References
- Borger, J. (2013, November 12). GCHQ and European spy agencies worked together on mass surveillance. Guardian. Retrieved from http://www.theguardian.com/uk-news/2013/nov/01/gchq-europe-spy-agencies-mass-surveillance-snowden
- Brighenti, A. (2007). Visibility a category for the Social Sciences. Current Sociology, 55, 323–342. doi:10.1177/0011392107076079
- Cox, J. (2012, December). Canada and the Five Eyes intelligence community (Canadian Defence & Foreign Affairs Institute Strategic Studies Working Group Paper). Retrieved from http://opencanada.org/wp-content/uploads/2012/12/SSWG-Paper-James-Cox-December-2012.pdf.pdf
- Dagbladet. (2013, December 18). Snowden-dokumentene: Norge er NSAs drømmepartner. Retrieved from http://www.dagbladet.no/2013/12/18/nyheter/nsa/etterretningstjenesten/snowden/overvakning/30891164
- Derix, S., & Modderkolk, H. (2013). The secret role of the Dutch in the American war on terror. NRC. Retrieved from http://www.nrc.nl/nieuws/2014/03/05/the-secret-role-of-the-dutch-in-the-american-war-on-terror/
- Der, Spiegel. (2013, July 20). “Prolific partner”: German intelligence used NSA spy program. Retrieved from http://www.spiegel.de/international/germany/german-intelligence-agencies-used-nsa-spying-program-a-912173.html
- Dworkin, A. (2013, July). Drones and targeted killing: Defining a European position (European Council on Foreign Relations policy brief). Retrieved from http://www.ecfr.eu/page/-/ECFR84_DRONES_BRIEF.pdf
- Foucault, M. (1991). Governmentality. In G. Burchell, G. Gordon & P. Miller (Eds.), The Foucault Effect: Studies in Governmentality (pp. 87–104). Chicago, IL: University of Chicago Press.
- Gallagher, R. (2014, June 19). How secret partners expand NSA's surveillance dragnet. The Intercept. Retrieved from https://firstlook.org/theintercept/2014/06/18/nsa-surveillance-secret-cable-partners-revealed-rampart-a/
- Greenwald, G., & Aranda, G. (2013, October 30). El CNI facilitó el espionaje masivo de EEUU a España. El Mundo. Retrieved from http://www.elmundo.es/espana/2013/10/30/5270985d63fd3d7d778b4576.html
- Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. British Journal of Sociology, 51, 605–622. doi:10.1080/00071310020015280
- Issacharoff, S., & Pildes, R. (2013). Targeted warfare: Individuating enemy responsibility. New York University Law Review, 88, 1521–1599. Retrieved from http://www.nyulawreview.org/sites/default/files/pdf/NYULawReview-88-5-IssacharoffPildes.pdf
- MacAskill, E., & Ball, J. (2013, November 2). Portrait of the NSA: No detail too small in quest for total surveillance. Guardian. Retrieved from http://www.theguardian.com/world/2013/nov/02/nsa-portrait-total-surveillance
- Martins, B. O. (2013, August). Disclosed: EU vulnerability. Taking US mass surveillance seriously after the Snowden affair (Viewpoints 132, Portuguese Institute of International Relations and Security). Retrieved from http://pure.au.dk/portal/files/55950626/1322013_VP.pdf
- Mazzetti, M. (2013). The way of the knife: The CIA, a secret army, and a war at the ends of the Earth. New York: The Penguin Press.
- Patton, P. (1994). MetamorphoLogic: Bodies and powers in A Thousand Plateaus. Journal of the British Society for Phenomenology, 25, 158–169. doi: 10.1080/00071773.1994.11007058
- Poitras, L., Rosenbach, M., Schmid, F., Stark, H., & Stock, J. (2013, July 1). Cover story: How the NSA targets Germany and Europe. Der Spiegel. Retrieved from http://www.spiegel.de/international/world/secret-documents-nsa-targeted-germany-and-eu-buildings-a-908609.html
- Priest, D. (2013, July 21). NSA growth fueled by need to target terrorists. Washington Post. Retrieved from http://www.washingtonpost.com/world/national-security/nsa-growth-fueled-by-need-to-target-terrorists/2013/07/21/24c93cf4-f0b1-11e2-bed3-b9b6fe264871_story.html
- Rensfeldt, G. (2013, December 11). Read the Snowden documents from the NSA. SVT. Retrieved from http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa
- Scahill, J., & Greenwald, G. (2014, October 2). The NSA's secret role in the U.S. assassination program. The Intercept. Retrieved from https://firstlook.org/theintercept/2014/02/10/the-nsas-secret-role/
- Seifert, J. W. (2008, April). Data mining and homeland security: An overview (Congressional Research Service Report). Retrieved from http://www.fas.org/sgp/crs/intel/RL31798.pdf
- Smith, E. A. (2006). Effects based operations applying network centric warfare in peace, crisis, and war (Command and Control Research Program Publications Series, US Department of Defence). Retrieved from http://www.dtic.mil/dtic/tr/fulltext/u2/a457292.pdf
- Walsh, P., & Miller, S. (2015). Rethinking “Five Eyes” security intelligence collection policies and practice post Snowden. Intelligence and National Security, 1–24. doi:10.1080/02684527.2014.998436
- Watt, N. (2013, June 10). NSA “offers intelligence to British counterparts to skirt UK law”. Guardian. Retrieved from http://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett