Terrorist Use of the Internet by the Numbers: Part II – Quantifying Behaviours, Patterns, and Processes Using Closed Sources

VOX-Pol Blog post.

x
Tags: closed source, terrorism