1. Abd Al-Aziz Al-Muqrin (2009) A practical course of Guerrilla war (trans: Cigar N), published as: Al-Aqidas’s Doctrine for Insurgency. Washington
2. Ahlberg C (2014a) How Al-Qaeda uses encryption post-Snowden (part 1). Recorded future blog post. Accessed online: https://www.recordedfuture.com/al-Qaeda-encryption-technology-part-1/
3. Ahlberg C (2014b) How Al-Qaeda uses encryption post-Snowden (part 2). Recorded future blog post. Accessed online: https://www.recordedfuture.com/al-qaeda-encryption-technology-part-2/
4. Albawaba News (2016) Jordan intercepts Daesh messenger pigeon, spy plane at border. Albawaba News. Accessed online: https://www.albawaba.com/news/jordan-intercepts-IS-messenger-pigeon-spy-plane-border-836538
5. Al-Kadi IA (1992) The origins of cryptology: the Arab contributions. Cryptologia