1.
Herman M. Ethics and Intelligence after September 2001. Intelligence and National Security. 2004 Jun;19(2):342–358.
2.
Mark Phythian. The Ethics-Intelligence Tension: Sources and Bypassing Strategies. International Journal of Intelligence Ethics [Internet]. 2012;3(2):12–36. Available from: https://journals.flvc.org/ijie/article/view/83451
3.
A Symposium on Intelligence Ethics. Intelligence and National Security [Internet]. Routledge; 24(3):366–386. Available from: https://www-tandfonline-com.ezproxy4.lib.le.ac.uk/doi/full/10.1080/02684520903036958
4.
Turner S. Ethics and Intelligence. Foreign Affairs. 1978;57(1).
5.
Godfrey ED. Ethics and Intelligence. Foreign Affairs. 1978;56(3).
6.
Erskine T. ‘As Rays of Light to the Human Soul’? Moral Agents and Intelligence Gathering. Intelligence and National Security. 2004 Jun;19(2):359–381.
7.
Pfaff T, Tiel JR. The ethics of espionage. Journal of Military Ethics. 2004 Mar;3(1):1–15.
8.
Gill P. Security Intelligence and Human Rights: Illuminating the ‘Heart of Darkness’? Intelligence and National Security. 2009 Feb;24(1):78–102.
9.
Omand SD, Phythian M. Ethics and Intelligence: A Debate. International Journal of Intelligence and CounterIntelligence. 2013 Mar;26(1):38–63.
10.
Omand GCB SD. Ethical Guidelines in Using Secret Intelligence for Public Security. Cambridge Review of International Affairs. 2006 Dec;19(4):613–628.
11.
Bar-Joseph U. The Professional Ethics of Intelligence Analysis. International Journal of Intelligence and CounterIntelligence. 2010 Nov 30;24(1):22–43.
12.
Cogan C. Hunters not Gatherers: Intelligence in the Twenty-First Century. Intelligence and National Security. 2004 Jun;19(2):304–321.
13.
Vrist Ronn K. Intelligence Ethics: A Critical Review and Future Perspectives. International Journal of Intelligence and CounterIntelligence. 2016 Oct;29(4):760–784.
14.
Quinlan M. Just intelligence: Prolegomena to an ethical theory. Intelligence and National Security. 2007 Feb;22(1):1–13.
15.
Bellaby R. What’s the Harm? The Ethics of Intelligence Collection. Intelligence and National Security. 2012 Feb;27(1):93–117.
16.
Gendron A. Just War, Just Intelligence: An Ethical Framework for Foreign Espionage. International Journal of Intelligence and CounterIntelligence. 2005 Oct;18(3):398–434.
17.
Diderichsen A, Rønn KV. Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics. Intelligence and National Security. 2016 Dec 30;1–15.
18.
Derbyshire Constabulary - Operation Herne [Internet]. Available from: http://www.derbyshire.police.uk/About-us/Operation-Herne/Operation-Herne.aspx
19.
Bonino S, Kaoullas LG. Preventing Political Violence in Britain: An Evaluation of over Forty Years of Undercover Policing of Political Groups Involved in Protest. Studies in Conflict & Terrorism. 2015 Oct 3;38(10):814–840.
20.
Elizabeth E. Joh. Breaking the law to enforce it: undercover police participation in crime. Stanford Law Review [Internet]. Available from: http://go.galegroup.com.ezproxy4.lib.le.ac.uk/ps/i.do?&id=GALE|A216682480&v=2.1&u=leicester&it=r&p=EAIM&sw=w&authCount=1
21.
Stephen Lawrence independent review - Publications - GOV.UK [Internet]. Available from: https://www.gov.uk/government/publications/stephen-lawrence-independent-review
22.
Police spies stole identities of dead children | UK news | The Guardian. Available from: https://www.theguardian.com/uk/2013/feb/03/police-spies-identities-dead-children
23.
Police ‘smear’ campaign targeted Stephen Lawrence’s friends and family | UK news | The Guardian. Available from: https://www.theguardian.com/uk/2013/jun/23/stephen-lawrence-undercover-police-smears
24.
Sara T. Project Champion Review [Internet]. Thames Valley Police; 2010. Available from: http://www.statewatch.org/news/2010/oct/uk-project-champion-police-report.pdf
25.
Project Champion Scrutiny Review into ANPR and CCTV Cameras November 2010 | Birmingham City Council [Internet]. Available from: https://www.birmingham.gov.uk/downloads/file/460/project_champion_scrutiny_review_into_anpr_and_cctv_cameras_november_2010
26.
Fussey P. Contested topologies of UK counterterrorist surveillance: the rise and fall of Project Champion. Critical Studies on Terrorism. 2013 Dec;6(3):351–370.
27.
Isakjee A, Allen C. ‘A catastrophic lack of inquisitiveness’: A critical study of the impact and narrative of the Project Champion surveillance project in Birmingham. Ethnicities. 2013 Dec 1;13(6):751–770.
28.
Lyon D, Haggerty KD, Ball K. Routledge handbook of surveillance studies [Internet]. Abingdon, Oxon: Routledge; 2012. Available from: http://ezproxy.lib.le.ac.uk/login?url=http://lib.myilibrary.com?id=363739
29.
Covert surveillance and covert human intelligence sources codes of practice - Publications - GOV.UK [Internet]. Available from: https://www.gov.uk/government/publications/covert-surveillance-and-covert-human-intelligence-sources-codes-of-practice
30.
Undercover policing guide | College of Policing [Internet]. Available from: http://www.college.police.uk/News/College-news/Pages/undercover-policing-guide.aspx
31.
Report on Undercover Policing Ethics Workshop [Internet]. University of Warwick; 2016. Available from: http://www.college.police.uk/News/College-news/Documents/July_2016_Report_on_CoP_Warwick_undercover_meeting.pdf
32.
THREATS AND RESPONSES: PLANS AND CRITICISMS; Pentagon Prepares A Futures Market On Terror Attacks - The New York Times. Available from: http://www.nytimes.com/2003/07/29/us/threats-responses-plans-criticisms-pentagon-prepares-futures-market-terror.html
33.
Weijers D, Richardson J. Is the repugnance about betting on terrorist attacks misguided? Ethics and Information Technology. 2014 Sep;16(3):251–262.
34.
Policy Analysis Market and the Political Yuck. Available from: http://www.sirc.org/articles/policy_analysis.shtml
35.
Pentagon cancels futures market on terror | New Scientist [Internet]. Available from: https://www.newscientist.com/article/dn4007-pentagon-cancels-futures-market-on-terror/
36.
Mantello P. The machine that ate bad people: The ontopolitics of the precrime assemblage. Big Data & Society. 2016 Dec 12;3(2).
37.
The new way police are surveilling you: Calculating your threat ‘score’ - The Washington Post. Available from: https://www.washingtonpost.com/local/public-safety/the-new-way-police-are-surveilling-you-calculating-your-threat-score/2016/01/10/e42bccac-8e15-11e5-baf4-bdf37355da0c_story.html?postshare=771452528554762&tid=ss_tw-bottom&utm_term=.c26ab463bf72
38.
Patrick West. The nightmare of ‘precrime’ is already with us: Patrick West says that the science fiction of Philip K. Dick’s Minority Report has become alarming fact in the powers given to police to take against people who have committed no crime. Spectator [Internet]. Available from: http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?&id=GALE|A171213127&v=2.1&u=leicester&it=r&p=EAIM&sw=w
39.
Predictive Policing a Success in Santa Cruz, Calif. [Internet]. Available from: http://www.govtech.com/public-safety/Predictive-Policing-a-Success-in-Santa-Cruz-Calif.html
40.
Kenneth Cukier,Viktor Mayer-Schoenberger. The rise of big data: how it’s changing the way we think about the world. Foreign Affairs [Internet]. Available from: http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?&id=GALE|A329302643&v=2.1&u=leicester&it=r&p=EAIM&sw=w&authCount=1
41.
Levinson S, Levinson S. Torture: A Collection [Internet]. New York: Oxford University Press; 2004. Available from: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=273303
42.
Alex J. Bellamy. No Pain, No Gain? Torture and Ethics in the War on Terror. International Affairs (Royal Institute of International Affairs 1944-) [Internet]. WileyRoyal Institute of International AffairsRoyal Institute of International Affairs; 2006;82(1):121–148. Available from: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3569133?seq=1#page_scan_tab_contents
43.
Rumney PNS. The Torture Debate: A Perspective from the United Kingdom. Intelligence, security and policing post-9/11: The UK’s response to the war on terror [Internet]. Basingstoke: Palgrave Macmillan; 2008. p. 135–156. Available from: http://ezproxy.lib.le.ac.uk/login?url=https://link.springer.com/chapter/10.1057/9780230583542_8
44.
Gary  Kern. Torture and Intelligence in the Global War on Terror. Intelligence and National Security [Internet]. Routledge; 24(3):429–457. Available from: https://www-tandfonline-com.ezproxy4.lib.le.ac.uk/doi/full/10.1080/02684520903037022
45.
U.S. Senate Select Committee on Intelligence - Report on Study of the CIA’s Detention and Interrogation Program [Internet]. US Senate Select Committee on Intelligence; Available from: http://www.intelligence.senate.gov/study2014.html
46.
Steven Lukes. Liberal Democratic Torture. British Journal of Political Science [Internet]. Cambridge University PressCambridge University Press; 2006;36(1):1–16. Available from: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/4092313?seq=1#page_scan_tab_contents
47.
Watching ‘Zero Dark Thirty’ with the CIA: Separating Fact from Fiction [Internet]. American Enterprise Institute; Available from: http://www.aei.org/wp-content/uploads/2013/01/-event-transcript_111915959376.pdf
48.
Newbery S, Brecher B, Sands P, Stewart B. Interrogation, Intelligence and the Issue of Human Rights. Intelligence and National Security. 2009 Oct;24(5):631–643.
49.
Avery Plaw. Terminating Terror: The Legality, Ethics and Effectiveness of Targeting Terrorists. Theoria: A Journal of Social and Political Theory [Internet]. Berghahn BooksFaculty of Humanities, Development and Social Sciences, University of KwaZulu-Natal, South AfricaBerghahn Books; 2007;(114):1–27. Available from: http://www.jstor.org.ezproxy4.lib.le.ac.uk/stable/41802380?seq=1#page_scan_tab_contents
50.
Philip A. Study on Targeted Killings, UN General Assembly Human Rights Council [Internet]. United Nations; 2010. Available from: http://www2.ohchr.org/english/bodies/hrcouncil/docs/14session/A.HRC.14.24.Add6.pdf
51.
Shelton AM. Framing the Oxymoron: A New Paradigm for Intelligence Ethics. Intelligence and National Security. 2011 Feb;26(1):23–45.
52.
Steven R. David. Israel’s policy of targeted killing. Ethics & International Affairs [Internet]. Available from: http://go.galegroup.com.ezproxy4.lib.le.ac.uk/ps/retrieve.do?tabID=T002&resultListType=RESULT_LIST&searchResultsType=SingleTab&searchType=AdvancedSearchForm&currentPosition=1&docId=GALE%7CA109351999&docType=Article&sort=RELEVANCE&contentSegment=&prodId=EAIM&contentSet=GALE%7CA109351999&searchId=R1&userGroupName=leicester&inPS=true
53.
GROSS ML. Assassination and Targeted Killing: Law Enforcement, Execution or Self-Defence? Journal of Applied Philosophy. 2006 Aug;23(3):323–335.
54.
Pickard, D. Legalizing Assassination - Terrorism, the Central Intelligence Agency, and International Law. Georgia Journal of International and Comparative Law [Internet]. 2001;30(1):1–36. Available from: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/gjicl30&id=13
55.
Wiebe, M. Assassination in Domestic and International Law: The Central Intelligence Agency, State-Sponsored Terrorism, and the Right of Self-Defense. Tulsa Journal of Comparative & International Law [Internet]. 2003;11(1). Available from: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tulcint11&id=369
56.
Yoo, J. Assassination or Targeted Killings after 9/11. New York Law School Law Review [Internet]. 2011;56(1):57–80. Available from: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/nyls56&id=51
57.
Scheuerman WE. What Edward Snowden can teach theorists of conscientious law-breaking. Philosophy & Social Criticism. 2016 Dec;42(10):958–964.
58.
Brownlee K. The civil disobedience of Edward Snowden. Philosophy & Social Criticism. 2016 Dec;42(10):965–970.
59.
Daniel Ellsberg. Secrecy and national security whistleblowing. Social Research [Internet]. Available from: http://go.galegroup.com.ezproxy4.lib.le.ac.uk/ps/i.do?&id=GALE|A243277636&v=2.1&u=leicester&it=r&p=EAIM&sw=w
60.
Harwood WH. Secrecy, transparency and government whistleblowing. Philosophy & Social Criticism. 2017 Feb;43(2):164–186.
61.
Johnson LK, Aldrich RJ, Moran C, Barrett DM, Hastedt G, Jervis R, Krieger W, McDermott R, Omand D, Phythian M, Wark WK. An                              Special Forum: Implications of the Snowden Leaks. Intelligence and National Security. 2014 Nov 2;29(6):793–810.
62.
How Edward Snowden went from loyal NSA contractor to whistleblower | US news | The Guardian [Internet]. Available from: http://www.theguardian.com/world/2014/feb/01/edward-snowden-intelligence-leak-nsa-contractor-extract
63.
Making Sense of Snowden. The Political Quarterly. 2013 Oct;84(4):433–435.
64.
Bauman Z, Bigo D, Esteves P, Guild E, Jabri V, Lyon D, Walker RBJ. After Snowden: Rethinking the Impact of Surveillance. International Political Sociology. 2014 Jun;8(2):121–144.
65.
Gill P, Phythian M. Intelligence in an insecure world [Internet]. Third edition. Cambridge, UK: Polity; 2018. Available from: https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=5553458&ppg=208
66.
Richards J. Intelligence Dilemma? Contemporary Counter-terrorism in a Liberal Democracy. Intelligence and National Security. 2012 Oct;27(5):761–780.
67.
Johnson LK. Handbook of intelligence studies [Internet]. London: Routledge; 2009. Available from: http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5664687050002746&institutionId=2746&customerId=2745
68.
den Boer M, van Buuren J. SECURITY CLOUDS. Journal of Cultural Economy. 2012 Feb;5(1):85–103.
69.
Gill P. Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the ‘war on terror’. Intelligence and National Security. 2007 Feb;22(1):14–37.
70.
Leigh I. Rebalancing Rights and National Security: Reforming UK Intelligence Oversight a Decade after 9/11. Intelligence and National Security. 2012 Oct;27(5):722–738.
71.
Boraz SC. Establishing Democratic Control of Intelligence in Colombia. International Journal of Intelligence and CounterIntelligence. 2006 Jan;19(1):84–109.
72.
Müller-Wille B. Improving the democratic accountability of EU intelligence. Intelligence and National Security. 2006 Feb;21(1):100–128.