Skip to content
Main Menu
Research
Data & Primary Sources
Harmony Program
Militant Imagery Project
Al-Mawla Interrogation Reports
Publications
Reports
CTC Sentinel
CTC Perspectives
Regions
Europe
Americas
Africa
Middle East
South & Central Asia
East & Southeast Asia
Topics
Cooperation, Competition, & Fissures
Counterterrorism
CVE, De-Rad, & Disengagement
Financing & the Crime-Terror Nexus
Foreign Fighters
Hostage & Kidnapping
Ideology, Rules, & Edicts
Innovation & Technology
Media & Communication
Operations, Plots, & Attacks
Recruitment & Radicalization
Strategy, History, & Goals
Terror Behavior
Weapons & Tactics
Weapons of Mass Destruction
Terrorist Organizations & Networks
Al Qa`ida & Affiliates
Islamic State & Predecessor Groups
Hayat Tahrir Al-Sham
Afghan Taliban
Pakistani Taliban
Haqqani Network
Lashkar-E-Taiba
Al-Shabaab
Boko Haram
Hezbollah & Other Shia Groups
Violent Far Right Terrorism
Violent Far Left Terrorism
Single Issue Terrorism
Individual Terrorist Actors
Go
Education
Cadet Education
Courses
Professional Development Opportunities
Cadet Internships / AIADs
Cadet Activities & Achievements
Downing Scholars Program
Program Description
Application Instructions
MILPER Message
Practitioner Education
CTC Sentinel
Editorial Board
Submission Guidelines
News
About
History
Team
Internship and Research Assistantship Program
Research
Education
CTC Sentinel
Close
Publications by
Robert Graham
Sentinel Articles
June 16, 2016
How Terrorists Use Encryption
Robert Graham
Stay Informed
Sign up to receive updates from CTC.
Sign up