Jump to ContentJump to Main Navigation
One Nation Under SurveillanceA New Social Contract to Defend Freedom Without Sacrificing Liberty$

Simon Chesterman

Print publication date: 2013

Print ISBN-13: 9780199674954

Published to Oxford Scholarship Online: February 2015

DOI: 10.1093/acprof:osobl/9780199674954.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a monograph in OSO for personal use (for details see http://www.oxfordscholarship.com/page/privacy-policy). Subscriber: null; date: 20 June 2018

(p.263) Select Bibliography

(p.263) Select Bibliography

One Nation Under Surveillance
Oxford University Press

Bibliography references:

Ackerman, Bruce, Before the Next Attack: Preserving Civil Liberties in an Age of Terrorism (New Haven, CT: Yale University Press, 2006).

Acquisti, Alessandro and Ralph Gross, ‘Predicting Social Security Numbers from Public Data’, Proceedings of the National Academy of Sciences 106(27) (2009) 10975.

Agamben, Giorgio, State of Exception [2003], translated by Kevin Attell (Chicago: University of Chicago Press, 2005).

Agamben, Giorgio ‘Bodies Without Words: Against the Biopolitical Tatoo’, German Law Journal 5 (2004) 168.

Alexander, Larry and Frederick Schauer, ‘On Extrajudicial Constitutional Interpretation’, Harvard Law Review 110 (1997) 1359.

Alexander, Matthew, How to Break a Terrorist: The US Interrogators Who Used Brains, Not Brutality, to Take Down the Deadliest Man in Iraq (New York: Free Press, 2008).

Alnasrawi, Abbas, Iraq's Burdens: Oil Sanctions and Underdevelopment (London: Greenwood Press, 2002).

Alpern, David M, ‘America's Secret Warriors’, Newsweek, 10 October 1983, 38.

Alvarez, José, ‘Hegemonic International Law Revisited’, American Journal of International Law 97 (2003) 873.

Andrew, Christopher M, The Defence of the Realm: The Authorised History of MI5 (London: Allen Lane, 2009).

Annan, Kofi A, The Question of Intervention: Statements by the Secretary-General (New York: UN Department of Public Information, 1999).

Arbour, Louise, ‘War Crimes Tribunals: The Record and the Prospects: History and Future of the International Criminal Tribunals for the Former Yugoslavia and Rwanda’, American University International Law Review 13 (1998) 1495.

Arendt, Hannah, The Origins of Totalitarianism, 2nd edn (New York: Meridian, 1958).

Ashcroft, John, ‘Memorandum for Heads of all Federal Departments and Agencies’, FOIA Post 19 (2001).

Auden, WH, ‘The Unknown Citizen’, New Yorker, 6 January 1940, 19.

Austin, Lisa M, ‘Privacy and the Question of Technology’, Law and Philosophy 22 (2003) 119.

Baer, John W, The Pledge of Allegiance: A Revised History and Analysis (Annapolis, MD: Free State Press, 2007).

(p.264) Baer, Robert, See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism (New York: Three Rivers, 2002).

Baker, Christopher, ‘Tolerance of International Espionage: A Functional Approach’, American University International Law Review 19 (2004) 1091.

Baker, Stewart A, ‘Should Spies be Cops?’, Foreign Policy 97 (1994–95) 36.

Balkin, Jack M, ‘The Constitution in the National Surveillance State’, Minnesota Law Review 93 (2008) 1.

Bamford, James, The Puzzle Palace: A Report on America's Most Secret Agency (Boston: Houghton Mifflin, 1982).

Bamford, James Body of Secrets: Anatomy of the Ultra-Secret National Security Agency from the Cold War Through the Dawn of a New Century (New York: Doubleday, 2001).

Bamford, James The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America (New York: Doubleday, 2008).

Barak-Erez, Daphne and Matthew C Waxman, ‘Secret Evidence and the Due Process of Terrorist Detentions’, Columbia Journal of Transnational Law 48 (2009) 3.

Barnett, Hilaire, Constitutional & Administrative Law, 6th edn (Oxford: Routledge-Cavendish, 2006).

Baxter, Richard R, ‘So-called “Unprivileged Belligerency”: Spies, Guerrillas, and Saboteurs’, British Yearbook of International Law 28 (1951) 323.

Belair, Robert R and Charles D Bock, ‘Police Use of Remote Camera Systems for Surveillance of Public Streets’, Columbia Human Rights Law Review 4 (1972) 143.

Benjamin, Daniel and Steven Simon, The Age of Sacred Terror (New York: Random House, 2002).

Bennett, Alan, The History Boys (London: Faber and Faber, 2004).

Bennett, Colin J and Rebecca Grant (eds), Visions of Privacy: Policy Choices for the Digital Age (Toronto: University of Toronto Press, 1999).

Bepko, Arminda Bradford, ‘Public Availability or Practical Obscurity: The Debate over Public Access to Court Records on the Internet’, New York Law School Law Review 49 (2005) 968.

Berdal, Mats R, ‘Fateful Encounter: The United States and UN Peacekeeping’, Survival 36 (1) (1994) 34.

Berkowitz, Bruce D and Allan E Goodman, Best Truth: Intelligence in the Information Age (New Haven, CT: Yale University Press, 2000).

Bernstein, Barton J, ‘The Road to Watergate and Beyond: The Growth and Abuse of Executive Authority Since 1940’, Law and Contemporary Problems 40(2) (1976) 58.

Best, Geoffrey, War and Law Since 1945 (Oxford: Oxford University Press, 1994).

(p.265) Betts, Richard K, ‘Analysis, War, and Decision: Why Intelligence Failures Are Inevitable’, World Politics 31(1) (1978) 61.

Betts, Richard K Enemies of Intelligence: Knowledge and Power in American National Security (New York: Columbia University Press, 2007).

Bickel, Robert D, Susan Brinkley, and Wendy White, ‘Seeing Past Privacy: Will the Development and Application of CCTV and Other Video Security Technology Compromise an Essential Constitutional Right in a Democracy, or Will the Courts Strike a Proper Balance?’, Stetson Law Review 33 (2003) 299.

Biddle, Francis, In Brief Authority (Garden City, NY: Doubleday, 1962).

Bidwell, Bruce W, History of the Military Intelligence Division, Department of the Army General Staff: 1775–1941 (Frederick, MD: University Publications of America, 1986).

Bierce, Ambrose, The Devil's Dictionary (New York: Neale, 1911).

Bignami, Francesca, ‘Transgovernmental Networks vs Democracy: The Case of the European Information Privacy Network’, Michigan Journal of International Law 26 (2005) 807.

Bignami, Francesca ‘European Versus American Liberty: A Comparative Privacy Analysis of Antiterrorism Data Mining’, Boston College Law Review 48 (2007) 609.

Bignell, Jonathan, Big Brother: Reality TV in the Twenty-First Century (New York: Palgrave Macmillan, 2005).

Black, Ian and Benny Morris, Israel's Secret Wars: A History of Israel's Intelligence Services (Grove Press: New York, 1992).

Blackstone, William, Commentaries on the Laws of England (Oxford: Clarendon Press, 1769) vol 4.

Blix, Hans, Disarming Iraq (New York: Pantheon, 2004).

Bloustein, EJ, ‘Privacy as an Aspect of Human Dignity: An Answer to Dean Prosser’, New York University Law Review 39 (1964) 962.

Bobbitt, Philip, Terror and Consent: The Wars for the Twenty-First Century (New York: Allen Lane, 2008).

Born, Hans and Marina Caparini (eds), Democratic Control of Intelligence Services: Containing Rogue Elephants (Aldershot: Ashgate, 2007).

Born, Hans, Loch K Johnson, and Ian Leigh (eds), Who's Watching the Spies: Establishing Intelligence Service Accountability (Washington, DC: Potomac Books, 2005).

Born, Hans and Ian Leigh, Making Intelligence Accountable: Legal Standards and Best Practice for Oversight of Intelligence Agencies (Oslo: Parliament of Norway, 2005).

Boucher, David and Paul Kelly (eds), The Social Contract from Hobbes to Rawls (New York: Routledge, 1994).

(p.266) Bowman, ME, ‘Intelligence and International Law’, International Journal of Intelligence and Counterintelligence 8(3) (1995) 321.

Braddon, Derek, Exploding the Myth? The Peace Dividend, Regions and Market Adjustment (New York: Routledge, 2000).

Brandeis, Louis D, Other People's Money and How the Bankers Use It (New York: Stokes, 1914).

Brin, David, The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? (Reading, MA: Addison-Wesley, 1998).

Brown, Jeremy, ‘Pan, Tilt, Zoom: Regulating the Use of Video Surveillance of Public Places’, Berkeley Technology Law Journal 23 (2008) 755.

Burgess, John W, Political Science and Comparative Constitutional Law (Boston: Ginn, 1891) vol 1.

Burke, Susan, ‘Accountability for Corporate Complicity in Torture’, Gonzaga Journal of International Law 10 (2006) 81.

Burrows, Quentin, ‘Scowl Because You're on Candid Camera: Privacy and Video Surveillance’, Valparaiso University Law Review 31 (1997) 1079.

Campbell, Lisa Madelon, ‘Rising Governmental Use of Biometric Technology: An Analysis of the United States Visitor and Immigrant Status Indicator Technology Program’, Canadian Journal of Law and Technology 4 (2005) 99.

Carey, Peter, Data Protection, 2nd edn (Oxford: Oxford University Press, 2004).

Carlisle, Rodney P (ed), Encyclopedia of Intelligence and Counter-Intelligence (Armonk, NY: Sharpe Reference, 2005).

Carne, Greg, ‘Thawing the Big Chill: Reform, Rhetoric, and Regression in the Security Intelligence Mandate’, Monash University Law Review 22 (1996) 379.

Casey, Timothy, ‘Electronic Surveillance and the Right to Be Secure’, UC Davis Law Review 41 (2008) 977.

Casey, Timothy The USA PATRIOT Act: The Decline of Legitimacy in the Age of Terrorism (Oxford: Oxford University Press, 2009).

Cassese, Antonio, ‘The Statute of the International Criminal Court: Some Preliminary Reflections’, European Journal of International Law 10 (1999) 144.

Cate, Fred H, ‘Government Data Mining: The Need for a Legal Framework’, Harvard Civil Rights-Civil Liberties Law Review 43 (2008) 435.

Chayes, Abraham, The Cuban Missile Crisis (Oxford: Oxford University Press, 1974).

Chesney, Robert M, ‘Leaving Guantánamo: The Law of International Detainee Transfers’, University of Richmond Law Review 40 (2006) 657.

Chesney, Robert M ‘State Secrets and the Limits of National Security Litigation’, George Washington Law Review 75 (2007) 1249.

(p.267) Chesterman, Simon, ‘Last Rights: Euthanasia, the Sanctity of Life and the Law in the Netherlands and the Northern Territory of Australia’, International and Comparative Law Quarterly 47 (1998) 362.

Chesterman, Simon Just War or Just Peace? Humanitarian Intervention and International Law, Oxford Monographs in International Law (Oxford: Oxford University Press, 2001).

Chesterman, Simon Shared Secrets: Intelligence and Collective Security (Sydney: Lowy Institute for International Policy, 2006).

Chesterman, Simon (ed), Secretary or General? The UN Secretary-General in World Politics (Cambridge: Cambridge University Press, 2007).

Chesterman, Simon ‘An International Rule of Law?’, American Journal of Comparative Law 56 (2008) 331.

Chesterman, Simon ‘Globalization Rules: Accountability, Power, and the Prospects for Global Administrative Law’, Global Governance 14 (2008) 39.

Chesterman, Simon and Sebastian von Einsiedel, ‘Dual Containment: The United States, Iraq, and the UN Security Council’, in Paul Eden and Thérèse O'Donnell (eds), September 11, 2001: A Turning Point in International and Domestic Law? (New York: Transnational Publishers, 2004).

Chesterman, Simon and Angelina Fisher (eds), Private Security, Public Order: The Outsourcing of Public Services and Its Limits (Oxford: Oxford University Press, 2009).

Chesterman, Simon and Chia Lehnardt (eds), From Mercenaries to Market: The Rise and Regulation of Private Military Companies (Oxford: Oxford University Press, 2007).

Chesterman, Simon and Béatrice Pouligny, ‘Are Sanctions Meant to Work? The Politics of Creating and Implementing Sanctions Through the United Nations’, Global Governance 9 (2003) 503.

Chowdhury, Subrata Roy, Rule of Law in a State of Emergency: The Paris Minimum Standards of Human Rights Norms in a State of Emergency (London: Palgrave Macmillan, 1989).

Clark, Kathleen, ‘“A New Era of Openness?” Disclosing Intelligence to Congress Under Obama’, Constitutional Commentary 26 (2010) forthcoming.

Clark, Robert M, Intelligence Analysis: A Target-Centric Approach, 2nd edn (Washington, DC: CQ Press, 2007).

Clarke, Richard A, Against All Enemies: Inside America's War on Terror (New York: Free Press, 2004).

Cogan, Charles, ‘Hunters not Gatherers: Intelligence in the Twenty-First Century’, Intelligence and National Security 19(2) (2004) 304.

Colby, William E, ‘Reorganizing Western Intelligence’, in Carl Peter Runde and Greg Voss (eds), Intelligence and the New World Order: Former Cold War Adversaries Look Toward the 21st Century (Bustehude: International Freedom Foundation, 1992) 126.

(p.268) Conaglen, Matthew, Fiduciary Loyalty: Protecting the Due Performance of Non-Fiduciary Duties (Oxford: Hart Publishing, 2010).

Conan Doyle, Arthur, ‘Silver Blaze’, Strand Magazine 4 (1892) 645.

Cooley, Thomas M, A Treatise on the Law of Torts, or the Wrongs Which Arise Independent of Contract, 2nd edn (Chicago: Callaghan & Co, 1888).

Copeland, Thomas E, Fool Me Twice: Intelligence Failure and Mass Casualty Terrorism (Leiden: Koninklijke Brill NV, 2007).

Cortright, David and George A Lopez, The Sanctions Decade: Assessing UN Strategies in the 1990s, A Project of the International Peace Academy (Boulder, CO: Lynne Rienner, 2000).

Cortright, David and George A Lopez Sanctions and the Search for Security: Challenges to UN Action, A Project of the International Peace Academy (Boulder, CO: Lynne Rienner, 2002).

Corwin, Edward S, The President: Office and Powers (New York: New York University Press, 1940).

Couillard, David A, ‘Defogging the Cloud: Applying Fourth Amendment Principles to Evolving Privacy Expectations in Cloud Computing’, Minnesota Law Review 93 (2009) 2205.

Curtis, Mark, The Great Deception: Anglo-American Power and World Order (London: Pluto Press, 1998).

Dallaire, Roméo, Shake Hands with the Devil: The Failure of Humanity in Rwanda (Toronto: Random House Canada, 2003).

Davies, Philip HJ, ‘Ideas of Intelligence: Divergent National Concepts and Institutions’, Harvard International Review 24(3) (2002) 62.

Davies, Simon, Big Brother: Britain's Web of Surveillance and the New Technological Order (London: Pan Books, 1996).

Davis, Morris D, ‘Historical Perspective on Guantánamo Bay: The Arrival of the High Value Detainees’, Case Western Reserve Journal of International Law 42 (2009) 115.

Delupis, Ingrid, ‘Foreign Warships and Immunity for Espionage’, American Journal of International Law 78 (1984) 53.

Demarest, Lt Col Geoffrey B, ‘Espionage in International Law’, Denver Journal of International Law and Policy 24 (1996) 321.

Denza, Eileen, Diplomatic Law: A Commentary on the Vienna Convention on Diplomatic Relations [1976], 2nd edn (Oxford: Clarendon Press, 1998).

Der Derian, James, The Rise and Fall of the Office of Strategic Influence, (Info Tech War Peace, posted 5 December 2005), available at <http://www.watson-institute.org/infopeace/911/index.cfm?id=9>.

Dershowitz, Alan M, Why Terrorism Works: Understanding the Threat, Responding to the Challenge (New Haven, CT: Yale University Press, 2002).

(p.269) Dicey, AV, Introduction to the Study of the Law of the Constitution [1885], 8th edn (London: Macmillan, 1915).

Divine, Robert A (ed), The Cuban Missile Crisis (Chicago: Quadrangle Books, 1971).

Donnelly, Eric, ‘The United States-China EP-3 Incident: Legality and Realpolitik’, Journal of Conflict and Security Law 9 (2004) 25.

Donohue, Laura K, ‘Anglo-American Privacy and Surveillance’, Journal of Criminal Law & Criminology 96 (2006) 1059.

Dorn, A Walter, ‘The Cloak and the Blue Beret: Limitations on Intelligence in UN Peacekeeping’, International Journal of Intelligence and Counterintelligence 12(4) (1999) 414.

Dorril, Stephen, MI6: Inside the Covert World of Her Majesty's Secret Intelligence Service (New York: Free Press, 2000).

Dosman, E Alexandra, ‘For the Record: Designating “Listed Entities” for the Purposes of Terrorist Financing Offences at Canadian Law’, University of Toronto Faculty Law Review 62 (2004) 1.

Dyzenhaus, David, ‘The Rule of (Administrative) Law in International Law’, Law and Contemporary Problems 68 (2005) 127.

Edelman, James, ‘When Do Fiduciary Duties Arise?’, Law Quarterly Review 126 (2010) 302.

Eickelman, Dale F, ‘Intelligence in an Arab Gulf State’, in Roy Godson (ed), Comparing Foreign Intelligence: The US, the USSR, the UK, and the Third World (Washington, DC: Pergamon-Brassey's, 1988) 89.

Elliff, John T, ‘The Attorney General's Guidelines for FBI Investigations’, Cornell Law Review 69 (1984) 785.

Etzioni, Amitai, The Limits of Privacy (New York: Basic Books, 1999).

Falk, Richard A, ‘Foreword’, in Roland J Stanger (ed), Essays on Espionage and International Law (Columbus, OH: Ohio State University Press, 1962) v.

Feldman, Noah, ‘Ugly Americans’, in Karen J Greenberg (ed), The Torture Debate in America (Cambridge: Cambridge University Press, 2006) 267.

Ferejohn, John, ‘Accountability and Authority: Toward a Theory of Political Accountability’, in Adam Przeworski, SC Stokes, and B Manin (eds), Democracy, Accountability, and Representation (Cambridge: Cambridge University Press, 1999) 131.

Ferejohn, John and Pasquale Pasquino, ‘The Law of the Exception: A Typology of Emergency Powers’, International Journal of Constitutional Law 2 (2004) 210.

Findlay, Trevor, The Use of Force in UN Peace Operations (Oxford: SIPRI & Oxford University Press, 2002).

Foucault, Michel, Discipline and Punish: The Birth of the Prison [1975] (London: Penguin, 1979).

(p.270) Franck, Thomas M, Recourse to Force: State Action Against Threats and Armed Attacks, Hersch Lauterpacht Memorial Lectures (Cambridge: Cambridge University Press, 2002).

Frankel, Joseph, Contemporary International Theory and the Behavior of States (Oxford: Oxford University Press, 1973).

Franklin, Benjamin, ‘Pennsylvania Assembly: Reply to the Governor, November 11, 1755’, in Leonard W Labaree (ed), The Papers of Benjamin Franklin (New Haven, CT: Yale University Press, 1963) vol 6, 242.

Franzen, Jonathan, How to Be Alone (London: Harper Collins, 2002).

Frazer, Tim, ‘Appropriation of Personality—A New Tort?’, Law Quarterly Review 99 (1983) 281.

Friedman, William F, ‘From the Archives: A Brief History of the Signal Intelligence Service (June 1942; declassified 1979)’, Cryptologia 15(3) (1991) 263.

Froomkin, A Michael, ‘The Death of Privacy?’, Stanford Law Review 52 (2000) 1461.

Gallagher, Caoilfhionn, ‘CCTV and Human Rights: The Fish and the Bicycle? An Examination of Peck v United Kingdom (2003) 36 EHRR 41’, Surveillance & Society 2 (2004) 270.

García-Mora, Manuel R, ‘Treason, Sedition, and Espionage as Political Offenses Under the Law of Extradition’, University of Pittsburgh Law Review 26 (1964–65) 65.

Gaston, EL, ‘Mercenarism 2.0? The Rise of the Modern Private Security Industry and Its Implications for International Humanitarian Law Enforcement’, Harvard International Law Journal 49 (2008) 221.

Gauthier, David, Morals by Agreement (Oxford: Oxford University Press, 1986).

Gavison, Ruth, ‘Privacy and the Limits of Law’, Yale Law Journal 89 (1980) 421.

Geertz, Clifford, The Interpretation of Cultures (New York: Basic Books, 1973).

Goedhuis, D, ‘The Changing Legal Regime of Air and Outer Space’, International and Comparative Law Quarterly 27 (1978) 576.

Goldsmith, Jack, The Terror Presidency (New York: Norton, 2007).

Goldsmith, Jack and Timothy Wu, Who Controls the Internet? Illusions of a Borderless World (Oxford: Oxford University Press, 2006).

Goldstone, Richard J, ‘Remarks: Intelligence and the Use of Force in the War on Terrorism’, American Society of International Law Proceedings 98 (2004) 148.

Gollin, James, ‘Stirring Up the Past: KAL Flight 007’, International Journal of Intelligence and Counterintelligence 7(4) (1994) 445.

Gomersall, Chris, ‘A Closer Look at Video Analytics’, GIT Security + Management, November–December 2007, 36.

Goold, Benjamin J, CCTV and Policing: Public Area Surveillance and Police Practices in Britain (Oxford: Oxford University Press, 2004).

(p.271) Goold, Benjamin J and Liora Lazarus (eds), Security and Human Rights (Oxford: Hart Publishing, 2007).

Gourevitch, Philip and Errol Morris, ‘Exposure: Behind the Camera at Abu Ghraib’, New Yorker, 24 March 2008.

Granholm, Jennifer Mulhern, ‘Video Surveillance on Public Streets: The Constitutionality of Invisible Citizen Searches’, University of Detroit Law Review 64 (1987) 687.

Grant, Ruth W and Robert O Keohane, ‘Accountability and Abuses of Power in World Politics’, American Political Science Review 99(1) (2005) 1.

Gras, Marianne L, ‘The Legal Regulation of CCTV in Europe’, Surveillance & Society 2 (2004) 216.

Greenberg, Karen J and Joshua L Dratel (eds), The Torture Papers: The Road to Abu Ghraib (Cambridge: Cambridge University Press, 2005).

Greenberg, Murice R and Richard Haass (eds), Making Intelligence Smarter: The Future of US Intelligence (New York: Council on Foreign Relations, 1996).

Grey, Stephen, Ghost Plane: The True Story of the CIA Torture Program (New York: St Martin's Press, 2006).

Gross, Emanuel, ‘The Struggle of a Democracy Against Terrorism: Protection of Human Rights’, Cornell International Law Journal 37 (2004) 27.

Gross, Oren, ‘Chaos and Rules: Should Responses to Violent Crises Always be Constitutional?’, Yale Law Journal 112 (2003) 1011.

Gross, Oren and Fionnuala Ní Aoláin, Law in Times of Crisis: Emergency Powers in Theory and Practice (Cambridge: Cambridge University Press, 2006).

Grossman, Serge and Michael Simon, ‘And Congress Shall Know the Truth: The Pressing Need for Restructuring Congressional Oversight of Intelligence’, Harvard Law & Policy Review 2 (2008) 435.

Grotius, Hugo, De iure belli ac pacis libri tres [1646], translated by Francis W Kelsey, Classics of International Law (Oxford: Clarendon Press, 1925).

Hager, Nicky, Secret Power: New Zealand's Role in the International Spy Network (Nelson, NZ: Craig Potton, 1996).

Hakimi, Monica, ‘The Council of Europe Addresses CIA Rendition and Detention Program’, American Journal of International Law 101 (2007) 442.

Halleck, HW, International Law; or, Rules Regulating the Intercourse of States in Peace and War, 1st edn (San Francisco: H Bancroft, 1861).

Hamilton, Keith and Richard Langhorne, The Practice of Diplomacy: Its Evolution and Administration (New York: Routledge, 1995).

Harding, AJ, ‘Singapore’, in AJ Harding and J Hatchard (eds), Preventive Detention and Security Law: A Comparative Survey (Dordrecht: Martinus Nijhoff, 1993) 193.

(p.272) Hardy, Michael, Modern Diplomatic Law (Manchester: Manchester University Press, 1968).

Harris, Candida, Peter Jones, David Hillier, and David Turner, ‘CCTV Surveillance Systems in Town and City Centre Management’, Property Management 16(3) (1998) 160.

Harris, John, ‘Euthanasia and the Value of Life’, in John Keown (ed), Euthanasia Examined: Ethical, Clinical and Legal Perspectives (Cambridge: Cambridge University Press, 1995) 6.

Hart, Gary, The Shield and the Cloak: The Security of the Commons (Oxford: Oxford University Press, 2007).

Herman, Michael, Intelligence Power in Peace and War (Cambridge: Cambridge University Press, 1996).

Herman, Michael Intelligence Services in the Information Age: Theory and Practice (London: Frank Cass, 2001).

Hersh, Seymour M, ‘Saddam's Best Friend’, New Yorker, 5 April 1999.

Heymann, Philip B and Juliette N Kayyem, Protecting Liberty in an Age of Terror (Cambridge, MA: MIT Press, 2005).

Higgins, Rosalyn, ‘UK Foreign Affairs Committee Report on the Abuse of Diplomatic Immunities and Privileges: Government Response and Report’, American Journal of International Law 80 (1986) 135.

Hinsley, FH and Alan Stripp (eds), Codebreakers: The Inside Story of Bletchley Park (Oxford: Oxford University Press, 2001).

Hitchens, Christopher, ‘Weapons of Mass Distraction’, Vanity Fair, March 1999, 92.

Hitz, Frederick P, The Great Game: The Myth and Reality of Espionage (New York: Alfred A Knopf, 2004).

Hitz, Frederick P Why Spy? Espionage in an Age of Uncertainty (New York: Thomas Dunne, 2008).

Hixson, Richard F, Privacy in a Public Society (Oxford: Oxford University Press, 1987).

Ho, Soyoung, ‘EU's Quantum Leap’, Foreign Policy 144, September 2004, 92xs.

Hobbes, Thomas, Leviathan [1651] (Cambridge: Cambridge University Press, 1991).

Hocking, Jenny, ‘Charting Political Space: Surveillance and the Rule of Law’, Social Justice 21(4) (1994) 66.

Hocking, Jenny Terror Laws: ASIO, Counter-Terrorism, and the Threat to Democracy (Sydney: UNSW Press, 2004).

Hogan, Jenny, ‘Your Every Move Will Be Analysed’, New Scientist, 12 July 2003, 4.

(p.273) Hohfeld, Wesley Newcomb, Fundamental Legal Conceptions as Applied in Judicial Reasoning and Other Legal Essays (New Haven, CT: Yale University Press, 1923).

Holmes, Stephen, ‘In Case of Emergency: Misunderstanding Tradeoffs in the War on Terror’, California Law Review 97 (2009) 301.

Hor, Michael, ‘Terrorism and the Criminal Law: Singapore's Solution’, Singapore Journal of Legal Studies [2002] 30.

Horn, Carl von, Soldiering for Peace, 1st American edn (New York: David McKay, 1967).

Hoversten, Michael R, ‘US National Security and Government Regulation of Commercial Remote Sensing from Outer Space’, Air Force Law Review 50 (2001) 25.

Hughes, Thomas L, The Fate of Facts in a World of Men: Foreign Policy and Intelligence-Making (New York: Foreign Policy Association, 1976).

Hulnick, Arthur S, Keeping Us Safe: Secret Intelligence and Homeland Security (Westport, CT: Praeger, 2004).

Hume, David, ‘Of the Original Contract [1748]’, in Ernest Barker (ed), Social Contract: Essays by Locke, Hume, and Rousseau (Oxford: Oxford University Press, 1962) 147.

Humphreys, Stephen, ‘Legalizing Lawlessness: On Giorgio Agamben's State of Exception, European Journal of International Law 17 (2006) 677.

Hyde, Charles Cheney, ‘Aspects of the Saboteur Cases’, American Journal of International Law 37 (1943) 88.

Ignatieff, Michael, The Lesser Evil: Political Ethics in an Age of Terror (Princeton: Princeton University Press, 2004).

Ignatius, David, Agents of Innocence (New York: Norton, 1987).

Inderfurth, Karl F and Loch K Johnson (eds), Fateful Decisions: Inside the National Security Council (Oxford: Oxford University Press, 2004).

Inness, Julie C, Privacy, Intimacy, and Isolation (Oxford: Oxford University Press, 1992).

Inness, Julie C International Peace Academy, Peacekeeper's Handbook (New York: Pergamon Press, 1984).

Issacharoff, Samuel and Richard H Pildes, ‘Emergency Contexts Without Emergency Powers: The United States' Constitutional Approach to Rights During Wartime’, International Journal of Constitutional Law 2 (2004) 296.

James, Alan, Peacekeeping in International Politics (New York: St Martin's Press, 1990).

Jay, Rosemary, Data Protection: Law and Practice, 3rd edn (London: Sweet & Maxwell, 2007).

(p.274) Jefferson, Thomas, ‘Letter from Thomas Jefferson to John B Colvin, 20 September 1810’, in Paul Leicester Ford (ed), The Works of Thomas Jefferson (New York: GP Putnam's Sons, 1905) vol 11, 146.

Jervis, Robert, Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War (Ithaca, NY: Cornell University Press, 2010).

Johnson-Woods, Toni, Big Bother: Why Did That Reality TV Show Become Such a Phenomenon? (Brisbane: University of Queensland Press, 2002).

Johnson, Loch K, A Season of Inquiry: The Senate Intelligence Investigation (Lexington, KY: University Press of Kentucky, 1985).

Johnson, Loch K ‘Congressional Supervision of America's Secret Agencies: The Experience and Legacy of the Church Committee’, Public Administration Review 64 (2004) 3.

Johnson, Loch K and James J Wirtz (eds), Intelligence and National Security: The Secret World of Spies, 2nd edn (Oxford: Oxford University Press, 2007).

Jones, Alex S, Losing the News: The Future of the News That Feeds Democracy (Oxford: Oxford University Press, 2009).

Jourard, SM, ‘Some Psychological Aspects of Privacy’, Law and Contemporary Problems 31 (1966) 307.

Kanwar, Vik, ‘Review Essay: Giorgio Agamben, State of Exception, International Journal of Constitutional Law 4 (2006) 567.

Kaplan, Arthur, Dictatorships and ‘Ultimate’ Decrees in the Early Roman Republic, 501–202 bc (New York: Revisionist Press, 1977).

Keefe, Patrick Radden, ‘Cat-and-Mouse Games’, New York Review LII(9), 26 May 2005, 41.

Keefe, Patrick Radden Chatter: Inside the Secret World of Global Eavesdropping (New York: Random House, 2005).

Keith, Linda Camp and Steven C Poe, ‘Are Constitutional State of Emergency Clauses Effective? An Empirical Exploration’, Human Rights Quarterly 26 (2004) 1071.

Kennedy, Robert F, Thirteen Days: A Memoir of the Cuban Missile Crisis (New York: WW Norton, 1969).

Kenyon, Andrew T and Megan Richardson (eds), New Dimensions in Privacy Law: International and Comparative Perspectives (Cambridge: Cambridge University Press, 2006).

Keown, John (ed), Euthanasia Examined: Ethical, Clinical, and Legal Perspectives (Cambridge: Cambridge University Press, 1995).

Kessler, Ronald, The CIA at War: Inside the Secret Campaign Against Terror (New York: St Martin's Press, 2003).

Khattab, Mohab Tarek, ‘Revised Circular A-76: Embracing Flawed Methodologies’, Public Contract Law Journal 34 (2005) 469.

(p.275) Kingsbury, Benedict, Nico Krisch, and Richard B Stewart, ‘The Emergence of Global Administrative Law’, Law and Contemporary Problems 68 (2005) 15.

Kirby, Dianne, ‘Harry Truman's Religious Legacy: The Holy Alliance, Containment, and the Cold War’, in Dianne Kirby (ed), Religion and the Cold War (New York: Palgrave Macmillan, 2003) 77.

Kissinger, Henry, Years of Upheaval (Boston: Little, Brown, 1982).

Koh, Harold Hongju, The National Security Constitution: Sharing Power after the Iran-Contra Affair (New Haven, CT: Yale University Press, 1990).

Krepon, Michael and Amy E Smithson (eds), Open Skies, Arms Control, and Cooperative Security (New York: St Martin's Press, 1992).

Kris, David S, ‘The Rise and Fall of the FISA Wall’, Stanford Law & Policy Review 17 (2006) 487.

Kruegle, Herman, CCTV Surveillance (Amsterdam: Elsevier Butterworth Heinemann, 2007).

Kruh, Louis, ‘Stimson, the Black Chamber, and the “Gentlemen's Mail” Quote’, Cryptologia 12(2) (1988) 65.

Kuhn, Thomas S, The Structure of Scientific Revolutions, 3rd edn (Chicago: University Of Chicago Press, 1996).

Kunzendorf, Volker, Verification in Conventional Arms Control, Adelphi Paper 245 (London: IISS/Brassey's, 1989).

Laffont, Jean-Jacques and Jean Tirole, ‘The Politics of Government Decision-Making: A Theory of Regulatory Capture’, Quarterly Journal of Economics 106 (1991) 1089.

Lazar, Nomi Claire, States of Emergency in Liberal Democracies (Cambridge: Cambridge University Press, 2009).

Le Carré, John, The Spy Who Came In from the Cold (London: Gollancz, 1963).

Le Carre, John The Russia House (New York: Knopf, 1989).

Le Carre, John The Constant Gardener (London: Hodder & Stoughton, 2001).

Leahy, Patrick, ‘The Uniting and Strengthening America Act of 2001’, Congressional Record (Senate) 147(134) (2001) S10365.

Lefkon, Owen Philip, ‘Culture Shock: Obstacles to Bringing Conflict Prevention Under the Wing of UN Development … and Vice Versa’, New York University Journal of International Law and Politics 35 (2003) 671.

Levine, Michael E and Jennifer L Forrence, ‘Regulatory Capture, Public Interest, and the Public Agenda: Toward a Synthesis’, Journal of Law, Economics, and Organization 6 (1990) 167.

Lewis, Margaret K, ‘Note: An Analysis of State Responsibility for the Chinese- American Airplane Collision Incident’, New York University Law Review 77 (2002) 1404.

(p.276) Lim Yee Fen, Cyberspace Law: Commentary and Materials, 2nd edn (Oxford: Oxford University Press, 2007).

Locke, John, Two Treatises of Government [1690] (Cambridge: Cambridge University Press, 1988).

Lorber, Steven, ‘Data Protection and Subject Access Requests’, Industrial Law Journal 33(2) (2004) 179.

Lowenthal, Mark M, Intelligence: From Secrets to Policy, 3rd edn (Washington, DC: CQ Press, 2006).

Luneburg, William V, ‘Contracting by the Federal Government for Legal Services: A Legal and Empirical Analysis’, Notre Dame Law Review 63 (1988) 399.

Lustgarten, Laurence and Ian Leigh, ‘The Security Service Act 1989’, Modern Law Review 52 (1989) 801.

Lustgarten, Laurence In from the Cold: National Security and Parliamentary Democracy (Oxford: Clarendon Press, 1994).

Lynn, Jonathan and Antony Jay, The Complete Yes Minister (London: British Broadcasting Corporation, 1984).

Machiavelli, Niccolò, The Discourses [1531], translated by Leslie J Walker (London: Penguin, 1970).

Maddrell, Paul, Spying on Science: Western Intelligence in Divided Germany 1945–1961 (Oxford: Oxford University Press, 2006).

Malone, David M and Ramesh Thakur, ‘UN Peacekeeping: Lessons Learned?’, Global Governance 7(1) (2001) 11.

Manget, Frederic F, ‘Another System of Oversight: Intelligence and the Rise of Judicial Intervention’, Studies in Intelligence 39(5) (1996) 43.

Mann, James, Rise of the Vulcans: The History of Bush's War Cabinet (New York: Viking, 2004).

Markesinis, BS, ‘The Royal Prerogative Revisited’, Cambridge Law Journal 32 (1973) 287.

Markesinis, Basil, Colm O'Cinneide, Jorg Fedtke, and Myriam Hunter-Henin, ‘Concerns and Ideas About the Developing English Law of Privacy (and How Knowledge of Foreign Law Might Be of Help)’, American Journal of Comparative Law 52 (2004) 133.

Martin, Kathryn, ‘The USA PATRIOT Act's Application to Library Patron Records’, Journal of Legislation 29 (2003) 283.

Martin, P, ‘Destruction of Korean Air Lines Boeing 747 over Sea of Japan, 31 August 1983’, Air Law 9(3) (1984) 138.

Martin, Samantha L, ‘Interpreting the Wiretap Act: Applying Ordinary Rules of “Transit” to the Internet Context’, Cardozo Law Review 28 (2006) 441.

Martin, Shannon E, Bits, Bytes, and Big Brother: Federal Information Control in the Technological Age (Westport, CT: Praeger, 1995).

(p.277) Mattingly, Garrett, Renaissance Diplomacy (London: Jonathan Cape, 1962).

Maugham, W Somerset, Ashenden; or: The British Agent [1928] (New York: Doubleday, 1941).

Mayer, Jane, ‘Outsourcing: The CIA's Travel Agent’, New Yorker, 30 October 2006.

Mayer, Jane ‘Whatever It Takes: The Politics of the Man Behind “24”’, New Yorker, 19 February 2007, 66.

Mayer, Jane The Dark Side: The Inside Story of How the War on Terror Turned Into a War on American Ideals (New York: Doubleday, 2008).

McClanahan, Grant V, Diplomatic Immunity: Principles, Practices, Problems (New York: St Martin's Press, 1989).

McCubbins, Mathew D and Thomas Schwartz, ‘Congressional Oversight Overlooked: Police Patrols versus Fire Alarms’, American Journal of Political Science 28 (1984) 165.

McDougal, Myres S, Harold D Lasswell, and W Michael Reisman, ‘The Intelligence Function and World Public Order’, Temple Law Quarterly 46 (1973) 365.

Mead, Margaret, ‘Margaret Mead Re-Examines Our Right to Privacy’, Redbook, April 1965, 15.

Mills, Jon L, Privacy: The Lost Right (Oxford: Oxford University Press, 2008).

Minow, Martha, ‘Outsourcing Power: How Privatizing Military Efforts Challenges Accountability, Professionalism, and Democracy’, Boston College Law Review 46 (2005) 989.

Moynihan, Daniel Patrick, Secrecy: The American Experience (New Haven, CT: Yale University Press, 1998).

Nagel, Thomas, ‘Concealment and Exposure’, Philosophy & Public Affairs 27 (1998) 3.

Newton Lyons, Carrie, ‘The State Secrets Privilege: Expanding Its Scope Through Government Misuse’, Lewis & Clark Law Review 11 (2007) 99.

Newton, Michael A, ‘The International Criminal Court Preparatory Commission: The Way It Is & the Way Ahead’, Virginia Journal of International Law 41 (2000) 204.

Nissenbaum, Helen, ‘Protecting Privacy in an Information Age: The Problem of Privacy in Public’, Law and Philosophy 17 (1998) 559.

Normand, Roger, ‘Human Rights Assessment of Sanctions: The Case of Iraq (1990–1997)’, in Willem JM van Genugten and Gerard A de Groot (eds), United Nations Sanctions—Effectiveness and Effects, Especially in the Field of Human Rights: A Multi-disciplinary Approach (Intersentia, Antwerp: 1999) 19.

Norris, Clive and Gary Armstrong, The Maximum Surveillance Society: The Rise of CCTV (Oxford: Berg, 1999).

(p.278) Norris, Clive, Mike McCahill, and David Wood, ‘The Growth of CCTV: A Global Perspective on the International Diffusion of Video Surveillance in Publicly Accessible Space’, Surveillance & Society 2 (2004) 110.

Norris, Clive and Dean Wilson (eds), Surveillance, Crime and Social Control (Aldershot: Ashgate, 2006).

Nye, Joseph S, ‘Peering into the Future’, Foreign Affairs 73(4) (1994) 82.

O'Brien, Connor Cruise, To Katanga and Back (New York: Simon & Schuster, 1962).

O'Neill, Brendan, ‘Watching You Watching Me’, New Statesman, 2 October 2006.

Orwell, George, Nineteen Eighty-Four (London: Secker and Warburg, 1949).

Oudraat, Chantal de Jonge, ‘UNSCOM: Between Iraq and a Hard Place’, European Journal of International Law 13 (2002) 139.

Packer, George, ‘Knowing the Enemy: Can Social Scientists Redefine the “War on Terror”?’, New Yorker, 18 December 2006, 60.

Palmer, Matthew SR, ‘Toward an Economics of Comparative Political Organization: Examining Ministerial Responsibility’, Journal of Law, Economics, and Organization 11(1) (1995) 164.

Parker, John, Total Surveillance: Investigating the Big Brother World of E-Spies, Eavesdroppers and CCTV (London: Piatkus, 2000).

Payne, Ronald, Mossad: Israel's Most Secret Service (London: Bantam, 1990).

Phelps, Major John T, ‘Aerial Intrusions by Civil and Military Aircraft in Time of Peace’, Military Law Review 107 (1985) 255.

Philby, Kim, My Silent War (New York: Grove Press, 1968).

Philips, Edward, ‘Drastic Solutions: A Comparative Study of Emergency Powers in the Commonwealth’, Denning Law Journal 5 (1990) 57.

Pillar, Paul R, ‘Intelligence, Policy, and the War in Iraq’, Foreign Affairs 85(2) (2006) 15.

Pither, Kerry, Dark Days: The Story of Four Canadians Tortured in the Name of Fighting Terror (Toronto: Viking Canada, 2008).

Plame Wilson, Valerie, Fair Game: My Life as a Spy, My Betrayal by the White House (New York: Simon & Schuster, 2007).

Posner, Richard A, The Economic Analysis of the Law, 5th edn (New York: Aspen, 1998).

Posner, Richard A ‘The Best Offense’, New Republic, 2 September 2002, 28.

Posner, Richard A Preventing Surprise Attacks: Intelligence Reform in the Wake of 9/11 (Stanford, CA: Hoover, 2005).

Posner, Richard A ‘Wire Trap: What If Wire-Tapping Works?’, New Republic, 6 February 2006.

Post, Robert C, ‘The Social Foundations of Privacy: Community and Self in the Common Law Tort’, California Law Review 77 (1989) 957.

(p.279) Pozen, David E, ‘The Mosaic Theory, National Security, and the Freedom of Information Act’, Yale Law Journal 115 (2005) 628.

Prosser, William, ‘Privacy’, California Law Review 484 (1960) 383.

Radcliff, Deborah, ‘A Cry for Privacy’, Computer World, 17 May 1999.

Ramraj, Victor V (ed), Emergencies and the Limits of Legality (Cambridge: Cambridge University Press, 2008).

Ramraj, Victor V, Michael Hor, and Kent Roach (eds), Global Anti-Terrorism Law and Policy (Cambridge: Cambridge University Press, 2005).

Ramsbotham, David, ‘Analysis and Assessment for Peacekeeping Operations’, Intelligence and National Security 10(4) (1995) 162.

Randall, James G, The Civil War and Reconstruction (Boston: DC Heath, 1937).

Rascoff, Samuel, ‘Domesticating Intelligence’, Southern California Law Review 83 (2010) 575.

Rawls, John, A Theory of Justice (Oxford: Clarendon Press, 1972).

Reinisch, August, ‘Developing Human Rights and Humanitarian Law Accountability of the Security Council for the Imposition of Economic Sanctions’, American Journal of International Law 95 (2001) 851.

Reisman, W Michael and James E Baker, Regulating Covert Action: Practices, Contexts, and Policies of Covert Coercion Abroad in International and American Law (New Haven, CT: Yale University Press, 1992).

Rempell, Scott, ‘Privacy, Personal Data and Subject Access Rights in the European Data Directive and Implementing UK Statute: Durant v Financial Services Authority as a Paradigm of Data Protection Nuances and Emerging Dilemmas’, Florida Journal of International Law 18 (2006) 807.

Renninger, John P, (ed), The Future Role of the United Nations in an Interdependent World (Dordrecht: Martinus Nijhoff, 1989).

Richelson, Jeffery T, A Century of Spies: Intelligence in the Twentieth Century (Oxford: Oxford University Press, 1997).

Richelson, Jeffery T The US Intelligence Community, 4th edn (Boulder, CO: Westview, 1999).

Richelson, Jeffrey T and Desmond Ball, The Ties that Bind: Intelligence Cooperation Between the UKUSA Countries, the United Kingdom, the United States of America, Canada, Australia, and New Zealand (Sydney: Allen & Unwin, 1985).

Risen, James, State of War: The Secret History of the CIA and the Bush Administration (New York: Free Press, 2006).

Ritter, Scott, Endgame: Solving the Iraq Problem—Once and for All (New York: Simon & Schuster, 1999).

Rockwood, Laura, ‘The IAEA's Strengthened Safeguards System’, Journal of Conflict and Security Law 7(1) (2002) 123.

Rosand, Eric, ‘The Security Council's Efforts to Monitor the Implementation of al Qaeda/Taliban Sanctions’, American Journal of International Law 98 (2004) 745.

(p.280) Rossiter, Clinton Lawrence, Constitutional Dictatorship: Crisis Government in the Modern Democracies [1948] (New Brunswick, NJ: Transaction Publishers, 2006).

Rousseau, Jean-Jacques, The Social Contract [1762], translated by GDH Cole (London: JM Dent, 1923).

Rule, James B, Private Lives and Public Surveillance: Social Control in the Computer Age (London: Allen Lane, 1973).

Rule, James B, Privacy in Peril (Oxford: Oxford University Press, 2007).

Rusbridger, James, The Intelligence Game (New York: New Amsterdam, 1989).

Russell, Richard L, Sharpening Strategic Intelligence: Why the CIA Gets It Wrong and What Needs to Be Done to Get It Right (Cambridge: Cambridge University Press, 2007).

Sandoz, Yves, Christophe Swinarski, and Bruno Zimmerman (eds), Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949 (Geneva: Martinus Nijhoff, 1987).

Schauer, Frederick, Profiles, Probabilities, and Stereotypes (Cambridge, MA: Harvard University Press, 2003).

Scheuerman, William E, Carl Schmitt: The End of Law (Lanham, MD: Rowman & Littlefield, 1999).

Schlesinger, Stephen, Act of Creation: The Founding of the United Nations (Boulder, CO: Westview, 2003).

Schmidt, Regin, Red Scare: FBI and the Origins of Anticommunism in the United States, 1919–1943 (Copenhagen: Museum Tusculanum Press, 2000).

Schmitt, Carl, Political Theology: Four Chapters on the Concept of Sovereignty [1922], translated by George Schwab (Cambridge, MA: MIT Press, 1985).

Schooner, Steven L, ‘Contractor Atrocities at Abu Ghraib: Compromised Accountability in a Streamlined, Outsourced Government’, Stanford Law and Policy Review 16 (2005) 549.

Schulhofer, Stephen J, The Enemy Within: Intelligence Gathering, Law Enforcement, and Civil Liberties in the Wake of September 11 (New York: Century Foundation Press, 2002).

Schumpeter, Joseph A, Capitalism, Socialism and Democracy [1942] (New York: Harper, 1975).

Schwartz, Jack, ‘The “Hearing Tom” Is Everywhere’, Newsday, 9 January 1965.

Schwartz, Paul M, ‘Reviving Telecommunications Surveillance Law’, University of Chicago Law Review 75 (2008) 287.

Scott, Cmdr Roger D, ‘Territorially Intrusive Intelligence Collection and International Law’, Air Force Law Review 46 (1999) 217.

Sergienko, Alexander, Saverio Pascazio, and Paolo Villoresi (eds), Quantum Communication and Quantum Networking (Berlin: Springer, 2010).

(p.281) Setear, John K, ‘Responses to Breach of a Treaty and Rationalist International Relations Theory: The Rules of Release and Remediation in the Law of Treaties and the Law of State Responsibility’, Virginia Law Review 83 (1997) 1.

Shetler-Jones, Philip, ‘Intelligence in Integrated UN Peacekeeping Missions: The Joint Mission Analysis Centre’, International Peacekeeping 15(4) (2008) 517.

Shils, Edward A, The Torment of Secrecy: The Background and Consequences of American Security Policies (London: Heinemann, 1956).

Shorrock, Tim, Spies for Hire: The Secret World of Intelligence Outsourcing (New York: Simon & Schuster, 2008).

Shue, Henry, ‘Torture’, Philosophy and Public Affairs 7 (1978) 124.

Shumate, Brett A, ‘From “Sneak and Peek” to “Sneak and Steal”: Section 213 of the USA PATRIOT Act’, Regent University Law Review 19 (2006) 203.

Silver, Daniel B and (updated and revised by Frederick P Hitz and JE Shreve Ariail), ‘Intelligence and Counterintelligence’, in John Norton Moore and Robert F Turner (eds), National Security Law (Durham, NC: Carolina Academic Press, 2005) 935.

Simester, AP, ‘Necessity, Torture, and the Rule of Law’, in Victor V Ramraj (ed), Emergencies and the Limits of Legality (Cambridge: Cambridge University Press, 2008) 289.

Simma, Bruno (ed), The Charter of the United Nations: A Commentary, 2nd edn (Oxford: Oxford University Press, 2002).

Simpson, AWB, Cannibalism and the Common Law: The Story of the Tragic Last Voyage of the Mignonette and the Strange Legal Proceedings to Which It Gave Rise (Chicago: University of Chicago Press, 1984).

Singleton, Susan, Tolley's Data Protection Handbook, 4th edn (London: Lexis-Nexis, 2006).

Slaughter, Anne-Marie, A New World Order (Princeton: Princeton University Press, 2004).

Slobogin, Christopher, ‘Public Privacy: Camera Surveillance of Public Places and the Right to Anonymity’, Mississippi Law Journal 72 (2002) 213.

Slobogin, Christopher, Privacy at Risk: The New Government Surveillance and the Fourth Amendment (Chicago: University of Chicago Press, 2007).

Smist, Frank, Congress Oversees the United States Intelligence Community, 2nd edn (Knoxville: University of Tennessee Press, 1994).

Smith, DJ, The Sleep of Reason: The James Bulger Case (London: Century, 1994).

Smith, Hugh, ‘Intelligence and UN Peacekeeping’, Survival 36(3) (1994) 174.

Smith, Michael, New Cloak, Old Dagger (London: Gollancz, 1996).

Smith, Michael, The Spying Game: The Secret History of British Espionage (London: Politico's, 2003).

Solove, Daniel J, ‘Conceptualizing Privacy’, California Law Review 90 (2002) 1087.

(p.282) Solove, Daniel J, The Digital Person: Privacy and Technology in the Information Age (New York: New York University Press, 2004).

Solove, Daniel J, ‘“I've Got Nothing to Hide” and Other Misunderstandings of Privacy’, San Diego Law Review 44 (2007) 745.

Solove, Daniel J, Understanding Privacy (Cambridge, MA: Harvard University Press, 2008).

Solzhenitsyn, Aleksandr, Cancer Ward [1968], translated by Nicholas Bethell and David Burg (New York: Noonday, 1991).

Stevens, G and C Doyle, Privacy: Wiretapping and Electronic Eavesdropping (New York: Novinka, 2002).

Stewart, Jonathan D, ‘Balancing the Scales of Due Process: Material Support of Terrorism and the Fifth Amendment’, Georgetown Journal of Law & Public Policy 3 (2005) 311.

Stimson, Herny L and McGeorge Bundy, On Active Service in Peace and War (New York: Harper and Brothers, 1947).

Stone, Geoffrey R, Perilous Times: Free Speech in Wartime from the Sedition Act of 1798 to the War on Terrorism (New York: WW Norton, 2004).

Swire, Peter P, ‘Proportionality for High-Tech Searches’, Ohio State Journal of Criminal Law 6 (2009) 751.

Sykes, Charles J, The End of Privacy: Personal Rights in the Surveillance Society (New York: St Martin's Griffin, 1999).

Tarallo, Mark, ‘Hayden Wants Fewer CIA Contractors’, Federal Computer Week, 25 June 2007.

Theoharis, Athan, The Quest for Absolute Security: The Failed Relations Among US Intelligence Agencies (Chicago: Ivan R Dee, 2007).

Tran, Van Dinh, Communication and Diplomacy in a Changing World (Norwood, NJ Ablex, 1987).

Turner, Admiral Stansfield, Secrecy and Democracy: The CIA in Transition (Boston: Houghton Mifflin, 1985).

Urquhart, Brian, Hammarskjöld (New York: Knopf, 1972).

Valencia, Mark J, The Proliferation Security Initiative: Making Waves in Asia, Adelphi Paper 376 (Abingdon: Routledge, 2005).

Wadham, John, ‘The Intelligence Services Act 1994’, Modern Law Review 57 (1994) 916.

Wark, Wesley K, The Ultimate Enemy: British Intelligence and Nazi Germany, 1933–1939 (Ithaca, NY: Cornell University Press, 1985).

Warner, Michael, ‘Wanted: A Definition of Intelligence’, Studies in Intelligence (Unclassified Edition) 46(3) (2002) 15.

Warren, Samuel D and Louis D Brandeis, ‘The Right to Privacy’, Harvard Law Review 4 (1890) 193.

(p.283) Watkins, Frederick M, ‘The Problem of Constitutional Dictatorship’, Public Policy 1 (1940) 324.

Wedgwood, Ruth, ‘International Criminal Tribunals and State Sources of Proof: The Case of Tihomir Blaskic’, Leiden Journal of International Law 11 (1998) 635.

Weiner, Tim, Legacy of Ashes: The History of the CIA (New York: Doubleday, 2007).

Wendel, W Bradley, ‘Legal Ethics and the Separation of Law and Morals’, Cornell Law Review 91 (2005) 67.

Westin, Alan F, Privacy and Freedom (New York: Atheneum, 1967).

Westin, Alan F, (ed), Information Technology in a Democracy (Cambridge, MA: Harvard University Press, 1971).

Whaley, Barton, Codeword Barbarossa (Cambridge, MA: MIT Press, 1973).

Whitman, James Q, ‘The Two Western Cultures of Privacy: Dignity Versus Liberty’, Yale Law Journal 113 (2004) 1153.

Whitney, Craig R, Spy Trader: Germany's Devil's Advocate and the Darkest Secrets of the Cold War (New York: Random House, 1993).

Wiebes, Cees, Intelligence and the War in Bosnia, 1992–1995 (Münster: LIT Verlag, 2003).

Williams, Bernard, In the Beginning Was the Deed: Realism and Moralism in Political Argument (Princeton: Princeton University Press, 2005).

Woods, Michael J, ‘Counterintelligence and Access to Transactional Records: A Practical History of USA PATRIOT Act Section 215’, Journal of National Security Law & Policy 1(1) (2005) 37.

Woodward, Bob, Plan of Attack (New York: Simon & Schuster, 2004).

Wright, Lawrence, ‘The Spymaster’, New Yorker, 21 January 2008, 42.

Wright, Peter, Spycatcher: The Candid Autobiography of a Senior Intelligence Officer (New York: Viking, 1987).

Wright, Quincy, ‘Legal Aspects of the U-2 Incident’, American Journal of International Law 54 (1960) 836.

Wright, Quincy, ‘Espionage and the Doctrine of Non-Intervention in Internal Affairs’, in Roland J Stanger (ed), Essays on Espionage and International Law (Columbus, OH: Ohio State University Press, 1962) 12.

Yoo, John, ‘Transferring Terrorists’, Notre Dame Law Review 79 (2004) 1183.

Yoo, John, ‘The Terrorist Surveillance Program and the Constitution’, George Mason Law Review 14 (2007) 565.

Yoo, John, Crisis and Command: A History of Executive Power from George Washington to George W Bush (New York: Kaplan, 2010).

Zegart, Amy B, Flawed by Design: The Evolution of the CIA, JCS, and NSC (Stanford, CA: Stanford University Press, 1999).

(p.284) Zegart, Amy B, ‘Cloaks, Daggers, and Ivory Towers: Why Academics Don't Study US Intelligence’, in Loch K Johnson (ed), Strategic Intelligence (Westport, CT: Praeger, 2007) 21.

Zegart, Amy B, Spying Blind: The CIA, the FBI, and the Origins of 9/11 (Princeton: Princeton University Press, 2007).

Zittrain, Jonathan, The Future of the Internet—and How to Stop It (New Haven, CT: Yale University Press, 2008).