References
- Apple. (2015a). We’ve built privacy into the things you use every day. Retrieved from http://www.apple.com/privacy/approach-to-privacy/
- Apple. (2015b). Legal process guidelines, April 10. Retrieved from https://www.apple.com
- Applegate, S. D. (2013). The dawn of kinetic cyber. In K. Podins, J. Stinissen, & M. Maybaum (Eds.), 5th international conference on cyber conflict. Tallinn: NATO CCD COE Publications.
- Arce, N. (2014, November 19). WhatsApp encryption has just made it more difficult for gov’t to spy on you. Tech Times. Retrieved from http://www.techtimes.com
- The Associated Press. (2013). Case against contractors resurfaces. New York Times. Retrieved from http://www.nytimes.com/2013/10/18/us/case-against-contractors-resurfaces.html?_r=0
- The Associated Press. (2014). China’s military cyberattacked defense contractors several times, report claims. CBS News. Retrieved from http://www.cbsnews.com/news/china-military-cyberattacked-defense-contractors-several-times-report-claims/
- Avant, D. (2005). The market for force. Cambridge: Cambridge University Press.
- Baker, P. (2009, December 5). How Obama came to plan for ‘surge’ in Afghanistan. New York Times.
- Bobbio, N. (1989). The great dichotomy: Public/private. In N. Bobbio (Ed.), Democracy and dictatorship: The nature and limits of State Power (pp. 1–21). Minneapolis: University of Minnesota Press.
- Busch, N. E., & Givens, A. D. (2012). Public–private partnerships in homeland security: Opportunities and challenges. Homeland Security Affairs, 8, 18.
- Cassel, F. H. (1988). The public–private distinction in organizational theory. Academic Management Review, 13, 182–201.
- Clapper, J. R. (2015). Statement for the record worldwide threat assessment of the US intelligence community. Retrieved from http://www.dni.gov/files/documents/Unclassified_2015_ATA_SFR_-_SASC_FINAL.pdf
- Clarke, R. A. (2010). Cyber war: The next threat to national security and what to do about it. New York, NY: Harper Collins.
- Comey, J. (2014, October 16). Going dark: Are technology, privacy, and public safety on a collision course? (Speech). Washington, DC: Brookings Institution. Retrieved from http://www.fbi.gov
- Cutler, A. C., Haufler, V., & Porter, T. (Eds.). (1999). Private authority and international affairs. New York, NY: State University of New York Press.
- Davis, J. H. (2015, July 9 ). Hacking of government computers exposed 21.5 million people. The New York Times.
- Dunigan, M. (2013, March 19 ). A lesson from Iraq war: How to outsource war to private contractors. Christian Science Monitor.
- Etzioni, A. (2012). The privacy merchants: What is to be done? University of Pennsylvania Journal of Constitutional Law, 14(4), 929–951.
- Federal Procurement Data System – Next Generation. (2015). Top 100 contractors report. Retrieved from https://www.fpds.gov
- Financial Stability Oversight Council. (2014). 2014 annual report. Retrieved from http://www.treasury.gov/
- Freeman, A., & Mensch, E. (1987). The public–private distinction in American law and life. Buffalo Law Review, 36, 237–258.
- Fritz, V., & Menocal, A. (2007). Understanding state-building from a political economy perspective. London: Overseas Development Institute (ODI). Retrieved from http://www.gsdrc.org/go/display&type=Document&id=3178
- Gal, S. (2002). A semiotics of the public/private distinction. Differences: A Journal of Feminist Cultural Studies, 13(1), 77–95.
- Germano, J. H. (2014). Cybersecurity partnerships: A new era of public–private collaboration. NYU Center on Law and Security. Retrieved from http://www.lawandsecurity.org/Portals/0/Documents/Cybersecurity.Partnerships.pdf
- Gertz, B. (2014, March 13). Top gun takeover: Stolen F-35 secrets showing up in China’s stealth fighter. Washington Times. Retrieved from http://www.washingtontimes.com
- Greenberg, A. (2010, February 17). For pentagon contractors, cyberspying escalates. Forbes. Retrieved from http://www.forbes.com/2010/02/17/pentagon-northrop-raytheon-technology-security-cyberspying.html
- Hall, R. B., & Biersteker, T. J. (Eds.). (2002). The emergence of private authority in global governance. Cambridge: Cambridge University Press.
- Hern, A. (2014, October 17). Apple defies FBI and offers encryption by default on new operating system. The Guardian. Retrieved from http://www.theguardian.com
- Internal Revenue Service. (2015, April 24). EO operational requirements: Private foundations and public charities. Retrieved from http://www.irs.gov/
- Ivory, D. (2014). Federal contracts plunge, squeezing private companies. New York Times. Retrieved from http://www.nytimes.com/2014/01/16/business/federal-contracts-plunge-squeezing-private-companies.html
- Joh, E. (2005). Conceptualizing the private police. UTAH L. REV. 573.
- Lorch, R. S. (1978). Public administration. St. Paul, MN: West Publishing.
- Lowenthal, T. (2015, April 9). Yahoo’s end-to-end email promises greater protection for journalists. PBS. Retrieved from pbs.com.
- Lowi, T. (1979). The end of liberalism (2nd ed.). New York, NY: Norton.
- Malatesta, D., & Carboni, J. (2014). The Public–private distinction: Insights for public administration from the State action doctrine. Public Administration Review, 75(1), 63–74. doi: 10.1111/puar.12272
- McConnell, G. (1966). Private power and American democracy. New York, NY: Knopf.
- McGarry, B. (2015, June 24). Fixing the Pentagon’s windows XP problem. Defense Tech.
- Mills, C. W. (2000). The power elite (New ed.). Oxford: Oxford University Press.
- Novak, W. J. (2008). The myth of the ‘weak’ American State. American Historical Review, 113, 752–772. doi: 10.1086/ahr.113.3.752
- Obama, B. (2014, January 17). Remarks by the president on review of signals intelligence (Speech). Washington, DC. Retrieved from https://www.whitehouse.gov/the-press-office/2014/01/17/remarks-president-review-signals-intelligence
- O’Harrow, Jr, R., Priest, D., & Censer, M. (2013). NSA leaks put focus on intelligence apparatus’s reliance on outside contractors. Washington Post. Retrieved from http://www.washingtonpost.com/business/nsa-leaks-put-focus-on-intelligence-apparatuss-reliance-on-outside-contractors/2013/06/10/e940c4ba-d20e-11e2-9f1a-1a7cdee20287_story.html
- Olson, M. (1982). The rise and decline of nations. New Haven, CT: Yale University Press.
- Pastor, J. F. (2003). The privatization of police in America: An analysis and case study. Jefferson, NC: McFarland.
- Pattison, J. (2014). The morality of private war: The challenge of private military and security companies. Oxford: Oxford University Press.
- Peterson, A. (2015). FBI official: Companies should help us ‘prevent encryption above all else’. The Washington Post. Retrieved from http://www.washingtonpost.com /
- Polanyi, K. (2001). The great transformation: The political and economic origins of our time. Boston, MA: Beacon Press.
- Radford, E. (1965). Business as government. In R. C. Martin (Ed.), Public administration and democracy (pp. 63–82). Syracuse: Syracuse University Press.
- Salamon, L. M. (1999). America’s nonprofit sector: A primer. New York, NY: The Foundation Center.
- Sapru, R. K. (2013). Administrative theories and management thought. Delhi: PHI Learning.
- Scahill, J. (2010). Blackwater’s secret ops. The Nation. Retrieved from http://www.thenation.com/article/154739/blackwaters-black-ops#
- Schattschneider, E. E. (1960). The Semi-sovereign people: A realist’s view of America. Chicago, IL: Holt, Rinehart, and Winston.
- Selyukh, A., & Palmer, D. (2013, March 28). U.S. law to restrict government purchases of Chinese IT equipment. Reuters. Retrieved from http://www.reuters.com/article/us-usa-cybersecurity-espionage-idUSBRE92Q18O20130328
- Senate Committee on Commerce, Science, and Transportation. (2013, December 18). A review of the data broker industry: Collection, use, and sale of consumer data for marketing purposes. Staff report for Chairman Rockefeller. Retrieved from http://www.commerce.senate.gov/
- Timm, T. (2015, June 9). If the FBI has a backdoor to Facebook or Apple encryption, we are less safe. The Guardian.
- United States Government Accountability Office. (2014). Maritime critical infrastructure protection: DHS needs to better address port security. Retrieved from http://www.gao.gov/assets/670/663828.pdf
- Van Hollen, C. (2015). Re: federal contracts and the contracted workforce. Congressional Budget Office. Retrieved from https://www.cbo.gov
- Weber, M. (1946). Essays in sociology ( pp. 77–128). New York, NY: Oxford University Press. Retrieved from http://www.sscnet.ucla.edu/polisci/ethos/Weber-vocation.pdf
- Weintraub, J. (1997). The theory and politics of the public–private distinction: Public and private in thought and practice. Chicago, IL: University of Chicago Press.
- Whaites, A. (2008). States in development: Understanding state-building. UK Department for International Development. Retrieved from http://tna.europarchive.org/20081212094836/http:/dfid.gov.uk/pubs/files/State-in-Development-Wkg-Paper.pdf