‘A Symposium on Intelligence Ethics’ (no date) Intelligence and National Security, 24(3), pp. 366–386. Available at: https://www-tandfonline-com.ezproxy4.lib.le.ac.uk/doi/full/10.1080/02684520903036958.
Alex J. Bellamy (2006) ‘No Pain, No Gain? Torture and Ethics in the War on Terror’, International Affairs (Royal Institute of International Affairs 1944-), 82(1), pp. 121–148. Available at: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/3569133?seq=1#page_scan_tab_contents.
Avery Plaw (2007) ‘Terminating Terror: The Legality, Ethics and Effectiveness of Targeting Terrorists’, Theoria: A Journal of Social and Political Theory, (114), pp. 1–27. Available at: http://www.jstor.org.ezproxy4.lib.le.ac.uk/stable/41802380?seq=1#page_scan_tab_contents.
Bar-Joseph, U. (2010) ‘The Professional Ethics of Intelligence Analysis’, International Journal of Intelligence and CounterIntelligence, 24(1), pp. 22–43. Available at: https://doi.org/10.1080/08850607.2011.519222.
Bauman, Z. et al. (2014) ‘After Snowden: Rethinking the Impact of Surveillance’, International Political Sociology, 8(2), pp. 121–144. Available at: https://doi.org/10.1111/ips.12048.
Bellaby, R. (2012) ‘What’s the Harm? The Ethics of Intelligence Collection’, Intelligence and National Security, 27(1), pp. 93–117. Available at: https://doi.org/10.1080/02684527.2012.621600.
den Boer, M. and van Buuren, J. (2012) ‘SECURITY CLOUDS’, Journal of Cultural Economy, 5(1), pp. 85–103. Available at: https://doi.org/10.1080/17530350.2012.640558.
Bonino, S. and Kaoullas, L.G. (2015) ‘Preventing Political Violence in Britain: An Evaluation of over Forty Years of Undercover Policing of Political Groups Involved in Protest’, Studies in Conflict & Terrorism, 38(10), pp. 814–840. Available at: https://doi.org/10.1080/1057610X.2015.1059102.
Boraz, S.C. (2006) ‘Establishing Democratic Control of Intelligence in Colombia’, International Journal of Intelligence and CounterIntelligence, 19(1), pp. 84–109. Available at: https://doi.org/10.1080/08850600500177168.
Brownlee, K. (2016) ‘The civil disobedience of Edward Snowden’, Philosophy & Social Criticism, 42(10), pp. 965–970. Available at: https://doi.org/10.1177/0191453716631167.
Cogan, C. (2004) ‘Hunters not Gatherers: Intelligence in the Twenty-First Century’, Intelligence and National Security, 19(2), pp. 304–321. Available at: https://doi.org/10.1080/0268452042000302010.
Covert surveillance and covert human intelligence sources codes of practice - Publications - GOV.UK (no date). Available at: https://www.gov.uk/government/publications/covert-surveillance-and-covert-human-intelligence-sources-codes-of-practice.
Daniel Ellsberg (no date) ‘Secrecy and national security whistleblowing’, Social Research [Preprint]. Available at: http://go.galegroup.com.ezproxy4.lib.le.ac.uk/ps/i.do?&id=GALE|A243277636&v=2.1&u=leicester&it=r&p=EAIM&sw=w.
Derbyshire Constabulary - Operation Herne (no date). Available at: http://www.derbyshire.police.uk/About-us/Operation-Herne/Operation-Herne.aspx.
Diderichsen, A. and Rønn, K.V. (2016) ‘Intelligence by consent: on the inadequacy of Just War Theory as a framework for intelligence ethics’, Intelligence and National Security, pp. 1–15. Available at: https://doi.org/10.1080/02684527.2016.1270622.
Elizabeth E. Joh (no date) ‘Breaking the law to enforce it: undercover police participation in crime’, Stanford Law Review [Preprint]. Available at: http://go.galegroup.com.ezproxy4.lib.le.ac.uk/ps/i.do?&id=GALE|A216682480&v=2.1&u=leicester&it=r&p=EAIM&sw=w&authCount=1.
Erskine, T. (2004) ‘“As Rays of Light to the Human Soul”? Moral Agents and Intelligence Gathering’, Intelligence and National Security, 19(2), pp. 359–381. Available at: https://doi.org/10.1080/0268452042000302047.
Fussey, P. (2013) ‘Contested topologies of UK counterterrorist surveillance: the rise and fall of Project Champion’, Critical Studies on Terrorism, 6(3), pp. 351–370. Available at: https://doi.org/10.1080/17539153.2013.823757.
Gary  Kern (no date) ‘Torture and Intelligence in the Global War on Terror’, Intelligence and National Security, 24(3), pp. 429–457. Available at: https://www-tandfonline-com.ezproxy4.lib.le.ac.uk/doi/full/10.1080/02684520903037022.
Gendron, A. (2005) ‘Just War, Just Intelligence: An Ethical Framework for Foreign Espionage’, International Journal of Intelligence and CounterIntelligence, 18(3), pp. 398–434. Available at: https://doi.org/10.1080/08850600590945399.
Gill, P. (2007) ‘Evaluating intelligence oversight committees: The UK Intelligence and Security Committee and the “war on terror”’, Intelligence and National Security, 22(1), pp. 14–37. Available at: https://doi.org/10.1080/02684520701200756.
Gill, P. (2009) ‘Security Intelligence and Human Rights: Illuminating the “Heart of Darkness”?’, Intelligence and National Security, 24(1), pp. 78–102. Available at: https://doi.org/10.1080/02684520902756929.
Gill, P. and Phythian, M. (2018) Intelligence in an insecure world. Third edition. Cambridge, UK: Polity. Available at: https://ebookcentral.proquest.com/lib/leicester/reader.action?docID=5553458&ppg=208.
Godfrey, E.D. (1978) ‘Ethics and Intelligence’, Foreign Affairs, 56(3). Available at: https://doi.org/10.2307/20039922.
GROSS, M.L. (2006) ‘Assassination and Targeted Killing: Law Enforcement, Execution or Self-Defence?’, Journal of Applied Philosophy, 23(3), pp. 323–335. Available at: https://doi.org/10.1111/j.1468-5930.2006.00347.x.
Harwood, W.H. (2017) ‘Secrecy, transparency and government whistleblowing’, Philosophy & Social Criticism, 43(2), pp. 164–186. Available at: https://doi.org/10.1177/0191453716677178.
Herman, M. (2004) ‘Ethics and Intelligence after September 2001’, Intelligence and National Security, 19(2), pp. 342–358. Available at: https://doi.org/10.1080/0268452042000302038.
How Edward Snowden went from loyal NSA contractor to whistleblower | US news | The Guardian (no date). Available at: http://www.theguardian.com/world/2014/feb/01/edward-snowden-intelligence-leak-nsa-contractor-extract.
Isakjee, A. and Allen, C. (2013) ‘“A catastrophic lack of inquisitiveness”: A critical study of the impact and narrative of the Project Champion surveillance project in Birmingham’, Ethnicities, 13(6), pp. 751–770. Available at: https://doi.org/10.1177/1468796813492488.
Johnson, L.K. (2009) Handbook of intelligence studies. London: Routledge. Available at: http://le.alma.exlibrisgroup.com/view/action/uresolver.do?operation=resolveService&package_service_id=5664687050002746&institutionId=2746&customerId=2745.
Johnson, L.K. et al. (2014) ‘An                              Special Forum: Implications of the Snowden Leaks’, Intelligence and National Security, 29(6), pp. 793–810. Available at: https://doi.org/10.1080/02684527.2014.946242.
Kenneth Cukier,Viktor Mayer-Schoenberger (no date) ‘The rise of big data: how it’s changing the way we think about the world’, Foreign Affairs [Preprint]. Available at: http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?&id=GALE|A329302643&v=2.1&u=leicester&it=r&p=EAIM&sw=w&authCount=1.
Leigh, I. (2012) ‘Rebalancing Rights and National Security: Reforming UK Intelligence Oversight a Decade after 9/11’, Intelligence and National Security, 27(5), pp. 722–738. Available at: https://doi.org/10.1080/02684527.2012.708525.
Levinson, S. and Levinson, S. (2004) Torture: A Collection. New York: Oxford University Press. Available at: https://ebookcentral.proquest.com/lib/leicester/detail.action?docID=273303.
Lyon, D., Haggerty, K.D. and Ball, K. (2012) Routledge handbook of surveillance studies. Abingdon, Oxon: Routledge. Available at: http://ezproxy.lib.le.ac.uk/login?url=http://lib.myilibrary.com?id=363739.
‘Making Sense of Snowden’ (2013) The Political Quarterly, 84(4), pp. 433–435. Available at: https://doi.org/10.1111/j.1467-923X.2013.12053.x.
Mantello, P. (2016) ‘The machine that ate bad people: The ontopolitics of the precrime assemblage’, Big Data & Society, 3(2). Available at: https://doi.org/10.1177/2053951716682538.
Mark Phythian (2012) ‘The Ethics-Intelligence Tension: Sources and Bypassing Strategies’, International Journal of Intelligence Ethics, 3(2), pp. 12–36. Available at: https://journals.flvc.org/ijie/article/view/83451.
Müller-Wille, B. (2006) ‘Improving the democratic accountability of EU intelligence’, Intelligence and National Security, 21(1), pp. 100–128. Available at: https://doi.org/10.1080/02684520600568394.
Newbery, S. et al. (2009) ‘Interrogation, Intelligence and the Issue of Human Rights’, Intelligence and National Security, 24(5), pp. 631–643. Available at: https://doi.org/10.1080/02684520903209381.
Omand GCB, S.D. (2006) ‘Ethical Guidelines in Using Secret Intelligence for Public Security’, Cambridge Review of International Affairs, 19(4), pp. 613–628. Available at: https://doi.org/10.1080/09557570601003338.
Omand, S.D. and Phythian, M. (2013) ‘Ethics and Intelligence: A Debate’, International Journal of Intelligence and CounterIntelligence, 26(1), pp. 38–63. Available at: https://doi.org/10.1080/08850607.2012.705186.
Patrick West (no date) ‘The nightmare of “precrime” is already with us: Patrick West says that the science fiction of Philip K. Dick’s Minority Report has become alarming fact in the powers given to police to take against people who have committed no crime’, Spectator [Preprint]. Available at: http://go.galegroup.com.ezproxy3.lib.le.ac.uk/ps/i.do?&id=GALE|A171213127&v=2.1&u=leicester&it=r&p=EAIM&sw=w.
Pentagon cancels futures market on terror | New Scientist (no date). Available at: https://www.newscientist.com/article/dn4007-pentagon-cancels-futures-market-on-terror/.
Pfaff, T. and Tiel, J.R. (2004) ‘The ethics of espionage’, Journal of Military Ethics, 3(1), pp. 1–15. Available at: https://doi.org/10.1080/15027570310004447.
Philip, A. (2010) ‘Study on Targeted Killings, UN General Assembly Human Rights Council’. United Nations. Available at: http://www2.ohchr.org/english/bodies/hrcouncil/docs/14session/A.HRC.14.24.Add6.pdf.
Pickard, D. (2001) ‘Legalizing Assassination - Terrorism, the Central Intelligence Agency, and International Law’, Georgia Journal of International and Comparative Law, 30(1), pp. 1–36. Available at: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/gjicl30&id=13.
‘Police “smear” campaign targeted Stephen Lawrence’s friends and family | UK news | The Guardian’ (no date). Available at: https://www.theguardian.com/uk/2013/jun/23/stephen-lawrence-undercover-police-smears.
‘Police spies stole identities of dead children | UK news | The Guardian’ (no date). Available at: https://www.theguardian.com/uk/2013/feb/03/police-spies-identities-dead-children.
‘Policy Analysis Market and the Political Yuck.’ (no date). Available at: http://www.sirc.org/articles/policy_analysis.shtml.
Predictive Policing a Success in Santa Cruz, Calif. (no date). Available at: http://www.govtech.com/public-safety/Predictive-Policing-a-Success-in-Santa-Cruz-Calif.html.
Project Champion Scrutiny Review into ANPR and CCTV Cameras November 2010 | Birmingham City Council (no date). Available at: https://www.birmingham.gov.uk/downloads/file/460/project_champion_scrutiny_review_into_anpr_and_cctv_cameras_november_2010.
Quinlan, M. (2007) ‘Just intelligence: Prolegomena to an ethical theory’, Intelligence and National Security, 22(1), pp. 1–13. Available at: https://doi.org/10.1080/02684520701200715.
‘Report on Undercover Policing Ethics Workshop’ (2016). University of Warwick. Available at: http://www.college.police.uk/News/College-news/Documents/July_2016_Report_on_CoP_Warwick_undercover_meeting.pdf.
Richards, J. (2012) ‘Intelligence Dilemma? Contemporary Counter-terrorism in a Liberal Democracy’, Intelligence and National Security, 27(5), pp. 761–780. Available at: https://doi.org/10.1080/02684527.2012.708528.
Rumney, P.N.S. (2008) ‘The Torture Debate: A Perspective from the United Kingdom’, in Intelligence, security and policing post-9/11: The UK’s response to the war on terror. Basingstoke: Palgrave Macmillan, pp. 135–156. Available at: https://doi.org/10.1057/9780230583542_8.
Sara, T. (2010) ‘Project Champion Review’. Thames Valley Police. Available at: http://www.statewatch.org/news/2010/oct/uk-project-champion-police-report.pdf.
Scheuerman, W.E. (2016) ‘What Edward Snowden can teach theorists of conscientious law-breaking’, Philosophy & Social Criticism, 42(10), pp. 958–964. Available at: https://doi.org/10.1177/0191453716631169.
Shelton, A.M. (2011) ‘Framing the Oxymoron: A New Paradigm for Intelligence Ethics’, Intelligence and National Security, 26(1), pp. 23–45. Available at: https://doi.org/10.1080/02684527.2011.556358.
Stephen Lawrence independent review - Publications - GOV.UK (no date). Available at: https://www.gov.uk/government/publications/stephen-lawrence-independent-review.
Steven Lukes (2006) ‘Liberal Democratic Torture’, British Journal of Political Science, 36(1), pp. 1–16. Available at: http://www.jstor.org.ezproxy3.lib.le.ac.uk/stable/4092313?seq=1#page_scan_tab_contents.
Steven R. David (no date) ‘Israel’s policy of targeted killing’, Ethics & International Affairs [Preprint]. Available at: http://go.galegroup.com.ezproxy4.lib.le.ac.uk/ps/retrieve.do?tabID=T002&resultListType=RESULT_LIST&searchResultsType=SingleTab&searchType=AdvancedSearchForm&currentPosition=1&docId=GALE%7CA109351999&docType=Article&sort=RELEVANCE&contentSegment=&prodId=EAIM&contentSet=GALE%7CA109351999&searchId=R1&userGroupName=leicester&inPS=true.
‘The new way police are surveilling you: Calculating your threat “score” - The Washington Post’ (no date). Available at: https://www.washingtonpost.com/local/public-safety/the-new-way-police-are-surveilling-you-calculating-your-threat-score/2016/01/10/e42bccac-8e15-11e5-baf4-bdf37355da0c_story.html?postshare=771452528554762&tid=ss_tw-bottom&utm_term=.c26ab463bf72.
‘THREATS AND RESPONSES: PLANS AND CRITICISMS; Pentagon Prepares A Futures Market On Terror Attacks - The New York Times’ (no date). Available at: http://www.nytimes.com/2003/07/29/us/threats-responses-plans-criticisms-pentagon-prepares-futures-market-terror.html.
Turner, S. (1978) ‘Ethics and Intelligence’, Foreign Affairs, 57(1). Available at: https://doi.org/10.2307/20040062.
Undercover policing guide | College of Policing (no date). Available at: http://www.college.police.uk/News/College-news/Pages/undercover-policing-guide.aspx.
U.S. Senate Select Committee on Intelligence - Report on Study of the CIA’s Detention and Interrogation Program (no date). US Senate Select Committee on Intelligence. Available at: http://www.intelligence.senate.gov/study2014.html.
Vrist Ronn, K. (2016) ‘Intelligence Ethics: A Critical Review and Future Perspectives’, International Journal of Intelligence and CounterIntelligence, 29(4), pp. 760–784. Available at: https://doi.org/10.1080/08850607.2016.1177399.
‘Watching “Zero Dark Thirty” with the CIA: Separating Fact from Fiction’ (no date). American Enterprise Institute. Available at: http://www.aei.org/wp-content/uploads/2013/01/-event-transcript_111915959376.pdf.
Weijers, D. and Richardson, J. (2014) ‘Is the repugnance about betting on terrorist attacks misguided?’, Ethics and Information Technology, 16(3), pp. 251–262. Available at: https://doi.org/10.1007/s10676-014-9350-9.
Wiebe, M. (2003) ‘Assassination in Domestic and International Law: The Central Intelligence Agency, State-Sponsored Terrorism, and the Right of Self-Defense’, Tulsa Journal of Comparative & International Law, 11(1). Available at: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/tulcint11&id=369.
Yoo, J. (2011) ‘Assassination or Targeted Killings after 9/11’, New York Law School Law Review, 56(1), pp. 57–80. Available at: http://heinonline.org/HOL/Page?public=false&handle=hein.journals/nyls56&id=51.