[1]
A. Parker, ‘Director General speaks on terrorism, technology and oversight’, 2015 [Online]. Available: https://www.mi5.gov.uk/news/director-general-speaks-on-terrorism-technology-and-oversight
[2]
I. Awan and B. Blakemore, Policing cyber hate, cyber threats and cyber terrorism. Farnham: Ashgate, 2012 [Online]. Available: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=4512562
[3]
I. Awan, ‘Debating the Term Cyber-Terrorism: Issues and Problems’, Internet Journal of Criminology, 2014 [Online]. Available: https://www.internetjournalofcriminology.com/_files/ugd/b93dd4_d6e57fcde0d44fe6a755dbd315c07093.pdf
[4]
‘Cabinet Office, (2011). The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World.’ [Online]. Available: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber-security-strategy-final.pdf
[5]
‘Cottim, Armando, 2010. Cybercrime, Cyberterrorism and Jurisdiction: An Analysis of Article 22 of the COE Convention on Cybercrime. European Journal of Legal Studies. Vol 2 (3).’ [Online]. Available: http://www.ejls.eu/6/78UK.htm
[6]
T. M. Chen, L. Jarvis, and S. Macdonald, Eds., ‘The Criminalisation of Terrorists’ Online Preparatory Acts’, in Cyberterrorism: understanding, assessment, and response, New York, NY: Springer, 2014 [Online]. Available: https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=1782052&ppg=175
[7]
‘Cavelty, Dr Myriam Dunn, (2008) Cyber-Terror—Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate. Journal of Information Technology and Politics. Vol 4 (1). pp.19-36.’
[8]
‘The Cyberterrorism Project’. [Online]. Available: http://www.cyberterrorism-project.org/publications/
[9]
D. Denning, ‘Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives.’, 2000 [Online]. Available: https://faculty.nps.edu/dedennin/publications/Testimony-Cyberterrorism2000.htm
[10]
‘European Parliamentary Research Service, 2013. Briefing: Cyber Security in the EU’: [Online]. Available: http://www.europarl.europa.eu/eplibrary/Cyber-security-in-the-European%20Union.pdf
[11]
‘Jarvis, L. & Macdonald, S. (2014) “What is Cyberterrorism? Findings from a Survey of Researchers” Terrorism and Political Violence 37(1): pp. 68-90’ [Online]. Available: http://www.tandfonline.com/doi/abs/10.1080/1057610X.2014.853603?journalCode=uter20#.VJKDjSusU6w
[12]
‘Rudner, M. (2013) “Cyber-Threats to Critical National Infrastructure: An Intelligence Challenge,” International Journal of Intelligence and CounterIntelligence, 26(3), pp. 453-481’ [Online]. Available: http://www.tandfonline.com/doi/abs/10.1080/08850607.2013.780552#.U6b_R_ldU6w
[13]
‘Stohl, M. (2007). “Cyber Terrorism: A Clear and Present Danger, The Sum of All Fears, Breaking Point or Patriot Games,” Crime, Law and Social Change 46:223-238’.
[14]
G. Weimann, Terror on the internet: the new arena, the new challenges. Washington, D.C.: United States Institute of Peace Press, 2006.
[15]
S. Herzog, ‘Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses’, Journal of Strategic Security, vol. 4, no. 2, 2011 [Online]. Available: https://digitalcommons.usf.edu/jss/vol4/iss2/4/
[16]
M. Kenney, ‘Cyber-Terrorism in a Post-Stuxnet World’.
[17]
‘Cabinet Office National Security Pages’: [Online]. Available: https://www.gov.uk/government/publications/security-policy-framework
[18]
‘Cornish, P. (2007) Domestic Security, Civil Contingencies and Resilience in the United Kingdom: A Guide to Policy. London: Chatham House.’ [Online]. Available: http://www.chathamhouse.org/publications/papers/view/108568
[19]
‘Cornish, P. (ed) (2007) Britain and Security. London: Smith Institute.’
[20]
‘Cornish, P (2008) “The National Security Strategy of the United Kingdom: How Radical Can Britain Be?” London: Chatham House.’
[21]
‘Edwards, C. (2007) The Case for a National Security Strategy. London: Demos.’ [Online]. Available: http://demos.co.uk/files/Demos_report_the_case_for_a_national_security_strategy.pdf
[22]
‘HM Government (2010): A Strong Britain in an Age of Uncertainty. The National Security Strategy. London: TSO’. [Online]. Available: http://webarchive.nationalarchives.gov.uk/20121015000000/http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191639.pdf
[23]
‘Kirshner, J. Barry Strauss, B., Fanis, M. and Evangelista, “Iraq and Beyond: The New U.S. National Security Strategy”, Cornell University Peace Studies Program Paper 27.’ [Online]. Available: http://pacs.einaudi.cornell.edu/node/8135
[24]
‘National Commission on Terrorist Attacks Upon the United States’. [Online]. Available: http://www.9-11commission.gov/
[25]
‘Omand, Sir David, 2009. The National Security Strategy: Implications for the UK intelligence community.’ [Online]. Available: http://dematerialisedid.com/pdfs/National_Security_Strategy.pdf
[26]
‘White House, 2010. National Security Strategy’. [Online]. Available: http://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf
[27]
‘CONTEST and related documents are available online via the UK Home Office page’. [Online]. Available: https://www.gov.uk/government/policies/protecting-the-uk-against-terrorism
[28]
J. Blackbourn, Learning Lessons from Counter-Terrorism Failures: The United Kingdom’s Pre- and Post- 9/11 Counter-Terrorism Policy. 2009 [Online]. Available: https://convention2.allacademic.com/one/isa/isa09/
[29]
‘Chalk, P. and Rosenau, W. (2004) Confronting “the Enemy Within”: Security Intelligence, the Police, and Counterterrorism in Four Democracies. Washington: RAND.’ [Online]. Available: http://www.rand.org/content/dam/rand/pubs/monographs/2004/RAND_MG100.pdf
[30]
P. Clarke, ‘Learning from Experience: counter-terrorism in the UK since 9/11 (Colin Cramphorn Memorial Lecture, Policy Exchange)’. 2007 [Online]. Available: https://policyexchange.org.uk/wp-content/uploads/2016/09/learning-from-experience-jun-07.pdf
[31]
Wilkinson, Paul, Ed., ‘An Assessment of the Contribution of Intelligence Led Counter-Terrorism to UK Homeland Security Post 9/11 within the “Contest” Strategy’, in Homeland Security in the UK: Future Preparedness for Terrorist Attack Since 9/11, Routledge; New Ed edition (14 Jun. 2007) [Online]. Available: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=308629
[32]
F. Gregory, ‘CONTEST: An Evaluation of Revisions to the UK Counter-Terrorism Strategy with a Special Focus on the CBRNE Threat’. 2009 [Online]. Available: https://www.realinstitutoelcano.org/en/analyses/contest-2009-an-evaluation-of-revisions-to-the-uk-counter-terrorism-strategy-with-a-special-focus-on-the-cbrne-threat-ari/
[33]
‘Lambert, R (2008) “Empowering Salafis and Islamists Against Al-Qaeda: A London Counterterrorism Case Study”. PS: Political Science & Politics, Vol. 41(1), 31-35.’
[34]
‘Lum, C., Kennedy, L.W. and Sherley, A. (2006) “Are Counter-terrorism strategies effective?” Journal of Experimental Criminology Vol. 2 (4). 489-516.’
[35]
‘Martin, Thomas, (2014). Governing an Unknowable Future: The Politics of Britain’s Prevent Policy. Critical Studies on Terrorism Vol. 7 (1). 62-78’.
[36]
‘Monar, J. (2007) “Common Threat and Common Response? The European Union’s Counter-Terrorism Strategy and its Problems”, Government and Opposition, Vol. 42 (3), 292-313.’
[37]
‘Pressman, J. (2007) “Rethinking Transnational Counterterrorism: Beyond a National Framework”, The Washington Quarterly, Vol. 20 (4), 63-73.’
[38]
‘Thomas, P. (2010) “Failed and Friendless: the UK’s ‘Preventing Violent Extremism’ Programme” The British Journal of Politics and International Relations, Vol 12 (3) 442-458.’ [Online]. Available: http://eprints.hud.ac.uk/8949/
[39]
R. Lambert and L. Freedman, Countering Al-Qaeda in London: police and Muslims in partnership. London: Hurst, 2011.
[40]
P. Wilkinson, Homeland security in the UK: future preparedness for terrorist attack since 9/11. London: Routledge, 2007 [Online]. Available: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=308629
[41]
K. S. Ball and F. Webster, The intensification of surveillance: crime, terrorism and warfare in the information age. London: Pluto, 2003 [Online]. Available: http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5662437450002746&institutionId=2746&customerId=2745
[42]
J. Coaffee, Terrorism, risk and the global city: towards urban resilience. Farnham, Surrey, England: Ashgate Pub, 2009 [Online]. Available: http://ezproxy.lib.le.ac.uk/login?url=http://site.ebrary.com/lib/leicester/Doc?id=10331433
[43]
S. Graham, ‘Recasting the “Ring of Steel”: Designing Out Terrorism in the City of London’, in Cities, war, and terrorism: towards an urban geopolitics, Malden, MA: Blackwell Publishing, 2004 [Online]. Available: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=351008
[44]
P. Griset and S. Mahan, Terrorism in perspective. London: SAGE, 2003.
[45]
P. Fussey, ‘New Labour and New Surveillance: Theoretical and Political Ramifications of CCTV Implementation in the UK’, Surveillance and Society, vol. 2, no. 2/3, 2004 [Online]. Available: https://ojs.library.queensu.ca/index.php/surveillance-and-society/article/view/3377/3340
[46]
‘Haggerty, K., and Gazso, A. (2005) “Seeing Beyond the Ruins: Surveillance as a Response to Terrorist Threats”, Canadian Journal of Sociology, 30(2): 169- 187.’ [Online]. Available: http://www.jstor.org/discover/10.2307/4146129?sid=21105068938881&uid=3738032&uid=2&uid=4
[47]
D. Lyon, Surveillance after September 11, vol. Themes for the 21st century. Cambridge: Polity, 2003.
[48]
H. Keeble and K. Hollington, Terror cops: fighting terrorism on Britain’s streets. London: Pocket Books, 2010.
[49]
S. Graham, ‘Technology Vs “Terrorism”: Circuits of City Surveillance Since September 11, 2001’, in Cities, war, and terrorism: towards an urban geopolitics, Malden, MA: Blackwell Publishing, 2004 [Online]. Available: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=351008
[50]
‘MI5 - Threat advice’. [Online]. Available: https://www.mi5.gov.uk/home/the-threats/overview.html
[51]
A. Silke, ‘Deterring Terrorists’, in Terrorists, victims, and society: psychological perspectives on terrorism and its consequences, Chichester: Wiley, 2003 [Online]. Available: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=366881
[52]
Kirstie Ball, ‘The Constant State of Emergency?: Surveillance after 9/11’, in The Intensification Of Surveillance : crime, terrorism and warfare in the information age, Pluto Press [Online]. Available: http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5665222410002746&institutionId=2746&customerId=2745
[53]
‘Cottim, Armando, 2010. Cybercrime, Cyberterrorism and Jurisdiction: An Analysis of Article 22 of the COE Convention on Cybercrime. European Journal of Legal Studies. Vol 2 (3).’ [Online]. Available: http://www.ejls.eu/6/78UK.htm