@article{Alex J. Bellamy_2006, title={No Pain, No Gain? Torture and Ethics in the War on Terror}, volume={82}, url={http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3569133?seq=1#page_scan_tab_contents}, number={1}, journal={International Affairs (Royal Institute of International Affairs 1944-)}, publisher={WileyRoyal Institute of International AffairsRoyal Institute of International Affairs}, author={Alex J. Bellamy}, year={2006}, pages={121–148} }
@article{Avery Plaw_2007, title={Terminating Terror: The Legality, Ethics and Effectiveness of Targeting Terrorists}, url={http://www.jstor.org.ezproxy4.lib.le.ac.uk/stable/41802380?seq=1#page_scan_tab_contents}, number={114}, journal={Theoria: A Journal of Social and Political Theory}, publisher={Berghahn BooksFaculty of Humanities, Development and Social Sciences, University of KwaZulu-Natal, South AfricaBerghahn Books}, author={Avery Plaw}, year={2007}, pages={1–27} }
@article{Bar-Joseph_2010, title={The Professional Ethics of Intelligence Analysis}, volume={24}, DOI={10.1080/08850607.2011.519222}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Bar-Joseph, Uri}, year={2010}, month={Nov}, pages={22–43} }
@article{Bauman_Bigo_Esteves_Guild_Jabri_Lyon_Walker_2014, title={After Snowden: Rethinking the Impact of Surveillance}, volume={8}, DOI={10.1111/ips.12048}, number={2}, journal={International Political Sociology}, author={Bauman, Zygmunt and Bigo, Didier and Esteves, Paulo and Guild, Elspeth and Jabri, Vivienne and Lyon, David and Walker, R. B. J.}, year={2014}, month={Jun}, pages={121–144} }
@article{Bellaby_2012, title={What’s the Harm? The Ethics of Intelligence Collection}, volume={27}, DOI={10.1080/02684527.2012.621600}, number={1}, journal={Intelligence and National Security}, author={Bellaby, Ross}, year={2012}, month={Feb}, pages={93–117} }
@article{den Boer_van Buuren_2012, title={SECURITY CLOUDS}, volume={5}, DOI={10.1080/17530350.2012.640558}, number={1}, journal={Journal of Cultural Economy}, author={den Boer, Monica and van Buuren, Jelle}, year={2012}, month={Feb}, pages={85–103} }
@article{Bonino_Kaoullas_2015, title={Preventing Political Violence in Britain: An Evaluation of over Forty Years of Undercover Policing of Political Groups Involved in Protest}, volume={38}, DOI={10.1080/1057610X.2015.1059102}, number={10}, journal={Studies in Conflict & Terrorism}, author={Bonino, Stefano and Kaoullas, Lambros George}, year={2015}, month={Oct}, pages={814–840} }
@article{Boraz_2006, title={Establishing Democratic Control of Intelligence in Colombia}, volume={19}, DOI={10.1080/08850600500177168}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Boraz, Steven C.}, year={2006}, month={Jan}, pages={84–109} }
@article{Brownlee_2016, title={The civil disobedience of Edward Snowden}, volume={42}, DOI={10.1177/0191453716631167}, number={10}, journal={Philosophy & Social Criticism}, author={Brownlee, Kimberley}, year={2016}, month={Dec}, pages={965–970} }
@article{Cogan_2004, title={Hunters not Gatherers: Intelligence in the Twenty-First Century}, volume={19}, DOI={10.1080/0268452042000302010}, number={2}, journal={Intelligence and National Security}, author={Cogan, Charles}, year={2004}, month={Jun}, pages={304–321} }
@article{Daniel Ellsberg, title={Secrecy and national security whistleblowing}, url={http://go.galegroup.com.ezproxy4.lib.le.ac.uk/ps/i.do?&id=GALE|A243277636&v=2.1&u=leicester&it=r&p=EAIM&sw=w}, journal={Social Research}, author={Daniel Ellsberg} }
@article{Diderichsen_Rønn_2016, title={Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics}, DOI={10.1080/02684527.2016.1270622}, journal={Intelligence and National Security}, author={Diderichsen, Adam and Rønn, Kira Vrist}, year={2016}, month={Dec}, pages={1–15} }
@article{Elizabeth E. Joh, title={Breaking the law to enforce it: undercover police participation in crime}, url={http://go.galegroup.com.ezproxy4.lib.le.ac.uk/ps/i.do?&id=GALE|A216682480&v=2.1&u=leicester&it=r&p=EAIM&sw=w&authCount=1}, journal={Stanford Law Review}, author={Elizabeth E. Joh} }
@article{Erskine_2004, title={‘As Rays of Light to the Human Soul’? Moral Agents and Intelligence Gathering}, volume={19}, DOI={10.1080/0268452042000302047}, number={2}, journal={Intelligence and National Security}, author={Erskine, Toni}, year={2004}, month={Jun}, pages={359–381} }
@article{Fussey_2013, title={Contested topologies of UK counterterrorist surveillance: the rise and fall of Project Champion}, volume={6}, DOI={10.1080/17539153.2013.823757}, number={3}, journal={Critical Studies on Terrorism}, author={Fussey, Pete}, year={2013}, month={Dec}, pages={351–370} }
@article{Gary  Kern, title={Torture and Intelligence in the Global War on Terror}, volume={24}, url={https://www-tandfonline-com.ezproxy4.lib.le.ac.uk/doi/full/10.1080/02684520903037022}, number={3}, journal={Intelligence and National Security}, publisher={Routledge}, author={Gary  Kern}, pages={429–457} }
@article{Gendron_2005, title={Just War, Just Intelligence: An Ethical Framework for Foreign Espionage}, volume={18}, DOI={10.1080/08850600590945399}, number={3}, journal={International Journal of Intelligence and CounterIntelligence}, author={Gendron, Angela}, year={2005}, month={Oct}, pages={398–434} }
@article{Gill_2007, title={Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’}, volume={22}, DOI={10.1080/02684520701200756}, number={1}, journal={Intelligence and National Security}, author={Gill, Peter}, year={2007}, month={Feb}, pages={14–37} }
@article{Gill_2009, title={Security Intelligence and Human Rights: Illuminating the ‘Heart of Darkness’?}, volume={24}, DOI={10.1080/02684520902756929}, number={1}, journal={Intelligence and National Security}, author={Gill, Peter}, year={2009}, month={Feb}, pages={78–102} }
@book{Gill_Phythian_2018, address={Cambridge, UK}, edition={Third edition}, title={Intelligence in an insecure world}, url={https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=5553458&ppg=208}, publisher={Polity}, author={Gill, Peter and Phythian, Mark}, year={2018} }
@article{Godfrey_1978, title={Ethics and Intelligence}, volume={56}, DOI={10.2307/20039922}, number={3}, journal={Foreign Affairs}, author={Godfrey, E. Drexel}, year={1978} }
@article{GROSS_2006, title={Assassination and Targeted Killing: Law Enforcement, Execution or Self-Defence?}, volume={23}, DOI={10.1111/j.1468-5930.2006.00347.x}, number={3}, journal={Journal of Applied Philosophy}, author={GROSS, MICHAEL L.}, year={2006}, month={Aug}, pages={323–335} }
@article{Harwood_2017, title={Secrecy, transparency and government whistleblowing}, volume={43}, DOI={10.1177/0191453716677178}, number={2}, journal={Philosophy & Social Criticism}, author={Harwood, William H.}, year={2017}, month={Feb}, pages={164–186} }
@article{Herman_2004, title={Ethics and Intelligence after September 2001}, volume={19}, DOI={10.1080/0268452042000302038}, number={2}, journal={Intelligence and National Security}, author={Herman, Michael}, year={2004}, month={Jun}, pages={342–358} }
@article{Isakjee_Allen_2013, title={‘A catastrophic lack of inquisitiveness’: A critical study of the impact and narrative of the Project Champion surveillance project in Birmingham}, volume={13}, DOI={10.1177/1468796813492488}, number={6}, journal={Ethnicities}, author={Isakjee, A. and Allen, C.}, year={2013}, month={Dec}, pages={751–770} }
@book{Johnson_2009, address={London}, title={Handbook of intelligence studies}, url={http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5664687050002746&institutionId=2746&customerId=2745}, publisher={Routledge}, author={Johnson, Loch K.}, year={2009} }
@article{Johnson_Aldrich_Moran_Barrett_Hastedt_Jervis_Krieger_McDermott_Omand_Phythian_et al._2014, title={An                              Special Forum: Implications of the Snowden Leaks}, volume={29}, DOI={10.1080/02684527.2014.946242}, number={6}, journal={Intelligence and National Security}, author={Johnson, Loch K. and Aldrich, Richard J. and Moran, Christopher and Barrett, David M. and Hastedt, Glenn and Jervis, Robert and Krieger, Wolfgang and McDermott, Rose and Omand, David and Phythian, Mark and Wark, Wesley K.}, year={2014}, month={Nov}, pages={793–810} }
@article{Kenneth Cukier,Viktor Mayer-Schoenberger, title={The rise of big data: how it’s changing the way we think about the world}, url={http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?&id=GALE|A329302643&v=2.1&u=leicester&it=r&p=EAIM&sw=w&authCount=1}, journal={Foreign Affairs}, author={Kenneth Cukier,Viktor Mayer-Schoenberger} }
@article{Leigh_2012, title={Rebalancing Rights and National Security: Reforming UK Intelligence Oversight a Decade after 9/11}, volume={27}, DOI={10.1080/02684527.2012.708525}, number={5}, journal={Intelligence and National Security}, author={Leigh, Ian}, year={2012}, month={Oct}, pages={722–738} }
@book{Levinson_Levinson_2004, address={New York}, title={Torture: A Collection}, url={https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=273303}, publisher={Oxford University Press}, author={Levinson, Sanford and Levinson, Sanford}, year={2004} }
@book{Lyon_Haggerty_Ball_2012, address={Abingdon, Oxon}, title={Routledge handbook of surveillance studies}, url={http://ezproxy.lib.le.ac.uk/login?url=http://lib.myilibrary.com?id=363739}, publisher={Routledge}, author={Lyon, David and Haggerty, Kevin D. and Ball, Kirstie}, year={2012} }
@article{Mantello_2016, title={The machine that ate bad people: The ontopolitics of the precrime assemblage}, volume={3}, DOI={10.1177/2053951716682538}, number={2}, journal={Big Data & Society}, author={Mantello, P.}, year={2016}, month={Dec} }
@article{Mark Phythian_2012, title={The Ethics-Intelligence Tension: Sources and Bypassing Strategies}, volume={3}, url={https://journals.flvc.org/ijie/article/view/83451}, number={2}, journal={International Journal of Intelligence Ethics}, author={Mark Phythian}, year={2012}, pages={12–36} }
@article{Müller-Wille_2006, title={Improving the democratic accountability of EU intelligence}, volume={21}, DOI={10.1080/02684520600568394}, number={1}, journal={Intelligence and National Security}, author={Müller-Wille, Björn}, year={2006}, month={Feb}, pages={100–128} }
@article{Newbery_Brecher_Sands_Stewart_2009, title={Interrogation, Intelligence and the Issue of Human Rights}, volume={24}, DOI={10.1080/02684520903209381}, number={5}, journal={Intelligence and National Security}, author={Newbery, Samantha and Brecher, Bob and Sands, Philippe and Stewart, Brian}, year={2009}, month={Oct}, pages={631–643} }
@article{Omand GCB_2006, title={Ethical Guidelines in Using Secret Intelligence for Public Security}, volume={19}, DOI={10.1080/09557570601003338}, number={4}, journal={Cambridge Review of International Affairs}, author={Omand GCB, Sir David}, year={2006}, month={Dec}, pages={613–628} }
@article{Omand_Phythian_2013, title={Ethics and Intelligence: A Debate}, volume={26}, DOI={10.1080/08850607.2012.705186}, number={1}, journal={International Journal of Intelligence and CounterIntelligence}, author={Omand, Sir David and Phythian, Mark}, year={2013}, month={Mar}, pages={38–63} }
@article{Patrick West, title={The nightmare of ‘precrime’ is already with us: Patrick West says that the science fiction of Philip K. Dick’s Minority Report has become alarming fact in the powers given to police to take against people who have committed no crime}, url={http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?&id=GALE|A171213127&v=2.1&u=leicester&it=r&p=EAIM&sw=w}, journal={Spectator}, author={Patrick West} }
@article{Pfaff_Tiel_2004, title={The ethics of espionage}, volume={3}, DOI={10.1080/15027570310004447}, number={1}, journal={Journal of Military Ethics}, author={Pfaff, Tony and Tiel, Jeffrey R.}, year={2004}, month={Mar}, pages={1–15} }
@misc{Philip_2010, title={Study on Targeted Killings, UN General Assembly Human Rights Council}, url={http://www2.ohchr.org/english/bodies/hrcouncil/docs/14session/A.HRC.14.24.Add6.pdf}, publisher={United Nations}, author={Philip, Alston}, year={2010}, month={May} }
@article{Pickard, D._2001, title={Legalizing Assassination - Terrorism, the Central Intelligence Agency, and International Law}, volume={30}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/gjicl30&id=13}, number={1}, journal={Georgia Journal of International and Comparative Law}, author={Pickard, D.}, year={2001}, pages={1–36} }
@article{Quinlan_2007, title={Just intelligence: Prolegomena to an ethical theory}, volume={22}, DOI={10.1080/02684520701200715}, number={1}, journal={Intelligence and National Security}, author={Quinlan, Michael}, year={2007}, month={Feb}, pages={1–13} }
@article{Richards_2012, title={Intelligence Dilemma? Contemporary Counter-terrorism in a Liberal Democracy}, volume={27}, DOI={10.1080/02684527.2012.708528}, number={5}, journal={Intelligence and National Security}, author={Richards, Julian}, year={2012}, month={Oct}, pages={761–780} }
@inbook{Rumney_2008, address={Basingstoke}, title={The Torture Debate: A Perspective from the United Kingdom}, url={http://ezproxy.lib.le.ac.uk/login?url=https://link.springer.com/chapter/10.1057/9780230583542_8}, DOI={10.1057/9780230583542_8}, booktitle={Intelligence, security and policing post-9/11: The UK’s response to the war on terror}, publisher={Palgrave Macmillan}, author={Rumney, Philip N. S.}, year={2008}, pages={135–156} }
@misc{Sara_2010, title={Project Champion Review}, url={http://www.statewatch.org/news/2010/oct/uk-project-champion-police-report.pdf}, publisher={Thames Valley Police}, author={Sara, Thornton}, year={2010}, month={Sep} }
@article{Scheuerman_2016, title={What Edward Snowden can teach theorists of conscientious law-breaking}, volume={42}, DOI={10.1177/0191453716631169}, number={10}, journal={Philosophy & Social Criticism}, author={Scheuerman, William E.}, year={2016}, month={Dec}, pages={958–964} }
@article{Shelton_2011, title={Framing the Oxymoron: A New Paradigm for Intelligence Ethics}, volume={26}, DOI={10.1080/02684527.2011.556358}, number={1}, journal={Intelligence and National Security}, author={Shelton, Allison M.}, year={2011}, month={Feb}, pages={23–45} }
@article{Steven Lukes_2006, title={Liberal Democratic Torture}, volume={36}, url={http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/4092313?seq=1#page_scan_tab_contents}, number={1}, journal={British Journal of Political Science}, publisher={Cambridge University PressCambridge University Press}, author={Steven Lukes}, year={2006}, pages={1–16} }
@article{Steven R. David, title={Israel’s policy of targeted killing}, url={http://go.galegroup.com.ezproxy4.lib.le.ac.uk/ps/retrieve.do?tabID=T002&resultListType=RESULT_LIST&searchResultsType=SingleTab&searchType=AdvancedSearchForm&currentPosition=1&docId=GALE%7CA109351999&docType=Article&sort=RELEVANCE&contentSegment=&prodId=EAIM&contentSet=GALE%7CA109351999&searchId=R1&userGroupName=leicester&inPS=true}, journal={Ethics & International Affairs}, author={Steven R. David} }
@article{Turner_1978, title={Ethics and Intelligence}, volume={57}, DOI={10.2307/20040062}, number={1}, journal={Foreign Affairs}, author={Turner, Stansfield}, year={1978} }
@article{Vrist Ronn_2016, title={Intelligence Ethics: A Critical Review and Future Perspectives}, volume={29}, DOI={10.1080/08850607.2016.1177399}, number={4}, journal={International Journal of Intelligence and CounterIntelligence}, author={Vrist Ronn, Kira}, year={2016}, month={Oct}, pages={760–784} }
@article{Weijers_Richardson_2014, title={Is the repugnance about betting on terrorist attacks misguided?}, volume={16}, DOI={10.1007/s10676-014-9350-9}, number={3}, journal={Ethics and Information Technology}, author={Weijers, Dan and Richardson, Jennifer}, year={2014}, month={Sep}, pages={251–262} }
@article{Wiebe, M._2003, title={Assassination in Domestic and International Law: The Central Intelligence Agency, State-Sponsored Terrorism, and the Right of Self-Defense}, volume={11}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tulcint11&id=369}, number={1}, journal={Tulsa Journal of Comparative & International Law}, author={Wiebe, M.}, year={2003} }
@article{Yoo, J._2011, title={Assassination or Targeted Killings after 9/11}, volume={56}, url={http://heinonline.org/HOL/Page?public=false&handle=hein.journals/nyls56&id=51}, number={1}, journal={New York Law School Law Review}, author={Yoo, J.}, year={2011}, pages={57–80} }
@article{Making Sense of Snowden_2013, volume={84}, DOI={10.1111/j.1467-923X.2013.12053.x}, number={4}, journal={The Political Quarterly}, year={2013}, month={Oct}, pages={433–435} }
@misc{Report on Undercover Policing Ethics Workshop_2016, url={http://www.college.police.uk/News/College-news/Documents/July_2016_Report_on_CoP_Warwick_undercover_meeting.pdf}, publisher={University of Warwick}, year={2016}, month={Jun} }
@article{A Symposium on Intelligence Ethics, volume={24}, url={https://www-tandfonline-com.ezproxy4.lib.le.ac.uk/doi/full/10.1080/02684520903036958}, number={3}, journal={Intelligence and National Security}, publisher={Routledge}, pages={366–386} }
@misc{Derbyshire Constabulary - Operation Herne, url={http://www.derbyshire.police.uk/About-us/Operation-Herne/Operation-Herne.aspx} }
@misc{Stephen Lawrence independent review - Publications - GOV.UK, url={https://www.gov.uk/government/publications/stephen-lawrence-independent-review} }
@article{Police spies stole identities of dead children | UK news | The Guardian, url={https://www.theguardian.com/uk/2013/feb/03/police-spies-identities-dead-children} }
@article{Police ‘smear’ campaign targeted Stephen Lawrence’s friends and family | UK news | The Guardian, url={https://www.theguardian.com/uk/2013/jun/23/stephen-lawrence-undercover-police-smears} }
@misc{Project Champion Scrutiny Review into ANPR and CCTV Cameras November 2010 | Birmingham City Council, url={https://www.birmingham.gov.uk/downloads/file/460/project_champion_scrutiny_review_into_anpr_and_cctv_cameras_november_2010} }
@misc{Covert surveillance and covert human intelligence sources codes of practice - Publications - GOV.UK, url={https://www.gov.uk/government/publications/covert-surveillance-and-covert-human-intelligence-sources-codes-of-practice} }
@misc{Undercover policing guide | College of Policing, url={http://www.college.police.uk/News/College-news/Pages/undercover-policing-guide.aspx} }
@article{THREATS AND RESPONSES: PLANS AND CRITICISMS; Pentagon Prepares A Futures Market On Terror Attacks - The New York Times, url={http://www.nytimes.com/2003/07/29/us/threats-responses-plans-criticisms-pentagon-prepares-futures-market-terror.html} }
@article{Policy Analysis Market and the Political Yuck., url={http://www.sirc.org/articles/policy_analysis.shtml} }
@misc{Pentagon cancels futures market on terror | New Scientist, url={https://www.newscientist.com/article/dn4007-pentagon-cancels-futures-market-on-terror/} }
@article{The new way police are surveilling you: Calculating your threat ‘score’ - The Washington Post, url={https://www.washingtonpost.com/local/public-safety/the-new-way-police-are-surveilling-you-calculating-your-threat-score/2016/01/10/e42bccac-8e15-11e5-baf4-bdf37355da0c_story.html?postshare=771452528554762&tid=ss_tw-bottom&utm_term=.c26ab463bf72} }
@misc{Predictive Policing a Success in Santa Cruz, Calif., url={http://www.govtech.com/public-safety/Predictive-Policing-a-Success-in-Santa-Cruz-Calif.html} }
@misc{U.S. Senate Select Committee on Intelligence - Report on Study of the CIA’s Detention and Interrogation Program, url={http://www.intelligence.senate.gov/study2014.html}, publisher={US Senate Select Committee on Intelligence} }
@misc{Watching ‘Zero Dark Thirty’ with the CIA: Separating Fact from Fiction, url={http://www.aei.org/wp-content/uploads/2013/01/-event-transcript_111915959376.pdf}, publisher={American Enterprise Institute} }
@misc{How Edward Snowden went from loyal NSA contractor to whistleblower | US news | The Guardian, url={http://www.theguardian.com/world/2014/feb/01/edward-snowden-intelligence-leak-nsa-contractor-extract} }