25.03.2013 Views

A View of Cyberterrorism Five Years Later

A View of Cyberterrorism Five Years Later

A View of Cyberterrorism Five Years Later

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Di Justo, P. (2002) „How Al-Qaida Site Was Hijacked,‟ Wired News, August 10, 2002.<br />

Drennan, S. and Black, A. (2007) „Jihad Online – The Changing Role <strong>of</strong> the Internet,‟ Janes.<br />

Freeh, L. J. (1997) Statement before the Senate Committee on Commerce, Science, and<br />

Transportation, regarding the Impact <strong>of</strong> Encryption on Law Enforcement and Public Safety, March<br />

19.<br />

Gardham, D. (2008) „Al-Qaeda Terrorists Who Brainwashed Exeter Suicide Bomber Still on the<br />

Run,‟ The Daily Telegraph, October 16, 2008.<br />

Glasser, S. B. and Coll, S. (2005) „The Web as Weapon: Zarqawi Intertwines Acts on Ground with<br />

Propaganda Campaign on the Internet,‟ The Washington Post, August 9.<br />

Ha‟aretz (2002) „Virtual Soldiers in a Holy War,‟ Ha’aretz Daily, September 16.<br />

Hall, A. (2005) „Al-Qaeda Chiefs Reveal World Domination Design,‟ The Age, August 24.<br />

Rossmiller, S. (2007) „My Cyber Counter-Jihad,‟ Middle East Quarterly, Summer.<br />

H<strong>of</strong>fman, B. (2003) „Al Qaeda, Trends in Terrorism, and Future Potentialities: An Assessment,<br />

Studies in Conflict & Terrorism, 26:429-442.<br />

H<strong>of</strong>fman, B. (2006) „The Use <strong>of</strong> the Internet By Islamic Extremists,‟ Testimony presented to the<br />

House Permanent Select Committee on Intelligence, May 4.<br />

Hooper, I. (2001) „Kabul Computer Reveals Files <strong>of</strong> Top Al Qaeda Officials,‟ Associated Press,<br />

December 21.<br />

28

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!