References
- Al-Malahem. (2010). Inspire, Issue 1 (summer). Published by Al-Malahem Media of Al-Qaeda in the Arabian Peninsula.
- Al-Malahem. (2011). Inspire, Issue 6 (summer). Published by Al-Malahem Media of Al-Qaeda in the Arabian Peninsula.
- Archer, E. M. (2014). ‘Crossing the Rubicon: Understanding cyber terrorism in the European context. The European Legacy: Toward New Paradigms, 19(5), 606–621. 10.1080/10848770.2014.943495.
- Attewill, F. (2007, May 25). Race hate preacher Faisal deported. The Guardian. Retrieved from http://www.theguardian.com/uk/2007/may/25/terrorism.race.
- Bin Adam, A. A. (alias) (2011). Class notes from the security and intelligence course. Global Islamic Media Front.
- Cole, D. (2012, April 19). 39 ways to limit free speech. New York Review of Books. Retrieved from http://www.nybooks.com/blogs/nyrblog/2012/apr/19/39-ways-limit-free-speech/.
- Conway, M. (2002). Reality bytes: Cyberterrorism and terrorist “use” of the internet. First Monday, 7(11), Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/1001/922.
- Conway, M. (2005, September). Terrorist “use” of the internet and fighting back. Paper presented at the Oxford Internet Institute, Oxford University.
- Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism: The internet as a tool for influencing foreign policy. In J. Arquilla & D. Ronfeldt (Eds.), Networks and netwars: The future of terror, crime, and militancy (pp. 239–288). Santa Monica: RAND.
- Hoffman, B. (2009). Radicalization and subversion: Al Qaeda and the 7 July 2005 bombings and the 2006 airline bombing plot. Studies in Conflict and Terrorism, 32(12), 1100–1116. doi:10.1080/10576100903319896.
- Holbrook, D., & Taylor, M. (2014). Developing grading processes for ideological content. Journal of Policing, Intelligence and Counter Terrorism, 9(1), 32–47.
- Holbrook, D., Ramsay, G., & Taylor, M. (2013). “Terroristic content” – Towards a grading scale. Terrorism and Political Violence, 25, 202–223.
- Lia, B. (2006, April 27–28). Abu Musab Al Suri: Profile of a jihadist leader. Paper presented at “The Changing Faces of Jihadism” conference, King's College London.
- NurdRage. (2013). YouTube account. Retrieved from http://www.youtube.com/user/NurdRage.
- Ramsay, G. (2013). Jihadi culture on the World Wide Web. New York, NY: Bloomsbury.
- Regina v anonymous, date withheld (1). Opening note for sentence. Crown Prosecution Service.
- Regina v anonymous, date withheld (2). Provisional opening note. Crown Prosecution Service.
- Regina v anonymous, date withheld (3). Sequence of events schedule. Crown Prosecution Service.
- Regina v anonymous, date withheld (4). Closing speech. Crown Prosecution Service.
- Rosenfield, D. (2009). Rethinking cyber war. Critical Review, 21, 77–90.
- Scott, L. (1996). Car bomb recognition guide: How they're made, how to detect them. Boulder, CO: Paladin Press.
- Spycatcheronline.co.uk. (2014). Bug detector. Retrieved from http://www.spycatcheronline.co.uk/bug-detector-pr7000.html.
- Terrorism Act. (2006). Retrieved from http://www.legislation.gov.uk/ukpga/2006/11/contents.
- Weimann, G. (2004). www.terror.net: How modern terrorism uses the internet. Special Report. Washington, DC: United States Institute of Peace. Retrieved from http://www.usip.org/sites/default/files/sr116.pdf.
- Weimann, G. (2006). Terror on the internet: The new arena, the new challenges. Washington, DC: United States Institute for Peace Press.