Frederic Lemieux (Georgetown University, USA)

Intelligence and State Surveillance in Modern Societies

ISBN: 978-1-78769-172-8, eISBN: 978-1-78769-171-1

Publication date: 3 December 2018


Lemieux, F. (2018), "References", Intelligence and State Surveillance in Modern Societies, Emerald Publishing Limited, Bingley, pp. 233-246.



Emerald Publishing Limited

Copyright © 2019 Frederic Lemieux

ACIC, 2017 ACIC . (2017). Australian criminal intelligence management strategy 2017–20. Canberra: Australian Criminal Intelligence Commission.

Agranoff and McGuire, 2001 Agranoff, R. , & McGuire, M. (2001). Big questions in public network management research. Journal of Public Administration Research and Theory, 11(3), 295396.

Akrivopoulou and Garipidis, 2013 Akrivopoulou, C. M. , & Garipidis, N. (2013). Digital democracy and the impact of technology on governance and politics: New globalized practices. Hershey, PA: IGI Global.

Albanese, 2008 Albanese, J. S. (2008). Risk assessment in organized crime. Developing a market and product-based model to determine threat levels. Journal of Contemporary Criminal Justice, 24(3), 263273.

Altham, 1983 Altham, J. E. J. (1983). Ethics of risk. Proceedings of the Aristotelian Society, 84, 1529.

Anderson, 2002 Anderson, M. (2002). Trust and police co-operation. In M. Anderson & J. Apap (Eds.), Police and justice co-operation and the new European borders (pp. 3546). The Hague: Kluwer Law International.

Andreas and Nadelmann, 2006 Andreas, P. , & Nadelmann, E. (2006). Policing the globe. Oxford: Oxford University Press.

Antebi, 2014 Antebi, L. (2014). Changing trends in unmanned aerial vehicles: New challenges for states, armies and security industries. Military and Strategic Affairs, 6(2), 2136.

Arenas et al., 2014 Arenas, M. , Barcelo, P. , Libkin, L. , & Murlak, F. (2014). Foundations of data exchange. Cambridge: Cambridge University Press.

Arrow, 1971 Arrow, K. J. (1971). A utilitarian approach to the concept of equality in public expenditures. Quarterly Journal of Economics, 85(3), 409419.

Audit Commission, 1993 Audit Commission . (1993). Helping with enquiries. Tackling crime effectively. London: Her Majesty's Stationery Office.

Bar-Joseph, 2013 Bar-Joseph, U. (2013). The politicization of intelligence: A comparative study. International Journal of Intelligence and CounterIntelligence, 26(2), 347369.

Bayley, 1994 Bayley, D. H. (1994). Police for the future. New York, NY: Oxford University Press.

Bayley and Shearing, 2001 Bayley, D. , & Shearing, C. (2001). The new structure of policing: Description, conceptualisation, and research agenda. Washington, DC: National Institute of Justice.

Beck, 1992 Beck, U. (1992). Risk society: Toward a new modernity. Thousand Oaks, CA: Sage Publications.

Bellaby, 2014 Bellaby, R. (2014). The ethics of intelligence: A new framework. New York, NY: Routledge.

Bentham, 2009 Bentham, J. (2009). Panopticon or the inspection house. Newcastle upon Tyne: Cambridge Scholars Publishing.

Benyon et al., 1993 Benyon, J. , Turnbull, L. , Willis, A. , Woodward, R. , & Beck, A. (1993). Police cooperation in Europe: An investigation. Leicester: Centre for the Study of Public Order, University of Leicester.

Bernard, 1939 Bernard, L. L. (1939). Social control in its sociological aspects. New York, NY: Macmillan Publishing.

Best and Elsea, 2011 Best, R. A. , & Elsea, J. K. (2011). Satellite surveillance: Domestic issues. Washington, DC: Congressional Research Service.

Betts, 2002 Betts, R. K. (2002). Fixing intelligence. Foreign Affairs, 80(1), 4359.

Bichard, 2004 Bichard, M. (2004). The Bichard inquiry report. London: Home Office.

Bigo, 1996 Bigo, D. (1996). Polices en Réseaux: L’expérience Européenne. Paris: Presse de Sciences Po.

Bigo, 2002 Bigo, D. (2002). Border regimes and security in an enlarged European community. In J. Zielonka (Ed.), Europe unbound: Enlarging and reshaping the boundaries of the European Union (pp. 213239). New York, NY: Routledge.

Birkinshaw and Sheehan, 2002 Birkinshaw, J. , & Sheehan, T. (2002). Managing the knowledge lifecycle. MIT Sloan Management Review, 44(1), 7583.

Bitner, 1970 Bitner, E. (1970). The functions of the police in modern society. Washington, DC: National Institute of Mental Health, Center for Studies of Crime and Delinquency.

Blackler, 1995 Blackler, F. (1995). Knowledge, knowledge work and organizations: An overview and interpretation. Thousand Oaks, CA: Sage Publications.

Boba, 2013 Boba, R. (2013). Crime analysis with crime mapping. Thousand Oaks, CA: Sage Publications.

Boersma et al., 2014 Boersma, K. , Brakel, R. V. , Fonio, C. , & Wagenaar, P. (2014). History of state surveillance in Europe and beyond. New York, NY: Routledge.

Boorn, 2014 van den Boorn, G. F. P. (2014). The duties of the vizier. New York, NY: Routledge.

Botha et al., 2008 Botha, A. , Kourie, D. , & Snyman, R. (2008). Coping with continuous change in the business environment, knowledge management and knowledge management technology. New York, NY: Elsevier.

Brandon and Farrington, 2009 Brandon, B. C. , & Farrington, D. P. (2009). Making public place safer: Surveillance and crime prevention. Oxford: Oxford University Press.

Brantingham and Brantingham, 1981 Brantingham, P. J. , & Brantingham, P. L. (1981). Environmental criminology. Thousand Oaks, CA: Sage Publications.

Bressler, 1992 Bressler, F. (1992). Interpol. Paris: Presses de la Cité.

Brodeur, 2010 Brodeur, J-P. (2010). The policing web. Oxford: Oxford University Press.

Brodeur and Dupont, 2006 Brodeur, J. P. , & Dupont, B. (2006). Knowledge workers or “knowledge” workers? Policing and Society, 16(1), 726.

Brodeur et al., 2003 Brodeur, J-P. , Gill, P. , & Tolborg, D. (2003). Democracy, law, and security: Internal security services in contemporary Europe. Burlington, VT: Ashgate.

Bruggeman, 2002 Bruggeman, W. (2002). Policing and accountability in a dynamic European context. Policing and Society, 12(4), 259273.

Bullington and Block, 1990 Bullington, B. , & Block, A. (1990). A Trojan horse: Anti-communism and the war on drugs. Contemporary Crises, 14(1), 3955.

Carter and Carter, 2009 Carter, D. L. , & Carter, J. G. (2009). Intelligence-led policing: Conceptual considerations for public policy. Criminal Justice Policy Review, 20(3), 310325.

Castells, 2010 Castells, M. (2010). The rise of the network society. The information age: Economy, society, and culture (Vol. 1). Hoboken, NJ: John Wiley & Sons.

Castillo, 2003 Castillo, J. (2003). Challenging the knowledge management mystique. Journal of Management Research, 3(3), 152172.

Center for Disease Control and Prevention, 2013 Center for Disease Control and Prevention . (2013). Surveillance for foodborne disease outbreaks in United States. Atlanta, GA: Center for Disease Control and Prevention.

Chainey and Ratcliffe, 2013 Chainey, S. , & Ratcliffe, J. (2013). GIS and crime mapping. Hoboken, NJ: John Wiley & Sons.

Chesterman and Fisher, 2009 Chesterman, S. , & Fisher, A. (2009). Private security, public order: The outsourcing of public services and its limits. In S. Chesterman & A. Fisher (Eds.), Private security, public order: The outsourcing of public services and its limits (pp. 17). Oxford: Oxford University Press.

Childress, 1978 Childress, J. F. (1978). Ethical issues in death and dying. Religious Studies Review, 4(3), 180188.

Choo, 2002 Choo, C. W. (2002). Information management for the intelligent organization: The art of scanning the environment. Medford, NJ: Information Today Inc.

Christensen, 1997 Christensen, C. M. (1997) The innovator's dilemma: When new technologies cause great firms to fail. Boston, MA: Harvard Business School Press.

Cockburn and Clair, 2014 Cockburn, A. , & St. Clair, J. (2014). Whiteout: The CIA, drugs and the press. New York, NY: Verso Books.

Cohen, 2010 Cohen, E. (2010). Mass surveillance and state control: The total information awareness project. Berlin: Springer.

Cohen and Felson, 1979 Cohen, L. , & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588608.

Copland, 2010 Copland, C. (2010). Terrorism and security issues facing the water infrastructure sector. Washington, DC: Congressional Research Service.

Corti and Swain, 2009 Corti, D. , & Swain, A. (2009). War on drugs and war on terror: Case of Afghanistan. Peace and Conflict Review, 3(2), 4153.

Cox, 2012 Cox, J. S. (2012). Canada and the five eyes intelligence community. Ottawa: Canadian Defense & Foreign Affairs Institute and Canadian International Council.

Crawford, 1997 Crawford, A. (1997). The local governance of crime: Appeals to community and partnerships. London: Oxford University Press.

Crossan et al., 1999 Crossan, M. M. , Lane, H. W. , & White, R. E. (1999). An organizational learning framework: From intuition to institution. Academy of Management Review, 24(4), 522537.

Crowdy, 2011 Crowdy, T. (2011). The enemy within: A history of spies, spymasters and espionage. London: Bloomsbury Publishing.

Crozier and Friedberg, 1977 Crozier, M. , & Friedberg, E. (1977). L'acteur et le système, Paris: Éditions du Seuil.

Cunningham et al., 1990 Cunningham, W. , Strauchs, J. , & Meter, C. V. (1990). The Hallcrest report II: Private security trends, 1970–2000. Boston, MA: Butterworth-Heinemann.

Daigler, 2015 Daigler, K. A. (2015). Spies, patriots, and traitors: American intelligence in the revolutionary war. Washington, DC: Georgetown University Press.

Dalkir, 2005 Dalkir, K. (2005). Knowledge management in theory and practice. New York, NY: Elsevier.

Darroch and Mazerolle, 2013 Darroch, S. , & Mazerolle, L. (2013). Intelligence-led policing: A comparative analysis of organizational factors influencing innovation uptake. Police Quarterly, 16(1), 337.

Davis et al., 2014 Davis, F. , McGarrity, N. , & Williams, G. (2014). Surveillance, counter-terrorism and comparative constitutionalism. New York, NY: Routledge.

Deflem, 2002 Deflem, M. (2002). Policing world society: Historical foundations of international police cooperation. Oxford: Oxford University Press.

Deflem, 2006 Deflem, M. (2006). Global rule of law or global rule of law enforcement? International police cooperation and counter-terrorism. The Annals of the American Academy of Political and Social Science, 603, 240251.

Deflem, 2012 Deflem, M. (2012). Joint terrorism task forces. In F. G. Shanty (Ed.), Counterterrorism: From the cold war to the war on terror (pp. 423426). Santa Barbara, CA: Praeger.

Den Boer, 2008 Den Boer, M. (2008). Governing transnational law enforcement in the EU: Accountability after the fuse between internal and external security. In M. Den Boer & J. Wilde (Eds.), The viability of human security (pp. 6378). Amsterdam: Amsterdam University Press.

Desouza, 2009 Desouza, K. C. (2009). Information and knowledge management in public sector networks: The case of the US intelligence community. International Journal of Public Administration, 32(14), 12191267.

Desouza and Awazu, 2006 Desouza, K. C. , & Awazu, Y. (2006). Knowledge management at SMEs: Five peculiarities. Journal of Knowledge Management, 10(1), 3243.

Duckworth, 1997 Duckworth, B. A. (1997). The defense HUMINT service: Preparing for the 21st century. Defense Intelligence Journal, 6(1), 713.

Dvornik, 1974 Dvornik, F. (1974). Origins of intelligence services: The ancient near East, Persia, Greece, Rome, Byzantium, the Arab Muslim empires, the Mongol empire, China, Muscovy. New Brunswick, NJ: Rutgers University Press.

Egger, 1984 Egger, S. (1984). A working definition of serial murder and the reduction of linkage blindness. Journal of Police Science and Administration, 12, 348357.

Eide and Thee, 1980 Eide, A. , & Thee, M. (1980). Problems of contemporary militarism. London: Croom Helm Publishing.

Else, 2014 Else, D. H. (2014). The “1033 Program,” Department of Defense Support to Law Enforcement. Washington, DC: Congressional Research Service.

EMC Education Services EMC Education Services . (2015). Data science and big data analytics: Discovering, analyzing, visualizing and presenting data. Hoboken, NJ: John Wiley & Sons.

Eppler and Mengis, 2003 Eppler, M. , & Mengis, J. (2003). A framework for information overload research in organizations. Lugano: Universita Della Svizzera Italia. Retrieved from Accessed on May 10, 2018.

Eppler and Mengis, 2004 Eppler, M. J. , & Mengis, J. (2004). The concept of information overload: A review of literature from organization science, accounting, marketing, MIS, and related disciplines. The Information Society, 20(5), 325344.

Ericson and Haggerty, 1997 Ericson, R. V. , & Haggerty, K. D. (1997). Policing the risk society. Oxford: Clarendon Press.

Erskine, 2004 Erskine, T. (2004). ‘As rays of light to the human soul’? Moral agents and intelligence gathering. Intelligence and National Security, 19(2), 359381.

Eterno and Silverman, 2008 Eterno, J. A. , & Silverman, E. B. (2008). The crime numbers game: Management by manipulation. Boca Raton, FL: CRC Press.

Fijnaut and Marx, 1995 Fijnaut, C. J. C. F. , & Marx, G. T. (1995). Undercover: Police surveillance in comparative perspective. Leiden: Martinus Nijhoff Publishers.

Fingar, 2011 Fingar, T. (2011). Analysis in the U.S. intelligence community: Missions, masters, and methods. In B. Fischhoff & C. Chauvin (Eds.), Intelligence analysis: Behavioral and social scientific foundations (pp. 328). Washington, DC: National Research Council.

Finn, 2005 Finn, J. (2005). Photographing Fingerprints: Data Collection and State Surveillance. Surveillance & Society, 3(1), 2144.

Flood, 2004 Flood, P. (2004). Inquiry into Australian intelligence agencies. Canberra: Australian Government.

Floridi and Taddeo, 2014 Floridi, L. , & Taddeo, M. (2014). The ethics of information warfare. Berlin: Springer.

Fooner, 1989 Fooner, M. (1989). Interpol. Issues in world crime and international justice. New York, NY: Plenum Press.

Frontex, 2008 Frontex . (2008). General report. European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union.

Fyffe, 2011 Fyffe, G. (2011). The Canadian intelligence community after 9/11. Journal of Military and Strategic Studies, 13(3), 117.

Gamble and Blackwell, 2001 Gamble, P. R. , & Blackwell, J. (2001). Knowledge management: A state of the art guide. London: Kogan Page.

George and Kimber, 2016 George, B. , & Kimber, S. (2016). The history of private security and its impact on the modern security sector. In M. Gill (Ed.), The hanbook of security (pp. 2140). New York, NY: Palgrave Macmillan.

Gertler, 2012 Gertler, J. (2012). U.S. Unmanned Aerial Systems. Washington D.C.: Congressional Research Service.

Giddens and Pierson, 1998 Giddens, A. , & Pierson, C. (1998). Conversation with Anthony Giddens: Making sense of modernity. Palo Alto, CA: Stanford University Press.

Gilbert, 2012 Gilbert, J. L. (2012). World War I and the origins of U.S. military intelligence. Lanham, MD: Scarecrow Press.

Gill, 2016 Gill, P. (2016). Intelligence governance and democratisation: A comparative analysis of the limits of reform. London: Routledge.

Gill and Phythian, 2013 Gill, P. , & Phythian, M. (2013). Intelligence in an insecure world. Hoboken, NJ: John Wiley & Sons.

Goldman, 2006 Goldman, J. (2006). Ethics of spying: A reader for the intelligence professional. Lanham, MD: Scarecrow Press.

Goldman and Rascoff, 2016 Goldman, Z. K. , & Rascoff, S. J. (2016). Global intelligence oversight: Governing security in the twenty-first century. Oxford: Oxford University Press.

Goodman and Jinks, 2004 Goodman, R. , & Jinks, D. (2004). How to influence states: Socialization and international human rights law. Duke Law Journal, 54(3), 621703.

Gottlieb et al., 1994 Gottlieb, S. , Arenberg, S. , & Singh, R. (1994). Crime analysis: From first report to final arrest. Montclair, CA: Alpha Publishing.

Government Accountability Office, 2012 Government Accountability Office . (2012). Unmanned aerial systems. Washington, DC: Government Accountability Office.

Government Accountability Office, 2015 Government Accountability Office . (2015a). Cyber threats and data breaches illustrate need for stronger controls across federal agencies. Washington, DC: Government Accountability Office.

Government Accountability Office, 2015 Government Accountability Office . (2015b). Biosurveillance: DHS should not pursue BioWatch upgrades or enhancements until system capabilities are established. Washington, DC: Government Accountability Office.

Government Accountability Office, 2016 Government Accountability Office . (2016). FACE recognition technology. FBI should better ensure privacy and accuracy. Washington, DC: Government Accountability Office.

Guisnel, 2002 Guisnel, J. (2002). La citadelle endormie. Paris: Fayard.

Guthrie and Quinlan, 2010 Guthrie, C. , & Quinlan, M. (2010). Just war. The just war tradition: Ethics in modern warfare. New York, NY: Bloomsbury Publishing.

Haberman and Ratcliffe, 2012 Haberman, C. P. , & Ratcliffe, J. H. (2012). The predictive policing challenges of near repeat armed street robberies. Policing, 6(2), 151166.

Hansson, 2013 Hansson, S. O. (2013). The ethics of risk: Ethical analysis in an uncertain world. London: Palgrave Macmillan.

Harbulot and Lucas, 2002 Harbulot, C. , & Lucas, D. (2002). La Guerre Cognitive: l’arme De La Connaissance. Paris: Lavauzelle.

Harris et al., 1976 Harris, D. , Maxfield, M. G. , & Hollady, G. (1976). Basic elements of intelligence. Washington, DC: Law Enforcement Assistance Administration, U.S. Department of Justice.

Head and Mann, 2016 Head, M. , & Mann, S. (2016). Domestic deployment of the armed forces: Military powers, law and human rights. New York, NY: Routledge.

Henry, 2003 Henry, V. E. (2003). COMPSTAT paradigm: Management accountability in policing, business and the public sector. Flushing, NY: Looseleaf Law Publications.

Herman, 2004 Herman, M. (2004). Ethics and intelligence after September 2001. Intelligence and National Security, 19(2), 342358.

Herzog, 2011 Herzog, S. (2011). Revisiting the Estonian cyber attacks: Digital threats and multinational responses. Journal of Strategic Security, 4(2), 4960.

Heuer, 2017 Heuer . (2017). The psychology of intelligence analysis. Washington, DC: Center for the Study of Intelligence.

Himma, 2008 Himma, K. E. (2008). The justification of intellectual property: Contemporary philosophical disputes. Journal of the American Society for Information Science and Technology, 59(7), 11431161.

Hippner, 2009 Hippner, C. (2009). A study into the size of the world's intelligence industry. Academic Dissertation, Mercyhurst College.

Hislop, 2013 Hislop, D. (2013). Knowledge management in organizations: A critical introduction. Oxford: Oxford University Press.

HMIC, HMIC . (1997). Policing with intelligence. London: Her Majesty’s Inspectorate of Constabulary.

Home Office, 1989 Home Office . (1989). Criminal and custodial careers of those born in 1953, 1958 and 1963. Statistical Bulletin. London: Home Office.

Home Office, 1995 Home Office . (1995). Criminal careers of those born between 1953 and 1973. Statistical Bulletin. London: Home Office.

Hope, 1974 Hope, J. (1974). Hope Royal Commission. Canberra: Australian Government.

Hope, 1983 Hope, J. (1983). Royal Commission on Australia’s Security and Intelligence Agencies. Canberra: Australian Government.

Hopkins, 2013 Hopkins, E. (2013). Industrialization and society: A social history, 1830–1951. New York, NY: Routledge.

Horvath, 2013 Horvath, J. (2013). Working with tacit knowledge. In J. A. Woods & J. Cortada (Eds.), The knowledge management yearbook 2000–2001 (pp. 3452). Hoboken, NJ: Taylor & Francis.

House of Lords, 2009 House of Lords . (2009). Surveillance: Citizens and the state. London: The Stationery Office Limited.

Hulnick, 1986 Hulnick, A. S. (1986). The intelligence producer – policy consumer linkage: A theoretical approach. Journal of Intelligence and National Security, 1(2), 212233.

Hulnick, 2011 Hulnick, A. S. (2011). Intelligence producer–consumer relations in the electronic era. International Journal of Intelligence and CounterIntelligence, 24(4), 747756.

Hunker, 2010 Hunker, J. (2010). U.S. international policy for cybersecurity: Five issues that won’t go away. Journal of National Security, Law and Policy, 9(2), 197216.

Ignatieff, 2004 Ignatieff, M. (2004). The lesser evil political ethics in an age of terror. Princeton, NJ: Princeton University Press.

Inmon and Nesavich, 2007 Inmon, W. H. , & Nesavich, A. (2007). Tapping into unstructured data: Integrating unstructured data and textual analytics into business intelligence. Upper Saddle River, NJ: Prentice Hall.

Innes, 2003 Innes, M. (2003). Understanding social control: Crime and social order in late modernity. London: McGraw-Hill Education.

Inspector General of the Department of Homeland Security, 2007 Inspector General of the Department of Homeland Security . (2007). The Department of Homeland Security’s role in food defense and critical infrastructure protection. Washington, DC: Department of Homeland Security.

Inter-American Development Bank, 2016 Inter-American Development Bank . (2016). Cybersecurity: Are we ready in Latin America and the Caribbean? Washington, DC: Organization of American States.

International Telecommunication Union, 2012 International Telecommunication Union . (2012). Overview of the internet of things. Geneva: International Telecommunication Union.

Janeczko, 2012 Janeczko, P. B. (2012). The dark game: True spy stories from invisible ink to CIA moles. Somerville, MA: Candlewick Press.

Jentlesen, 2007 Jentlesen, B. W. (2007). Military force against terrorism: Questions of legitimacy, dilemmas of efficacy. In I. H. Daalder (Ed.), Beyond preemption. Force and legitimacy in a changing world. Washington, DC: Brookings Institute Press.

John and Maguire, 2003 John, T. , & Maguire, M. (2003). Rolling out the national intelligence model: Key challenges. In K. Bullock & N. Tilley (Eds.), Crime reduction and problem-oriented policing. Cullompton: Willan Publishing.

Johnson, 2016 Johnson, L. K. (2016). National security intelligence. Hoboken, NJ: John Wiley & Sons.

Johnson and Wirtz, 2014 Johnson, L. K. , & Wirtz, J. J. (2014). Intelligence: The secret world of spies: An anthology. Oxford: Oxford University Press.

Johnston, 1992a Johnston, L. (1992a). British policing in the nineties: Free market and strong state? International Criminal Justice Review, 2(1), 118.

Johnston, 1992b Johnston, L. (1992b). The rebirth of private policing. New York, NY: Routledge.

Johnston, 1999 Johnston, L. (1999). Private policing in context. European Journal on Criminal Policy and Research, 7(2), 175196.

Jones and Newburn, 1998 Jones, T. , & Newburn, T. (1998). Private security and public policing. Oxford: Oxford University Press.

Jones, 1998 Jones, T. , & Newburn, T. (1998). Private Security and Public Policing. Oxford: Clarendon Press.

Kagan, 2003 Kagan, R. (2003). Of paradise and power: America and Europe in the new world order. New York, NY: Vintage Books.

Kagan and Kristol, 2000 Kagan, R. , & Kristol, W. (2000). Present dangers: Crisis and opportunity in American foreign and defense policy. New York, NY: Encounter Books.

Kaska, 2001 Kaska, P. (2001). Militarizing the American criminal justice system: The changing roles of the armed forces and the police. Boston, MA: Northeastern University Press.

Kegley and Wittkopf, 2005 Kegley, C. W. , & Wittkopf, E. R. (2005). World politics: Trends and transformation. Belmont, CA: Wadsworth Publishing.

Kelling and James, 1982 Kelling, G. L. , & James, W. Q. (1982). Broken windows: The police and neighborhood safety. Atlantic Monthly, 249(3), 2938.

Kindsvater, 2003 Kindsvater, L. C. (2003). The need to reorganize the intelligence community. Studies in Intelligence, 47(1), 3337.

Kloseck, 2000 Kloseck, J. (2000). Data privacy in the information age. New York, NY: Quorum Books.

Kraska, 2001 Kraska, P. B. (2001). Militarizing the American criminal justice system: the changing roles of the Armed Forces and the police. Boston: Northeastern University Press.

Lam, 2000 Lam, A. (2000). Tacit knowledge, organizational learning and societal institutions: An integrated framework. Organization Studies, 21(3), 487513.

Landau, 2013 Landau, S. (2013). Making sense from Snowden: What's significant in the NSA surveillance revelations. Journal of IEEE Security and Privacy, 11(4), 5463.

Lathrop, 2008 Lathrop, C. E. (2008). The literary spy: The ultimate source for quotations on espionage & intelligence. New Haven, CT: Yale University Press.

Leitner, 2013 Leitner, M. (2013). Crime modeling and mapping using geospatial technologies. Berlin: Springer.

Lemieux, 2006 Lemieux, F. (2006). Normes et pratiques en matiere de resneignment criminal: une comparaison internationale. Ste-Foy: Laval University Press.

Lemieux, 2007 Lemieux, F. (2007). Contre-terrorisme: Le rôle des agences de renseignement . In C-P. David & B. Gagnon (Eds.), Repenser le terrorisme: Concept, acteurs et réponses (pp. 311338). Québec: University Laval Press.

Lemieux, 2008a Lemieux, F. (2008a). A cross cultural comparison of intelligence led policing. In T. Williamson (Ed.), The handbook of knowledge based policing: Current conceptions and future directions (pp. 221240). Chichester: John Wiley & Sons.

Lemieux, 2008b Lemieux, F. (2008b). A cross cultural comparison of intelligence led policing. In T. Williamson (Ed.), The handbook of knowledge based policing: Current conceptions and future directions (pp. 221240). London: John Wiley & Sons.

Lemieux, 2010 Lemieux, F. (2010). International police cooperation: Emerging issues, theory and practice. Cullompton: Willan Publishing.

Lemieux, 2015 Lemieux, F. (2015). Current and emerging trends in cyber operations: Policy, strategy and practice. London: Palgrave Macmillan.

Lemieux and Bales, 2012 Lemieux, F. , & Bales, B. (2012). Cyber crime and intelligence-led policing. In search of a proactive investigation model. In S. Leman-Langlois (Ed.), Technocrime 2 (pp. 6578). London: Routledge.

Lemieux and Dupont, 2005 Lemieux, F. , & Dupont, B. (2005). La militarisation des appareils policiers. Ste-Foy: Laval University Press.

Libicki, 1997 Libicki, M. C. (1997). Information dominance. Washington, DC: National Defense University, Institute for National Strategic Studies.

Lowenthal, 2014 Lowenthal, M. M. (2014). From secrets to policy. Washington, DC: CQ Press.

Lowenthal and Clark, 2015 Lowenthal, M. M. , & Clark, R. M. (2015). Five disciplines of intelligence collection. Washington, DC: CQ Press.

Luban, 2014 Luban, D. (2014). Torture, power and law. Cambridge: Cambridge University Press.

Lucas, 2011 Lucas, S. (2011). Recognising politicization: The CIA and the path to the 2003 war in Iraq. Journal of Intelligence and National Security, 26(2), 203227.

Lujan, 1997 Lujan, T. R. (1997). Legal aspects of domestic employment of the army. Parameters: U.S. Army War College Quarterly, 27(3), 8297.

Luo, 2002 Luo, Y. (2002). Building trust in cross-cultural collaborations: Toward a contingency perspective. Journal of Management, 28(5), 669694.

Lyon et al., 2012 Lyon, D. , Ball, K. , & Haggerty, K. D. (2012). Routledge handbook of surveillance studies. New York, NY: Routledge.

Machiavelli, 2003 L’Heuillet, H. (2001). Basse Politique, Haute police: Une Approche Historique et Philosophique de la Police. Paris: Fayard.

Machiavelli, 2003 Machiavelli, N. (2003). The prince. London: Penguin Books.

Machiavelli, 2018 Machiavelli, N. (2018). The art of war. Cambridge: Charles River.

Maguire, 2000 Maguire, M. (2000). Policing by risks and targets: Some dimensions and implications of intelligence control. Policing and Society, 9(4), 315336.

Maguire and John, 2006 Maguire, M. , & John, T. (2006). Intelligence-led policing, managerialism and community engagement: Competing priorities and the role of the national intelligence model in the UK. Policing and Society, 16(1), 6785.

Makino and Cheun, 2003 Makino, S. , & Cheun, H. (2003). Application of the real-time PCR for the detection of airborne microbial pathogens in reference to the anthrax spores. Journal of Microbiological Methods, 53(1), 141147.

Mallett and Hale, 2006 Mallett, M. E. , & Hale, J. R. (2006). The military organization of renaissance state: Venice c. 1400 to 1617. Cambridge: Cambridge University Press.

Marrin, 2012 Marrin, S. (2012). Improving intelligence analysis: Bridging the gap between scholarship and practice. New York, NY: Routledge.

Marx, 2016 Marx, G. T. (2016). Windows into the soul: Surveillance and society in an age of high technology. Chicago, IL: University of Chicago Press.

Mason, 1986 Mason, R. O. (1986). Four ethical issues of the information age. Management Information Systems, 10(1), 117.

Masse and Rollins, 2007 Masse, T. , & Rollins, J. (2007). A summary of fusion centers: Core issues and options for congress. Washington, DC: Congressional Research Service.

Mathews, 1997 Mathews, J. T. (1997). Power shift. Foreign Affairs, 76(1), 5066.

Mayo, 1989 Mayo, J. S. (1989). The evolution of information technologies. In B. R. Guile (Ed.), Information technologies and the conduct of research: The user's view. Washington, DC: National Academies Press.

McElroy, 2000 McElroy, M. V. (2000). Integrating complexity theory, knowledge management and organizational learning. Journal of Knowledge Management, 4(3), 195203.

McGarrell et al., 2007 McGarrell, E. F. , Freilich, J. D. , & Chermak, S. (2007). Intelligence-led policing as a framework for responding to terrorism. Journal of Contemporary Criminal Justice, 23(2), 142158.

McGill and Slocum, 1994 McGill, M. E. , & Slocum, S. J. (1994). The smarter organization: How to build a business that learns and adapts to marketplace needs. New York, NY: John Wiley & Sons.

McLuhan, 2003 McLuhan, M. (2003). Understanding media: The extensions of man. Berkeley, CA: Gingko Press.

McVeigh, 2017 McVeigh, B. (2017). How religion evolved: Explaining the living dead, talking idols, and mesmerizing monuments. New York, NY: Routledge.

Medd, 2001 Medd, W. (2001). Complexity and partnership. In D. Taylor (Ed.), Breaking down barriers: Reviewing partnership practice (pp. 5673). Brighton: University of Brighton.

Mendonca et al., 2007 Mendonca, D. , Jefferson, T. , & Harrald, J. (2007). Collaborative adhocracies and mix and match technologies in emergency management. Communications of the ACM, 50(3), 4549.

Miles, 2016 Miles, A. D. (2016). Perspectives on enhanced interrogation techniques. Washington, DC: Congressional Research Service.

Mintzberg, 1982 Mintzberg, H. (1982). Structure et Dynamique Des Organisations. Montreal: Les Editions d'Organisation.

Moore, 2004 Moore, G. E. (2004). Principles of ethics. New York, NY: Dover Publications.

Morehouse, 2000 Morehouse, B. (2000). The role of criminal intelligence in law enforcement. In M. B. Peterson , B. Morehousse , & R. Wright (Eds.), Intelligence 2000: Revising the basic elements. Sacramento, CA: Law Enforcement Intelligence Unit (LEIU).

Morgan, 2016 Morgan, R. (2016). Oversight through five eyes. Institutional convergence and the structure and oversight of intelligence activities. In Z. K. Goldman & S. J. Rascoff (Eds.), Global intelligence oversight: Governing security in the twenty-first century (pp. 207234). Oxford: Oxford University Press.

Mythen et al., 2009 Mythen, G. , Walklate, S. , & Khan, F. (2009). ‘I’m a muslim but I’m not a terrorist’; victimization, risky identities and the performance of safety. British Journal of Criminology, 49(4), 736754.

National Research Council, 2013 National Research Council . (2013). Technologies to enable autonomous detection for BioWatch. Washington, DC: National Academies Press.

Neumann and Morgenstern, 2007 Neumann, J. V. , & Morgenstern, O. (2007). Theory of games and economic behavior. Princeton, NJ: Princeton University Press.

Nonaka and Takeuchi, 1995 Nonaka, I. , & Takeuchi, H. (1995). The knowledge-creating company. How Japanese companies create the dynamics of innovation. Oxford: Oxford University Press.

Norris and Dunnigham, 2000 Norris, C. , & Dunnigham, C. (2000). Subterranean blues: Conflict as an unintended consequence of police use of informers. Policing and Society, 9(5), 385412.

Olson, 2006 Olson, J. (2006). Fair play: The moral dilemmas of spying. Rockville, MD: Potomac Books Inc.

Omand and Phytian, 2012 Omand, D. , & Phytian, M. (2012). Ethics and intelligence: A debate. International Journal of Intelligence and CounterIntelligence, 26(1), 3863.

Ouimet, 1995 Ouimet, M. (1995). Vers une police informée. Revue internationale de criminologie et de police technique, 48(1), 8794.

Owen, 2015 Owen, G. , & Savage, N. (2015). The Tor Dark Net. The Global Commission on Internet Governance. London: Chatham House.

Paglen, 2009 O’Dell, C. , & Grayson, C. J. (1998). If only we knew what we know: Identification and transfer of internal best practices. California Management Review, 40(3), 154174.

Paglen, 2009 Paglen, T. (2009). Blank spots on the map: The dark geography of the Pentagon's secret world. Boston, MA: Dutton Adult Publisher.

Paglen, 2010 Paglen, T. (2010). Invisible: Covert operations and classified landscapes. New York, NY: Aperture Publishing.

Peterson, 1994 Peterson, M. B. (1994). Application in criminal analysis. A source book. Westport, CT: Greenwood Press.

Peterson, 2005 Peterson, M. (2005). Intelligence-led policing: The new architecture. Washington, DC: Bureau of Justice Assistance.

Peterson et al., 2001 Peterson, M. , Morehouse, R. , & Wright, R. (2001). Intelligence 2000: Revising the basic elements. Lawrenceville, NJ: International Association of Law Enforcement Intelligence Analysts and Law Enforcement Intelligence Unit.

Petkus, 2010 Petkus, D. A. (2010). Ethics of human intelligence operations: Of MICE and men. International Journal of Intelligence Ethics, 1(1), 97121.

Petrović, 2018 Petrović, T. , Šekler, M. , Petrić, D. , Lazić, S. , Debeljak, Z. , Vidanović, D. , et al. (2018). Methodology and results of integrated WNV surveillance programmes in Serbia. PLoS One, 13(4), 119.

Phythian, 2013 Phythian, M. (2013). Understanding the intelligence cycle. New York, NY: Routledge.

Pillar, 2011 Pillar, P. (2011). Intelligence and U.S. foreign policy – Iraq, 9/11, and misguided reform. New York, NY: Columbia University Press.

Pinto, 1998 Pinto, J. K. (1998). Project management handbook. San Francisco, CA: Jossey-Bass.

Plouffe, 2011 Plouffe, W. C. (2011). Just war theory as a basis for just intelligence theory: Necessary evil or sub-rosa colored self-deception? International Journal of Intelligence Ethics, 2(1), 77116.

Pratt and Cullen, 2005 Pratt, T. , & Cullen, F. T. (2005). Assessing macro-level predictors and theories of crime: A meta-analysis. In M. Tonry (Ed.), From crime and justice: A review of research (pp. 373450). Chicago, IL: University of Chicago Press.

Pratt and Cullen, 2005 Pratt, T. C. , & Cullen, F. T. (2005). Assessing macro-level predictors and theories of crime: A meta-analysis. Crime and Justice, 32(3), 373450.

Priest and Arkin, 2011 Priest, D. , & Arkin, W. M. (2011). Top secret America: The rise of the new American security state. Boston, MA: Little, Brown & Company.

Ramakrsihnan and Gehrke, 2002 Ramakrishnan, R. , & Gehrke, J. (2002). Database management systems. New York, NY: McGraw-Hill.

Ransley and Mazarolle, 2009 Ransley, L. , & Mazarolle, J. (2009). Policing in an era of uncertainty. Police Practice and Research, 10(4), 365381.

Raphals, 2013 Raphals, L. (2013). Divination and prediction in early China and ancient Greece. Cambridge: Cambridge University Press.

Ratcliffe, 2002 Ratcliffe, J. H. (2002). Intelligence-led policing and the problems of turning rhetoric into practice. Policing and Society, 12(1), 5366.

Ratcliffe, 2005 Ratcliffe, J. H. (2005). The effectiveness of police intelligence management: A New Zealand case study. Police Practice and Research, 6(5), 435451.

Ratcliffe, 2016 Ratcliffe, J. H. (2016). Intelligence-led policing. New York, NY: Routledge.

Raufer, 1999 Raufer, X. (1999). New world disorder, new terrorisms: New threats for Europe and the Western World. Terrorism and Political Violence, 11(4), 3051.

Reber, 1993 Reber, A. S. (1993). Implicit learning and tacit knowledge: An essay on cognitive unconscious. Oxford: Oxford University Press.

Reiner, 2000 Reiner, R. (2000). Crime and control in Britain. Thousand Oaks, CA: Sage Publications.

Renshon, 2009 Renshon, J. (2009). Risk-mirroring: The Cuban missile estimation. Intelligence and National Security, 24(3), 315338.

Robertson, 1994 Robertson, K. G. (1994). Practical police cooperation in Europe: The intelligence dimension. In M. Anderson & M. Den Boer (Eds.), Policing across national boundaries (pp. 106118). London: Pinter.

Rosenberger, 1996 Rosenberger, L. (1996). America’s drug policy debacle. Aldershot: Avebury Publishing.

Rotberg, 2010 Rotberg, R. I. (2010). When states fail: Causes and consequences. Princeton, NJ: Princeton University Press.

Rothenberg, 1993 Rothenberg, D. (1993). Hand's end: Technology and the limits of nature. Berkeley, CA: University of California Press.

Rovner, 2011 Rovner, J. (2011). Fixing the facts: National security and the politics of intelligence. Ithaca, NY: Cornell University Press.

Russel, 1999 Russel, S. F. (1999). Information gathering in classical Greece. Ann Arbor, MI: University of Michigan Press.

Schein, 1992 Schein, E. H. (1992). Organizational culture and leadership. San Francisco, CA: Jossey-Bass.

Scheptycki, 2004 Scheptycki, J. (2004). Organizational pathologies in police intelligence systems: Some contributions to the lexicon of intelligence-led policing. European Journal of Criminology, 1(3), 307332.

Schmitt and Vihul, 2014 Schmitt, M. N. , & Vihul, L. (2014). Proxy wars in cyber space: The evolving international law of attribution. Fletcher Security Review, 1(2), 5573.

Schultze and Stabell, 2004 Schultze, U. , & Stabell, C. (2004). Knowing what you don’t know? Discourses and contradictions in knowledge management research. Journal of Management Studies, 42(4), 549573.

Seacord et al., 2003 Seacord, R. C. , Plakosh, D. , & Lewis, G. A. (2003). Modernizing legacy systems: Software technologies, engineering processes, and business practices. Boston, MA: Addison-Wesley.

Seelke and Finklea, 2016 Seelke, C. R. , & Finklea, K. (2016). U.S.-Mexican security cooperation: The Mérida initiative and beyond. Washington, DC: Congressional Research Service.

Seliktar, 2008 Seliktar, O. (2008). The politics of intelligence and American wars with Iraq. Berlin: Springer.

Serafino, 1998 Serafino, N. M. (1998). U.S. military participation in Southwest border drug control: Questions and answers. Washington, DC: Congressional Research Service.

Sharp, 1994 Sharp, E. B. (1994). The dilemma of drug policy in the United States. New York, NY: HarperCollins College Publishers.

Shelby, 2002 Shelby, R. C. (2002), Additional views of Senator Richard C. Shelby, Vice-Chairman, Senate Select Committee on Intelligence. Washington, DC: US Senate.

Shelley and Picarelli, 2005 Shelley, L. I. , & Picarelli, J. T. (2005). Methods and motives: Exploring links between transnational organized crime and international terrorism. Trends in Organized Crime, 9(2), 5267.

Shore, 2006 Shore, J. M. (2006). Intelligence review and oversight in post-9/11 Canada. International Journal of Intelligence and CounterIntelligence, 19(3), 456479.

Shorrock, 2008 Shorrock, T. (2008). Spies for hire: The secret world of intelligence outsourcing. New York, NY: Simon & Schuster Publishing.

Skaarup, 2005 Skaarup, M. H. (2005). Out of Darkness-Light, A History of Canadian Military Intelligence, Vol 1, Pre-Confederation to 1982. Bloomington, IN: IUniverse.

Smith, 2005 Smith, C. M. (2005). Origin and uses of primum non nocere – above all, do no harm! Journal of Clinical Pharmacology, 45(4), 371377.

Sparrow, 2014 Sparrow, M. K. (2014). Managing the boundary between public and private policing. New perspectives in policing bulletin. Washington, DC: U.S. Department of Justice.

Spender, 1996 Spender, J. (1996). Making knowledge the basis of a dynamic theory of the firm. Strategic Management Journal, 17(2), 4562.

Stallings, 2013 Stallings, W. (2013). Data and computer communications. Upper Saddle River, NJ: Pearson Publishing.

Statista, 2015 Statista . (2015). Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). Retrieved from Accessed on July 15, 2018.

Steden and Sarre, 2007 Steden, R. V. , & Sarre, R. (2007). The growth of private security: Trends in the European Union. Security Journal, 20(4), 211221.

Stoneham, 2011 Stoneham, R. (2011). The ancients oracles: Making the gods speak. New Haven, CT: Yale University Press.

Strang, 2007 Strang, S. J. (2007). Integrated threat assessment methodology. Ottawa: Criminal Intelligence Service Canada.

Strom et al., 2010 Strom, K. , Berzofsky, M. , Shook-Sa, B. , Barrick, K. , Daye, C. , Horstmann, N. , & Kinsey, S. (2010). The private security industry: A review of the definitions, available data. sources, and paths moving forward. Washington, DC: Bureau of Justice Statistics.

Suskind, 2008 Suskind, R. (2008). The one percent doctrine. Deep inside America's pursuit of its enemies since 9/11. New York, NY: Simon & Schuster.

Svendsen, 2012 Svendsen, A. (2012). Understanding the globalization of intelligence. London: Palgrave Macmillan.

Svendsen, 2012 Svendsen, A. (2012). Understanding the Globalization of Intelligence. Berlin: Springer.

Tavani and Grodzinsky, 2014 Tavani, H. T. , & Grodzinsky, F. S. (2014). Trust, betrayal, and whistle-blowing: Reflections on the Edward Snowden case. ACM SIGCAS Computers and Society, 44(3), 813.

Thomsett, 2011 Thomsett, M. C. (2011). Heresy in the Roman Catholic Church: A history. Jefferson, NC: McFarland Publishing.

Tian et al., 2018 Tian, N. , Fleurant, A. , Kuimova, A. , Wezeman, P. D. , & Wezeman, S. T. (2018). Trends in world military expenditure, 2017. Stockholm: Stockholm International Peace Research Institute.

Tikk et al., 2010 Tikk, E. , Kaska, K. , & Vihul, L. (2010). International cyber incidents: Legal considerations. Tallinn: Cooperative Cyber Defense Centre of Excellence.

Tilley, 2003 Tilley, N. (2003). Community policing, problem-oriented policing and intelligence-led policing. In T. Newburn (Ed.), Hanbook of policing (pp. 311339). New York, NY: Routledge.

Troncy et al., 2011 Troncy, R. , Huet, B. , & Schenk, S. (2011). Multimedia semantics: Metadata, analysis and interaction. Hoboken, NJ: Wiley-Blackwell.

Tzu, 1994 Tzu, S. (1994). The art of war. New York, NY: Basic Books Publishers.

U.S. Government, 2009 U.S. Government . (2009). Tradecraft primer: Structured analytic techniques for improving intelligence analysis. Central Intelligence Agency. Retrieved from Accessed on June 19, 2018.

Van Dijk, 2008 Van Dijk, J. (2008). The world of crime. Thousand Oaks, CA: Sage Publications.

Vark, 2005 Vark, R. (2005). The status and protection of unlawful combatants. Juridica International, 10, 191198.

Vileriano and Maness, 2014 Vileriano, B. , & Maness, R. C. (2014). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford: Oxford University Press.

Waard, 1999 Waard, J. D. (1999). The private security industry in international perspective. European Journal on Criminal Policy and Research, 7(2), 143174.

Waller, 2011 Waller, B. (2011). Consider ethics: Theory, readings and contemporary issues. London: Pearson.

Walsh, 2011 Walsh, P. (2011). Intelligence and intelligence analysis. Sydney: Routledge.

Waltz, 1959 Waltz, K. (1959). Man, the state, and war. New York, NY: Columbia University Press.

Wang and Ahmed, 2003 Wang, C. L. , & Ahmed, P. K. (2003). Making organizational memory perform. Journal of Information & Knowledge Management, 3(3), 229235.

Wastell et al., 2004 Wastell, D. , Kawalek, P. , Langmead-Jones, P. , & Ormerod, R. (2004). Information systems and partnership in multi-agency networks: An action research project in crime reduction. Information and Organization, 14(2), 189210.

Webster and Boahen, 1968 Webster, J. B. , & Boahen, A. A. (1968). The revolutionary years: West Africa since 1800. London: Longman Press.

Whitaker et al., 2012 Whitaker, R. , Kealey, G. S. , & Parnaby, A. (2012). Secret service: Political policing in Canada from Fenians to Fortress America. Toronto: University of Toronto Press.

Williams, 2003 Williams, K. L. (2003). Peel's principles and their acceptance by American police: Ending 175 years of reinvention. The Police Journal, 76(2), 97120.

Witlin, 2008 Witlin, L. (2008). Of note: Mirror-imaging and its dangers. SAIS Review of International Affairs, 28(1), 8990.

Wooler et al., 2007 Wooler, J. P. F. , Hodder, B. , & Crickmore, R. I. (2007). Acoustic properties of a fibre-laser microphone. Measurement Science and Technology, 18(3), 884888.

Wormer, 1999 Wormer, K. V. (1999). Harm induction vs. harm reduction. Comparing American and British approaches to drug use. Journal of Offender Rehabilitation, 29(1), 3548.

Yost, 2010 Yost, D. S. (2010). NATO's evolving purposes and the next Strategic Concept. International Affairs, 86(2), 489522.

Youngers, 2009 Youngers, C. A. , & Walsh, J. M. . (2009). Drug Decriminalization: A Trend Takes Shape. Americas Quaterly, Fall 2009. Retrieved on 03/10/2018.

Youngers and Walsh, 2010 Youngers, C. , & Walsh, J. (2010). Development first: A more humane and promising approach to reducing cultivation of crops for illicit markets. Washington, DC: Washington Office on Latin America.

Zelikow, 1999 Zelikow, P. (1999). American intelligence and the world economy. In From the cold: The report of the twentieth century funds task force on the future of U.S. intelligence. New York, NY: Twentieth Century Fund Press.

Zimmermann, 2013 Zimmermann, E. (2013). Political violence, crises and revolutions: Theory and research. New York, NY: Routledge.

Zolin et al., 2003 Zolin, R. , Hinds, P. J. , Fruchter, R. , & Levitt, R. E. (2003). Interpersonal distrust in cross-functional, geographically distributed work: A longitudinal study. Information and Organization, 4(1), 126.

Zollo and Winter, 2002 Zollo, M. , & Winter, S. G. (2002). Deliberate learning and the evolution of dynamic capabilities. Organization Science, 13(4), 339351.