[1] Cybersecurity, Civil Liberties and Innovation: Hearing Before H. Comm. on Energy and Com., 111th Cong. (2009) (statement of Gregory T. Nojeim),available at http://www.cdt.org/security/20090501_cybersecurity.pdf; Cybersecurity: Preventing Terrorist Attacks and Protecting Cyberspace: Hearing Before S. Comm. on the Judiciary, Subcomm. on Terrorism and Homeland Security, 111th Cong. (2009), available at http://www.cdt.org/files/pdfs/20091117 _senate_cybersec_testimony.pdf.
[2] Crime in India: 2011-Compendium (2012), National Crime Records Bureau, Ministry of Home Affairs, Government of India, New Delhi, India
[3] Clay Wilson, Cong. Research Serv., RL32114, “Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress 5 (2005)”, (Wilson argues that defining any particular act as Cyberterrorism is problematic because of the inherent difficulties in determining the attackers identify, motive and intent, but recognizes the potential for Cyberterrorism). Available on http://www.dtic.mil/get-tr-doc/pdf?AD= ADA44479, Retrieved on 12 March, 2009
[4] Myra Williamson, Terrorism, War and International Law: The Legality of the Use of Force against Afghanistan in 2001. p. 38, Ashgate Publishing. United Kingdom, 2009.; Alex P. Schmid, The Definition of Terrorism. p. 39, The Routledge Handbook of Terrorism Research. Routledge, 2011
[5] Bruce Hoffman, Inside Terrorism, p. 32, 2nd ed., Columbia University Press, 2006,p.32,Seerevie win TheNewYork Times, Inside Terrorism, Available on http://www.nytimes.com/books/first/h/h offman-terrorism.html. Retrieved on 11 February 2012. Cited in “Cyber-Terrorism: Finding a Common Starting Point”by Jeffrey Thomas Biller, to The Faculty of The George Washington University Law School.