25.03.2013 Views

A View of Cyberterrorism Five Years Later

A View of Cyberterrorism Five Years Later

A View of Cyberterrorism Five Years Later

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

OSC (2008c) „Forum Member Discusses Importance <strong>of</strong> Jihadist Websites; Suggests Asking for<br />

Help,‟ Open Source Center, October 8.<br />

OSC (2008d) „Jihadist Forum Member Warns <strong>of</strong> “Intellectual Discord” in Forums,‟ Open Source<br />

Center, October 9.<br />

OSC (2008e) „Website Posts Article Expressing Concern That Members May Belong to<br />

Intelligence Services,‟ Opens Source Center, November 10.<br />

Pool, J. (2005a) „New Web Forum Postings Call for Intensified Electronic Jihad Against<br />

Government Websites,‟ Jamestown Foundation, August 23.<br />

Pool, J. (2005b) „Technology and Security Discussions on the Jihadist Forums,‟ Jamestown<br />

Foundation, October 11.<br />

Ranstorp, M. (2004) „Al-Qaida in Cyberspace: Future Challenges <strong>of</strong> Terrorism in an Information<br />

Age,‟ in L. Nicander and M. Ranstorp (eds) Terrorism in the Information Age – New Frontiers?<br />

(Stockholm: Swedish National Defence College).<br />

Regan, T. (1999) „How Terrorists Use the Internet to Spread Their Messages,‟ Christian Science<br />

Monitor, July 1.<br />

Reuters (2008) „US Military Says Hits Al Qaeda Propaganda Units,‟ Reuters, March 22.<br />

Reynalds, J. (2004) „Internet “Terrorist” Using Yahoo to Recruit 600 Muslims for Hack Attack,‟<br />

Mensnewsdaily.com, February 28,<br />

http://www.mensnewsdaily.com/archive/r/reynalds/04/reynalds022804.htm (accessed October 21,<br />

2008).<br />

32

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!