References
Dennard, L..Wickham, L., & Green, S. Weapons Technical Intelligence Handbook. Joint IED Defeat Organization.
Depue, R. L. (1986). An American Response to an Era of Violence, FBI Law Enforcement Bulletin. Quantico, VA: Federal Bureau of Investigation
Federal Bureau of Investigation (2012), Counterterrorism Analytical Lexicon. U.S. Department of Justice.
FM 3-90.15. (2010) Site Exploitation Operations. Headquarters, Department of the Army
Gillen, M., Loyall, J., Usbeck, K., Hanlon, K., Scally, A., Sterling, J., ... & Kohler, R. (2012). Beyond line-of-sight information dissemination for force protection. Raytheon BBN Technologies, Cambridge, MA.
James, Michael (2014). Scrum Methodology. Retrieved from www.scrummethodology.com.
Lofty, P. Major (2002). Managing Sensitive Site Exploitation – Notes from Operation Iraqi Freedom. Fort Hood, TX: U.S. Department of the Army
National Forensic Science Technology Center®. (2015). National Forensic Technology Center. Retrieved from http://www.nfstc.org/
Parnell, G. S., Driscoll, P. J., & Henderson, D. L. (Eds.). (2011). Decision making in systems engineering and management (Vol. 81). John Wiley & Sons
Rosen, J. L., & Walsh, J. W. (2011). The Nett Warrior system: a case study for the acquisition of soldier systems (No. NPS- AM-11-187). NAVAL POSTGRADUATE SCHOOL MONTEREY CA GRADUATE SCHOOL OF BUSINESS AND PUBLIC POLICY.
Stewart, K. (2013, March 6). Naval Postgraduate School Public Affairs. Naval Postgraduate School Enlisted SOF Student Creates Smartphone App. Retrieved from http://www.navy.mil/.
Stewart, K. (2013, July 17). Naval Postgraduate School Public Affairs. NPS Student’s Intel App Takes Center Stage in Global Interdiction Experiment. Retrieved from: http://www.nps.edu/About/News/ .
Task Force Team SOF-SE Report. (2007). SOF-SE Report. Special Forces Command, Department of the Army
Trello. www.trello.com. 2015.
United States Operation Command. (2015, March 11). Technical Exploitation Course. Retrieved from http://www.soc.mil.
Wiggins, Virginia (2008, February 28). DoD Biometrics Architecture Briefing to Industry. Retrieved from the Biometrics Task Force Technical Integration Division.