A View of Cyberterrorism Five Years Later
A View of Cyberterrorism Five Years Later
A View of Cyberterrorism Five Years Later
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Di Justo, P. (2002) „How Al-Qaida Site Was Hijacked,‟ Wired News, August 10, 2002.<br />
Drennan, S. and Black, A. (2007) „Jihad Online – The Changing Role <strong>of</strong> the Internet,‟ Janes.<br />
Freeh, L. J. (1997) Statement before the Senate Committee on Commerce, Science, and<br />
Transportation, regarding the Impact <strong>of</strong> Encryption on Law Enforcement and Public Safety, March<br />
19.<br />
Gardham, D. (2008) „Al-Qaeda Terrorists Who Brainwashed Exeter Suicide Bomber Still on the<br />
Run,‟ The Daily Telegraph, October 16, 2008.<br />
Glasser, S. B. and Coll, S. (2005) „The Web as Weapon: Zarqawi Intertwines Acts on Ground with<br />
Propaganda Campaign on the Internet,‟ The Washington Post, August 9.<br />
Ha‟aretz (2002) „Virtual Soldiers in a Holy War,‟ Ha’aretz Daily, September 16.<br />
Hall, A. (2005) „Al-Qaeda Chiefs Reveal World Domination Design,‟ The Age, August 24.<br />
Rossmiller, S. (2007) „My Cyber Counter-Jihad,‟ Middle East Quarterly, Summer.<br />
H<strong>of</strong>fman, B. (2003) „Al Qaeda, Trends in Terrorism, and Future Potentialities: An Assessment,<br />
Studies in Conflict & Terrorism, 26:429-442.<br />
H<strong>of</strong>fman, B. (2006) „The Use <strong>of</strong> the Internet By Islamic Extremists,‟ Testimony presented to the<br />
House Permanent Select Committee on Intelligence, May 4.<br />
Hooper, I. (2001) „Kabul Computer Reveals Files <strong>of</strong> Top Al Qaeda Officials,‟ Associated Press,<br />
December 21.<br />
28