Return to Article Details Storage and Use of Information in an Intelligence and Security Context Download Download PDF