Abstract

This article analyses the internet functionality used by the terrorists responsible for the Madrid bombings of March 11, 2004. The computers and USB memory drives seized by the Spanish police form the main source for the analysis. This case study is contrasted with the contemporary [...]