Skip to Main Content

Terrorism

Profile Photo
William Hoag
Contact:
Roxbury Community College Library
Room 211 Academic Building
1234 Columbus Ave.
Boston, MA 02120-3400
Phone: 857-701-1386
Website
chat loading...

You can now chat with us by text message!

Text (857) 877 - 2255 to chat with a librarian.

Your carrier's text rates may apply.

Fall 2023 Library Hours

On Campus and Virtual Hours

LIBRARY HOURS:


The library will be open both in-person and virtually:

Mon. - Thur. 8:30 AM - 9:00 PM

Fri. 8:30 AM - 4:30 PM

Sat. 8:30 AM - 4:00 PM

Sun. CLOSED

 

You can find the services we offer at a distance via Zoom, Teams, and other internet-based methods on our remote services page.


Evening class instruction is available by request. To see if the RCC Library is closed on school holidays and semester breaks, please consult the Library Calendar.


Contact Us

857-701-1380

or via text at 857-877-2255

library1@rcc.mass.edu

1234 Columbus Avenue
Building 3, Room 211
Boston, MA 02120

Streaming Videos

Full length and segment videos from:


American Terrorist

FRONTLINE investigates American-born terrorist David Coleman Headley, who helped plan the deadly 2008 siege on Mumbai.

In collaboration with ProPublica, the film -- an updated and expanded version of A Perfect Terrorist -- reveals how secret electronic surveillance missed catching the Mumbai plotters, and how Headley planned another Charlie Hebdo-like assault against a Danish newspaper.


Jihad 2.0: ISIS, Terrorism, and Social Media

For nearly two years, an extraordinary effective terrorist propaganda has been flooding the Internet. Through an unfailing control over social networks and the mass production of ultra-violent footage enhanced by special effects and edited like rap music videos, the ISIS (Islamic State of Iraq and al-Sham) terrorists have been hammering their hateful message.

How did the Internet become, and in such a short time, some kind of travel agency promoting armed jihad as the ultimate destination? Who are these dreadful terrorist cyber-headhunters? Can we fight against this indoctrination machinery?


Cyber Terror and Cyber Risk: What You Need To Know

By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk.

Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents.