close source intelligence
Blog
Terrorist Use of the Internet by the Numbers: Part II – Quantifying Behaviours, Patterns, and Processes Using Closed Sources
March 29, 2017This post is Part 2 of 3; Part I is HERE. Background Last week’s post—part I of three in this series—presented findings on convicted UK terrorists’ online behaviours from a large scale analysis based on open source data. Follow-up research on the antecedent behaviours, including online activities, of UK-based lone-actor terrorists leading up to their ...