25.03.2013 Views

A View of Cyberterrorism Five Years Later

A View of Cyberterrorism Five Years Later

A View of Cyberterrorism Five Years Later

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Peace). Fortunately, it is very good. For new developments, Internet Haganah (internet-<br />

haganah.com/haganah/) is an excellent resource.<br />

References<br />

AFP (2005) „Cyber-jihadists weave a dangerous web,‟ Agence France-Presse, October 27.<br />

Al-Matrafi, S. (2005) „Terrorist Website Drops Dirty Bomb,‟ Arab News, March 11.<br />

Alshech, E. (2007) „Cyberspace as a Combat Zone: The Phenomenon <strong>of</strong> Electronic Jihad,‟<br />

MEMRI Inquiry and Analysis Series, No. 329 (The Middle East Media Research Institute),<br />

February 7.<br />

As-Sālim, M. (2003) 39 Ways to Serve and Participate in Jihâd (At-Tibyân Publications),<br />

http://tibyan.wordpress.com/2007/08/24/39-ways-to-serve-and-participate-in-jihad/ (accessed<br />

June 30, 2008).<br />

ATC (2004) „ATC‟s OBL Crew Investigation,‟ Anti-Terrorism Coalition, July 1.<br />

Bakier, A. H. (2007) „Forum Users Improve Electronic Jihad Technology,‟ Terrorism Focus, 4:20,<br />

June 26.<br />

Bakier, A. H. (2008a) „Jihadi Website Advises Recruits on How to Join al-Qaeda,‟ Terrorism<br />

Focus, 5:18, May 6.<br />

Bakier, A. H. (2008b) „Jihadis Publish Online Recruitment Manual,‟ Terrorism Focus, 5:34,<br />

September 24.<br />

26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!