[1]
M. Herman, ‘Ethics and Intelligence after September 2001’, Intelligence and National Security, vol. 19, no. 2, pp. 342–358, Jun. 2004, doi: 10.1080/0268452042000302038.
[2]
Mark Phythian, ‘The Ethics-Intelligence Tension: Sources and Bypassing Strategies’, International Journal of Intelligence Ethics, vol. 3, no. 2, pp. 12–36, 2012 [Online]. Available: https://journals.flvc.org/ijie/article/view/83451
[3]
‘A Symposium on Intelligence Ethics’, Intelligence and National Security, vol. 24, no. 3, pp. 366–386 [Online]. Available: https://www-tandfonline-com.ezproxy4.lib.le.ac.uk/doi/full/10.1080/02684520903036958
[4]
S. Turner, ‘Ethics and Intelligence’, Foreign Affairs, vol. 57, no. 1, 1978, doi: 10.2307/20040062.
[5]
E. D. Godfrey, ‘Ethics and Intelligence’, Foreign Affairs, vol. 56, no. 3, 1978, doi: 10.2307/20039922.
[6]
T. Erskine, ‘“As Rays of Light to the Human Soul”? Moral Agents and Intelligence Gathering’, Intelligence and National Security, vol. 19, no. 2, pp. 359–381, Jun. 2004, doi: 10.1080/0268452042000302047.
[7]
T. Pfaff and J. R. Tiel, ‘The ethics of espionage’, Journal of Military Ethics, vol. 3, no. 1, pp. 1–15, Mar. 2004, doi: 10.1080/15027570310004447.
[8]
P. Gill, ‘Security Intelligence and Human Rights: Illuminating the “Heart of Darkness”?’, Intelligence and National Security, vol. 24, no. 1, pp. 78–102, Feb. 2009, doi: 10.1080/02684520902756929.
[9]
S. D. Omand and M. Phythian, ‘Ethics and Intelligence: A Debate’, International Journal of Intelligence and CounterIntelligence, vol. 26, no. 1, pp. 38–63, Mar. 2013, doi: 10.1080/08850607.2012.705186.
[10]
S. D. Omand GCB, ‘Ethical Guidelines in Using Secret Intelligence for Public Security’, Cambridge Review of International Affairs, vol. 19, no. 4, pp. 613–628, Dec. 2006, doi: 10.1080/09557570601003338.
[11]
U. Bar-Joseph, ‘The Professional Ethics of Intelligence Analysis’, International Journal of Intelligence and CounterIntelligence, vol. 24, no. 1, pp. 22–43, Nov. 2010, doi: 10.1080/08850607.2011.519222.
[12]
C. Cogan, ‘Hunters not Gatherers: Intelligence in the Twenty-First Century’, Intelligence and National Security, vol. 19, no. 2, pp. 304–321, Jun. 2004, doi: 10.1080/0268452042000302010.
[13]
K. Vrist Ronn, ‘Intelligence Ethics: A Critical Review and Future Perspectives’, International Journal of Intelligence and CounterIntelligence, vol. 29, no. 4, pp. 760–784, Oct. 2016, doi: 10.1080/08850607.2016.1177399.
[14]
M. Quinlan, ‘Just intelligence: Prolegomena to an ethical theory’, Intelligence and National Security, vol. 22, no. 1, pp. 1–13, Feb. 2007, doi: 10.1080/02684520701200715.
[15]
R. Bellaby, ‘What’s the Harm? The Ethics of Intelligence Collection’, Intelligence and National Security, vol. 27, no. 1, pp. 93–117, Feb. 2012, doi: 10.1080/02684527.2012.621600.
[16]
A. Gendron, ‘Just War, Just Intelligence: An Ethical Framework for Foreign Espionage’, International Journal of Intelligence and CounterIntelligence, vol. 18, no. 3, pp. 398–434, Oct. 2005, doi: 10.1080/08850600590945399.
[17]
A. Diderichsen and K. V. Rønn, ‘Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics’, Intelligence and National Security, pp. 1–15, Dec. 2016, doi: 10.1080/02684527.2016.1270622.
[18]
‘Derbyshire Constabulary - Operation Herne’. [Online]. Available: http://www.derbyshire.police.uk/About-us/Operation-Herne/Operation-Herne.aspx
[19]
S. Bonino and L. G. Kaoullas, ‘Preventing Political Violence in Britain: An Evaluation of over Forty Years of Undercover Policing of Political Groups Involved in Protest’, Studies in Conflict & Terrorism, vol. 38, no. 10, pp. 814–840, Oct. 2015, doi: 10.1080/1057610X.2015.1059102.
[20]
Elizabeth E. Joh, ‘Breaking the law to enforce it: undercover police participation in crime’, Stanford Law Review [Online]. Available: http://go.galegroup.com.ezproxy4.lib.le.ac.uk/ps/i.do?&id=GALE|A216682480&v=2.1&u=leicester&it=r&p=EAIM&sw=w&authCount=1
[21]
‘Stephen Lawrence independent review - Publications - GOV.UK’. [Online]. Available: https://www.gov.uk/government/publications/stephen-lawrence-independent-review
[22]
‘Police spies stole identities of dead children | UK news | The Guardian’ [Online]. Available: https://www.theguardian.com/uk/2013/feb/03/police-spies-identities-dead-children
[23]
‘Police “smear” campaign targeted Stephen Lawrence’s friends and family | UK news | The Guardian’ [Online]. Available: https://www.theguardian.com/uk/2013/jun/23/stephen-lawrence-undercover-police-smears
[24]
T. Sara, ‘Project Champion Review’. Thames Valley Police, Sep. 30, 2010 [Online]. Available: http://www.statewatch.org/news/2010/oct/uk-project-champion-police-report.pdf
[25]
‘Project Champion Scrutiny Review into ANPR and CCTV Cameras November 2010 | Birmingham City Council’. [Online]. Available: https://www.birmingham.gov.uk/downloads/file/460/project_champion_scrutiny_review_into_anpr_and_cctv_cameras_november_2010
[26]
P. Fussey, ‘Contested topologies of UK counterterrorist surveillance: the rise and fall of Project Champion’, Critical Studies on Terrorism, vol. 6, no. 3, pp. 351–370, Dec. 2013, doi: 10.1080/17539153.2013.823757.
[27]
A. Isakjee and C. Allen, ‘“A catastrophic lack of inquisitiveness”: A critical study of the impact and narrative of the Project Champion surveillance project in Birmingham’, Ethnicities, vol. 13, no. 6, pp. 751–770, Dec. 2013, doi: 10.1177/1468796813492488.
[28]
D. Lyon, K. D. Haggerty, and K. Ball, Routledge handbook of surveillance studies. Abingdon, Oxon: Routledge, 2012 [Online]. Available: http://ezproxy.lib.le.ac.uk/login?url=http://lib.myilibrary.com?id=363739
[29]
‘Covert surveillance and covert human intelligence sources codes of practice - Publications - GOV.UK’. [Online]. Available: https://www.gov.uk/government/publications/covert-surveillance-and-covert-human-intelligence-sources-codes-of-practice
[30]
‘Undercover policing guide | College of Policing’. [Online]. Available: http://www.college.police.uk/News/College-news/Pages/undercover-policing-guide.aspx
[31]
‘Report on Undercover Policing Ethics Workshop’. University of Warwick, Jun. 10, 2016 [Online]. Available: http://www.college.police.uk/News/College-news/Documents/July_2016_Report_on_CoP_Warwick_undercover_meeting.pdf
[32]
‘THREATS AND RESPONSES: PLANS AND CRITICISMS; Pentagon Prepares A Futures Market On Terror Attacks - The New York Times’ [Online]. Available: http://www.nytimes.com/2003/07/29/us/threats-responses-plans-criticisms-pentagon-prepares-futures-market-terror.html
[33]
D. Weijers and J. Richardson, ‘Is the repugnance about betting on terrorist attacks misguided?’, Ethics and Information Technology, vol. 16, no. 3, pp. 251–262, Sep. 2014, doi: 10.1007/s10676-014-9350-9.
[34]
‘Policy Analysis Market and the Political Yuck.’ [Online]. Available: http://www.sirc.org/articles/policy_analysis.shtml
[35]
‘Pentagon cancels futures market on terror | New Scientist’. [Online]. Available: https://www.newscientist.com/article/dn4007-pentagon-cancels-futures-market-on-terror/
[36]
P. Mantello, ‘The machine that ate bad people: The ontopolitics of the precrime assemblage’, Big Data & Society, vol. 3, no. 2, Dec. 2016, doi: 10.1177/2053951716682538.
[37]
‘The new way police are surveilling you: Calculating your threat “score” - The Washington Post’ [Online]. Available: https://www.washingtonpost.com/local/public-safety/the-new-way-police-are-surveilling-you-calculating-your-threat-score/2016/01/10/e42bccac-8e15-11e5-baf4-bdf37355da0c_story.html?postshare=771452528554762&tid=ss_tw-bottom&utm_term=.c26ab463bf72
[38]
Patrick West, ‘The nightmare of “precrime” is already with us: Patrick West says that the science fiction of Philip K. Dick’s Minority Report has become alarming fact in the powers given to police to take against people who have committed no crime’, Spectator [Online]. Available: http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?&id=GALE|A171213127&v=2.1&u=leicester&it=r&p=EAIM&sw=w
[39]
‘Predictive Policing a Success in Santa Cruz, Calif.’ [Online]. Available: http://www.govtech.com/public-safety/Predictive-Policing-a-Success-in-Santa-Cruz-Calif.html
[40]
Kenneth Cukier,Viktor Mayer-Schoenberger, ‘The rise of big data: how it’s changing the way we think about the world’, Foreign Affairs [Online]. Available: http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?&id=GALE|A329302643&v=2.1&u=leicester&it=r&p=EAIM&sw=w&authCount=1
[41]
S. Levinson and S. Levinson, Torture: A Collection. New York: Oxford University Press, 2004 [Online]. Available: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=273303
[42]
Alex J. Bellamy, ‘No Pain, No Gain? Torture and Ethics in the War on Terror’, International Affairs (Royal Institute of International Affairs 1944-), vol. 82, no. 1, pp. 121–148, 2006 [Online]. Available: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3569133?seq=1#page_scan_tab_contents
[43]
P. N. S. Rumney, ‘The Torture Debate: A Perspective from the United Kingdom’, in Intelligence, security and policing post-9/11: The UK’s response to the war on terror, Basingstoke: Palgrave Macmillan, 2008, pp. 135–156 [Online]. Available: http://ezproxy.lib.le.ac.uk/login?url=https://link.springer.com/chapter/10.1057/9780230583542_8
[44]
Gary  Kern, ‘Torture and Intelligence in the Global War on Terror’, Intelligence and National Security, vol. 24, no. 3, pp. 429–457 [Online]. Available: https://www-tandfonline-com.ezproxy4.lib.le.ac.uk/doi/full/10.1080/02684520903037022
[45]
‘U.S. Senate Select Committee on Intelligence - Report on Study of the CIA’s Detention and Interrogation Program’. [Online]. Available: http://www.intelligence.senate.gov/study2014.html
[46]
Steven Lukes, ‘Liberal Democratic Torture’, British Journal of Political Science, vol. 36, no. 1, pp. 1–16, 2006 [Online]. Available: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/4092313?seq=1#page_scan_tab_contents
[47]
‘Watching “Zero Dark Thirty” with the CIA: Separating Fact from Fiction’. American Enterprise Institute [Online]. Available: http://www.aei.org/wp-content/uploads/2013/01/-event-transcript_111915959376.pdf
[48]
S. Newbery, B. Brecher, P. Sands, and B. Stewart, ‘Interrogation, Intelligence and the Issue of Human Rights’, Intelligence and National Security, vol. 24, no. 5, pp. 631–643, Oct. 2009, doi: 10.1080/02684520903209381.
[49]
Avery Plaw, ‘Terminating Terror: The Legality, Ethics and Effectiveness of Targeting Terrorists’, Theoria: A Journal of Social and Political Theory, no. 114, pp. 1–27, 2007 [Online]. Available: http://www.jstor.org.ezproxy4.lib.le.ac.uk/stable/41802380?seq=1#page_scan_tab_contents
[50]
A. Philip, ‘Study on Targeted Killings, UN General Assembly Human Rights Council’. United Nations, May 28, 2010 [Online]. Available: http://www2.ohchr.org/english/bodies/hrcouncil/docs/14session/A.HRC.14.24.Add6.pdf
[51]
A. M. Shelton, ‘Framing the Oxymoron: A New Paradigm for Intelligence Ethics’, Intelligence and National Security, vol. 26, no. 1, pp. 23–45, Feb. 2011, doi: 10.1080/02684527.2011.556358.
[52]
Steven R. David, ‘Israel’s policy of targeted killing’, Ethics & International Affairs [Online]. Available: http://go.galegroup.com.ezproxy4.lib.le.ac.uk/ps/retrieve.do?tabID=T002&resultListType=RESULT_LIST&searchResultsType=SingleTab&searchType=AdvancedSearchForm&currentPosition=1&docId=GALE%7CA109351999&docType=Article&sort=RELEVANCE&contentSegment=&prodId=EAIM&contentSet=GALE%7CA109351999&searchId=R1&userGroupName=leicester&inPS=true
[53]
M. L. GROSS, ‘Assassination and Targeted Killing: Law Enforcement, Execution or Self-Defence?’, Journal of Applied Philosophy, vol. 23, no. 3, pp. 323–335, Aug. 2006, doi: 10.1111/j.1468-5930.2006.00347.x.
[54]
Pickard, D., ‘Legalizing Assassination - Terrorism, the Central Intelligence Agency, and International Law’, Georgia Journal of International and Comparative Law, vol. 30, no. 1, pp. 1–36, 2001 [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/gjicl30&id=13
[55]
Wiebe, M., ‘Assassination in Domestic and International Law: The Central Intelligence Agency, State-Sponsored Terrorism, and the Right of Self-Defense’, Tulsa Journal of Comparative & International Law, vol. 11, no. 1, 2003 [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tulcint11&id=369
[56]
Yoo, J., ‘Assassination or Targeted Killings after 9/11’, New York Law School Law Review, vol. 56, no. 1, pp. 57–80, 2011 [Online]. Available: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/nyls56&id=51
[57]
W. E. Scheuerman, ‘What Edward Snowden can teach theorists of conscientious law-breaking’, Philosophy & Social Criticism, vol. 42, no. 10, pp. 958–964, Dec. 2016, doi: 10.1177/0191453716631169.
[58]
K. Brownlee, ‘The civil disobedience of Edward Snowden’, Philosophy & Social Criticism, vol. 42, no. 10, pp. 965–970, Dec. 2016, doi: 10.1177/0191453716631167.
[59]
Daniel Ellsberg, ‘Secrecy and national security whistleblowing’, Social Research [Online]. Available: http://go.galegroup.com.ezproxy4.lib.le.ac.uk/ps/i.do?&id=GALE|A243277636&v=2.1&u=leicester&it=r&p=EAIM&sw=w
[60]
W. H. Harwood, ‘Secrecy, transparency and government whistleblowing’, Philosophy & Social Criticism, vol. 43, no. 2, pp. 164–186, Feb. 2017, doi: 10.1177/0191453716677178.
[61]
L. K. Johnson et al., ‘An                              Special Forum: Implications of the Snowden Leaks’, Intelligence and National Security, vol. 29, no. 6, pp. 793–810, Nov. 2014, doi: 10.1080/02684527.2014.946242.
[62]
‘How Edward Snowden went from loyal NSA contractor to whistleblower | US news | The Guardian’. [Online]. Available: http://www.theguardian.com/world/2014/feb/01/edward-snowden-intelligence-leak-nsa-contractor-extract
[63]
‘Making Sense of Snowden’, The Political Quarterly, vol. 84, no. 4, pp. 433–435, Oct. 2013, doi: 10.1111/j.1467-923X.2013.12053.x.
[64]
Z. Bauman et al., ‘After Snowden: Rethinking the Impact of Surveillance’, International Political Sociology, vol. 8, no. 2, pp. 121–144, Jun. 2014, doi: 10.1111/ips.12048.
[65]
P. Gill and M. Phythian, Intelligence in an insecure world, Third edition. Cambridge, UK: Polity, 2018 [Online]. Available: https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=5553458&ppg=208
[66]
J. Richards, ‘Intelligence Dilemma? Contemporary Counter-terrorism in a Liberal Democracy’, Intelligence and National Security, vol. 27, no. 5, pp. 761–780, Oct. 2012, doi: 10.1080/02684527.2012.708528.
[67]
L. K. Johnson, Handbook of intelligence studies. London: Routledge, 2009 [Online]. Available: http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5664687050002746&institutionId=2746&customerId=2745
[68]
M. den Boer and J. van Buuren, ‘SECURITY CLOUDS’, Journal of Cultural Economy, vol. 5, no. 1, pp. 85–103, Feb. 2012, doi: 10.1080/17530350.2012.640558.
[69]
P. Gill, ‘Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the “war on terror”’, Intelligence and National Security, vol. 22, no. 1, pp. 14–37, Feb. 2007, doi: 10.1080/02684520701200756.
[70]
I. Leigh, ‘Rebalancing Rights and National Security: Reforming UK Intelligence Oversight a Decade after 9/11’, Intelligence and National Security, vol. 27, no. 5, pp. 722–738, Oct. 2012, doi: 10.1080/02684527.2012.708525.
[71]
S. C. Boraz, ‘Establishing Democratic Control of Intelligence in Colombia’, International Journal of Intelligence and CounterIntelligence, vol. 19, no. 1, pp. 84–109, Jan. 2006, doi: 10.1080/08850600500177168.
[72]
B. Müller-Wille, ‘Improving the democratic accountability of EU intelligence’, Intelligence and National Security, vol. 21, no. 1, pp. 100–128, Feb. 2006, doi: 10.1080/02684520600568394.