diff options
| author | root <root@turin.home> | 2022-02-19 16:18:54 +0000 |
|---|---|---|
| committer | root <root@turin.home> | 2022-03-07 11:35:34 +0000 |
| commit | 59255e745611bdac1dee7eac69dc50370e13d901 (patch) | |
| tree | 3cb9d4c380b6b5434ea4341dadd467e3d45a95cb /refer | |
| parent | 07f08d061a52af8bf62d1c1ecaed22f1bcdff14e (diff) | |
Discussing terror, 9/11 Commission Report
Diffstat (limited to 'refer')
| -rw-r--r-- | refer | 12 |
1 files changed, 12 insertions, 0 deletions
@@ -51,6 +51,18 @@ %J CTC Sentinel %O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022) +%T The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (9/11 Report) +%A National^Commission^on^Terrorist^Attacks^Upon^the^United^States +%D July 2004 + +%A Daniel Byman +%D 2014 +%T The Intelligence War on Terrorism +%J Intelligence and National Security +%V 29:6 +%P 837-863 +%G DOI: 10.1080/02684527.2013.851876 + %T International statement: End-to-end encryption and public safety %A Home^Office %D Oct 2020 |
