report 2/2007, Hessische Stiftung Friedens- und Konfliktforschung, Frankfurt a.M. Open Google Scholar
  208. Scahill, Jeremy. 2013. Dirty Wars. Nation Books, New York. Open Google Scholar
  209. Schaper, Annette. 2006. The Technical Challenges of Nuclear and Radiological Terrorism, in: Forest, James J.F. (Hrsg.). Teaching Terror. Strategic and Tactical Learning in the Terrorist World, Rowman & Littlefield, Lanham (MD), S. 155-168. Open Google Scholar
  210. Schneider, Wolf. 2014. Der Soldat – Ein Nachruf. Eine Weltgeschichte von Helden, Opfern und Bestien. Rowohlt, Reinbek bei Hamburg. Open Google Scholar
  211. Schreiber, Wolfgang. 2012. Kriege und bewaffnete Konflikte 2012. AKUF Analyse Nr. 11, Hamburg, http://www.wiso.uni-hamburg.de/fileadmin/sowi/akuf/Text_ 2010/AKUF-Analysen-11.pdf, Zugriff: 26.11.2013. Open Google Scholar
  212. Seah, Edwin. 2006. Temporal Dominance. Military Transformation and the Time Dimension of Strategy, Institute of Defence and Strategic Studies, Singapore. Open Google Scholar
  213. Shanker, Thom. 2013. Pentagon Is Updating Conflict Rules in Cyberspace, in: New York Times, 27.06.2013, http://www.nytimes.com/2013/06/28/us/pentagon-is-updating-conflict-rules-in-cyberspace.html, Zugriff: 17.06.2014. Open Google Scholar
  214. Sheppard, Ben. 2009. The Psychology of Strategic Terrorism. Public and Government Responses to Attack, Routledge, London/New York. Open Google Scholar
  215. Siegrist, David W. 1999. The Threat of Biological Attack: Why Concern Now?, in: Emerging Infectious Diseases 5 (4), S. 505-508. Open Google Scholar doi.org/10.3201/eid0504.990407
  216. Singer, Peter W. und Allan Friedman. 2014. Cybersecurity and Cyberwar. Oxford University Press, Oxford. Open Google Scholar doi.org/10.14453/isngi2013.proc.52
  217. Smith, Edward R. 2006. Effects Based Operations, in: Security Challenges 2 (1), S. 43-62. Open Google Scholar
  218. Sofsky, Wolfgang. 1996. Traktat über die Gewalt. S. Fischer Verlag, Frankfurt a.M. Open Google Scholar
  219. Sommer, P. und I. Brown. 2010. Reducing Systemic Cybersecurity Risk. OECD/IFP Project on Future Global Shocks, http://www.oecd.org/governance/risk/ 46889922.pdf, Zugriff: 17.06. 2014. Open Google Scholar
  220. Spencer, Alexander. 2006. Questioning the Concept of ‘New’ Terrorism, in: Peace, Conflict & Development 8, S. 1-33. Open Google Scholar
  221. Spiegel Online. 2012. Studenten kapern Drohne. 29.06.2014, http://www.spiegel. de/netzwelt/ netzpolitik/drohne-gekapert-studenten-aus-texas-hacken-gps-system-a-841778.html, Zugriff: 18.06. 2014. Open Google Scholar
  222. Steinberg, Guido. 2012. Wer sind die Salafisten? Zum Umgang mit einer schnell wachsenden und sich politisierenden Bewegung, SWP, Berlin. Open Google Scholar
  223. Steinberg, Guido. 2013. German Jihad. On the Internationalization of Islamist Terrorism, Columbia University Press, New York. Open Google Scholar doi.org/10.7312/columbia/9780231159920.001.0001
  224. Stockholm International Peace Research Institute (SIPRI). 2013. SIPRI yearbook 2013: armaments, disarmament and international security. Oxford University Press, Oxford. Open Google Scholar
  225. Stohl, Michael. 2006. Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games?, in: Crime, Law and Social Change 46, S. 223-238. Open Google Scholar
  226. Strachan, Hew. 2013. The Direction of War. Contemporary Strategy in Historical Perspective, Cambridge University Press, Cambridge. Open Google Scholar doi.org/10.1017/CBO9781107256514
  227. Swiss Federal Intelligence Service (FIS). 2012. Switzerland’s Security. Situation Report 2012 of the Federal Intelligence Service FIS, http://www.vbs.admin.ch/ internet/vbs/en/home/documentation/ publication/snd_publ.html, Zugriff: 17.06. 2014. Open Google Scholar
  228. Symantec Corporation. 2013. Internet Security Threat Report 2013. 2012 Trends, 18, http://www. symantec.com/content/en/us/enterprise/other_resources/b-istr_main_ report_v18_2012_2129 1018.en-us.pdf, Zugriff: 17.06.2014. Open Google Scholar
  229. The Economist. 2013. GPS jamming: Out of sight. 27.07.2013, http://www. economist.com/news/ international/21582288-satellite-positioning-data-are-vitalbut-signal-surprisingly-easy-disrupt-out, Zugriff: 18.06.2014. Open Google Scholar
  230. Toffler, Alvin und Heidi Toffler. 1994. Überleben im 21. Jahrhundert. Deutsche Verlags-Anstalt, Stuttgart. Open Google Scholar
  231. Toon, Owen B., Robock, Alan and Turco, Richard P.. 2008:.Environmental consequences of nuclear war.Physics Today, 61, No. 12, 37-42. Open Google Scholar doi.org/10.1063/1.3047679
  232. Tuchman, Barbara. 2006/2007. Der ferne Spiegel – Das dramatische 14. Jahrhundert. Spiegel-Buchverlag, Hamburg. Open Google Scholar
  233. Tucker, Jonathan B. (Hrsg.). 2000. Toxic Terror: Assessing Terrorist Use of Chemical and Biological Weapons. MIT Press, Cambridge, MA/London. Open Google Scholar
  234. Turco, Richard P., Toon, Owen, B., Ackerman, Thomas P., Pollack, James B. und Carl Sagan. 1990. Climate and Smoke: An Appraisal of Nuclear Winter, in: Science 247, S. 166-176. Open Google Scholar doi.org/10.1126/science.11538069
  235. Ucko, David H. 2009. The New Counterinsurgency Era. Transforming the U.S. Military for Modern Wars, Georgetown University Press, Washington, DC. Open Google Scholar
  236. UK Ministry of Defence. 2010a. Global Strategic Trends – Out to 2040. https://www.gov.uk/ government/ uploads/system/uploads/attach¬ment_data/ file/33717/GST4_v9_Feb10.pdf, Zugriff: 17.06.2014. Open Google Scholar
  237. UK Ministry of Defence. 2010b. Strategic Trends Programme. The Future Character of Conflict, https://www.gov.uk/ government/uploads/system/uploads/ attachment_data/file/33685/FCOCReadactedFinalWeb.pdf, Zugriff: 19.06. 2014. Open Google Scholar
  238. Ullman, Harlan K. und James P. Wade. 1996. Shock and Awe - Achieving Rapid Dominance. Institute for National Strategic Studies, Washington, DC. Open Google Scholar doi.org/10.1080/03071849608446063
  239. Ulrichs, Timo, Kuhn, Jens und Helmut Hahn. 2005. Mögliche Gefahren durch Bioterrorismus – Die Bedrohung durch vorsätzlich freigesetzte Mikroorganismen und andere Agenzien, Wissenschaftsmagazin fundiert, Freie Universität Berlin, Zugriff: http://www.fu-berlin.de/presse/ publikationen/fundiert/archiv/2005_01/05-01_ulrichs/index .html, Zugriff: 18.06.2014. Open Google Scholar
  240. Unger, Walter J. 2014. Cyber Defence – eine nationale Herausforderung, in: Sicherheit und Frieden 32 (1), S. 8-16. Open Google Scholar doi.org/10.5771/0175-274x-2014-1-8
  241. United Nations Institute for Disarmament Research (UNIDIR). 2011. Cybersecurity and Cyberwarfare: Preliminary Assessment of National Doctrine and Organization. UNIDIR Resources, http://www.unidir.org/files/publications/ pdfs/cyber¬security-and-cyberwarfare-prelimi¬nary-assessment-of-national-doctrine-and-organization-380.pdf, Zugriff: 22.11.2013. Open Google Scholar
  242. United Nations Institute for Disarmament Research (UNIDIR). 2013. The Cyber Index. International Security Trends and Realities. UNIDIR/2013/3, http://www. unidir.org/files/publications/pdfs/cyber-index-2013-en-463.pdf, Zugriff: 19.06. 2014. Open Google Scholar
  243. United Nations Office on Drugs and Crime (UNODC). 2010. The Globalisation of Crime: A transnational organized crime threat assessment. http://www.unodc. org/documents/data-and-analysis/ tocta/TOCTA_Report_2010_ low_ res.pdf, Zugriff: 15.10.2013. Open Google Scholar
  244. US Army. 1996. Field Manual 8-10-7 – Health Services Support in a Nuclear, Biological, and Chemical Environment. http://www.enlisted.info/field-manuals/fm-8-10-7-health-service-support-in-a-NBC-environment.shtml, Zugriff: 18.06.2014. Open Google Scholar
  245. US Army Training and Doctrine Command (TRADOC). 1994. A Concept for the Evolution of Full-Dimensional Operations for the Strategic Army of the Early Twenty-First Century. TRADOC Pamphlet 525-5, US Army TRADOC, Fort Leavenworth, KS. Open Google Scholar
  246. US Army Training and Doctrine Command (TRADOC). 2007. A Military Guide to Terrorism in the 21st Century. TRADOC G2, Handbook No. 1, US Army TRADOC, Fort Leavenworth, KS. Open Google Scholar
  247. US Department of Defense. 2009. Defense Nanotechnology Research and Development Program. http://www.nano.gov/sites/default/files/pub_resource/dod-report_ to_congress_final_1mar10.pdf, Zugriff: 18.06. 2014. Open Google Scholar
  248. US Department of Defense. 2010a. Quadrennial Defense Review Report 2010. http://www.defense. gov/ qdr/qdr%20as%20of%2029jan10%201600.pdf, Zugriff: 18.06.2014. Open Google Scholar
  249. US Department of Defense. 2010b. Nuclear Posture Review Report. http://www. defense.gov/npr/docs/ 2010%20nuclear%20posture%20review%20report.pdf, Zugriff: 19.06.2014. Open Google Scholar
  250. US Department of Defense. 2011. The National Military Strategy of the United States of America 2011. Redefining America’s Military Leadership, http://www. army.mil/info/references/ docs/ NMS%20FEB%202011.pdf, Zugriff: 19.06.2014. Open Google Scholar
  251. US Department of Defense. 2013. Electromagnetic spectrum (EMS) Strategy 2013. www.defense. gov/news/dod spectrumstrategy.pdf, Zugriff: 19.06.2014. Open Google Scholar
  252. US Department of State. 2010. Adherence to and Compliance with Arms Control, Nonproliferation, and Disarmament Agreements and Commitments. http://www. state.gov/documents/ organization/212096.pdf, Zugriff: 17.06.2014. Open Google Scholar
  253. US Department of State. 2013. Country Reports on Terrorism. http://www. state.gov/r/pa/prs/ ps/2014/04/ 225406.htm, Zugriff: 18.06.2014. Open Google Scholar
  254. US Deputy Chief of Staff of Intelligence (DCSINT). 2006. Critical Infrastrucure Threats and Terrorism. DCSINT Handbook No. 1.02, DCSINT, Fort Leavenworth, KS. Open Google Scholar
  255. US Joint Chiefs of Staff. 1959. Note by the Secretaries to the Joint Chiefs of Staff, 20 August 1959, enclosing memorandum from JCS Chairman Nathan Twining to Secretary of Defense, "Target Coordination and Associated Problems". J.C.S. 2056/131, http://www2.gwu.edu/~nsarchiv/ NSAEBB/NSAEBB130/SIOP-2.pdf, Zugriff: 18.06.2014. Open Google Scholar
  256. US Joint Chiefs of Staff. 2005. Doctrine of Joint Nuclear Operations. Joint Publication 3-12, Final Coordination (2), http://www.globalsecurity.org/wmd/li¬brary/ policy/dod/jp3_12fc2.pdf, Zugriff: 19.06.2014. Open Google Scholar
  257. US Joint Chiefs of Staff. 2013. Joint Targeting. Joint Publication 3-60, http://www.bits.de/ NRANEU/others/jp-doctrine/jp3-60%2813%29.pdf, Zugriff: 19.06.2014. Open Google Scholar
  258. US Joint Forces Command (USJFCOM), 2007. Joint Operating Environment, Trends and Challenges for the Future Joint Forces through 2030. USJFCOM, Norfolk, VA. Open Google Scholar
  259. US Joint Forces Command (USJFCOM). 2010. Joint Operating Environment 2010. USJFCOM, Suffolk, VA. Open Google Scholar
  260. US National Intelligence Council. 2012. Global Trends 2030: Alternative Worlds. http://www. dni.gov/files/documents/ GlobalTrends_2030.pdf, Zugriff: 17.06. 2014. Open Google Scholar
  261. US Office of Technology Assessment (OTA). 1979. The Effects of Nuclear War. OTA, Washington, DC. Open Google Scholar
  262. US Senate Armed Services Committee Confirmation Hearing am 9. Juni 2011, CNN Transcripts, 10.6.2011, http://transcripts.cnn.com/TRANSCRIPTS/1106/10/ nwsm.01.html, Zugriff: 17.06.2014. Open Google Scholar
  263. Varnie, Jamie G. G., Powers, Gregory M., Crawford, Maj Dan S., Jordan, Maj Craig E. Und Douglas L. Kendall. 1996. Space Operations: Through The Looking Glass (Global Area Strike System). Research Paper presented to Air Force 2025, https://www.hsdl.org/?view&did= 729248, Zugriff: 19.06.2014. Open Google Scholar
  264. Vertrag über die Nichtverbreitung von Kernwaffen (NVV) vom 01.07.1968, dt. Übersetzung unter http://www.auswaertiges-amt.de/cae/servlet/contentblob/349442/ publicationFile/4149/NVV.pdf, Zugriff: 17.06.2014. Open Google Scholar
  265. Waldmann, Peter. 1998. Terrorismus. Provokation der Macht, Gerling, München. Open Google Scholar
  266. Wallach, Evan J. 2009. A Tiny Problem with Huge Implications – Nanotech Agents as Enablers or Substitutes for Banned Chemical Weapons: Is a New Treaty Needed?, in: Fordham International law Journal 33 (3), S. 856-956. Open Google Scholar
  267. Wankmüller, Susanna. 2013. Gefahren durch Bedrohungskapazitäten staatlicher und nichtstaatlicher Akteure und aufkommende Risikotechnologietrends. Literaturauswertung. Open Google Scholar
  268. Warden, John A. III. (o. J.). Air Theory for the Twenty-first Century, in: Air University USAF. Battlefield of the Future 21st Century Warfare Issues, http://www. airpower.maxwell.af.mil/air¬chronicles/battle/bftoc.html, Zugriff: 16.01.2014. Open Google Scholar
  269. Wein, Lawrence M. und Yifan Liu. 2005. Analyzing a Bioterror Attack on the Food Supply. The Case of Botulinum Toxin in Milk, in: Proceedings of the National Academy of Sciences of the United States of America 10, S. 9984-9989. Open Google Scholar doi.org/10.1073/pnas.0408526102
  270. The White House. 2010. National Security Strategy. http://www.whitehouse.gov/sites/ default/files/rss_viewer/ national_security_strategy.pdf, Zugriff: 19.06.2014. Open Google Scholar
  271. The White House. 2013. National Security Strategy (Entwurf). http://www. utexas.edu/lbj/sites/default/files/file/news/National%20Security%20Strategy % 202013%20(Final%20Draft).pdf, Zugriff: 15.10.2013. Open Google Scholar
  272. Wikimedia Commons. 2007. Forschungsreaktoren in Deutschland. http://upload. wikimedia.org/wikipedia/commons/d/d3/Forschungsreaktoren_in_Deutschland. png, Zugriff: 18.06.2014. Open Google Scholar
  273. World Meteorological Organization. 2007. WMO documents on weather modification approved by the Commission for Atmospheric Sciences Management Group. Second session, 24./26. September 2007, http://www. wmo.int/pages/prog/arep/ wwrp/new/documents/WM_statement_guidelines_approved.pdf, Zugriff: 20.12. 2013. Open Google Scholar
  274. World Nuclear Association. Radioisotopes and Research. http://www.world-nuclear.org/info/Non-Power-Nuclear-Applications/Radioisotopes-and-Research/, Zugriff: 17.06.2014. Open Google Scholar
  275. Zukunftsforum Öffentliche Sicherheit. 2008. Risiken und Herausforderungen für die öffentliche Sicherheit in Deutschland. Szenarien und Leitfragen. Grünbuch des Zukunftsforums Öffentliche Sicherheit, Zukunftsforum Öffentliche Sicherheit, Berlin. Open Google Scholar

Similar publications

from the topics "Peace Research & Conflict Research"
Cover of book: Weltbilder und Weltordnung
Educational Book No access
Gert Krell, Peter Schlotter, Alexandra Homolar, Frank A. Stengel
Weltbilder und Weltordnung
Cover of book: Hinter der Lage
Book Titles No access
David Czudnochowski
Hinter der Lage
Cover of book: Streit um das Kyjiwer Erbe
Book Titles No access
Andriy Mykhaleyko
Streit um das Kyjiwer Erbe
Cover of book: Terrorismus und Amok
Educational Book No access
Stefan Goertz, Raphael Röttinger, Nicolas Stockhammer
Terrorismus und Amok