References
304th MI BN OSINT Team. 2008. “Al Qaida-Like Mobile Discussions & Potential Creative Uses.” Intelligence Resource Program, Federation of American Scientists. Accessed February 12, 2014. http://fas.org/irp/eprint/mobile.pdf.
Adnkronos International. 2008. “Egypt: Sunni Scholars Sanction ‘Electronic Jihad.’” October 16. http://www1.adnkronos.com/AKI/English/Security/?id=3.0.2595019598.
The Advertiser. 2008. “‘Facebook’ Terrorism Investigation.” The Advertiser (Adelaide, Australia), April 5.
Agence France-Presse. 2013. “11 Killed as Syria Rebels, Kurds Clash.” Agence France-Presse, May 26. http://www.globalpost.com/dispatch/news/afp/130526/11-killed-syria-rebels-kurds-clash.
Ahlers, Mike M. 2004. “Blueprints for Terrorists?” CNN.com, October 19. http://www.cnn.com/2004/US/10/19/terror.nrc/.
Ahlqvist, Toni, Asta Bäck, Minna Halonen, and Sirkka Heinonen. 2008. Social Media Road Maps: Exploring the Futures Triggered by Social Media. VTT Tiedotteita—Valtion Teknillinen Tutkimuskeskus. VTT Research Notes 2454. http://www.vtt.fi/inf/pdf/tiedotteet/2008/T2454.pdf.
AIVD (General Intelligence and Security Service). 2012. Jihadism on the Web: A Breeding Ground for Jihad in the Modern Age. Amsterdam: Ministry of the Interior and Kingdom Relations of the Netherlands.
Akin, David. 2004. “Arrests Key Win for NSA Hackers.” Globe and Mail, April 6: A16. http://www.theglobeandmail.com/servlet/ArticleNews/TPStory/LAC/20040406/TERROR06/International/Idx/.
Al Raffie, Dina. 2012. “Whose Hearts and Minds? Narratives and Counter-Narratives of Salafi Jihadism.” Journal of Terrorism Research 3 (2): 13–31.
Aly, Anne, Dana Weimann-Saks, and Gabriel Weimann. 2014. “Making ‘Noise’ Online: An Analysis of the ‘Say No to Terror’ Online Campaign.” Perspectives on Terrorism 8 (5): 33–47. http://www.terrorismanalysts.com/pt/index.php/pot/article/view/376/html.
Amble, John Curtis. 2012. “Combating Terrorism in the New Media Environment.” Studies in Conflict & Terrorism 35 (5): 339–53.
American Civil Liberties Union (ACLU). 2003. “ACLU Says New Ashcroft Anti-Terror Proposal Undermines Checks and Balances.” ACLU, February 7. http://www.aclu.org/SafeandFree/SafeandFree.cfm?ID=11803&c=206.
Anderson, Chris. 2006. The Long Tail: Why the Future of Business Is Selling Less of More. New York: Hyperion.
Anderson, Craig A., and Brad J. Bushman. 2001. “Effects of Violent Video Games on Aggressive Behavior, Aggressive Cognition, Aggressive Affect, Physiological Arousal and Prosocial Behaviour: A Meta-Analytic Review of the Scientific Literature.” Psychological Science 12 (5): 353–59.
Anderson, Ross. 2008. Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd ed. New York: Wiley.
Anti-Defamation League. 2002. Jihad Online: Islamic Terrorists and the Internet. New York: Anti-Defamation League. http://archive.adl.org/internet/jihad_online.pdf.
———. 2013. “Terry Lee Loewen Planned Airport Bombing for Al Qaeda.” Extremism & Terrorism blog, December 13. http://blog.adl.org/extremism/terry-lee-loewen-airport-bomb-al-qaeda-revolution-muslim.
Archetti, Cristina. 2010. “Terrorism, Communication and the War of Ideas: Al-Qaida’s Strategic Narrative as a Brand.” Paper presented at the International Communication Association Annual Convention, Singapore, June 22–26.
———. 2012. Understanding Terrorism in the Age of Global Media: A Communication Approach. London: Palgrave Macmillan.
Armerding, Taylor. 2012. “Advanced Persistent Threats Can Be Beaten, Says Expert.” CSO Online, August 6. http://www.csoonline.com/article/2131881/critical-infrastructure/advanced-persistent-threats-can-be-beaten--says-expert.html.
Arquilla, John, and David Ronfeldt. 2001. “The Advent of Netwar (revisited).” In Networks and Netwars: The Future of Terror, Crime, and Militancy, edited by John Arquilla and David Ronfeldt, 1–25. Santa Monica, CA: RAND Corporation.
———. 2003. “Networks, Netwars, and the Fight for the Future.” First Monday 25: 1–25.
Arquilla, John, David Ronfeldt, and Michele Zanini. 2001. “Networks, Netwar and Information-Age Terrorism.” In Countering the New Terrorism, edited by Ian O. Lesser, Bruce Hoffman, John Arquilla, David F. Ronfeldt, Michele Zanini, and Brian Michael Jenkins, 75–111. Santa Monica, CA: RAND Corporation.
Associated Press. 2002. “Using Terror as a Pretext.” Wired.com, September 4. http://archive.wired.com/politics/law/news/2002/09/54939.
———. 2011. “Hacking in the Netherlands Took Aim at Internet Giants.” New York Times, September 5. http://www.nytimes.com/2011/09/06/technology/hacking-in-the-netherlands-broadens-in-scope.html.
———. 2012. “Terrorists May Be Eyeing Cyber Attacks on US.” Fox News, March 7. http://www.foxnews.com/us/2012/03/07/terrorists-may-be-eyeing-cyber-attacks-on-us/.
———. 2013. “Number of Active Users at Facebook over the Years.” Yahoo!News, May 1. http://news.yahoo.com/number-active-users-facebook-over-230449748.html.
Azuri, L. 2008. “Recent Rise in Sunni–Shi’ite Tension: Sunni–Shi’ite Hacker War on the Internet.” MEMRI Inquiry & Analysis Series Report 480, December 16. http://www.memri.org/report/en/0/0/0/0/0/0/3145.htm.
Ball, James. 2014. “NSA Collects Millions of Text Messages Daily in ‘Untargeted’ Global Sweep.” Guardian (London), January 16. http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep.
Ball, James, Julian Borger, and Glenn Greenwald. 2013. “Revealed: How US and UK Spy Agencies Defeat Internet Privacy and Security.” Guardian (London), September 5. http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security.
Bamford, James. 2012. “The NSA Is Building the Country’s Biggest Spy Center.” Wired. com, March 15. http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/.
Bar, Shmuel. 2006a. Warrant for Terror: The Fatwas of Radical Islam and the Duty to Jihad. Lanham, MD: Rowman and Littlefield Publishing.
———. 2006b. Jihad Ideology in Light of Contemporary Fatwas. Washington, DC: Hudson Institute.
BBC. 2009. “Islamists ‘Promote Jihad in Jail.’” BBC News, November 15. http://news.bbc.co.uk/2/hi/uk_news/8361440.stm.
———. 2011. “Kosovan Admits Shooting US Airmen at Frankfurt Airport.” BBC News, August 31. http://www.bbc.co.uk/news/world-europe-14727975.
———. 2013. “UK Cyber Defence Unit ‘May Include Hackers.’” BBC News, October 22. http://www.bbc.com/news/technology-24613376.
Beaumont, Claudine. 2009. “Twitter Hacker by ‘Iranian Cyber Army.’” Daily Telegraph (London), December 18. http://www.telegraph.co.uk/technology/twitter/6838993/Twitter-hacked-by-Iranian-Cyber-Army.html.
Bender, Bryan. 2008. “Unwittingly Hosting Terror.” Boston Globe, March 27. http://www.boston.com/business/articles/2008/03/27/unwittingly_hosting_terror/.
Bergen, Peter. 2007. “War of Error.” New Republic, October 15. http://www.newrepublic.com/article/politics/war-error.
———. 2013. “Are Mass Murderers Using Twitter as a Tool?” CNN.com, September 27. http://edition.cnn.com/2013/09/26/opinion/bergen-twitter-terrorism/.
Bergen, Peter, Bruce Hoffman, Michael Hurley, and Erroll G. Southers. 2013. Jihadist Terrorism: A Threat Assessment. Homeland Security Project. Washington, DC: Bipartisan Policy Center. http://bipartisanpolicy.org/sites/default/files/Jihadist%20Terrorism-A%20Threat%20Assesment_0.pdf.
Bergin, Anthony, Sulastri Bte Osman, Carl Ungerer, and Nur Azlin Mohamed Yasin. 2009. Countering Internet Radicalisation in Southeast Asia. Australian Strategic Policy Institute, Special Report 22, March 6. https://www.aspi.org.au/publications/special-report-issue-22-countering-internet-radicalisation-in-southeast-asia.
Betz, David. 2008. “The Virtual Dimension of Contemporary Insurgency and Counterinsurgency.” Small Wars & Insurgencies 19 (4): 510–40.
Blumenthal, Les. 2007. “U.S. Seeks to Counter Terrorists’ Use of the Internet.” Kansas City Star, September 23: A23.
Boccara, Marie-Hélène. 2004. “Islamist Websites and Their Hosts, Part I: Islamist Terror Organizations.” MEMRI Special Report 31, July 16. http://memri.org/report/en/0/0/0/0/0/50/1174.htm.
Boccara, Marie-Hélène, and Alex Greenberg. 2004. “Islamist Websites and Their Hosts, Part II: Clerics.” MEMRI Special Report 35, November 11. http://www.memri.org/report/en/0/0/0/0/0/50/1257.htm.
Bolz, Frank, Kenneth Dudonis, and David Schulz. 2002. The Counterterrorism Handbook: Tactics, Procedures, and Techniques. Boca Raton, FL: CRC Press.
Boyle, Louise, and Associated Press. 2013. “‘Brother Bin Laden is a great inspiration to me’: Authorities Thwart Suicide Bombing ‘By Islamic Extremist Flight Technician Who Plotted to Blow Up Kansas Airport.’” Daily Mail (London), December 13. http://www.dailymail.co.uk/news/article-2523387/Authorities-thwart-suicide-bombing-Islamic-extremist-flight-technician-plotted-blow-Kansas-airport.html.
Brahimi, Alia. 2010. The Taliban’s Evolving Ideology. London School of Economics: Global Governance Working Paper.
Braun, Michael. 2008. “Drug Trafficking and Middle Eastern Terrorist Groups: A Growing Nexus?” Washington Institute for Near East Policy, July 25. http://www.washingtoninstitute.org/policy-analysis/view/drug-trafficking-and-middle-eastern-terrorist-groups-a-growing-nexus.
Brickey, Jonalan. 2012. “Defining Cyberterrorism: Capturing a Broad Range of Activities in Cyberspace.” CTC Sentinel 5 (8): 4–6. https://www.ctc.usma.edu/posts/defining-cyberterrorism-capturing-a-broad-range-of-activities-in-cyberspace.
Buckley, Cara, and William K. Rashbaum. 2007. “4 Men Accused of Plot to Blow Up Kennedy Airport Terminals and Fuel Lines.” New York Times, June 3. http://www.nytimes.com/2007/06/03/nyregion/03plot.html.
Bunt, Gary. 2000. Virtually Islamic: Computer-Mediated Communication and Cyber Islamic Environment. Cardiff: University of Wales Press.
———. 2003. Islam in the Digital Age: E-Jihad, Online Fatwas and Cyber Islamic Environments. London: Pluto.
———. 2009. iMuslims: Rewiring the House of Islam. Chapel Hill: University of North Carolina Press.
Busch, Nathan E., and Austen D. Givens. 2012. “Public-Private Partnerships in Homeland Security: Opportunities and Challenges.” Homeland Security Affairs 8, Article 18 (October). http://www.hsaj.org/?article=8.1.18.
Carroll, Roy. 2012. “US Urged to Recruit Master Hackers to Wage Cyber War on America’s Foes.” Guardian (London), July 10. http://www.theguardian.com/technology/2012/jul/10/us-master-hackers-al-qaida.
Carter, Sara. 2013. “Feds Take Little Action Against U.S. Web Companies Hosting Sites Linked to Terror.” Washington Times, May 15. http://www.washingtontimes.com/news/2013/may/15/feds-take-little-action-against-us-web-companies-h/.
Casebeer, William A., and James Russell. 2005. “Storytelling and Terrorism: Towards a Comprehensive ‘Counter-Narrative Strategy.’” Strategic Insights 6 (3). http://calhoun.nps.edu/bitstream/handle/10945/11132/casebeerMar05.pdf.
Chaffey, Dave. 2004. “E-marketing Strategy—An In-Depth Guide.” Marketing Insights. http://www.marketing-insights.co.uk/wnim0402.htm.
Chaffey, Dave, Richard Mayer, Kevin Johnston, and Fiona Ellis-Chadwick. 2000. Internet Marketing: Strategy, Implementation and Practice. Harlow, UK: Person Education Ltd.
Change Institute. 2008. Studies into Violent Radicalisation: The Beliefs, Ideologies and Narratives. February. European Commission—Directorate-General for Justice, Freedom and Security. http://www.changeinstitute.co.uk/images/publications/changeinstitute_beliefsideologiesnarratives.pdf.
Cilluffo, Frank. 2013. “Countering Use of the Internet for Terrorist Purposes.” Statement before the United Nations Security Council Counter Terrorism Committee, May 24, 2013. http://www.un.org/en/sc/ctc/docs/2013/2013-05-24_GWU-Session%20III.pdf.
Clapper, James R., Jr. 2014. “Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community.” Senate Select Committee on Intelligence, January 29. Office of the Director of National Intelligence. http://www.dni.gov/files/documents/Intelligence%20Reports/2014%20WWTA%20%20SFR_SSCI_29_Jan.pdf.
Clayton, Mark. 2013. “Terrorist Tweets: How Al Qaeda’s Social Media Move Could Cause Problems.” Christian Science Monitor, February 7. http://www.csmonitor.com/USA/2013/0207/Terrorist-tweets-how-Al-Qaeda-s-social-media-move-could-cause-problems.
Clean IT Project. 2012. “Clean IT Project—Detailed Recommendations Document.” EDRi (European Digital Rights). August 28. http://www.edri.org/files/cleanIT_sept2012.pdf.
———. 2013. Reducing Terrorist Use of the Internet. January. http://www.nctv.nl/Images/reducing-terrorist-use-of-the-internet_tcm126-485438.pdf.
Cobb, Tyrus W. 2013. “Two Worrisome Scenarios on the Boston Bombers.” National Security Forum, May 16. http://nationalsecurityforum.org/domestic-news/homeland-security/two-worrisome-scenarios-on-the-boston-bombers/.
Cole, Matthew. 2011. “New Al-Qaeda Video: American Muslims Should Buy Guns, Start Shooting People.” ABC News, June 3. http://abcnews.go.com/Blotter/al-qaeda-video-buy-automatic-weapons-start-shooting/story?id=13704264.
Coll, Steve, and Susan Glasser. 2005. “Terrorists Turn to the Web as Base of Operations.” Washington Post, August 7. http://www.washingtonpost.com/wp-dyn/content/article/2005/08/05/AR2005080501138.html.
Collin, Barry. 1997. “The Future of Cyberterrorism.” Crime & Justice International Journal 13 (2). http://www.cjimagazine.com/archives/cji4c18.html?id=415.
Collins, Nick. 2010. “YouTube Radicalisation: Video Site Directed MP’s Attacker to Extremist Videos.” Daily Telegraph (London), November 4. http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/8109613/YouTube-radicalisation-video-site-directed-MPs-attacker-to-extremist-videos.html.
———. 2013. “Cyber Terrorism Is ‘Biggest Threat to Aircraft.’” Daily Telegraph (London), December 23. http://www.telegraph.co.uk/finance/newsbysector/transport/10526620/Cyber-terrorism-is-biggest-threat-to-aircraft.html.
Conway, Maura. 2002. “Reality Bytes: Cyberterrorism and Terrorist ‘Use’ of the Internet.” First Monday 7. http://www.firstmonday.org/ojs/index.php/fm/issue/view/151.
———. 2005. “Terrorist ‘Use’ of the Internet and Fighting Back.” Paper presented at the “Cybersafety: Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities” conference, Oxford Internet Institute, Oxford University, UK, September 8–10. http://www.oii.ox.ac.uk/microsites/cybersafety/extensions/pdfs/papers/maura_conway.pdf.
Conway, Maura, and Lisa McInerney. 2008. “Jihadi Video & Auto-Radicalisation: Evidence from an Exploratory YouTube Study.” In Proceedings of the 1st European Conference on Intelligence and Security Informatics, Esbjerg, Denmark, December 3–5. http://doras.dcu.ie/2253/2/youtube_2008.pdf.
Cooper, Abraham. 2009. Facebook, YouTube +: How Social Media Outlets Impact Digital Terrorism and Hate. Los Angeles: Simon Wiesenthal Center. http://www.wiesenthal.com/atf/cf/%7B54d385e6-f1b9-4e9f-8e94-890c3e6dd277%7D/NY-RELEASE.PDF.
COT/Transnational Terrorism, Security, and the Rule of Law (COT/TTSRL). 2007. Lone-Wolf Terrorism. Case Study for Work Package 3: Citizens and Governance in a Knowledge-Based Society. http://www.transnationalterrorism.eu/tekst/publications/Lone-Wolf%20Terrorism.pdf.
Coviello, Nicole E., Roderick J. Brodie, Richard W. Brookes, and Roger A. Palmer. 2003. “Assessing the Role of e-Marketing in Contemporary Marketing Practice.” Journal of Marketing Management 19 (7–8): 857–81.
Crabbe, Nathan. 2011. “Al-Qaida Becoming Irrelevant, CNN Analyst Tells UF Audience.” Gainsville Sun. October 12. http://www.gainesville.com/article/20111012/ARTICLES/111019807.
Cronin, Audrey Kurth. 2006. “Cyber-Mobilization: The New Levée en Masse.” Parameters (Summer): 77–87. http://strategicstudiesinstitute.army.mil/pubs/parameters/Articles/06summer/cronin.pdf.
Dal Cin, Sonya, Mark P. Zanna, and Geoffrey T. Fong. 2004. “Narrative Persuasion and Overcoming Resistance.” In Resistance and Persuasion, edited by Eric S. Knowles and Jay A. Linn, 175–92. Mawah, NJ: Erlbaum.
Davis, Anthony. 2002. “The Afghan Files: Al-Qaeda Documents from Kabul.” Jane’s Intelligence Review 14 (2): 14–19.
Denning, Dorothy. 1998. Information Warfare and Security, New York: Addison-Wesley.
———. 2000. “Cyberterrorism: Testimony before the Special Oversight Panel on Terrorism.” Statement to U.S. House of Representatives, Committee on Armed Services, May 23. http://www.stealth-iss.com/documents/pdf/CYBERTERRORISM.pdf.
———. 2001. “Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy.” In Networks and Netwars: The Future of Terror, Crime, and Militancy, edited by John Arquilla and David Ronfeldt, 239–88. Santa Monica, CA: RAND Corporation.
———. 2010. “Terror’s Web: How the Internet Is Transforming Terrorism.” In Handbook of Internet Crime, edited by Yvonne Jewkes and Majid Yar, 194–213. Cullompton, UK: Willan Publishing.
Department of Homeland Security. 2010. “DHS Terrorist Use of Social Networking Facebook Case Study.” PublicIntelligence.net, December 5. http://publicintelligence.net/ufouoles-dhs-terrorist-use-of-social-networking-facebook-case-study/.
Department of Justice. 2010. “Pennsylvania Woman Indicted in Plot to Recruit Violent Jihadist Fighters and to Commit Murder Overseas.” Office of Public Affairs. March 9. http://www.justice.gov/opa/pr/2010/March/10-ag-238.html.
Department of State. 2013. Country Reports on Terrorism 2012. Office of the Coordinator for Counterterrorism. May 2013. http://www.state.gov/documents/organization/210204.pdf.
Department of State. 2014a. “Foreign Terrorist Organizations.” Accessed September 16, 2014. http://www.state.gov/j/ct/rls/other/des/123085.htm.
———. 2014b. “State Sponsors of Terrorism.” Accessed September 16, 2014. http://www.state.gov/j/ct/list/c14151.htm.
deYoung, Karen. 2006. “Spy Agencies Say Iraq War Hurting U.S. Terror Fight,” Washington Post, September 24. http://www.washingtonpost.com/wp-dyn/content/article/2006/09/23/AR2006092301130.html.
Dobson, Christopher, and Ronald Paine. 1977. The Carlos Complex: A Pattern of Violence. London: Hodder and Stoughton.
Dodd, Vikram. 2010. “Roshonara Choudhry: I Wanted to Die … I Wanted to Be a Martyr.” Guardian (London), November 3. http://www.theguardian.com/uk/2010/nov/04/stephen-timms-attack-roshonara-choudhry.
Dorgan, Bryan. 2013. “Cyber Terror Is the New Language of War.” Huffington Post, July 17. http://www.huffingtonpost.com/sen-byron-dorgan/cyber-terror-is-the-new-l_b_3612888.html.
Dunn-Cavelty, Myriam, and Manuel Suter. 2009. “Public–Private Partnerships Are No Silver Bullet: An Expanded Governance Model for Critical Infrastructure Protection.” International Journal of Critical Infrastructure Protection 2 (4): 179–87.
Electronic Frontier Foundation. 2014. “How the NSA’s Domestic Spying Program Works.” Accessed September 16, 2014. https://www.eff.org/nsa-spying/how-it-works.
Electronic Privacy Information Center. 2005. “The USA Patriot Act.” May 24. Accessed April 2, 2014. http://www.epic.org/privacy/terrorism/usapatriot/.
Erwin, Michael. 2008. “Key Factors for the Recent Growth of the Afghan Insurgency.” CTC Sentinel 1 (9): 9–11. http://www.ctc.usma.edu/posts/key-factors-for-the-recent-growth-of-the-afghan-insurgency.
Etzioni, Amitai. 1999. The Limits of Privacy. New York: Basic Books.
———. 2002. “Seeking Middle Ground on Privacy vs. Security.” Commentary, October 15.
European Commission. 2008. “Radicalization Processes Leading to Acts of Terrorism.” Expert Group on Violent Radicalization, European Commission. http://www.clingendael.nl/sites/default/files/20080500_cscp_report_vries.pdf.
Europol. 2012. Annual Terrorism Situation and Trend Report. European Police Office. https://www.europol.europa.eu/sites/default/files/publications/europoltsat.pdf.
Facebook. 2014. “Our Mission.” Facebook.com. Accessed September 14, 2014. http://newsroom.fb.com/company-info/.
Fahd, Shaykh Nasir bin Hamid al-. 2003. “A Treatise on the Legal Status of Using Weapons of Mass Destruction Against Infidels.” May. Accessed April 9, 2014. http://ahlussunnahpublicaties.files.wordpress.com/2013/04/42288104-nasir-al-fahd-the-ruling-on-using-weapons-of-mass-destruction-against-the-infidels.pdf.
Farmer, Ben. 2013. “NATO Suffered 2,500 Cyber Attacks in 2012.” Daily Telegraph (London), January 4. http://www.telegraph.co.uk/news/uknews/defence/10099525/Nato-suffered-2500-cyber-attacks-in-2012.html.
Federal Bureau of Investigation. 2013. “Botnets 101: What They Are and How to Avoid Them.” June 5. http://www.fbi.gov/news/news_blog/botnets-101/botnets-101-what-they-are-and-how-to-avoid-them.
Finn, Peter. 2012. “Inspire, Al-Qaeda’s English-language Magazine, Returns Without Editor Awlaki.” Washington Post, May 2. http://www.washingtonpost.com/world/national-security/inspire-al-qaedas-english-language-magazine-returns-without-editor-awlaki/2012/05/02/gIQAiEPMxT_story.html.
Fink, Naureen Chowdhury, and Jack Barclay. 2013. Mastering the Narrative: Counterterrorism Strategic Communication and the United Nations. Washington, DC: Center on Global Counterterrorism Cooperation. http://www.globalcenter.org/wp-content/uploads/2013/03/Feb2013_CT_StratComm.pdf.
Forest, James J. F. 2012. “Perception Challenges Faced by Al-Qaeda on the Battlefield of Influence Warfare.” Perspectives on Terrorism 6 (1): 8–22. http://www.terrorismanalysts.com/pt/index.php/pot/article/view/forest-perception-challenges.
Foster, Peter. 2013. “‘Bogus’ AP tweet about explosion at the White House wipes billions off US markets.” Daily Telegraph (London), April 23. http://www.telegraph.co.uk/finance/markets/10013768/Bogus-AP-tweet-about-explosion-at-the-White-House-wipes-billions-off-US-markets.html.
Fouda, Yosri, and Nick Fielding. 2003. Masterminds of Terror: The Truth Behind the Most Devastating Terrorist Attack the World Has Ever Seen. New York: Arcade.
Freamon, Bernard K. 2003. “Martyrdom, Suicide, and the Islamic Law of War: A Short Legal History.” Fordham International Law Journal 27: 299–369.
Freedman, Lawrence. 2006. The Transformation of Strategic Affairs. London: International Institute for Strategic Studies.
Friedman, Thomas. 2009. “America vs. The Narrative.” New York Times, November 28. http://www.nytimes.com/2009/11/29/opinion/29friedman.html.
Friscolanti, Michael. 2013. “The Self-Radicalized Terrorist Next Door.” Maclean’s, July 12. http://www.macleans.ca/society/life/the-terrorist-next-door-2/.
Fuller, Graham. 2004. The Future of Political Islam. New York: Palgrave Macmillan.
Gadahn, Adam Yahiye. 1995. “Becoming Muslim.” Free Republic. Accessed April 3, 2014. http://www.freerepublic.com/focus/f-news/1482394/posts.
Gardels, Nathan. 2009. “Mike McConnell: An American Spymaster on Cyberwar.” Huffington Post, July 8. http://www.huffingtonpost.com/nathan-gardels/mike-mcconnell-an-america_b_227944.html.
Gardham, Duncan. 2010. “Anwar al-Awlaki: MI5 Warns of the al-Qaeda Preacher Targeting Britain.” Daily Telegraph (London), June 11. http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/7822761/Anwar-al-Awlaki-MI5-warns-of-the-al-Qaeda-preacher-targeting-Britain.html.
Gartenstein-Ross, David, and Laura Grossman. 2009. Homegrown Terrorists in the U.S. and U.K. Washington, DC: FDD Press.
Gerrig, Richard. 1993. Experiencing Narrative Worlds. New Haven, CT: Yale University Press.
Gertz, Bill. 2011. “Iran Militia Claims Credit for VOA Cyberstrike.” Washington Times, February 22. http://www.washingtontimes.com/news/2011/feb/22/iran-militia-claims-credit-for-voa-cyberstrike/.
Gerwehr, Scott, and Sara Daly. 2006. “Al-Qaida: Terrorist Selection and Recruitment.” In The McGraw-Hill Homeland Security Handbook, edited by David Kamien, 73–89. New York, McGraw-Hill.
Gillam, Carey. 2013. “Man Arrested for Suspected Suicide Plot to Blow Up Kansas Airport.” Reuters.com, December 13. http://www.reuters.com/article/2013/12/13/us-usa-kansas-plot-idUSBRE9BC0UI20131213.
Glasser, Susan, and Steve Coll. 2005. “The Web as a Weapon.” Washington Post, August 9. http://www.washingtonpost.com/wp-dyn/content/article/2005/08/08/AR2005080801018.html.
Goncalves, Jorge, Vassilis Kostakos, and Jayant Venkatanathan. 2013. “Narrowcasting in Social Media: Effects and Perceptions.” In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 502–9. New York: IEEE/ACM.
Goodenough, Patrick. 2013. “‘Sexual Jihad’ Fatwa Urges ‘Temporary Marriages’ for Syrian Rebels.” CNS News, March 29. http://cnsnews.com/news/article/sexual-jihad-fatwa-urges-temporary-marriages-syrian-rebels.
Gorge, Mathieu. 2007. “Cyberterrorism: Hype or Reality?” Computer Fraud & Security 2007 (2): 9–12.
Gorman, Siobhan, and Julian E. Barnes. 2014. “Iranian Hacking to Test NSA Nominee Michael Rogers.” Wall Street Journal, February 18. http://online.wsj.com/news/articles/SB10001424052702304899704579389402826681452.
Gorman, Siobhan, and Devlin Barrett. 2014. “White House Weighs Options for Revamping NSA Surveillance.” Wall Street Journal, February 25. http://online.wsj.com/articles/SB10001424052702303880604579405640624409748.
Gorman, Siobhan, and Danny Yadron. 2013. “Iran Hacks Energy Firms, U.S. Says.” Wall Street Journal, May 27. http://online.wsj.com/news/articles/SB10001424127887323336104578501601108021968.
Graham, Robert. 2001. “Carnivore FAQ (Frequently Asked Questions).” October 6. http://www.robertgraham.com/pubs/carnivore-faq.html. Archived at http://corz.org/public/docs/privacy/carnivore-faq.html.
Green, Melanie C., and Timothy C. Brock. 2000. “The Role of Transportation in the Pervasiveness of Public Narratives.” Journal of Personality and Social Psychology 79 (5): 701–21.
Green, Melanie C., Jeffrey J. Strange, and Timothy C. Brock, ed. 2002. Narrative Impact: Social and Cognitive Foundations. Mahwah, NJ: Erlbaum.
Greenberg, Andy. 2010. “‘Here You Have’ Virus Writer Claims Credit in Video Denouncing Iraq Invasion.” Forbes, September 13. http://www.forbes.com/sites/andygreenberg/2010/09/13/here-you-have-virus-writer-claims-credit-in-video-denouncing-iraq-invasion/.
Guttman, Nathan. 2012. “Should Terror Groups Be Able To Tweet and Use YouTube?” Forward, August 17: 1–8.
Hafner, Katie, and Saritha Rai. 2005. “Governments Tremble at Google’s Bird’s-Eye View.” New York Times, December 20. http://www.nytimes.com/2005/12/20/technology/20image.html.
Halloran, Richard. 2007. “Strategic Communication.” Parameters (Autumn): 4–14. http://strategicstudiesinstitute.army.mil/pubs/parameters/Articles/07autumn/halloran.pdf.
Halverson, Jeffrey, Steven Corman, and H. L. Goodall. 2011. Master Narratives of Islamist Extremism. New York: Palgrave Macmillan.
Hamilton College. 2002. Hamilton College Muslim America Poll. Zogby International /Arthur Levitt Public Affairs Center, May 30. http://www.hamilton.edu/news/MuslimAmerica/MuslimAmerica.pdf.
“Happy Snaps of a Suicide Bomber.” 2004. South African Star, January 27. http://www.thestar.co.za/index.php?fSectionId=129&fArticleId=334925.
Harding, Thomas. 2007. “Terrorists ‘Use Google Maps to Hit UK Troops.’” Daily Telegraph (London), January 13. http://www.telegraph.co.uk/news/worldnews/1539401/Terrorists-use-Google-maps-to-hit-UK-troops.html.
Harman, Jane. 2014. “Future Terrorists.” Los Angeles Times, January 6. http://articles.latimes.com/2014/jan/06/opinion/la-oe-harman-terrorism-response-20140106
Hazan, D. 2008. “Women’s Forums on Islamist Websites—Tools for Preparing Women to Carry Out Jihad and Suicide Operations.” MEMRI Inquiry & Analysis Series Report 419, February 1. http://www.memri.org/report/en/0/0/0/0/0/0/2620.htm.
Heffelfinger, Christopher, 2010. “Waiting out the Islamist Winter: Creating and Effective Counter Narrative to ‘Jihad.’” Paper presented at the GTReC ARC Linkage Project on Radicalisation Conference, November 8. http://artsonline.monash.edu.au/radicalisation/files/2013/03/conference-2010-counter-narratives-ch.pdf.
———. 2013. “The Risks Posed by Jihadist Hackers.” CTC Sentinel 6 (71): 1–4. http://www.ctc.usma.edu/wp-content/uploads/2013/07/CTCSentinel-Vol6Iss71.pdf.
Hegghamer, Thomas. 2006. “Global Jihadism After the Iraq War.” Middle East Journal 60 (1): 11–32.
Helfont, Samuel. 2009. The Sunni Divide: Understanding Politics and Terrorism in the Arab Middle East. Philadelphia: Center for Terrorism and Counterrorism at the Foreign Policy Research Institute.
Heller, Jeffrey. 2013. “Iran Ups Cyber Attacks on Israeli Computers: Netanyahu.” Reuters, June 9. http://www.reuters.com/article/2013/06/09/us-israel-iran-cyber-idUSBRE95808H20130609.
Hershman, Tania. 2001. “Israel’s ‘First Internet Murder.’” Wired.com, January 19. Accessed April 15, 2014. http://archive.is/t3eR.
Hirsh, Michael. 2012. “Can Obama Safely Embrace Islamists?” National Journal, April 23. http://www.nationaljournal.com/blogs/decoded/2012/04/can-obama-safely-embrace-islamists--23.
Hoffman, Bruce. 2006a. Inside Terrorism, revised version. New York: Columbia University Press.
———. 2006b. “The Use of the Internet by Islamic Extremists,” Testimony presented to the House Permanent Select Committee on Intelligence, May 4, 2006. http://www.au.af.mil/au/awc/awcgate/congress/hoffman_testimony4may06.pdf
Hoffman, Bruce, Mary Habeck, Aaron Y. Zelin, and Matthew Levitt. 2012. “Is al-Qaeda Central Still Relevant?” Washington Institute for Near East Policy. September 10. https://www.washingtoninstitute.org/policy-analysis/view/is-al-qaeda-central-still-relevant.
Holden, Michael. 2008. “Qaeda Videos Show Boys in Mock Attacks.” Reuters, February 6. http://www.reuters.com/article/2008/02/06/us-iraq-idUSL1880448320080206.
Holtmann, Philipp. 2013. “Countering Al-Qaeda’s Single Narrative.” Perspectives on Terrorism 7 (2): 141–46. http://www.terrorismanalysts.com/pt/index.php/pot/article/view/262/html.
Home Office of the United Kingdom (Home Office). 2014. “Proscribed Terrorist Organisations.” November 28. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/380939/ProscribedOrganisations.pdf.
Homeland Security Policy Institute/Critical Incident Analysis Group (HSPI/CIAG). 2007. NETworked Radicalization: A Counter-Strategy. Homeland Security Policy Institute (George Washington University) and Critical Incident Analysis Group (University of Virginia). http://homelandsecurity.gwu.edu/files/downloads/HSPI_Report_11.pdf.
Homeland Security Television. 2011. “Public-Private Partnerships for Homeland Security.” YouTube video, 7:36. August 3. http://www.youtube.com/watch?v=ka6dgMxLrJI.
Horwitz, Sari. 2013. “Investigators Sharpen Focus on Wife of Dead Boston Bombing Suspect.” Washington Post, May 3. http://www.washingtonpost.com/world/national-security/investigators-sharpen-focus-on-boston-bombing-suspects-widow/2013/05/03/a2cd9d28-b413-11e2-baf7-5bc2a9dc6f44_story.html.
Hudson, John. 2012. “U.S. Counter-Terrorism Hackers Fight Al Qaeda One Prank at a Time.” The Wire, May 24. http://www.thewire.com/global/2012/05/us-counter-terrorism-hackers-fight-al-qaeda-one-prank-time/52747/.
Ibrahim, Raymond. 2013. “Fatwa Permits Rape of Non-Sunni Women in Syria.” FrontpageMag.com, April 4. http://www.frontpagemag.com/2013/raymond-ibrahim/fatwa-permits-rape-of-non-sunni-women-in-syria/.
Intelligence and Terrorism Information Center. 2007. “The Main Points of Ayman al-Zawahiri’s Statement as Broadcasted on Al-Jazeera TV.” Israel Intelligence Heritage and Commemoration Center, March 11. http://www.terrorism-info.org.il/data/pdf/PDF_07_058_2.pdf.
Interactive Advertising Bureau. 2013. “IAB Internet Advertising Revenue Report.” PwC and Interactive Advertising Bureau. April. Accessed April 12, 2014. http://www.iab.net/media/file/IAB_Internet_Advertising_Revenue_Report_FY_2012_rev.pdf.
Internet Haganah. 2011. “Jose-Pimentel, a-k-a Mohammad-Yusuf.” November 21. Accessed March 4, 2014. http://forum.internet-haganah.com/archive/index.php/t-358.html.
The Investigative Project on Terrorism. 2014. “State of New York v. Pimentel, Jose.” Washington, DC. Accessed September 18, 2014. http://www.investigativeproject.org/case/602.
Jacobson, Michael. 2008. “Why Terrorists Quit: Gaining from Al Qa’ida’s Losses.” CTC Sentinel 1 (8): 1–4. https://www.ctc.usma.edu/posts/why-terrorists-quit-gaining-from-al-qaida%E2%80%99s-losses.
———. 2010a. Learning Counter-Narrative Lessons from Cases of Terrorist Dropouts. The Hague: National Coordinator for Counterterrorism. https://www.washingtoninstitute.org/uploads/Documents/opeds/4b7aaf56ca52e.pdf.
———. 2010b. “Terrorist Financing and the Internet.” Studies in Conflict & Terrorism 33 (4): 353–63.
Jenkins, Brian. 1975. International Terrorism. Los Angeles: Crescent Publication.
———. 2011. Is Al Qaeda’s Internet Strategy Working? Santa Monica, CA: RAND Corporation. http://www.rand.org/pubs/testimonies/CT371.html
Jihadi Websites Monitoring Group. 2010. “Periodical Review: Fatwas—October 2010.” November. Herzliya, Israel: International Institute for Counter-Terrorism. http://www.ict.org.il/Article.aspx?ID=356.
“Jihadist Forum Suggests YouTube Invasion.” 2008. Daily Telegraph (London), December 4. http://www.telegraph.co.uk/news/worldnews/northamerica/usa/3547072/Jihadist-forum-calls-for-YouTube-Invasion.html.
Johnston, Philip. 2007. “MI5: Al-Qa’eda Recruiting UK Children for Terror.” Daily Telegraph (London), November 5. http://www.telegraph.co.uk/news/uknews/1568363/MI5-Al-Qaeda-recruiting-UK-children-for-terror.html.
Joint Chiefs of Staff. 2010. Psychological Operations (Joint Pub. 3-13.2). January 7. Washington, DC: US Government Printing Office.
Jost, Janis, and Curti Covi. 2013. Terrorismus in London und Paris? Zwischen Ideologie und Frustration [Terrorism in London and Paris? Between ideology and frustration]. ISPK Policy Brief No. 2, June 18. http://www.ispk.uni-kiel.de/fileadmin/user_upload/Kieler%20Analysen%20zur%20Sicherheitspolitik/ISPK_Policy_Brief/ISPK_PB2__18.06.2013_.pdf.
Kaplan, Eben. 2009. “Terrorists and the Internet.” Washington, DC: Council on Foreign Relations. http://www.cfr.org/terrorism-and-technology/terrorists-internet/p10005.
Kaplow, Louis, and Steven Shavell. 2002. Fairness versus Welfare. Cambridge, MA: Harvard University Press.
Kassimeris, George, and John Buckley. 2010. The Ashgate Research Companion to Modern Warfare. Farnham, UK: Ashgate.
Katz, Mark. 2011. “The ‘War on Terror’: Future Directions.” Middle East Policy Council. January 25. http://www.mepc.org/articles-commentary/commentary/war-terror-future-directions.
Katz, Rita, and Josh Devon. 2014. “Jihad on YouTube.” SITE Special Report, January 15. https://news.siteintelgroup.com/Featured-Article/jihad-on-youtube.html.
Katz, Rita, and Adam Raisman. 2013. “Special Report on the Power Struggle Between al-Qaeda Branches and Leadership: Al-Qaeda in Iraq vs. Al-Nusra Front and Zawahiri.” SITE Special Report, June. http://news.siteintelgroup.com/index.php/18-articles-a-analysis/3195-special-report-on-the-power-struggle-between-al-qaeda-branches-and-leadership-al-qaeda-in-iraq-vs-al-nusra-front-and-zawahiri.
———. 2014. “Syrian Jihad: The Weakening of al-Qaeda’s Leadership.” SITE Monitoring Service, April 8. https://news.siteintelgroup.com/Articles-Analysis/syrian-jihad-the-weakening-of-al-qaeda-s-leadership.html.
Kennedy, Jonathan and Gabriel Weimann. 2011. “The Strength of Weak Terrorist Ties.” Terrorism and Political Violence 23 (2): 201–12.
Khatchadourian, Raffi. 2007. “Azzam the American: The Making of an Al Qaeda Homegrown.” New Yorker, January 22. http://www.newyorker.com/reporting/2007/01/22/070122fa_fact_khatchadourian.
Khayat, M. 2013. “Jihadis’ Responses to Widespread Decline In Participation On Jihadi Forums; Increased Use Of Twitter.” MEMRI Inquiry & Analysis Series Report 955, March 29. http://www.memri.org/report/en/0/0/0/0/0/0/7106.htm.
King, Meg. 2014. “Opinion: The Errors Between 1s and 0s.” CNN Security Clearance, January 17. http://security.blogs.cnn.com/2014/01/17/opinion-the-errors-between-1s-and-0s/.
Klein, Ezra, and Evan Soltas. 2014. “Wonkbook: How Americans Feel About Inequality.” Washington Post blog, January 21. http://www.washingtonpost.com/blogs/wonkblog/wp/2014/01/21/wonkbook-how-americans-feel-about-inequality/.
Kohlmann, Evan. 2006. “The Real Online Terrorist Threat.” Foreign Affairs. September /October. http://www.foreignaffairs.com/articles/61924/evan-f-kohlmann/the-real-online-terrorist-threat.
———. 2009. “A Web of Lone Wolves.” Foreign Policy, November 13. http://www.foreignpolicy.com/articles/2009/11/13/a_web_of_lone_wolves.
———. 2011. “The Antisocial Network: Countering the Use of Online Social Networking Technologies by Foreign Terrorist Organizations.” Testimony before the House Committee on Homeland Security on “Jihadist Use of Social Media—How to Prevent Terrorism and Preserve Innovation,” December 6. http://homeland.house.gov/sites/homeland.house.gov/files/Testimony%20Kohlmann%5B1%5D.pdf.
Kovacs, Eduard. 2013a. “US Department of State, Pentagon Websites Hacked by Tunisian Cyber Army.” Softpedia News, January 3. http://news.softpedia.com/news/Week-4-of-Operation-Ababil-2-Hackers-to-Attack-9-US-Banks-318056.shtml.
———. 2013b. “Week 4 of Operation Ababil 2: Hackers to Attack 9 US Banks.” Softpedia News, January 3. http://news.softpedia.com/news/Week-4-of-Operation-Ababil-2-Hackers-to-Attack-9-US-Banks-318056.shtml.
Kull, Steven, Clay Ramsay, Stephen Weber, Evan Lewis, and Ebrahim Mohseni. 2009. Public Opinion in the Islamic World on Terrorism, al Qaeda, and US Policies. WorldPublicOpinion.org. Program on International Policy Attitudes, University of Maryland. http://www.worldpublicopinion.org/pipa/pdf/feb09/STARTII_Feb09_rpt.pdf.
Kumar, Mohit. 2012. “US Authorities: Iranian Hackers Are Becoming a Real Pain.” TheHackerNews.com, October 14. http://thehackernews.com/2012/10/us-authorities-iranian-hackers-are.html/.
Kumar, Nirmalya. 1999. “Internet Distribution Strategies: Dilemmas for the Incumbent.” Financial Times, March 15: 6–7. http://faculty.london.edu/nkumar/assets/documents/Internet_distribution_strategies_-_Dilemmas_for_the_incumbent.pdf.
Labi, Nadya. 2006. “Jihad 2.0.” Atlantic Monthly, July 1. http://www.theatlantic.com/doc/prem/200607/online-jihad.
Lal, Vinay. 2002. “Terror and Its Networks: Disappearing Trails in Cyberspace (draft).” The Nautilus Institute. http://oldsite.nautilus.org/gps/virtual-diasporas/paper/Lal.html.
Landler, Mark, and John Markoff. 2007. “Digital Fears Emerge After Data Siege in Estonia.” New York Times, May 29. http://www.nytimes.com/2007/05/29/technology/29estonia.html.
Langford, Duncan. 1998. “Ethics @ the Internet: Bilateral Procedures in Electronic Communication.” In Cyberspace Divide: Equality, Agency and Policy in the Information Society, edited by Brian D. Loader, 98–112. London: Routledge.
Lappin, Yaakov. 2014. “3 East Jerusalem al-Qaida Recruits Arrested, ‘Planned Massive Bombings.’” Jerusalem Post, January 22. http://www.jpost.com/Defense/3-al-Qaida-recruits-arrested-planned-massive-bombings-339002.
Laub, Zachary. 2014. “Backgrounder: Hamas.” Council on Foreign Relations. Accessed January 30, 2014. http://www.cfr.org/israel/hamas/p8968.
Lentini, Peter. 2013. Neojihadism: Towards a New Understanding of Terrorism and Extremism? Cheltenham, UK: Edward Elgar Publishing.
Leuprecht, Christian, Todd Hataley, Sophia Moskalenko, and Clark McCauley. 2009. “Winning the Battle but Losing the War? Narrative and Counter-Narratives Strategy.” Perspectives on Terrorism 3 (2): 25–35. http://www.terrorismanalysts.com/pt/index.php/pot/article/view/68/html.
———. 2010. “Containing the Narrative: Strategy and Tactics in Countering the Storyline of Global Jihad.” Journal of Policing, Intelligence and Counter Terrorism 5 (1): 42–57.
Levitt, Matthew. 2009. “Radicalization: Made in the USA?” HSPI Commentary Series, June 2. Washington, DC: Homeland Security Policy Institute. http://homelandsecurity.gwu.edu/sites/homelandsecurity.gwu.edu/files/downloads/Commentary_3_HSPI.pdf.
Lewis, Bernard. 1988. The Political Language of Islam. Chicago: University of Chicago Press.
Lewis, James A. 2002. Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. Washington, DC: Center for Strategic and International Studies. December. http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf.
Lewis, Peter. 2001. “The Tools of Freedom and Security.” Fortune, October 29: 200–4.
Lia, Brynjar, 2008. “Al-Qaida’s Appeal: Understanding Its Unique Selling Points.” Perspectives on Terrorism (2) 8: 3–10. http://www.terrorismanalysts.com/pt/index.php/pot/article/view/44/html.
Lieberman, Joseph I., and Susan M. Collins. 2011. A Ticking Time Bomb: Counterterrorism Lessons from the U.S. Government’s Failure to Prevent the Fort Hood Attack. US Senate Committee on Homeland Security and Governmental Affairs, February 3. http://www.hsgac.senate.gov//imo/media/doc/Fort_Hood/FortHoodReport.pdf
Londono, Ernesto. 2011. “U.S. Military, Taliban Use Twitter to Wage War.” Washington Post, December 18. http://articles.washingtonpost.com/2011-12-18/world/35284991_1_isafmedia-abalkhi-social-media.
Ludlow, Peter. 2013. “What Is a ‘Hacktivist’?” New York Times Opinionator blog, January 13. http://opinionator.blogs.nytimes.com/2013/01/13/what-is-a-hacktivist/.
Lungu, Angela Maria. 2001. “War.com: The Internet and Psychological Operations.” Joint Force Quarterly 28: 14–17. http://www.dtic.mil/doctrine/jfq/jfq-28.pdf.
Lynch, Marc. 2006. “Al-Qaeda’s Media Strategies.” The National Interest, Spring. http://nationalinterest.org/article/al-qaedas-media-strategies-883.
Lyon, David. 2001. Surveillance Society: Monitoring Everyday Life. London: Open University Press.
Macdonald, Alistair. 2011. “U.K. Detects ‘Talk’ About Internet Terror Attack.” Wall Street Journal, November 25. http://online.wsj.com/article/SB10001424052970203764804577060272839781902.html.
Malik, Kenan. 2009. From Fatwa to Jihad: The Rushdie Affair and Its Legacy. London: Atlantic.
Mantel, Barbara. 2009. “Terrorism and the Internet.” CQ Global Researcher, November 1. http://cqresearcherblog.blogspot.com/2009/11/should-governments-block-terrorist-web.html.
Marcus, Itamar, and Nan Jacques Zilberdik. 2012. “Mother Places Suicide Belt on Child, on Fatah Facebook Page in Lebanon.” Palestinian Media Watch, October 29. http://www.palwatch.org/main.aspx?fi=157&doc_id=7704.
Mazzocco, Philip J., and Melanie C. Green. 2011. “Narrative Persuasion in Legal Settings: What’s the Story?” The Jury Expert 23 (3): 27–38. http://www.thejuryexpert.com/2011/05/narrative-persuasion/.
McCants, William. 2011. “Testimony: Jihadist Use of Social Media—How to Prevent Terrorism and Preserve Innovation.” US House of Representatives: Subcommittee on Counterterrorism and Intelligence, December 6. http://homeland.house.gov/sites/homeland.house.gov/files/Testimony%20McCants.pdf.
McCarthy, Tom. 2014. “Obama Announces New Limits on NSA Surveillance Programs—Live Reaction.” Guardian (London), January 17. http://www.theguardian.com/world/2014/jan/17/obama-nsa-surveillance-reforms-speech-live.
McCullagh, Declan. 2003. “Military Is Worried about Web Leaks.” CNET News, January 16. http://news.cnet.com/2100-1023-981057.html.
MEMRI Jihad & Terrorism Studies Project. 2001. “Debating the Religious, Political and Moral Legitimacy of Suicide Bombings Part 1: The Debate over Religious Legitimacy.” MEMRI Inquiry & Analysis Series Report 53, May 3. http://www.memri.org/report/en/0/0/0/0/0/0/451.htm.
———. 2004. “Reactions to Sheik Al-Qaradhawi’s Fatwa Calling for the Abduction and Killing of American Civilians in Iraq.” Special Dispatch Series 794. October 6. http://www.memri.org/report/en/0/0/0/0/0/0/1231.
———. 2013a. “Fatwa on Minbar Al-Tawhid Wal-Jihad (MTJ) Discusses Permissibility of Bombing European Synagogues, Churches.” Special Dispatch Series 5272. April 15. http://www.memri.org/report/en/0/0/0/0/0/0/7131.htm.
———. 2013b. “Jihad and Terrorism Threat Monitor (JTTM) Weekend Summary.” Special Announcement No. 261. October 12. http://www.memri.org/report/en/0/0/0/0/0/50/7457.htm.
MEMRI Jihad & Terrorism Threat Monitor. 2010. “Fatwas Posted on the Website of Abu Muhammad Al-Maqdisi Permit Targeting Infidel Companies Such As Coca-Cola and McDonald’s—and Kidnapping and Killing Tourists in Muslim Countries.” Special Dispatch Series 3390, November 19. http://www.memrijttm.org/content/en/report.htm?report=4779.
———. 2011a. “New Al-Qaeda Al-Sahab Video Reiterates: Carry Out One-Man Jihad Operations in the West” Special Dispatch Series 3885, June 3. http://www.memrijttm.org/new-al-qaeda-al-sahab-video-reiterates-carry-out-one-man-jihad-operations-in-the-west.html.
———. 2011b. “New Al-Qaeda Magazine for Women Encourages Them to Fulfill Their Role in Supporting Jihad and the Mujahideen.” Special Dispatch Series 3651, March 8. http://www.memrijttm.org/new-al-qaeda-magazine-for-women-encourages-them-to-fulfill-their-role-in-supporting-jihad-and-the-mujahideen.html.
———. 2012. “Al-Qaeda’s E-Magazine for Women Encourages Them to Disseminate Ideology of Jihad and Martyrdom.” Special Dispatch Series 4500, February 15. http://www.memrijttm.org/al-qaedas-e-magazine-for-women-encourages-them-to-disseminate-ideology-of-jihad-and-martyrdom.html.
———. 2013a. “Fatwas for the Land of Jihad—Part II: Young Men from the Middle East, Europe and the U.S. Turn to Minbar Al-Tawhid Wal-Jihad Clerics for Guidance Before Departing for Syria.” December 17. http://www.memrijttm.org/fatwas-for-the-land-of-jihad-part-ii-young-men-from-the-middle-east-europe-and-the-us-turn-to-minbar-al-tawhid-wal-jihad-clerics-for-guidance-before-departing-to-syria.html.
———. 2013b. “Taliban Fatwa Threatens Journalists, Television Hosts, Analysts and Other Media Personalities in Pakistan with Death.” November 4. http://www.memrijttm.org/taliban-fatwa-threatens-journalists-television-hosts-analysts-and-other-media-personalities-in-pakistan-with-death.html.
Meo, Nick, Ruth Sherlock, and Carol Malouf. 2012. “Hizbollah Debates Dropping Support for the Regime of President Bashar al-Assad.” Daily Telegraph (London), October 27. http://www.telegraph.co.uk/news/worldnews/middleeast/lebanon/9638058/Hizbollah-debates-dropping-support-for-the-regime-of-President-Bashar-al-Assad.html.
Merriam, Lisa. 2011. “The Al-Qaeda Brand Died Last Week.” Forbes, October 6. http://www.forbes.com/sites/realspin/2011/10/06/the-al-qaeda-brand-died-last-week/.
Michael, George, and Kassem M. Wahba, trans. and ed. 2001. “Text: Bin Laden Discusses Attacks on Tape.” Washington Post, December 13. http://www.washingtonpost.com/wp-srv/nation/specials/attacked/transcripts/binladentext_121301.html.
Middle East Forum. 2004. “The Qaradawi Fatwas.” The Middle East Quarterly 9 (3): 78–80. http://www.meforum.org/646/the-qaradawi-fatwas.
Middle East Times. 2008. “Cyber Terrorism: Perils of the Internet’s Social Networks.” Middle East Times, September 8.
MideastWeb. 2013. “Osama Bin Laden’s 1998 Fatwa.” MideastWeb.com. Accessed December 3, 2013. http://www.mideastweb.org/Osamabinladen2.htm.
Minei, Elizabeth, and Jonathan Matusitz. 2011. “Cyberterrorist Messages and Their Effects on Targets: A Qualitative Analysis.” Journal of Human Behavior in the Social Environment 21 (8): 995–1019.
———. 2012. “Cyberspace as a New Arena for Terroristic Propaganda: An Updated Examination.” Poiesis & Praxis 9 (1–2): 163–76.
Miniwatts Marketing Group. 2013. “Internet World Stats: Usage and Population Statistics.” Internet World Stats. Accessed May 14, 2014. http://www.internetworldstats.com/.
Morgan, Nigel, Graham Jones, and Ant Hodges. 2012. Social Media: The Complete Guide to Social Media From The Social Media Guys. http://rucreativebloggingfa13.files.wordpress.com/2013/09/completeguidetosocialmedia.pdf
Morris, Loveday. 2010. “The Anatomy of a Suicide Bomber.” National (Abu Dhabi), October 24. http://www.thenational.ae/news/the-anatomy-of-a-suicide-bomber.
Mowatt-Larssen, Rolf. 2010. “Al Qaeda’s Nuclear Ambitions.” Foreign Policy, November 16. http://www.foreignpolicy.com/articles/2010/11/16/al_qaedas_nuclear_ambitions.
Mozes, Tomer, and Gabriel Weimann. 2010. “The E-Marketing Strategy of Hamas.” Studies in Conflict & Terrorism 33 (3): 211–25.
Mueller, John, and Mark Stewart. 2011. “Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security.” Paper presented at the “Terror and the Economy: Which Institutions Help Mitigate the Damage?” panel at the Annual Convention of the Midwest Political Science Association, Chicago, IL, April 1. http://politicalscience.osu.edu/faculty/jmueller//MID11TSM.PDF
Mulrine, Anna. 2013. “How an 8-by-10 Foot Plywood Table Holds the Future of America’s National Security.” Business Insider, September 16. http://www.businessinsider.com/the-military-is-recruiting-middle-school-hackers-2013-9.
Nacos, Brigitte. 2002. Mass-Mediated Terrorism. Oxford: Rowman and Littlefield.
———. 2003. “The Terrorist Calculus behind 9-11: A Model for Future Terrorism?” Studies in Conflict & Terrorism 26(1): 1–16.
Nasralla, Shadia. 2013. “Sunni Clerics Call for Jihad Against Assad, Allies.” Reuters, June 13. http://www.reuters.com/article/2013/06/13/us-syria-crisis-sunnis-jihad-idUSBRE95C0YQ20130613.
National Commission on Terrorist Attacks upon the United States. 2004. The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States. New York: W. W. Norton.
National Counterterrorism Center. 2012. 2011 Report on Terrorism. Washington, DC: Office of the Director of National Intelligence, National Counterterrorism Center.
National Research Council. 1991. Computers at Risk. Washington, DC: National Academy Press.
Neumann, Peter. 2012. Countering Online Radicalization in America. National Security Program Homeland Security Project. December. Washington, DC: Bipartisan Policy Center. http://bipartisanpolicy.org/sites/default/files/BPC%20_Online%20Radicalization%20Report.pdf.
Nielsen. 2012. Social Media Report 2012: Social Media Comes of Age. December 3. http://www.nielsen.com/us/en/insights/news/2012/social-media-report-2012-social-media-comes-of-age.html.
Noel-Levitz. 2012. E-Expectations Report: The Online Expectations of College-Bound Juniors and Seniors. https://www.noellevitz.com/documents/shared/Papers_and_Research/2012/2012_E-Expectations.pdf.
Noguchi, Yuki. 2006. “Tracking Terrorists Online.” WashingtonPost.com video report transcript. April 19. http://www.washingtonpost.com/wp-dyn/content/discussion/2006/04/11/DI2006041100626.html.
Nye, Joseph. 2003. “The Power of Persuasion: Dual Components of US Leadership (Perspectives on the United States).” Sean Creehan and Sabeel Rahman. Harvard International Review 24 (4): 46–49.
———. 2004a. Power in the Global Information Age: From Realism to Globalization. London: Routledge.
———. 2004b. “Soft Power and American Foreign Policy.” Political Science Quarterly 119 (2): 255–70.
Oatley, Keith. 2002. “Emotions and the Story Worlds of Fiction.” In Narrative Impact: Social and Cognitive Foundations, edited by Melanie C. Green, Jeffrey J. Strange and Timothy C. Brock, 39–69. Mahwah, NJ: Erlbaum.
Obama, Barack. 2014. “Transcript of President Obama’s Speech on NSA Reforms.” NPR, January 17. http://www.npr.org/blogs/itsallpolitics/2014/01/17/263480199/transcript-of-president-obamas-speech-on-nsa-reforms.
Office for Security and Counterterrorism. 2009. “The United Kingdom’s Strategy for Countering International Terrorism.” Home Office of the United Kingdom. http://www.official-documents.gov.uk/document/cm75/7547/7547.asp.
Oreskovic, Alexei. 2013. “Facebook Removes Beheading Video, Updates Violent Images Standards.” Reuters UK, October 23. http://uk.reuters.com/article/2013/10/23/uk-facebook-violence-idUKBRE99M01O20131023.
Pantucci, Raffaello. 2011. “Typology of Lone Wolves: Preliminary Analysis of Lone Islamist Terrorists.” Developments in Radicalisation and Political Violence, March. London: The International Centre for the Study of Radicalisation and Political Violence. http://www.trackingterrorism.org/sites/default/files/chatter/1302002992ICSRPaper_ATypologyofLoneWolves_Pantucci.pdf.
Paz, Reuven. 2003. “Sawt al-Jihad: New Indoctrination of Qa’idat al-Jihad.” Project for the Study of Islamist Movements (PRISM) Occasional Paper 1, No. 8. http://www.e-prism.org/images/PRISM_no_8.doc.
———. 2004. “Hamas vs. Al-Qaeda: The Condemnation of the Khobar Attack.” Project for the Study of Islamist Movements (PRISM) Special Dispatch 2 (3), June 2. http://www.e-prism.org/images/PRISM_Special_dispatch_no_3-2.pdf.
———. 2005. “Global Jihad and WMD: Between Martyrdom and Mass Destruction.” Current Trends in Islamist Ideology 2: 74–86.
———. 2010. “Global Jihad.” In Guide to Islamist Movements, Vol. 2, edited by Barry M. Rubin, xxxiii–liii. Armonk, NY: M. E. Sharpe.
PearAnalytics. 2009. PearAnalytics: Twitter Study—August 2009. August. https://www.pearanalytics.com/wp-content/uploads/2012/12/Twitter-Study-August-2009.pdf.
Perl, Raphael. 2004. The Department of State’s Patterns of Global Terrorism Report: Trends, State Sponsors, and Related Issues. Congressional Research Service Report for Congress RL32417, June 5. Washington, DC: Congressional Research Service.
Perlroth, Nicole, and David E. Sanger. 2013. “Cyberattacks Seem Meant to Destroy, Not Just Disrupt.” New York Times, March 28. http://www.nytimes.com/2013/03/29/technology/corporate-cyberattackers-possibly-state-backed-now-seek-to-destroy-data.html.
Pew Research Center. 2007. “Muslim Americans: Middle Class and Mostly Mainstream.” May 22. http://www.pewresearch.org/2007/05/22/muslim-americans-middle-class-and-mostly-mainstream/.
Pew Research Center for the People and the Press. 2013. “Majority Views NSA Phone Tracking as Acceptable Anti-Terror Tactic.” Pew Research Center/Washington Post Survey, June 10. http://www.people-press.org/2013/06/10/majority-views-nsa-phone-tracking-as-acceptable-anti-terror-tactic/.
Picali, E. B. 2013a. “Independent Shi’ites in Lebanon Challenge Hizbullah.” MEMRI Inquiry & Analysis Series Report 983, February 22. http://www.memri.org/report/en/0/0/0/0/259/0/7017.htm.
———. 2013b. “Rift in Hizbullah and among Its Shi’ite Supporters Due to Its Military Involvement in Syria.” MEMRI Inquiry & Analysis Series Report 1021, October 3. http://www.memri.org/report/en/0/0/0/0/259/0/7438.htm.
Pollack, Suzanne. 2013. “Internet provides venue for training future jihadists.” Washington Jewish Week, May 16: 3.
Porter, Michael E. 2001. “Strategy and the Internet.” Harvard Business Review, March: 62–78.
President’s Commission on Critical Infrastructure Protection. 1997. Critical Foundations: Protecting America’s Infrastructures. October. Project on Government Secrecy, Federation of American Scientists. Accessed April 3, 2014. https://www.fas.org/sgp/library/pccip.pdf.
Presidential Task Force. 2009. Rewriting the Narrative: An Integrated Strategy for Counterradicalization. March. Washington, DC: Washington Institute for Near East Policy. https://www.washingtoninstitute.org/uploads/Documents/pubs/PTF2-Counterradicalization.pdf.
Priest, Dana, and William M. Arkin. 2010. “Hidden World, Growing Beyond Control.” Washington Post, July 19. http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/.
Project on Muslims in the American Public Square (Project MAPS). 2002. “American Muslim Poll.” Georgetown University. May 2002. Accessed January 4, 2014. http://www.projectmaps.com/PMReport.htm.
Prucha, Nico, and Ali Fisher. 2013. “Tweeting for the Caliphate: Twitter as the New Frontier for Jihadist Propaganda.” CTC Sentinel 6 (6): 19–22. https://www.ctc.usma.edu/posts/tweeting-for-the-caliphate-twitter-as-the-new-frontier-for-jihadist-propaganda.
Qaradawi, Sheikh Yusuf al-. 2003. “Fatwa: Whether Suicide Bombings Are a Form of Martyrdom” [in Arabic]. November 8. http://qaradawi.net.
Qin, Jialun, Yilu Zhou, Edna Reid, Guanpi Lai, and Hsinchun Chen. 2007. “Analyzing Terror Campaigns on the Internet: Technical Sophistication, Content Richness, and Web Interactivity.” International Journal of Human-Computer Studies 65 (1): 71–84.
Ranstorp, Magnus. 1998. “Interpreting the Broader Context and Meaning of Bin-Laden’s ‘Fatwa.’” Studies in Conflict & Terrorism 21 (4): 321–30.
———. 2007. “The Virtual Sanctuary of Al-Qaeda and Terrorism in an Age of Globalization.” In International Relations and Security in the Digital Age, edited by Johan Eriksson and Giampiero Giacomello, 31–56. London: Routledge.
Reform Government Surveillance. 2013. “Global Government Surveillance Reform.” Accessed March 12, 2014. https://www.reformgovernmentsurveillance.com/#.
Risen, James, and Eric Lichtblau. 2005. “Bush Lets U.S. Spy on Callers Without Courts.” New York Times, December 16. http://www.nytimes.com/2005/12/16/politics/16program.html.
———. 2009. “Officials Say U.S. Wiretaps Exceeded Law.” New York Times, April 15. http://www.nytimes.com/2009/04/16/us/16nsa.html.
Rogan, Hanna. 2006. Jihadism Online: A Study of How Al-Qaida and Radical Islamist Groups Use the Internet for Terrorist Purposes. Norwegian Defense Research Establishment. http://rapporter.ffi.no/rapporter/2006/00915.pdf.
Rollins, John, and Clay Wilson. 2007. Terrorist Capabilities for Cyberattack: Overview and Policy Issues. Congressional Research Service Report for Congress RL 33123, January 22. Washington, DC: Congressional Research Service.
Rothman, Paul. 2012. “Cyber Terror Rages in the Banking Sector.” Security InfoWatch 28, September. http://www.securityinfowatch.com/blog/10796084/cyber-terror-rages-in-the-banking-sector.
Rothwell, Dan. 2004. In the Company of Others: An Introduction to Communication. New York: McGraw Hill.
Roy, Olivier. 2008a. “Al-Qaeda in the West as a Youth Movement: The Power of a Narrative.” MicroCon Policy Working Paper 2. http://www.microconflict.eu/publications/PWP2_OR.pdf
———. 2008b. “Radicalisation and De-Radicalisation.” In Perspectives on Radicalisation and Political Violence, edited by the International Centre for the Study of Radicalisation (ICSR), 8–14. London: ICSR.
Rumsfeld, Donald. 2006. “New Realities in the Media Age.” Speech at the Council on Foreign Relations, February 17. http://www.cfr.org/publication/9900/new_realities_in_the_media_age.html.
Sageman, Marc. 2008. Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia: University of Pennsylvania Press.
Sammy67 [pseud]. 2008. “Al-Qaida Eyes U.S. Troops MySpace Pages.” FreeRepublic. com, January 14. http://www.freerepublic.com/focus/f-news/1953538/posts.
Sanger, David E., and John O’Neil. 2006. “White House Begins New Effort to Defend Surveillance Program.” New York Times, January 23. http://www.nytimes.com/2006/01/23/politics/23cnd-wiretap.html.
Satter, Raphael. 2013. “NSA Hacking Tactics Revealed By Der Spiegel.” Huffington Post, December 29: 2–13. http://www.huffingtonpost.com/2013/12/29/nsa-hacking-tactics-_n_4515897.html.
“SCADA Systems and the Terrorist Threat: Protecting the Nation’s Critical Control Systems.” 2005. Joint hearing before the US House of Representatives Subcommittee on Economic Security, Infrastructure Protection and Cybersecurity, October 18. Intelligence Resource Program, Federation of American Scientists. Accessed April 10, 2014. http://www.fas.org/irp/congress/2005_hr/scada.pdf.
Schmid, Alex. 2004. “Frameworks for Conceptualising Terrorism.” Terrorism and Political Violence 16 (2): 197–221.
———. 2010. “The Importance of Countering Al-Qaeda’s ‘Single Narrative.’” In Countering Violent Extremist Narratives, edited by Eelco Kessels, 46–57. The Hague: The National Coordinator for Counter-Terrorism (NCTb). http://www.clingendael.nl/sites/default/files/Countering-violent-extremist-narratives.pdf.
Schmid, Alex, and Janny de Graaf. 1982. Violence as Communication: Insurgent Terrorism and the Western News Media. Beverly Hills, CA: Sage.
Schmid, Alex, and Albert Jongman. 1988. Political Terrorism. Amsterdam: Transaction Books.
———. 2005. Political Terrorism. Piscataway, NJ: Transaction Publishers.
Schmidt, Eric, and Jared Cohen. 2013. The New Digital Age: Reshaping the Future of People, Nations and Business. New York: Knopf Doubleday Publishing Group.
Schmidt, Michael S. 2012. “F.B.I. Director Warns Congress About Terrorist Hacking.” New York Times, March 7. http://www.nytimes.com/2012/03/08/us/fbi-director-warns-about-terrorist-hacking.html.
Schmitt, Eric, and Michael S. Schmidt. 2013. “Qaeda Plot Leak Has Undermined U.S. Intelligence.” New York Times, September 29. http://www.nytimes.com/2013/09/30/us/qaeda-plot-leak-has-undermined-us-intelligence.html.
Schmitt, Eric, and Thom Shanker. 2011. Counterstrike: The Untold Story of America’s Secret Campaign Against Al Qaeda. New York: Times Books.
Schneier, Bruce. 2009. “Terrorists May Use Google Earth, but Fear Is No Reason to Ban It.” Guardian (London), January 28. http://www.theguardian.com/technology/2009/jan/29/read-me-first-google-earth.
Schwartz, John. 2001. “Tools for the Aftermath: In Investigation, Internet Offers Clues and Static.” New York Times, September 26: H1. http://www.nytimes.com/2001/09/26/business/tools-for-the-aftermath-in-investigation-internet-offers-clues-and-static.html.
Shane, Scott. 2013. “A Homemade Style of Terror: Jihadists Push New Tactics.” New York Times, May 5. http://www.nytimes.com/2013/05/06/us/terrorists-find-online-education-for-attacks.html.
Sherif, Muzafer, and Carl Iver Hovland. 1961. Social Judgment: Assimilation and Contrast Effects in Communication and Attitude Change. New Haven, CT: Yale University Press.
Shiffman, John. 2010. “Jane’s Jihad: The New Face of Terrorism.” Reuters, March 9. http://www.reuters.com/subjects/jihad-jane.
Shih, Gerry, and Joseph Menn. 2013. “New York Times, Twitter Hacked by Syrian Group.” Reuters, August 28. http://www.reuters.com/article/2013/08/28/media-hacking-idUSL2N0GS29C20130828.
Siddiqui, Sabrina, and Jaweed Kaleem. 2013. “Muslims Focus on Online Extremism, Radicalization after Boston Bombings.” Huffington Post, June 4. http://www.huffingtonpost.com/2013/06/04/muslims-online-extremism-radicalization-boston_n_3380159.html.
Sinai, Joshua. 2006. “Defeating Internet Terrorists.” Washington Times, October 7. http://www.washingtontimes.com/news/2006/oct/7/20061007-104915-3656r/.
———. 2011. “Terrorism on the Internet and Effective Countermeasures.” The Intelligencer: Journal of U.S. Intelligence Studies 18: 21–24.
SITE Monitoring Service. 2005. “Salafi Group for Call and Combat Issues Fatwa Calling for Jihad Against Foreigners in Algeria.” March 11. http://ent.siteintelgroup.com/Jihadist-News/salafi-group-for-call-and-combat-issues-fatwa-calling-for-jihad-against-foreingners-in-algeria.html.
———. 2008. “Al-Nusra Media Battalion Distributes Guide for ‘Martyrdom.’” December 18. http://ent.siteintelgroup.com/Jihadist-News/al-nusra-media-battalion-distributes-guide-for-martyrdom.html.
———. 2011a. “Jihadist Offers Tips for Facebook Users to Increase Page Viewership.” June 2. https://news.siteintelgroup.com/index.php/21-social-network-jihad/776-jihadist-offers-tips-for-facebook-users-to-increase-page-viewership.
———. 2011b. “Jihadists Strategize to Evade YouTube Censorship.” April 28. http://ent.siteintelgroup.com/Social-Network-Jihad/site-intel-group-4-28-11-jfm-youtube-strategies.html.
———. 2011c. “Jose Pimentel and the Use of Social Networks for Jihadist Recruitment.” January 14. https://news.siteintelgroup.com/Social-Network-Jihad/jose-pimentel-and-the-use-of-social-networks-for-jihadist-recruitment.html.
———. 2012a. “‘Cyber Fighters’ Announces ‘Phase 2’ of Banking Website Hacks.” December 11. http://ent.siteintelgroup.com/Jihadist-News/cyber-fighters-announces-phase-2-of-banking-website-hacks.html.
———. 2012b. “Jihadist Gives Analysis of Electronic Jihad.” January 6. http://news.siteintelgroup.com/index.php/19-jihadist-news/1462-jihadist-gives-analysis-of-electronic-jihad.
———. 2013a. “‘Al-Qaeda Electronic Army’ Threatens to Hit Vital Sectors of the US.” April 12. http://ent.siteintelgroup.com/Jihadist-News/al-qaeda-electronic-army-threatens-to-hit-vital-sectors-of-us.html.
———. 2013b. “AQIM Blames Hezbollah for Tripoli Bombings, Promises Retribution.” August 23. http://ent.siteintelgroup.com/Jihadist-News/aqim-blames-hezbollah-for-tripoli-bombings-promises-retribution.html.
———. 2013c. “Facebook Page Serves as Official Facebook Outlet for Ansar al-Islam.” August 6. https://news.siteintelgroup.com/index.php/19-jihadist-news/3342-facebook-page-serves-as-official-facebook-outlet-for-ansar-al-islam.
———. 2013d. “Jihadists Create Twitter-based Jihadi Media Group, Al-Battar Media Battalion.” July 19. https://news.siteintelgroup.com/Jihadist-News/jihadists-create-twitter-based-jihadi-media-group-al-battar-media-battalion.html.
———. 2014a. “Female Jihadists Promote Attacks in West in Third Issue of Magazine.” January 15. https://news.siteintelgroup.com/Jihadist-News/female-jihadists-promote-attacks-in-west-in-third-issue-of-magazine.html.
———. 2014b. “Jihadist Invites to ‘Electronic Islamic Army,’ Gives DDOS Program Tutorial.” January 15. https://news.siteintelgroup.com/Jihadist-News/jihadist-invites-to-qelectronic-islamic-armyq-gives-ddos-program-tutorial.html.
———. 2014c. “Social Network Jihad: Hezbollah’s Capitalization of Facebook.” January 14. https://news.siteintelgroup.com/Social-Network-Jihad/social-network-jihad-hezbollahs-capitalization-of-facebook.html.
———. 2014d. “The Third Palestinian Intifada’s Facebook Page.” January 15. https://news.siteintelgroup.com/Featured-Article/the-third-palestinian-intifadas-facebook-page.html.
Slater, Michael. 2002. “Entertainment Education and the Persuasive Impact of Narratives.” In Narrative Impact: Social and Cognitive Foundations, edited by Melanie C. Green, Jeffrey J. Strange, and Timothy C. Brock, 157–81. Mahwah, NJ: Erlbaum.
Smith, Paul Russell, and Dave Chaffey. 2001. eMarketing Excellence: At the Heart of eBusiness. Oxford: Butterworth Heinemann.
The Soufan Group. 2013. TSG IntelBrief: The Importance of Counter Narratives in Fighting Violent Extremism. September 10. http://soufangroup.com/tsg-intelbrief-3/.
Spaaij, Ramon. 2010. “The Enigma of Lone Wolf Terrorism: An Assessment.” Studies in Conflict & Terrorism 33 (9): 854–70.
Spring, Tom. 2004. “Al Qaeda’s Tech Traps.” PCWorld, September 1. http://www.pcworld.com/article/117658/article.html.
Stalinsky, Steven. 2012a. “HASHTAG #Jihad Part II: Twitter Usage By Al-Qaeda And Online Jihadi Affiliated Groups Explodes.” MEMRI Inquiry & Analysis Series Report 881, September 7. http://www.memri.org/report/en/0/0/0/0/0/0/6660.htm.
———. 2012b. “Tracking Hizbullah’s Al-Manar TV Online: Removed from Servers in Netherlands and U.S. as a Result of MEMRI Reports—and Now Hosted on Servers in U.K.” MEMRI Inquiry & Analysis Series Report 905, December 4. http://www.memri.org/report/en/0/0/0/0/0/857/6848.htm
———. 2012c. “WHOIS—U.S.-Based Domain Registration Protection Companies Hide Identities Of Individuals Behind The Most Important Al-Qaeda-Affiliated Websites.” MEMRI Inquiry & Analysis Series Report 856, July. http://www.memri.org/report/en/0/0/0/0/0/0/6515.htm.
———. 2013a. “Hizbullah—A Victim of Identity Theft.” MEMRI Inquiry & Analysis Series Report 985, June 20. http://www.memri.org/report/en/0/0/0/0/0/0/7252.htm.
———. 2013b. “Jihadists Embrace Instagram.” MEMRI Inquiry & Analysis Series Report 468, March 14. http://www.memri.org/report/en/0/0/0/0/0/857/7081.htm.
———. 2013c. “Jihadis Move From Facebook To Yahoo’s Flickr Picture Sharing Site.” MEMRI Inquiry & Analysis Series Report 1005, August 5. http://www.memri.org/report/en/0/0/0/0/0/857/7334.htm.
Stalinsky, Steven, and R. Sosnow. 2013a. “Afghan Cyber Army (ACA): Active on Facebook and YouTube—Recruiting and Training Volunteers, Claiming to Have Hacked U.S. Gov’t Websites, U.S. and Israeli Bank Websites, Pakistan Gov’t and Taliban Websites; Promising Major Attacks in Future.” MEMRI Inquiry & Analysis Series Report 1036, November 15. http://www.memri.org/report/en/0/0/0/0/0/0/7575.htm.
———. 2013b. “Syrian Electronic Army Uses Social Media—Twitter, YouTube, Facebook, Instagram, Google+, Pinterest, Smartphone Apps—To Communicate, Spread News of Its Hacks and Its Mission, and Recruit Volunteers.” MEMRI Inquiry & Analysis Series Report 1009, August 19. http://www.memri.org/report/en/0/0/0/0/0/0/7357.htm.
Stalinsky, Steven, and Elliot Zweig. 2013. “YouTube Questioned in U.K. House of Commons over Keeping Terrorism-Promoting Videos Active on Its Website.” MEMRI Inquiry & Analysis Series Report 956, April 9. http://www.memri.org/report/en/0/0/0/0/0/841/7121.htm.
Statistic Brain. 2013. “Twitter Statistics.” Statistic Brain, May 7. Accessed March 12, 2014. http://www.statisticbrain.com/twitter-statistics/.
Stevens, Tim, and Peter Neumann. 2009. Countering Online Radicalization: A Strategy for Action. London: International Centre for the Study of Radicalisation and Political Violence (ICSR). http://www.thecst.org.uk/docs/countering_online_radicalisation1.pdf.
Stevenson, Robert. 2003. “Freedom of the Press Around the World.” In Global Journalism: Topical Issues and Media Systems, 4th edition, edited by Arnold S. de Beer and John C. Merrill, 1–33. Boston: Allyn and Bacon.
Strohm, Chris, and Del Quentin Wilber. 2014. “Pentagon Says Snowden Took Most U.S. Secrets Ever: Rogers.” Bloomberg.com, January 9. http://www.bloomberg.com/news/2014-01-09/pentagon-finds-snowden-took-1-7-million-files-rogers-says.html.
Sullivan, Bob. 2001. “FBI Software Cracks Encryption Wall.” NBCNews.com, November 20. http://www.nbcnews.com/id/3341694/ns/technology_and_science-security/t/fbi-software-cracks-encryption-wall/.
Swartz, Jon. 2005. “Terrorists’ Use of Internet Spreads.” USA Today, February 20. http://www.usatoday.com/money/industries/technology/2005-02-20-cyber-terror-usat_x.htm.
“Syria: Speech by Bashar al-Assad.” 2011. Al-Bab.com, June 20. http://www.al-bab.com/arab/docs/syria/bashar_assad_speech_110620.htm.
Syrian Electronic Army. 2014. “About Organization.” Accessed September 30, 2014. http://sea.sy/about/en.
Tahawy, Abdallah, el-. 2008. “The Internet Is the New Mosque: Fatwa at the Click of a Mouse.” Arab Insight 2 (1):11–20.
Talbot, David. 2005. “Terror’s Server.” Technology Review, February 1. http://www.technologyreview.com/featuredstory/403657/terrors-server/.
Teich, Sara. 2013. Trends and Developments in Lone Wolf Terrorism in the Western World: An Analysis of Terrorist Attacks and Attempted Attacks by Islamic Extremists. Herzliya, Israel: International Institute for Counter-Terrorism. http://www.ict.org.il/Article/691/Trends%20and%20Developments%20in%20Lone%20Wolf%20Terrorism%20in%20the%20Western%20World.
Tell, William. 2006. Bridges Burning: America’s Challenge of the 21st Century. Lincoln, NE: iUniverse.
Thomas, Timothy. 2003. “Al Qaeda and the Internet: The Danger of ‘Cyberplanning.’” Parameters (Spring): 112–23. http://strategicstudiesinstitute.army.mil/pubs/parameters/articles/03spring/thomas.pdf.
Tsfati, Yariv, and Gabriel Weimann. 2002. “www.terrorism.com: Terror on the Internet.” Studies in Conflict & Terrorism 25 (5): 317–32.
United Nations Counter-Terrorism Implementation Task Force. 2011. Countering the Use of the Internet for Terrorist Purposes: Legal and Technical Aspects. New York: United Nations.
———. 2012. “Use of the Internet to Counter the Appeal of Extremist Violence. Conference Summary & Follow-up/Recommendations.” Perspectives on Terrorism 6 (1): 80–91. http://www.terrorismanalysts.com/pt/index.php/pot/article/view/CTITF-Use-of-Internet/html.
United Nations Office on Drugs and Crime (UNODC). 2012. The Use of the Internet for Terrorist Purposes. New York: United Nations.
United Nations Security Council. 2009. “Security Council Committee pursuant to resolutions 1267 (1999) and 1989 (2011) concerning Al-Qaida and associated individuals and entities.” Accessed October 13, 2013. http://www.un.org/sc/committees/1267/NSQI23608E.shtml.
———. 2014. “Al-Qaida Sanctions List.” Accessed October 1, 2014. http://www.un.org/sc/committees/1267/AQList.htm.
Vaccani, Matteo. 2010. Alternative Remittance Systems and Terrorism Financing. Working Paper No. 1980. First printed November 2009. Washington, DC: World Bank. http://elibrary.worldbank.org/doi/pdf/10.1596/978-0-8213-8178-6.
Vatis, Michael. 2001. Cyber Attacks during the War on Terrorism: A Predictive Analysis. Institute for Security Technology Studies, Dartmouth College. http://www.ists.dartmouth.edu/docs/cyber_a1.pdf.
Ventre, Daniel. 2009. Information Warfare. New York: Wiley.
———, ed. 2011. Cyberwar and Information Warfare. New York: Wiley.
Verton, Dan. 2003. Black Ice: The Invisible Threat of Cyber-Terrorism. New York: McGraw-Hill Osborne Media.
Viscusi, W. Kip, and Richard J. Zeckhauser. 2003. “Sacrificing Civil Liberties to Reduce Terrorism Risks.” Journal of Risk and Uncertainty 26 (2–3): 99–120.
Von Knop, Katharina, and Gabriel Weimann. 2008. “Applying the Notion of Noise to Countering Online Terrorism.” Studies in Conflict & Terrorism 31 (10): 883–902.
Voors, Matthew Parker. 2003. “Encryption Regulation in the Wake of September 11, 2001: Must We Protect National Security at the Expense of the Economy?” Federal Communications Law Journal 55 (2): 331–52.
Wade, Lindsey. 2003. “Terrorism and the Internet: Resistance in the Information Age.” Knowledge, Technology & Policy 16 (1): 104–27.
Weaver, Warren, and Claude Shannon. 1963. The Mathematical Theory of Communication. Urbana: University of Illinois Press.
Weimann, Gabriel. 2005a. “Cyberterrorism: The Sum of All Fears?” Studies in Conflict & Terrorism 28 (2): 129–49.
———. 2005b. “How Terrorists Use the Internet.” Journal of International Security Affairs 8: 91–105.
———. 2005c. “Terrorist Dot Com: Using the Internet for Terrorist Recruitment and Mobilization.” In The Making of a Terrorist: Recruitment, Training, and Root Causes, edited by James J. F. Forest, 53–65. Westport, CT: Praeger.
———. 2006a. “Cyberterrorism.” In Security, Terrorism and Privacy in Information Society, edited by Katharina Von Knop and Boaz Ganor, 41–52. Bielefeld, Germany: W. Bertelsmann Verlag.
———. 2006b. Terror on the Internet: The New Arena. The New Challenges. Washington, DC: United States Institute for Peace (USIP) Press.
———. 2006c. “Virtual Disputes: The Use of the Internet for Terrorist Debates.” Studies in Conflict & Terrorism 29 (7): 623–39.
———. 2006d. “Virtual Training Camps: Terrorist Use of the Internet.” In Teaching Terror: Strategic and Tactical Learning in the Terrorist World, edited by James Forest, 110–32. Boulder, CO: Rowman & Littlefield.
———. 2007a. “Using the Internet for Terrorist Recruitment and Mobilization.” In Hypermedia Seduction for Terrorist Recruiting, edited by Boaz Ganor, Katharina Von Knop, and Carlos Duarte, 47–58. NATO Science for Peace and Security Series. Amsterdam: IOS Press.
———. 2007b. “Virtual Terrorism: How Modern Terrorists Use the Internet.” In The Internet and Governance in Asia: A Critical Reader, edited by Indrajit Banerjee, 189–216. Singapore: Asian Media Information and Communication Centre and Wee Kim Wee School of Communication and Information, Nanyang Technological University.
———. 2008a. “Al-Qa‘ida’s Extensive Use of the Internet.” CTC Sentinel. January 15. http://www.ctc.usma.edu/posts/al-qaida%E2%80%99s-extensive-use-of-the-internet.
———. 2008b. “Cyber-Terrorism: Are We Barking at the Wrong Tree?” Harvard Asia Pacific Review 9 (2) (Spring 2008): 41–46.
———. 2008c. “How Terrorists Use the Internet to Target Children.” InSite 1 (8): 14–16. http://sitemultimedia.org/docs/inSITE_December_2008.pdf.
———. 2008d. “Online Terrorists Prey on the Vulnerable.” Yale Global Online. March 5. http://yaleglobal.yale.edu/content/online-terrorists-prey-vulnerable.
———. 2008e. “The Psychology of Mass-Mediated Terrorism.” American Behavioral Scientist 52 (1): 69–86.
———. 2008f. “WWW.Al-Qaeda: The Reliance of al-Qaeda on the Internet.” In Responses to Cyber Terrorism, edited by Centre of Excellence—Defence Against Terrorism, Ankara, Turkey, 61–69. NATO Science for Peace and Security Series. Amsterdam: IOS Press.
———. 2009a. “Online Training Camps for Terrorists,” InSite, Vol. 2 No. 9. http://sitemultimedia.org/docs/inSITE_Nov_2009.pdf.
———. 2009b. “Virtual Sisters: How Terrorists Target Women Online.” InSite 2 (1): 19–22. http://sitemultimedia.org/docs/inSITE_January_2009.pdf.
———. 2009c. “War by Other Means: Econo-Jihad.” Yale Global Online. June 4. http://yaleglobal.yale.edu/content/econo-jihad.
———. 2009d. “When Fatwas Clash Online: Terrorist Debates on the Internet.” In Influence Warfare: How Terrorists and Governments Fight to Shape Perceptions in a War of Ideas, edited by James Forest, 49–74. Westport, CT: Praeger Security International.
———. 2010a. “Terror on Facebook, Twitter, and Youtube.” The Brown Journal of World Affairs 16 (2): 45–54. http://brown.edu/initiatives/journal-world-affairs/16.2/terror-facebook-twitter-and-youtube.
———. 2010b. “Terrorism’s New Avatars—Part II.” Yale Global Online. January 12. http://yaleglobal.yale.edu/content/terrrorisms-new-avatars-part-ii.
———. 2010c. “Terrorist Facebook: Terrorists and Online Social Networking.” In Web Intelligence and Security, edited by Mark Last and Abraham Kandel, 19–30. NATO Science for Peace and Security Series. Amsterdam: IOS Press.
———. 2011a. “Al Qaeda Has Sent You a Friend Request: Terrorists Using Online Social Networking.” Paper presented at annual conference of the Israeli Communication Association, Haifa, Israel, April 14.
———. 2011b. “Cyber-Fatwas and Terrorism.” Studies in Conflict & Terrorism 34 (10): 765–81.
———. 2012a. “Lone Wolves in Cyberspace.” Journal of Terrorism Research 3 (2): 75–90.
———. 2012b. “The Role of the Media in Propagating Terrorism.” In Countering Terrorism: Psychosocial Strategies, edited by Updesh Kumar and Manas K. Mandal, 182–200. London: Sage Publications.
———. 2014a. New Terrorism and New Media. Commons Lab, Science and Technology Innovation Program. Washington, DC: Woodrow Wilson International Center for Scholars. http://www.wilsoncenter.org/publication/new-terrorism-and-new-media.
———. 2014b. “Virtual Packs of Lone Wolves.” Medium.com/@thewilsoncenter, February 28. https://medium.com/its-a-medium-world/virtual-packs-of-lone-wolves-17b12f8c455a.
Weimann, Gabriel, and Gabrielle Vail Gorder. 2009. “Al-Qaeda Has Sent You A Friend Request: Terrorists Using Online Social Networking.” InSite 2:6. http://sitemultimedia.org/docs/inSITE_June_2009.pdf.
Weimann, Gabriel, and Conrad Winn. 1994. The Theater of Terror: Mass Media and International Terrorism. New York: Longman.
Westby, Jody. 2006. “Countering Terrorism with Cyber Security.” Paper presented at the 36th Session of World Federation of Scientists, International Seminars on Planetary Emergencies, August 18–26, 2006, Erice, Italy.
Wheeler, Ashley. 2013. “Iranian Cyber Army, the Offensive Arm of Iran’s Cyber Force.” Phoenix TS blog, September 19. http://www.phoenixts.com/blog/iranian-cyber-army/#sthash.qMRqtrQg.1Pl02y9b.dpuf.
The White House. 2011a. Empowering Local Partners to Prevent Violent Extremism in the United States. August 2011. Washington, DC: The White House. http://www.whitehouse.gov/sites/default/files/empowering_local_partners.pdf.
———. 2011b. Strategic Implementation Plan for Empowering Local Partners to Prevent Violent Extremism in the United States. December 2011. Washington, DC: The White House. http://www.whitehouse.gov/sites/default/files/sip-final.pdf.
Wilkinson, Paul. 2001. Terrorism versus Democracy. London: Frank Cass.
Wilson, Clay. 2005. Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Congressional Research Service Report for Congress RL32114, April 1. Washington, DC: Congressional Research Service.
———. 2007. Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues. Congressional Research Service Report for Congress RL31787, June 5. Washington, DC: Congressional Research Service.
———. 2008. Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Congressional Research Service Report for Congress RL32114, January 29. Washington, DC: Congressional Research Service.
Withnall, Adam. 2014. “Iraq Crisis: ISIS Declares Its Territories a New Islamic State with ‘Restoration of Caliphate’ in Middle East.” The Independent, June 30. http://www.independent.co.uk/news/world/middle-east/isis-declares-new-islamic-state-in-middle-east-with-abu-bakr-albaghdadi-as-emir-removing-iraq-and-syria-from-its-name-9571374.html.
Wolfsfeld, Gadi, Eli Avraham, and Issam Aburaiya. 2001. “When Prophesy Always Fails: Israeli Press Coverage of the Arab Minority’s Land Day Protests.” Political Communication 17 (2): 115–31.
World Public Opinion. 2009. Public Opinion in the Islamic World on Terrorism, al Qaeda, and US Policies. February 25. WorldPublicOpinion.org. Program on International Policy Attitudes, University of Maryland. http://www.worldpublicopinion.org/pipa/pdf/feb09/STARTII_Feb09_rpt.pdf.
Wright, Lawrence. 2007. The Looming Tower: Al-Qaeda and the Road to 9/11. New York: Alfred A. Knopf.
Youssef, Maamoun, and Lee Keath. 2014. “Al-Qaida Breaks with Syria Group in Mounting Feud.” Associated Press, February 3. http://bigstory.ap.org/article/al-qaida-breaks-syria-group-mounting-feud.
YouTube. 2014. “Statistics.” Accessed March 12, 2014. http://www.youtube.com/yt/press/statistics.html.
Zanini, Michele, and Sean J. A. Edwards. 2001. “The Networking of Terror in the Information Age.” In Networks and Netwars: The Future of Terror, Crime and Militancy, edited by John Arquilla and David Ronfeldt, 29–60. Santa Monica, CA: RAND Corporation.
Zanna, Mark P. 1993. “Message Receptivity: A New Look at the Old Problem of Open - vs. Closedmindedness.” In Advertising Exposure, Memory and Choice, edited by Andrew A. Mitchell, 141–62. Hillsdale, NJ: Erlbaum.
Zelin, Aaron. 2013. The State of Global Jihad Online. January. Washington, DC: New America Foundation. http://www.washingtoninstitute.org/uploads/Documents/opeds/Zelin20130201-NewAmericaFoundation.pdf.
Zetter, Kim. 2011. “DHS Fears a Modified Stuxnet Could Attack U.S. Infrastructure.” Wired.com, July 26. http://www.wired.com/threatlevel/2011/07/dhs-fears-stuxnet-attacks/.