Bilton, N. An Average American Consumes 34 Gigabytes a Day, Study Says // New York Times, December 9, 2009.
Blanchette, J. F., and D. G. Johnson Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness // Information Society 18, no. 1 (2002): 33–45.
Bonneau, J., Anderson, J., Anderson, R., and F. Stajano Eight Friends Are Enough: Social Graph Approximation via Public Listings / In: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13–18. 2009.
Bunyan, T. Just over the Horizon: The Surveillance Society and the State in the EU // Race & Class 51, no. 3 (2010): 1.
Cambodia Shuts Off SMS Ahead of Elections // Associated Press, April 2, 2007.
Carver, G. A., Jr. Intelligence in the Age of Glasnost // Foreign Af-fairs 69 (1989): 147.
Clover, C. Stalin-Era Files Raided in “War over Memory” // Finan-cial Times, December 7, 2008.
Cohen, J. Children of Jihad: A Young American’s Travels Among the Youth of the Middle East. New York: Gotham, 2007.
Dementis, G., and G. Sousa A Legal Reasoning Component of a Network Security Command and Control System. Master’s thesis, Naval Postgraduate School, Monterey, CA, 2010.
Dodge, M., and R. Kitchin The Ethics of Forgetting in an Age of
Pervasive Computing // CASA Working Papers 92 (2005). Elliott, C. Hotels Connecting Dots to Online Reviewers // Tribune
Media Services, June 4, 2010.
Faris, R., Roberts, H, and S. Wang China’s Green Dam: The Implications of Government Control Encroaching on the Home PC // OpenNet Initiative, June 2009. opennet.net/chinas-green-dam-the-implications-government-control-encroaching-home-pc.
Fassihi, F. Iranian Crackdown Goes Global // Wall Street Journal, December 3, 2009.
FBI Backs Record-Keeping on Prepaid Cell Phones // Associated Press, July 31, 2010.
George-Cosh, D. Blackberry Maker Silent on UAE Security Talks // National (Abu Dhabi), July 29, 2010.
Google: Critics of Vietnam Mine Face Online Attack // Associated Press, March 31, 2010.
Google Says Vietnam Mine Opponents Under Cyber Attack // BBC News, March 31, 2010.
Government to Banish Unbranded Mobile Phones // SiliconIndia, July 14, 2010.www.siliconindia.com/shownews/Government_to_banish_ unbranded_mobile_phones_-nid-69662.html.
Graham, S., and D. Wood Digitizing Surveillance: Categorization, Space, Inequality // Critical Social Policy 23, no. 2 (2003): 227. Heintz, J. Text Messages Warn of Violence in Belarus // Associated
Press, March 18, 2006.
Helft, M. Google Uses Web Searches to Track Flu’s Spread // New York Times, November 11, 2008.
Hille, K. Censorship Fears Grow as IBM Tool Bolsters Chinese Spam Curb // Financial Times, March 25, 2010.
Hille, K. Censorship Fears over China Spam Curb // Financial Times, March 24, 2010.
Hille, K. China Bolsters Internet Censors’ Scrutiny // Financial Times, January 5, 2009.
Holland, H. B. Privacy Paradox 2.0 // 19 Widener Law Journal 893 (2010).
Home Office Targets Terror-Related Websites // BBC News, February 1, 2010.
Huber, M., Kowalski, S., Nohlberg, M., and S. Tjoa To-wards Automating Social Engineering Using Social Networking Sites / In: 2009 International Conference on Computational Science and Engineering, 117–124.
India Bans Chinese Telecom Equipment // Associated Press, April 30, 2010. Iran’s Police Vow No Tolerance Towards Protesters // Reuters, Febru-ary 6, 2010.
Johnson, C. Y. Project “Gaydar”: An MIT Experiment Raises New Questions About Online Privacy // Boston Globe, September 20, 2009.
Jonietz, E. Augmented Identity // Technology Review, February 23,
2010. www.technologyreview.com/computing/24639/?a=f. Kazmin, A. Police Threaten Kashmiri Facebook Users // Financial
Times, July 19, 2010.
Kirk, J. Vietnam Rebuffs Hacking Claims from Google // IDG News Service, April 6, 2010.
Krishna, Jai India Minister: Security Agencies Have Concerns over Blackberry Services // Wall Street Journal, July 27, 2010.
Lemos, Robert Your Groups Tell Hackers Who You Are // Technology Review, July 23, 2010. www.technologyreview.com/printer_friendly_ article.aspx?id=43892&channel=web§ion=.
Lukyanenko, Peter, and Cathy Young Tricks of the KGB trade // Harper’s Magazine, January 1992.
Mayer-Schonberger, Viktor Delete: The Virtue of Forgetting in the Digital Age. Princeton, NJ: Princeton University Press, 2009.
McMillan, Robert Activists Worry About a New “Green Dam” in Vietnam // IDG News Service, June 4, 2010.
Morar, Natalia Blog for Democracy, from the Streets of Moldova // Open-Democracy, April 8, 2009. www.opendemocracy.net/arti-cle/email/blog-for-democracy-from-the-streets-of-moldova.
Mumford, Lewis The Pentagon of Power. New York: Harcourt Brace Jovanovich, 1974.
Nigeria: New Policy on Mobile Phone SIM Cards // Daily Trust, Janu-ary 11, 2010. allafrica.com/stories/201001110286.html.
Note to Readers // New York Times, September 13, 2009. www.nytimes. com/2009/09/13/business/media/13note.html?_r=1.
Owad, Tom Data Mining 101: Finding Subversives with Amazon Wishlists // Applefritter, January 4, 2006. www.applefritter.com/ bannedbooks.
P2P Comes to the Aid of Audiovisual Search // PhysOrg.com. Novem-ber 18, 2009. www.physorg.com/news177780052.html.
Page, Lewis NSA Offering “Billions” for Skype Eavesdrop Solution // Register, February 12, 2009. www.theregister.co.uk/2009/02/12/ nsa_offers_billions_for_skype_pwnage/.
Palmer, Maija Face Recognition Software Gaining a Broader Can-vas // Financial Times, May 22, 2010.
Palmer, Maija Google Debates Face Recognition Technology After Privacy Blunders // Financial Times, May 20, 2010.
Peterson, Kristina Intelligence Agents Borrow Wall Street Trading Technology // Wall Street Journal, May 28, 2010.
Scheck, Justin Stalkers Exploit Cellphone GPS // What They Know series, Wall Street Journal, August 3, 2010.
Sharma, A. Cyber Wars: A Paradigm Shift from Means to Ends // Stra-tegic Analysis 34, no. 1 (2010): 62–73.
Simonite, Tom Surveillance Software Knows What a Camera Sees // Technology Review, June 1, 2010. www.technologyreview. com/computing/25439/?a=f.