References
- American Library Association. (2003, January 29). Resolution on the USA patriot act and related measures that infringe on the rights of library users. Retrieved from http://www.ala.org/Template.cfm?Section=ifresolutions&Template=/ContentManagement/ContentDisplay.cfm&ContentID=11891
- Ball, J. (2013, October 25). NSA monitored calls of 35 world leaders after US official handed over contacts. The Guardian. Retrieved from http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls
- Bamford, J. (2005, December 25). The agency that could be big brother. New York Times. Retrieved from http://www.nytimes.com/2005/12/25/weekinreview/25bamford.html
- Bamford, J. (2008). The shadow factor: The ultra secret NSA from 9/11 to the eavesdropping on America. New York, NY: Doubleday.
- Baumgärtner, M., Knobbe, M., & Schindler, J. (2016, April 5). Atmosphere of distrust hinders EU anti-terror cooperation. Der Spiegel. Retrieved from http://www.spiegel.de/international/europe/is-german-intelligence-slowing-counterterror-efforts-a-1085331.html
- BBC News. (2016, April 9). Paris and Brussels bombers’ links uncovered. bbc.com. Retrieved from http://www.bbc.com/news/world-europe-35879401
- Bridis, T. (2015, December 7). San Bernardino shooting: Terror investigators can’t view NSA phone records. The Mercury News. Retrieved from http://www.mercurynews.com/crime-courts/ci_29212953/san-bernardino-shooting-terror-investigators-cant-view-nsa
- Britanica. (2014). Lucius quinctius cincinnatus. Retrieved from http://www.britannica.com/EBchecked/topic/117993/Lucius-Quinctius-Cincinnatus
- Browne, H. (2006, October). Intelligence successes are being overlooked. Signal Magazine. Retrieved from http://www.afcea.org/content/?q=intelligence-successes-are-being-overlooked
- Bullock, K. (2013). Community, intelligence-led policing and crime control. Policing & Society, 23(2), 125–144. doi: 10.1080/10439463.2012.671822
- Bush, G. W. (2001, September 20). Address to the nation. Retrieved from http://www.presidentialrhetoric.com/speeches/09.20.01.print.html
- Bush, G. W. (2002, September). The national security strategy of the United States. Washington, DC: The White House.
- Byers, A. (2014, May 22). NSA surveillance reform clears house. Politico.com. Retrieved from http://www.politico.com/story/2014/05/congress-nsa-data-collection-106994.html
- Byman, D., & Wittes, B. (2014, May/June). Reforming the NSA: How to spy after Snowden. Foreign Affairs, 93(3), 127–138.
- Calvitto, C. (2005, September 10). Homeland security: South Dakota style. The Rapid City Journal. Retrieved from http://rapidcityjournal.com/news/local/article_2bfbc6ad-a860-5eaf-bafe-a4c52ed42694.html
- Campbell, D. (2015, December 16). Big Brother is born. And we find out 15 years too late to stop him. The Register. Retrieved from http://www.theregister.co.uk/2015/12/16/big_brother_born_ntac_gchq_mi5_mass_surveillance_data_slurping
- CBS News. (2016, June 14). Orlando shooting: Latest on the investigation. cbsnews.com. Retrieved from http://www.cbsnews.com/news/orlando-shooting-what-we-know-about-investigation-omar-mateen/
- Chumley, C. (2013, August 6). Nidal Hasan’s Fort Hood trial starts;‘workplace violence’ classification denies purple hearts. The Washington Post. Retrieved from http://www.washingtontimes.com/news/2013/aug/6/nidal-hasans-fort-hood-trial-starts-workplace-viol/
- Clarke, R. A., Morell, M. J., Stone, G. R., Sunstein, C. R., & Swire, P. (2013 December 12). Liberty and security in a changing world President’s Review Group on Intelligence and Communications Technology.
- Contorno, S. (2014, March 11). James Clapper’s testimony one year later. Politifact.com. Retrieved from http://www.politifact.com/truth-o-meter/article/2014/mar/11/james-clappers-testimony-one-year-later/
- Daily Mail. (2015, November 18). Britain says Paris attacks show need for European intelligence cooperation. Daily Mail.com. Retrieved from http://www.dailymail.co.uk/wires/reuters/article-3323949/Britain-says-Paris-attacks-need-European-intelligence-cooperation.html
- Deluca, M. (2016, April 7). FBI’s iPhone hack works on ‘narrow slice of phones’: James Comey. NBS News. Retrieved from http://www.nbcnews.com/tech/apple/fbi-s-iphone-hack-works-narrow-slice-phones-james-comey-n552371
- Den Hengst-Bruggeling, M., de Graaf, B., & van Scheepstal, P. (2013). Modelling intelligence-led policing to identify its potential. Journal of Police Studies/Cahiers Politiestudies, 1(3), 171–191.
- Dinan, S. (2017, June 7). Trump backs permanent snooping powers he once criticized as abusive. Washington Times. Retrieved from http://www.washingtontimes.com/news/2017/jun/7/trump-backs-permanent-snooping-powers-intelligence/
- Dorling, P. (2013, October 31). Exposed: Australia’s Asia spy network. The Sydney Morning Herald. Retrieved from http://www.smh.com.au/federal-politics/political-news/exposed-australias-asia-spy-network-20131030-2whia.html
- Doyle, J. M. (2013, June 21). Actionable intelligence: Getting accurate info to decision makers – quickly. Homeland Security Today. Retrieved from http://www.hstoday.us/briefings/correspondents-watch/single-article/actionable-intelligence-getting-accurate-info-to-decision-makers-quickly/51a8bdb5cdb2f1b00b6a12c2f808abd9.html
- Dutton, S., De Pinto, J., Salvanto, A., & Backus, F. (2014, January 22). Poll: Most think Edward Snowden should stand trial in U.S. CBSNews.com. Retrieved from http://www.cbsnews.com/news/poll-most-think-edward-snowden-should-stand-trial-in-us/
- FAS Website. (2014). History of army INSCOM. Federation of American Scientists. Retrieved from http://www.fas.org/irp/agency/inscom/history.htm
- FBI Boston. (2013, October 18). Joint release from Massachusetts law enforcement Agencies. FBI.com. Retrieved from https://www.fbi.gov/boston/press-releases/2013/joint-release-from-massachusetts-law-enforcement-agencies
- Forbes Quotes. (2015). Sir Francis Bacon. Retrieved from http://www.forbes.com/quotes/2913/
- Gallagher, S. (2013, December 13). White house: NSA and cyber command to stay under one boss. Ars Technica. Retrieved from http://arstechnica.com/tech-policy/2013/12/white-house-nsa-and-cyber-command-to-stay-under-one-boss/
- Galperin, E. (2014, May 5). Proposed Mexican telecom law would be a disaster for internet freedom. Electronic Frontier Foundation. Retrieved from https://www.eff.org/deeplinks/2014/05/proposed-mexican-telecom-law-would-be-disaster-internet-freedom
- Gellman, B., & Poitras, L. (2013, June 6). U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. The Washington Post. Retrieved from http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html
- Greenwald, G. (2013, June 5). NSA collecting phone records of millions of Verizon customers daily. The Guardian. Retrieved from http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order
- Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state. New York, NY: Metropolitan Books.
- Grier, P. (2014). CIA-Senate dispute 101: 9 questions about who’s spying on whom. Christian Science Monitor. Retrieved from http://www.csmonitor.com/USA/DC-Decoder/2014/0311/CIA-Senate-dispute-101-9-questions-about-who-s-spying-on-whom/How-do-you-investigate-a-spy-agency
- Hamill, J. (2015, December 16). Hackers trace ISIS Twitter accounts back to internet addresses linked to department of work and pensions. The Mirror. Retrieved from http://www.mirror.co.uk/news/technology-science/technology/hackers-trace-isis-twitter-accounts-7010417
- Hattern, J. (2014, January 22). Leahy: NSA surveillance ‘not making us safer.’ The Hill. Retrieved from http://thehill.com/policy/technology/196136-leahy-nsa-surveillance-not-making-us-safer
- Hillman, R., & D’Agostino, T. (2011). Understanding contemporary Latin America (4th ed.). Boulder, CO: Lynne Rienner.
- History.com Staff. (2014). Boston marathon bombing. History.com. Retrieved from http://www.history.com/topics/boston-marathon-bombings
- Human Rights Watch. (2014, July). With liberty to monitor all: How large-scale us surveillance is harming journalism. New York, NY: Human Rights Watch.
- Johnson, L. K., Aldrich, R. J., Christopher Moran, D., Barrett, M., Hastedt, B., Jervis, R. K., … Wark, W. K. (2014). An INS special forum: Implications of the Snowden Leaks. Intelligence and National Security, 29(6), 793–810. doi: 10.1080/02684527.2014.946242
- Kakutani, M. (2014, May 12). Snowden’s Story behind the scenes. New York Times. Retrieved from http://www.nytimes.com/2014/05/13/books/no-place-to-hide-by-glenn-greenwald.html
- Kleinrock, L. (2003). An internet vision: The invisible global infrastructure. Ad Hoc Networks, 1, 3–11. doi: 10.1016/S1570-8705(03)00012-X
- Knickerbocker, B. (2014, April 13). Senate report: Interrogation methods ‘far worse’ than CIA acknowledged. Christian Science Monitor. Retrieved from http://www.csmonitor.com/USA/DC-Decoder/2014/0412/Senate-report-Interrogation-methods-far-worse-than-CIA-acknowledged
- Kopstein, J. (2014, May 16). The NSA can ‘collect-it-all,’ but what will it do with our data next? The Daily Beast. Retrieved from http://www.thedailybeast.com/articles/2014/05/16/the-nsa-can-collect-it-all-but-what-will-it-do-with-our-data-next.html
- Liston, A. (2014). Keeping up with the Joneses: The NSA’s bulk telephony metadata program and its relationship with the Katz privacy doctrine in the 21st century. Faulkner Law Review, 5(2), 309–334.
- Liu, E. C., Nolan, A., & Thompson, R. M. I. I. (2014 April 1). Overview of constitutional challenges to NSA collection activities and recent developments. Washington, DC: Congressional Research Service.
- LoBianco, T., Herb, J., & Walsh, D. (2017, June 1). House intelligence panel subpoenas Flynn, Cohen; seeks ‘unmasking’ docs. CNN. Retrieved from http://www.cnn.com/2017/05/31/politics/house-russia-investigators-subpoena-flynn-cohen/index.html
- Madison, J., Hamilton, A., & Jay, J. (1787–1788). The federalist papers. Retrieved from http://thomas.loc.gov/home/histdox/fedpapers.html
- Marks, A. (2007, May 25). Funding squabble reveals stresses on police departments. Boston University College of Communications. Retrieved from http://www.bu.edu/phpbin/news-cms/news/?dept=1368&id=46064
- Mauer, T. (2014, May 15). Exporting the right to privacy. Slate.com. Retrieved from http://www.slate.com/articles/technology/future_tense/2014/05/wassenaar_arrangement_u_s_export_control_reform_keeping_surveillance_tech.html
- Mayer, M. (2009). Homeland security and federalism: Protecting America from outside the Beltway. Santa Barbara, CA: ABC-CLIO.
- Mazzetti, M., Savage, C., & Shane, S. (2013, March 9). How a U.S. citizen came to be in America’s cross hairs. New York Times. Retrieved from http://www.nytimes.com/2013/03/10/world/middleeast/anwar-al-awlaki-a-us-citizen-in-americas-cross-hairs.html?pagewanted=all&_r=0
- Mears, B., & Perez, E. (2013, December 17). Judge: NSA domestic phone data-mining unconstitutional. CNN.com. Retrieved from http://edition.cnn.com/2013/12/16/justice/nsa-surveillance-court-ruling/
- Medine, D., Brand, R., Collins Cook, E., Dempsey, J., & Wald, P. (2014 January 23). Report on the telephone records program conducted under section 215 of the USA PATRIOT ACT and on the operations of the Foreign Intelligence Surveillance Court Privacy and Civil Liberties Oversight Board.
- Mueller, J., & Stewart, M. (2012, Summer). The terrorism delusion America’s overwrought response to September 11. International Security, 37(1), 81–110. doi: 10.1162/ISEC_a_00089
- Mundie, C. (2014, March/April). Privacy pragmatism: Focus on data use, not data collection. Foreign Affairs, 93(2), 28–38.
- Myers, A. L., & Abdollah, T. (2015, December 4). Woman in San Bernardino shooting pledged allegiance to ISIL, source says. The National Post. Retrieved from http://news.nationalpost.com/news/world/woman-in-san-bernardino-shooting-pledged-allegiance-to-isil-source-says
- National Commission on Terrorist Attacks upon the United States. (2004). The 9/11 commission report: Final report of the National Commission on terrorist attacks upon the United States. Washington, DC: National. Commission on Terrorist Attacks upon the United States.
- National Public Radio. (2017, March 16). Trump unveils ‘hard power’ budget that boosts military spending. NPR. Retrieved from http://www.npr.org/2017/03/16/520305293/trump-to-unveil-hard-power-budget-that-boosts-military-spending
- New York City. (2013). Terrorist plots targeting New York City. Retrieved from www.nyc.gov/html/nypd/html/pr/plots_targeting_nyc.shtml
- O’Brien, M. (2013, December 18). Obama task force calls for overhauls to surveillance Tactics. NBCNews.com. Retrieved from http://www.nbcnews.com/news/other/obama-task-force-calls-overhauls-surveillance-tactics-f2D11765820
- Perez, E., Prokupecz, S., Grinberg, E., & Yan, H. (2016, September 19). NY, NJ bombings: Suspect charged with attempted murder of officers. CNN. Retrieved from http://www.cnn.com/2016/09/19/us/new-york-explosion-investigation/index.html
- Perlez, J. (2013, October 31). Australia said to play part in N.S.A. effort. The New York Times. Retrieved from http://www.nytimes.com/2013/11/01/world/asia/australia-participated-in-nsa-program-document-says.html?_r=0
- Pew Research Center. (2013, June 10). Public says investigate terrorism, even if it intrudes on privacy: Majority views NSA phone tracking as acceptable anti-terror tactic. Pew Research Center and Washington Post survey. Retrieved from http://www.people-press.org/files/legacy-pdf/06-10-13%20PRC%20WP%20Surveillance%20Release.pdf
- Posner, R. (2001, December). Security vs civil liberties. The Atlantic. Retrieved from https://www.theatlantic.com/past/docs/issues/2001/12/posner.htm
- Ramsay, J. D., & Kiltz, L. (2014). Critical issues in homeland security. Boulder, CO: Westview Press.
- Riley-Smith, B. (2015, January 9). George Osborne hints at bringing back Snooper’s charter after Paris attack. The Telegraph. Retrieved from http://www.telegraph.co.uk/news/politics/conservative/11334923/George-Osborne-hints-at-bringing-back-Snoopers-Charter-after-Paris-attack.html
- Sanger, D. E., & Schmitt, E. (2016, July 26). Spy agency consensus grows that Russia Hacked D.N.C. New York Times. Retrieved from http://www.nytimes.com/2016/07/27/us/politics/spy-agency-consensus-grows-that-russia-hacked-dnc.html
- Savage, C. (2015, June 30). Surveillance court rules that N.S.A. Can resume bulk data collection. Washington Post. Retrieved from http://www.nytimes.com/2015/07/01/us/politics/fisa-surveillance-court-rules-nsa-can-resume-bulk-data-collection.html?_r=0
- Scavo, C., Kearney, R., & KilroyJr., R. (2006). Local government managers’ views on homeland security. The Municipal Yearbook. International Community Managers Association (ICMA), 19–26.
- Schneier, B. (2014, January 7). How the NSA threatens national security. The Atlantic. Retrieved from http://www.theatlantic.com/technology/archive/2014/01/how-the-nsa-threatens-national-security/282822
- Seidler, P., & Adderley, R. (2013). Criminal network analysis inside law enforcement agencies: A data-mining system approach under the National Intelligence Model. International Journal of Police Science & Management, 15(4), 323–337. doi: 10.1350/ijps.2013.15.4.321
- Serwin, A. (2012). Information superiority: Turning ‘big data’ in to actionable intelligence. Diplomatic Courier, 6(6), 30–32.
- Solove, D. (2013). Nothing to hide: The false tradeoff between privacy and security. New Haven: Yale University Press.
- Tucker, E. (2014, May 19). US official: China cited in US cyber-espionage case. ABC News. Retrieved from http://abcnews.go.com/Politics/wireStory/us-eyeing-charges-foreign-cyber-espionage-case-23774264
- U.S. Department of Defense. (2012). Defense budget priorities and choices. Retrieved from http://www.defense.gov/news/Defense_Budget_Priorities.pdf
- U.S. Department of Justice. (2014, April 30). Letter to Harry Reid pertaining to FISA requests. Retrieved from http://www.fas.org/irp/agency/doj/fisa/2013rept.pdf
- U.S. Senate. (2013, February 7). Open hearing on the nomination of John O. Brennan to be director of the central intelligence agency. Washington, DC: Senate Select Committee on Intelligence.
- Waterman, S. (2013, October 2). NSA chief’s admission of misleading numbers adds to Obama administration blunders. The Washington Times. Retrieved from http://www.washingtontimes.com/news/2013/oct/2/nsa-chief-figures-foiled-terror-plotsmisleading/?page=all
- Winesburg-Ankrom, M. (2011, September 29). Update on ARRA funding for police departments. Police One. Retrieved from http://www.policegrantshelp.com/news/1915903-Update-on-ARRA-funding-for-police-departments/
- Winter, B. (2013, December 20). Insight: How U.S. spying cost boeing multibillion-dollar jet contract. Reuters. http://www.reuters.com/article/us-boeing-brazil-insight-idUSBRE9BJ10P20131220
- Wittes, B. (2013, June 12). Would be franklin trade liberty for wiretapping? Brookings Institution. Retrieved from http://www.brookings.edu/blogs/up-front/posts/2013/06/11-ben-franklin-liberty-wiretapping-security
- Wittes, B. (2014, May 15). The intelligence legitimacy paradox. Brookings Institution Lawfare. Retrieved from https://www.lawfareblog.com/intelligence-legitimacy-paradox
- Woods, A. K. (2015, November 30). Dark clouds over the internet. New York Times. Retrieved from http://www.nytimes.com/2015/12/01/opinion/dark-clouds-over-the-internet.html?_r=0
- Zycher, B. (2003). A preliminary benefit/cost framework for counterterrorism expenditures. Santa Monica, CA: RAND.