Abraham, D. (2000). “Where Hannah Arendt Went Wrong.” Law and History Review 18(3): 607-612.

Aldrich, R. J. (1998). “British intelligence and the Anglo[hyphen]American ‘Special Relationship’ during the Cold War.” Review of International Studies 24(3): 331-351.

Aldrich, R. J. (2004). “Transatlantic intelligence and security cooperation.” International Affairs 80(4): 731.

Aldrich, R. J., C. M. Andrew and W. K. Wark (2009). Secret intelligence : a reader. London, Routledge.

Aldrich, R. J. and J. Kasuku (2012). “Escaping from American intelligence: culture, ethnocentrism and the Anglosphere.” International Affairs 88(5): 1009-1028.

Alford, C. F. (2000). “What Would It Matter If Everything Foucault Said about Prison Were Wrong? “Discipline and Punish” after Twenty Years.” Theory and Society 29(1): 125-146.

Alford, R. T. (2011). “Government Leaks in the Internet Age.” Proceedingsof the105th Annual Meeting 105: 147-150.

Andrejevic, M. (2007). iSpy : surveillance and power in the interactive era. Lawrence, Kan., University Press of Kansas.

Andrejevic, M. (2014). “Wikileaks, Surveillance and Transparency.” International Journal of Communications 8: 2619-2630.

Assange, J., J. Appelbaum, A. M©*ller-Maguhn, J. r. m. Zimmermann and A. S. d. Santos (2013). Cypherpunks Unsere Freiheit und die Zukunft des Internets, Campus Verlag,: 1 online resource (208 p.).

Australia. Royal Commission on, I. and Security (1978). Intelligence and security: Royal Commission first report. Canberra, Govt. Pr. no. 246/1977.

Avritzer, L. and T. Lyrra (1997). “New Cultures, Social Movements and the Role of Knowledge: An interview with Alberto Melucci.” Thesis Eleven 48(1): 91-109.

Baehr, P. (2008). “The “Masses” in Hannah Arendt’s Theory of Totalitarianism.” The Good Society 16 (2): 12-18

Ball, D. (1980). A suitable piece of real estate : American installations in Australia. Sydney, Hale & Iremonger.

Ball, D. and Australian National University. Strategic and Defence Studies Centre. (1999). The US-Australian alliance : history and prospects. Canberra, Strategic and Defence Studies Centre, Australian National University.

Ball, D. C., Duncan.; Robinson, Bill.; Tanter, Richard (28 May 2015). “Expanded Communications Satellite Surveillance and Intelligence Activities ustilising Multi-beam Antenna Systems.” Special Report, Nautilus Institute for Security and Sustainability.

Ball, K. (2005). “Organization, Surveillance and the Body: Towards a Politics of Resistance.” Organization 12(1): 89-108.

Ball, K., K. D. Haggerty and D. Lyon (2012). Routledge handbook of surveillance studies. Routledge international handbooks. Abingdon, Oxon ; New York, Routledge,: 1 online resource (xxxi, 437 p.).

Bamford, J. (1982). The puzzle palace : a report on America’s most secret agency. Boston, Houghton Mifflin.

Bamford, J. (2006). BIG BROTHER IS LISTENING. Boston, Atlantic Media, Inc. 297: 65.

Barnds, W. J. (1969). Intelligence and Foreign Policy: Dilemmas of a Democracy.

Behm, A. (2007). “The Australian Intelligence Community in 2020.” Security Challenges 3(4): 1-9.

Bennett, C. J. (2008). The privacy advocates : resisting the spread of surveillance. Cambridge, MA, MIT Press.

Bennett, C. J. and K. D. Haggerty (2011). Security games : surveillance and control at mega-events. Abingdon, Oxon ; New York, Routledge.

Bexfield, J. T., Ben (September 2012). “Organization of Operations Resaerch in the Five Eyes Countries.” Phalanx: 20-22.

Birchall, C. (2014). “Radical Transparency?” Cultural Studies Critical Methodologies 14(1): 77-88.

Boghosian, H. (2013). “THE ARMY GOES SPYING ALONG.” National Lawyers Guild Review 70(2): 100.

Brevini, B., A. Hintz, P. McCurdy and C. Palgrave (2013). Beyond WikiLeaks: implications for the future of communications, journalism and society. Basingstoke, Palgrave Macmillan.

Bronskill, J. (2012). Canada’s electronic spy watchdog eyes Five Eyes intelligence sharing. Whitehorse Star Newspaper Article. Whitehorse, Y.T, Infomart, a division of Postmedia Network Inc: 13.

Burnet, D. and R. Thomas (1989). “Spycatcher: The Commodification of Truth.” Journal of Law and Society 16(2): 210-224.

Cain, F. (2000). “Venona in Australia and Its Long-Term Ramifications.” Journal of Contemporary History 35(2): 231-248.

Campbell, D. (12 August 1988). “Somebody’s Listening.” New Statesman.

Campbell, D. (23 May 1999). “Careful, they might year you.” The Age.

Campbell, D. (1982). War plan UK : the truth about civil defence in Britain. London, Burnett Books.

Campbell, D. (1984). The unsinkable aircraft carrier : American military power in Britain. London, M. Joseph.

Campbell, D. (1986). On the record : surveillance, computers, and privacy : the inside story. London, M. Joseph.

Campbell, D. (1988). Global eavesdroppers. London, Statesman and Nation. 1: 10.

Campbell, D. (October 1999). “Development of Surveillance Technology and Risk of Abuse of Economic Information: Interception Capabilities 2000.” European Parliament Working Document for the STOA Panel PE 168.184/Vol 2/5.

Castronovo, R. (2013). “State Secrets: Ben Franklin and WikiLeaks.” Critical Inquiry 39(3): 425-450.

Clarke, R. (2014). “Surveillance by the Australian Media, and its Regulation.” Surveillance & Society 12(1): 89.

Coxsedge, J., K. Coldicutt, G. Harant and Committee for the Abolition of Political Police (Melbourne Vic.) (1982). Rooted in secrecy : the clandestine element in Australian politics. Balwyn North, Vic., Committee for the Abolition of Political Police.

Curran, G. and M. Gibson (2013). “WikiLeaks, Anarchism and Technologies of Dissent.” Antipode 45(2): 294-314.

Danchev, A. (2006). “The Cold War “Special Relationship” Revisited.” Diplomacy & Statecraft 17(3): 579-595.

Davies, P. H. J. (2010). “The Missing Dimension’s Missing Dimension.” Public Policy and Administration 25(1): 5-9.

Davies, P. H. J. and K. Gustafson (2013). Intelligence elsewhere: spies and espionage outside the anglosphere. Washington, DC, Georgetown University Press.

Deibert, R. (2013). Black code: inside the battle for cyberspace. Toronto, McClelland & Stewart.

Deutsch, K. W. (1969). Political community and the North Atlantic area: international organization in the light of historical experience. New York – Book, Greenwood Press.

Dickie-Clark, H. F. (1986). “The Making of a Social Theory: Anthony Giddens’ Theory of Structuration.” Sociological Focus 19(2): 159-176.

Donohue, L. K. (2006). “Anglo-American Privacy and Surveillance.” The Journal of Criminal Law and Criminology (1973-) 96(3): 1059-1208.

Dover, R. (2014). “The World’s Second Oldest Profession: The Transatlantic Spying Scandal and its Aftermath.” The International Spectator 49(2): 117-133.

Doyle, K. (1999). “The end of secrecy: U.S. national security and the imperative for openness.” World Policy Journal [H.W.Wilson – SSA] 16(1): 34.

Dreyfus, S. and J. Assange (1997). Underground : tales of hacking, madness & obsession on the electronic frontier. Kew, Vic., Mandarin.

Earl, J. and K. Kimport (2011). Digitally enabled social change : activism in the Internet age. Cambridge, Mass., MIT Press.

Epstein, D., M. C. Roth and E. P. S. Baumer (2014). “It’s the Definition, Stupid! Framing of Online Privacy in the Internet Governance Forum Debates.” Journal of Information Policy 4: 144-172.

Ericson, R. V. and K. D. Haggerty (1997). Policing the risk society. Toronto, University of Toronto Press.

Ericson, R. V., K. D. Haggerty, A. Doyle and J. B. L. Chan (2011). Crime, institutional knowledge and power : the rich criminological legacy of Richard Ericson. Farnham, Surrey, England ; Burlington, VT, Ashgate.

Fernandez, L. H., Laura (2009). “Is Resistance Futile? Thoughts on Resisting Surveillance.” Surveillance & Society 6(3): 198-202.

Fernback, J. (2013). “Sousveillance: Communities of resistance to the surveillance environment.” Telematics and Informatics 30(1): 11-21.

Foucault, M. Discipline and punish : the birth of the prison / Chapter 3 : Panopticism.

Garrido, M. V. (2015). “Contesting a Biopolitics of Information and Communications: The Importance of Truth and Sousveillance After Snowden.” Surveillance & Society 13(2): 153.

Gill, P. (2009). “The Intelligence and Security Committee and the challenge of security networks.” Review of International Studies 35(4): 929-941.

Gill, P. (2009). “Security Intelligence and Human Rights: Illuminating the ‘Heart of Darkness’?” Intelligence and National Security 24(1): 78-102.

Gill, S. (1995). “The Global Panopticon? The Neoliberal State, Economic Life, and Democratic Surveillance.” Alternatives: Global, Local, Political 20(1): 1-49.

Goggin, G. (2013). “Democratic affordances: Politics, media, and digital technology after Wikileaks.” The International Journal of Communication Ethics Vol 10(Number 2/3): 6-14.

Gordon, N. (2002). “On Visibility and Power: An Arendtian Corrective of Foucault.” Human Studies 25(2): 125-145.

Green, N. and N. Zurawski (2015). “Surveillance and Ethnography: Researching Surveillance as Everyday Life.” Surveillance & Society 13(1): 27.

Greener-Barcham, B. K. (2002). “Before September: A History of Counter-terrorism in New Zealand.” Australian Journal of Political Science 37(3): 509-524.

Greenwald, G. No Place to Hide : Edward Snowden, the NSA and the Surveillance State / Collect It All.

Haggerty, K. D. Modern serial killers.

Haggerty, K. D. and R. V. Ericson (2000). “The surveillant assemblage.” The British journal of sociology 51(4): 605-622.

Hardt, M. and A. Negri (2005). Multitude: war and democracy in the Age of Empire. London, Hamish Hamilton.

Harrington, C. L. (2000). Contemporary Sociology 29(3): 564-566.

Hope, R. M., I. Australia. Royal Commission on and Security (1978).  Australian Government Publishing Service.

Horner, D. M. The spy catchers : the official history of ASIO, 1949-1963.

Hosein, G. (2014). “On Just Surveillance.” Surveillance & Society 12(1): 154.

Innes, M. (2006). “Policing Uncertainty: Countering Terror through Community Intelligence and Democratic Policing.” The ANNALS of the American Academy of Political and Social Science 605(1): 222-241.

International, P. I. A. (June 2015). “Two Years After Snowden: Protecting Human Rights in an Age of Mass Surveillance.”

Introna, L. D. G. A. (2009). “Networks and Resistance: Investigating online advocacy networks as a modality for resisting state surevillance.” Surveillance & Society 6(3): 233-258.

Jary, D. and J. Jary (1995). “The Transformations of Anthony Giddens – The Continuing Story of Structuration Theory.” Theory, Culture & Society 12(2): 141-160.

Jeffries, F. (2011). “Saying Something: The Location of Social Movements in the Surveillance Society.” Social Movement Studies 10(2): 175-190.

Kaye, D. (22 Mary 2015). “Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.” Human Rights Council A/HRC/29/32.

Keane, J. (2004). Violence and democracy. New York, Cambridge University Press.

Keane, J. (2009). The life and death of democracy. London ; New York, Simon & Schuster.

Keen, A. (2012). Digital vertigo how today’s online social revolution is dividing, diminishing, and disorienting us. London, Constable & Robinson,: 1 online resource (404 p.).

Keenan, T. P. (2014). Technocreep The Surrender of Privacy and the Capitalization of Intimacy. New York, Greystone Books,: 1 online resource (265 p.).

Keiber, J. (2015). “Surveillance Hegemony.” Surveillance & Society 13(2): 168.

King, E. (26 November 2013). “Eyes Wide Open.”

Kisswani, N. M. (2011). “The Reasonable Necessary for the Implement of Telecommunications Interception and Access Laws.” The International Lawyer 45(3): 857-879.

Kisswani, N. M. (2011). “The Reasonable Necessary for the Implement of Telecommunications Interception and Access Laws.” The International Lawyer 45(3): 857-879.

Landau, S. E. (2010). Surveillance or security? : the risks posed by new wiretapping technologies. Cambridge, Mass., MIT Press.

Le Blond, S., D. Choffnes, W. Zhou, P. Druschel, H. Ballani and P. Francis (2013). “Towards efficient traffic-analysis resistant anonymity networks.” 303.

Leistert, O. (2012). “Resistance against Cyber-Surveillance within Social Movements and how Surveillance Adapts.” Surveillance & Society 9(4): 441.

Lewandowski, J. D. (1995). “Rethinking Power and Subjectivity after Foucault.” symplokē 3(2): 221-243.

Lightfoot, G. and T. P. Wisniewski (2014). “Information asymmetry and power in a surveillance society.” Information and Organization 24(4): 214-235.

Lilja, M. and S. Vinthagen (2014). “Sovereign power, disciplinary power and biopower: resisting what power with what resistance?” Journal of Political Power 7(1): 107-126.

Long, A. and A. B. Zegart (2006). “How Intelligent Is Intelligence Reform?” International Security 30(4): 196-208.

Lonneke van der, V. (2015). “Leaky Apps and Data Shots: Technologies of Leakage and Insertion in NSA-Surveillance.” Surveillance & Society 13(2): 182.

Lutkenhaus, J. (2014). “PROSECUTING LEAKERS THE EASY WAY: 18 U.S.C. § 641.” Columbia law review 114(5): 1167-1208.

Lyon, D. (2001). Surveillance society: monitoring everyday life. Buckingham, Open University Press.

Lyon, D. (2006). Theorizing surveillance : the panopticon and beyond. Cullompton, Devon UK ; Portland, Or., Willan Pub.

Lyon, D. (2015). “The Snowden Stakes: Challenges for Understanding Surveillance Today.” Surveillance & Society 13(2): 139.

Lyon, D. and I. ebrary (2006). Theorizing surveillance: the panopticon and beyond. Cullompton, Devon, Willan Publishing.

Macrakis, K. (2010). “Technophilic Hubris and Espionage Styles during the Cold War.” Isis 101(2): 378-385.

Marks, P. (2011). “Escaping the Panopticon: Utopia, Hegemony, and Performance in Peter Weir’s The Truman Show.” Utopian Studies 22(1): 52-73.

Marks, P. (2015). Imagining surveillance: eutopian and dystopian literature and film. Edinburgh, Edinburgh University Press.

Marquez, X. (2011). “Spaces of Appearance and Spaces of Surveillance.” Polity 44(1): 6.

Marx, G. T. (2003). “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance.” Journal of Social Issues 59(2): 369-390.

Mass-Observation., T. Harrisson, Mass-Observation Archive., University of Sussex. and Adam Matthew Digital (Firm) (1943). War factory a report. London, Victor Gollancz,.

Mattelart, A., S. G. Taponier and J. Cohen (2010). The globalization of surveillance : the origin of the securitarian order. Cambridge, Polity.

Mayer-Sch©œnberger, V. and K. Cukier (2013). Big data : a revolution that will transform how we live, work and think. London, John Murray.

Mehrabov, I. (2015). “Exploring Terra Incognita: Mapping Surveillance Studies from the Perspective of Media and Communication Research.” Surveillance & Society 13(1): 117.

Melucci, A. (1980). “The new social movements: A theoretical approach.” Social Science Information 19(2): 199-226.

Moglen, E. (2014).  State surveillance: The truth is ours. Now we must act: Part I.  The Guardian (London, England), Guardian Newspapers Ltd: 26.

Moglen, E. (2014). State surveillance: In our hands lies the answer: Part II. The Guardian (London, England), Guardian Newspapers Ltd: 26.

Monahan, T. (2011). “SURVEILLANCE AS CULTURAL PRACTICE.” The Sociological Quarterly 52(4): 495-508.

Moorhouse, F. (2007). “The writer in a time of terror.” Intellectual Property forum : Journal of the Intellectual Property Society of Australia and New Zealand(68): 10-36.

Moorhouse, F. (2014). Australia under surveillance: how should we act? North Sydney; North Sydney, N.S.W, Random House Australia.

Moran, C. J. and C. J. Murphy (2013). Intelligence studies in Britain and the US: historiography since 1945. Edinburgh, Edinburgh University Press.

Morgenthau, H. (1977). “Hannah Arendt on Totalitarianism and Democracy.” Social Research 44(1): 127-131.

Nathan, J. A. (1982). “Dateline Australia: America’s Foreign Watergate?” Foreign Policy(49): 168-185.

Neyland, D. (2006). Privacy, surveillance and public trust. Hampshire, England ; New York, Palgrave Macmillan.

O’Brien, K. A. (2009). “Managing national security and law enforcement intelligence in a globalised world.” Review of International Studies 35(4): 903-915.

Palm, E. (2014). “Conditions under which Surveillance may be Ethically Justifiable: Remarks on Kevin Macnish’s proposed normative theory of surveillance.” Surveillance & Society 12(1): 164.

Pecora, V. P. (2002). “The Culture of Surveillance.” Qualitative Sociology 25(3): 345-358.

Pecora, V. P. (2002). “The Culture of Surveillance.” Qualitative Sociology 25(3): 345-358.

Phillips, A. (1993). Democracy and difference. University Park, Pa., Pennsylvania State University Press.

Pieterse, J. N. (2012). “Leaking Superpower: WikiLeaks and the contradictions of democracy.” Third World Quarterly 33(10): 1909-1924.

Rathmell, A. (2002). “Towards postmodern intelligence.” Intelligence and National Security 17(3): 87-104.

Rauhofer, J. (2012). “Future-Proofing Privacy: Time For An Ethical Introspection?” Surveillance & Society 10(3/4): 356.

Rauhofer, J. (2012). “Future-Proofing Privacy: Time For An Ethical Introspection?” Surveillance & Society 10(3/4): 356.

Rich, A. (1979). On lies, secrets, and silence : selected prose, 1966-1978. New York, Norton.

Richelson, J. and D. Ball (1985). The ties that bind : intelligence cooperation between the UKUSA countries – the United Kingdom, the United States of America, Canada, Australia and New Zealand. Sydney, George Allen & Unwin.

Ries, K. (1999). “Confidential information and the media.” Queensland University of Technology Law Journal 15(15): 126-134.

Rudner, M. (2004). “Britain Betwixt and Between: Uk SIGINT Alliance Strategy’s Transatlantic and European Connections.” Intelligence and National Security 19(4): 571-609.

Sagar, R. Secrets and leaks : the dilemma of state secrecy: 1 online resource (xii, 281 pages).

Sarikakis, K. and D. K. Thussu (2006). Ideologies of the Internet. Cresskill, N.J., Hampton Press.

Scholz, T. (2010). “Introduction: Points of Control.” Social Research 77(3): 931-940.

Scholz, T. (2010). “Introduction: Points of Control.” Social Research 77(3): 931-940.

Schultz, J. (2013). Now We Are Ten: Griffith REVIEW 41. Melbourne, The Text Publishing Company.

Scott, L. (2007). “Sources and methods in the study of intelligence: A British view.” Intelligence and National Security 22(2): 185-205.

Scott, L. (2012). “Reflections on the Age of Intelligence.” Intelligence and National Security 27(5): 617.

Scott, L. and P. Jackson (2004). “The Study of Intelligence in Theory and Practice.” Intelligence and National Security 19(2): 139-169.

Sherr, J. (1994). Cultures of Spying. New York, National Affairs, Inc. 38: 56-62.

Sherr, J. (1994). Cultures of Spying. New York, National Affairs, Inc. 38: 56-62.

Simplican, S. C. (2015). The capacity contract: intellectual disability and the question of citizenship. London;Minneapolis;, University of Minnesota Press.

Singer, P. W. and A. Friedman (2013). Cybersecurity and cyberwar what everyone needs to know. What Everyone Needs to Know. Oxford, Oxford University Press, USA,: 1 online resource (321 p.).

Sloan, L. D. (2001). “ECHELON and the Legal Restraints on Signals Intelligence: A Need for Reevaluation.” Duke Law Journal 50(5): 1467-1510.

Smith, D. (2006). “Spying and lying in 21st Century America.” Foreign Policy in Focus: 1.

Stivers, C. (2004). “On Theorizing in Dark Times.” Administrative Theory & Praxis 26(1): 19-26.

Stoddart, E. (2014). “Challenging ‘Just Surveillance Theory’: A Response to Kevin Macnish’s ‘Just Surveillance? Towards a Normative Theory of Surveillance’.” Surveillance & Society 12(1): 158.

Surveillance Studies, N. (2002) “Surveillance & society.”

Tanter, R. (1991). Intelligence agencies and Third World militarization a case study of Indonesia 1966-1989 Ph. D., Monash University.

Taylor, B., N. Farrelly and S. Lee (2012). Insurgent Intellectual: Essays in Honour of Professor Desmond Ball. Singapore, Institute of Southeast Asian Studies.

Tow, W. T. (2014). “The “East Wind” and Australia’s Alliance Politics.” Asian Survey 54(2): 273-296.

Towell, N. (2014). Careful, they might hear you. The Sydney Morning Herald (Sydney, Australia). Sydney, N.S.W, Fairfax Media Publications Pty Limited: 34.

Turnbull, M. (1988). The Spycatcher trial. Richmond, Vic., William Heinemann Australia.

Vahabzadeh, P. (2001). “A Critique of Ultimate Referentiality in the New Social Movement Theory of Alberto Melucci.” The Canadian Journal of Sociology / Cahiers canadiens de sociologie 26(4): 611-633.

Villa, D. R. (1992). “Postmodernism and the Public Sphere.” The American Political Science Review 86(3): 712-721.

Wark, W. K. (1987). “Cryptographic Innocence: The Origins of Signals Intelligence in Canada in the Second World War.” Journal of Contemporary History 22(4): 639-665.

Warner, M. (2014). The Rise and Fall of Intelligence an international security history. Washington, Georgetown University Press,: 1 online resource (xvii, 406 pages).

Warner, M. (2014). The Rise and Fall of Intelligence: an international security history. Washington, Georgetown University Press.

Wood, D. M. (2013). “What is global surveillance? Towards a relational political economy of the global surveillant assemblage.” Geoforum 49: 317.

Wood, D. M. (2013). “What is global surveillance? Towards a relational political economy of the global surveillant assemblage.” Geoforum 49: 317.

Wood, D. M. and S. Wright (2015). “Before and After Snowden.” Surveillance & Society 13(2): 132.

Wright, P. (1991). The spycatcher’s encyclopedia of espionage. Port Melbourne, William Heinemann Australia.

Wright, P. and P. Greengrass (1987). Spycatcher : the candid autobiography of a senior intelligence officer. Melbourne, William Heinemann Australia.

Zureik, E. (2010). Surveillance, privacy, and the globalization of personal information : international comparisons. Montr©*al Qu©*bec ; Ithaca N.Y., McGill-Queen’s University Press.