REFERENCES
- Publius (John Jay), “The Federalist Papers, The Federalist No. 64,” Independent Journal, 5 March 1788, available at http://www.constitution.org/fed/federa64.htm
- Jan Goldman and Susan Maret, Intelligence and Information Policy for National Security: Key Terms and Concepts (Lanham, MD: Rowman and Littlefield, 2016).
- Margaret Hartmann, “Conservative Media Rails Against Leaks, Doesn’t Care What Trump Tells Russia,” New York Magazine, “Daily Intelligencer,” May 2017, available at http://nymag.com/daily/intelligencer/2017/05/right-wing-media-against-press-leaks-not-trump-russia-leaks.html
- USA Today, “Security Clearances Held by Millions of Americans,” 2017, available at http://www.usatoday.com/story/news/2013/06/09/government-security-clearance/2406243/
- United States Bureau of the Census, “Census.Gov,” Census.Gov, 2017, available at https://www.census.gov
- “Benefits—Central Intelligence Agency.” 2017. Cia.Gov., available at https://www.cia.gov/careers/benefits.html
- Department of Defense Office of Inspector General, Review of the Actions Taken to Deter, Detect and Investigate the Espionage Activities of Ana Belen Montes, Report No. 05-INTEL-18, June 16, 2005, National Security Archive, available at http://nsarchive.gwu.edu/NSAEBB/NSAEBB534-DIA-Declassified-Sourcebook/documents/DIA-37.pdf
- The 9/11 Commission Report. Final Report of the National Commission on Terrorist Attacks upon the United States (Washington, DC, 2004), pp. 342, 410.
- Infosecurity News, January/February 1996.
- Fas.org., Report to Congress on Inadvertent Releases of Restricted Data [online], available at http://www.fas.org/sgp/othergov/inadvertent.html
- Ironically, this testimony was given exactly one year before the 9/11 attacks. Today, protecting computer security from terrorists is a $1 trillion dollar business. Joel Willemseen, Computer Security: Critical Federal Operations and Assets Remain at Risk, United States General Accounting Office, 11 September 2000, available at http://www.gao.gov/assets/110/108621.pdf
- Nicole Sanger, “Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool,” The New York Times, 12 May 2017, available at NYTimes.com, https://www.nytimes.com/2017/05/12/world/europe/uk-national-health-service-cyberattack.html?._r=0
- Arthur S. Hulnick, “The Downside of Open Source Intelligence,” International Journal of Intelligence and CounterIntelligence, Vol. 15, No 3, Fall 2002, pp. 565–579.
- See Jan Goldman and Susan Maret, Intelligence and Information Policy for National Security; see also, the United States Marine Corps Comments on Joint Open Source Task Force Report and Recommendations (Working Group Draft, dated 6 January 1992).
- Robert D. Steele, “Open Source Intelligence: What Is It? Why Is It Important to the Military?,” available at http://www.oss.net/dynamaster/file_archive/040320/fb893cded51d5ff6145f06c39a3d5094/OSS1997-02-33.pdf
- Erin Skarda, “There Is a Myth About the Peace Corps Being a Front for the CIA,” Time, 22 September 2011, available at http://content.time.com/time/specials/packages/article/0,28804,2094254_2094247_2094275,00.html
- G. J. A. O’Toole, Honorable Treachery: A History of U.S. Intelligence, Espionage, and Covert Action from the American Revolution to the CIA (New York: Grove/Atlantic, 2014).
- Iztok Podbregar, “Vohunska dejavnost in gospodarstvo” (Ljubjana: Fakulteta za varnostne vede, 2008), from “OSINT: A ‘Grey Zone,’” by Gasper Hribar, Iztok Podbregar, and Teodora Ivanusa, International Journal of Intelligence and CounterIntelligence, Vol. 27, No. 3, Fall 2014, pp. 529–549.
- Alexander DeVolpi, Gerald E. Marsh, Ted A. Postol, and George S. Stanford, Born Secret: The H-Bomb, the Progressive Case, and National Security (New York: Pergamon Press, 1981).
- Peter Galison, quoted in Arieh Neier, “What We Have Learned About Limiting Knowledge in a Democracy,” Social Research, Vol. 77, No. 3, 2010, pp. 1013–1048.
- Ibid.
- These figures are based on the Director of National Intelligence, 2015 Annual Report on Security Clearance Determinations, Dni.gov (2017), Home [online], available at www.dni.gov/files/documents/Newsroom/Reports%20and%20Pubs, accessed 12 Mar. 2017.
- An excellent article on the ethics of cyber research is Ronald Deibert and Masashi Crete-Nishihata, “Blurred Boundaries: Probing the Ethics of Cyberspace Research,” Review of Policy Research, Vol. 28, No. 5, 2011, pp. 531–537.