diff options
| author | root <root@turin.home> | 2022-02-19 16:18:54 +0000 |
|---|---|---|
| committer | root <root@turin.home> | 2022-02-19 16:18:54 +0000 |
| commit | 84102b68aabaec8755612be5619057eb36ad5dce (patch) | |
| tree | 505c207df7fa009717990561d80e5b9a348f39d7 /refer | |
| parent | 8524d5fd8cf7c8a3fde26080a7e64f84b1dd736c (diff) | |
Discussing terror, 9/11 Commission Report
Diffstat (limited to 'refer')
| -rw-r--r-- | refer | 12 |
1 files changed, 12 insertions, 0 deletions
@@ -51,6 +51,18 @@ %J CTC Sentinel %O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022) +%T The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (9/11 Report) +%A National^Commission^on^Terrorist^Attacks^Upon^the^United^States +%D July 2004 + +%A Daniel Byman +%D 2014 +%T The Intelligence War on Terrorism +%J Intelligence and National Security +%V 29:6 +%P 837-863 +%G DOI: 10.1080/02684527.2013.851876 + %T International statement: End-to-end encryption and public safety %A Home^Office %D Oct 2020 |
