aboutsummaryrefslogtreecommitdiff
path: root/refer
diff options
context:
space:
mode:
authorroot <root@turin.home>2022-02-19 16:18:54 +0000
committerroot <root@turin.home>2022-03-07 11:35:34 +0000
commit59255e745611bdac1dee7eac69dc50370e13d901 (patch)
tree3cb9d4c380b6b5434ea4341dadd467e3d45a95cb /refer
parent07f08d061a52af8bf62d1c1ecaed22f1bcdff14e (diff)
Discussing terror, 9/11 Commission Report
Diffstat (limited to 'refer')
-rw-r--r--refer12
1 files changed, 12 insertions, 0 deletions
diff --git a/refer b/refer
index 4abb107..a760478 100644
--- a/refer
+++ b/refer
@@ -51,6 +51,18 @@
%J CTC Sentinel
%O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022)
+%T The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (9/11 Report)
+%A National^Commission^on^Terrorist^Attacks^Upon^the^United^States
+%D July 2004
+
+%A Daniel Byman
+%D 2014
+%T The Intelligence War on Terrorism
+%J Intelligence and National Security
+%V 29:6
+%P 837-863
+%G DOI: 10.1080/02684527.2013.851876
+
%T International statement: End-to-end encryption and public safety
%A Home^Office
%D Oct 2020