This study explores how the internet is used by individuals in the process of their radicalisation. It is based on primary data drawn from a variety of sources: evidence presented at trial, computer registries of convicted terrorists, interviews with convicted terrorists and extremists, as well as police senior investigative officers responsible for terrorist investigations.