An incomplete list of news articles, scholarly articles and academic reports that cite or utilize information from this website as source material.
Print and Online
- Donald Trump Signs Authorization for Border Troops Using Lethal Force as Migrant Caravan Approaches, Document Reveals. Newsweek, November 21, 2018.
- How the U.S. Government Might Have Survived a Nuclear War. The National Interest, November 17, 2018.
- NDAA Conference: Congress Spares DISA, Bans Chinese Firms and Orders JEDI Review. Nextgov, July 24, 2018.
- Inside Incels’ Looksmaxing Obsession: Penis Stretching, Skull Implants And Rage. Huffington Post, July 24, 2018.
- Pentagon’s Secret UFO Program Investigated Poltergeist Connection to Alien Mystery. Newsweek, May 29, 2018.
- The US military released a study on warp drives and faster-than-light travel. Here’s what a theoretical physicist thinks of it. Business Insider, May 24, 2018.
- ‘The Dark Overlord’ Hackers Shrug Off Reported Arrest. PC Magazine, May 18, 2018.
- The DIA Studied Warp Drives, Wormholes, And Manipulating Space-Time For Some Reason. Task and Purpose, May 15, 2018.
- ‘A Conceptual Error’ – Why the Pentagon Confuses Spies With Whistleblowers. Sputnik, March 15, 2018.
- Why Is the Trump Administration Selling Giant Sniper Rifles to Ukraine? War is Boring, March 2, 2018.
- On A Tense Press Tour Of Guantánamo’s Prison Complex, Signs Of Expansion. NPR, February 20, 2018.
- China Can Spy on U.S. Citizens Through Their Huawei Smartphones, Spy Chief Warns. Newsweek, February 14, 2018.
- This New Russian Sniper Rifle Is Redefining ‘a Safe Distance’. Popular Mechanics, December 8, 2017.
- Gobierno estadounidense acusa de espionaje a DJI. El Universal, December 4, 2017.
- Leaked government memo claims DJI is spying on the US for China. Digital Photography Review, November 30, 2017.
- Popular Drone Maker DJI May Be Sending Customer Videos to the Chinese Government. , November 30, 2017.
- ICE memo says Chinese-made drones are snoops. Federal Computing Weekly, November 30, 2017.
- Drone Giant DJI To Feds: Your Allegations Are “Insane”. Fast Company, November 30, 2017.
- DJI Slams Suspicions Its Drones Harvest Data For The Chinese Government. Forbes, November 30, 2017.
- Homeland Security Thinks DJI Is Using Its Drones to Spy on America. Gizmodo, November 30, 2017.
- Drone Maker D.J.I. May Be Sending Data to China, U.S. Officials Say. New York Times, November 30, 2017.
- Franklin D. Roosevelt, ‘Gray Zone’ Warrior. War on the Rocks, November 23, 2017.
- Fahrzeuge – die neuen Lieblingswaffen der Terroristen. Neue Zurcher Zeitung, November 1, 2017.
- New York truck attack was predictable, just not preventable. Los Angeles Times, November 1, 2017.
- UK sale of surveillance equipment to Macedonia raises questions over export licence policy. Computer Weekly, November 2017.
- NYC Attack: Why ISIS And Terrorists Use Trucks To Kill People And Spread Fear. Newsweek, October 31, 2017.
- Why terrorist threats will survive ISIS defeats. CNN, October 23, 2017.
- Are many hate crimes really examples of domestic terrorism? Salon, October 21, 2017.
- With Loss of Its Caliphate, ISIS May Return to Guerrilla Roots. New York Times, October 18, 2017.
- Russia Attacks U.S. Military Guide Preparing Troops For Future War With Moscow. Newsweek, September 26, 2017.
- У США видали посібник з інформацією про гібридні війни Росії. com, September 24, 2017.
- Американским военным советуют воевать с Россией «по инструкции». ru, September 24, 2017.
- Армия США подготовила руководство по новой тактике российских войск. io, September 24, 2017.
- В США опубликовали пособие по противостоянию России в гибридных войнах. Novaya Gazeta, September 24, 2017.
- Армия США выпустила пособие по противостоянию России в гибридных войнах. ru, September 24, 2017.
- For Dummies? US Publishes How-To Handbook for Countering ‘Russian Threat’. Sputnik, September 24, 2017.
- US Army publishes handbook on defeating Russia in hybrid war. Kyiv Post, September 24, 2017.
- Армия США выпустила учебник по войне с Россией. ru, September 24, 2017.
- Армия США выпустила пособие по ведению войны с Россией. Ria Novosti, September 24, 2017.
- Армия США опубликовала пособие по новой тактике российских войск. ru, September 24, 2017.
- В США выпустили пособие по войне с Россией. ru, September 23, 2017.
- FBI warns on IP addresses. Federal Computing Weekly, August 4, 2017.
- Timeline: Foreign Efforts To Hack State Election Systems And How Officials Responded. NPR, July 31, 2017.
- Here’s how many countries buy military equipment from Russia. Business Insider, July 13, 2017.
- The Trump Administration Provides One More Reason to Discontinue CVE. Brennan Center for Justice, July 12, 2017.
- Homegrown Terrorism and Why the Threat of Right-Wing Extremism Is Rising in America. Newsweek, July 4, 2017.
- National Counterterrorism Center handbook lists “dissatisfaction with job” as a potential sign of extremism. MuckRock, June 1, 2017.
- DHS: WannaCry could linger. Federal Computing Weekly, June 1, 2017.
- The Numbers Don’t Lie: White Far-Right Terrorists Pose a Clear Danger to Us All. The Intercept, May 31, 2017.
- Where ICE Already Has Direct Lines To Law-Enforcement Databases With Immigrant Data. NPR, May 12, 2017.
- The FBI Has Quietly Investigated White Supremacist Infiltration of Law Enforcement. The Intercept, January 31, 2017.
- Monday’s Google Doodle Honoring Japanese Internment Survivor Fred Korematsu Is Just a Coincidence, We’re Sure. Slate. January 30, 2017.
- Trump’s Homeland Security Team Likely to Emphasize Facial Recognition and Biometric Surveillance. The Intercept, January 19, 2017.
- Democrats didn’t stand a chance against Russia’s elite hackers. They’re too good. McClatchy, January 11, 2017.
- U.S. Unveils Plan to Punish Russians for Election Hack. NBC News, December 29, 2016.
- .דו”ח של הקונגרס האמריקאי: בארה”ב מופעלים מאות תאי סלולר מזויפים על ידי הממשל Israel Defense, December 21, 2016.
- Vehicle Attacks Like Berlin’s Are Nothing New, And Are Likely To Continue. NPR, December 21, 2016.
- Truck Attacks: Low-Tech, Soft Target Terrorism Is Growing Threat. NBC News, December 20, 2016.
- We Don’t Talk About ‘Radicalization’ When an Attacker Isn’t Muslim. We Should. New York Times Magazine, December 6, 2016.
- Могут ли хакеры взломать американские выборы? BBC, November 8, 2016.
- Election Cyberattacks Could Hurt Public Confidence but not Change Results, Feds Say. ABC News, November 7, 2016.
- Newly Released Transcript Proves Orlando Terrorist Was Avenging ISIS. The Federalist, September 26, 2016.
- Orlando Gunman Omar Mateen Name-drops Obscure ISIS Terrorist in 911 Transcripts. New York Magazine, September 26, 2016.
- À qui profite le crime ? Le marché de la prédiction du crime aux États-Unis. La Vie des Idées, September 13, 2016.
- Pentagon geeft beveiligingstips voor Facebook, Twitter en Tor. nl, August 29, 2016.
- FBI’s Don’t Be a Puppet game targets Muslim youth, teachers’ union says. The Guardian, August 26, 2016.
- France Attack Aftermath: Security Experts Warn of Uptick in Vehicular Terrorism. Newsweek, July 15, 2017.
- Terrorattacker med fordon är billiga, enkla och svåra att upptäcka i förväg. se, July 15, 2016.
- En Afghanistan, les pratiques pédophiles minent l’armée et la police. Le Temps, July 4, 2016.
- FBI waarschuwt voor als usb-oplader vermomde keylogger. nl, May 23, 2016.
- Aurora theater shooting victims lose key early battle in civil trial. Denver Post, May 9, 2016.
- Why Fentanyl Is So Much More Deadly Than Heroin. Forbes, April 9, 2016.
- DHS: Threat of destructive cyberattack vs. power grid ‘low’. FedScoop, April 8, 2016.
- Homeland Security report hoses down energy-sector ‘cybergeddon’ talk. The Register, April 6, 2016.
- State Wants Improved Cybersecurity For Utilities. Hartford Courant, April 6, 2016.
- DHS: Risk of destructive cyberattack on grid ‘low’. The Hill, April 6, 2016.
- Spies and shadowy allies lurk in secret, thanks to firm’s bag of tricks. McClatchy, April 5, 2016.
- Government reveals details about energy grid hacks. CNN, April 5, 2016.
- S. Infrastructure Can Be Hacked With Google, Simple Passwords. NBC News, April 3, 2016.
- Hostile Intent and Civilian Protection: Lessons From Recent Conflicts. Just Security, March 10, 2016.
- FBI warns ‘Exploding Targets’ sold in Pa. stores could be used by extremists for IEDs. WTAE, March 7, 2016.
- FBI program instructs teachers to report radical students. Press TV, March 6, 2016.
- How to Spot a Swatter: Dangerous Hoax Calls to Cops Have Several Clues. War is Boring, March 4, 2016.
- The FBI Has a New Plan to Spy on High School Students Across the Country. AlterNet, March 3, 2016.
- The Secret Service’s 2010 Guide for Spotting Concealed Weapons. Popular Mechanics, March 2, 2016.
- The Ayaan Hirsi Ali problem: why do anti-Islam Muslims keep getting promoted as “experts”? Vox, March 1, 2016.
- When the Enemy Is Everywhere: The Rise and Fall of the ‘Kill Box’ in US Military Strategy. DefenseOne, February 28, 2016.
- Mit diesen Tricks erkennen Geheimagenten, ob jemand eine Waffe am Körper trägt. Vice, February 26, 2016.
- GOP candidates talk Apple. Politico, February 26, 2016.
- El velo “promueve el terrorismo pasivo”, según un artículo académico del Pentágono. El Confidencial, February 25, 2016.
- Il velo islamico è una forma di terrorismo “passivo”? Il Fofglio, February 25, 2016.
- Hijab equals ‘passive terrorism’ & other strange claims in US policy paper on countering ISIS. RT, February 24, 2016.
- Hijab wearing is ‘passive terrorism’, says US military publication. The Independent, February 24, 2016.
- Wearing Hijab is Passive Terrorism Says US Military to Women. Telesur TV English, February 23 ,2016.
- S. Military White Paper Describes Wearing Hijab as “Passive Terrorism”. The Intercept, February 23, 2016.
- The United States and Cyberspace: Military Organization, Policies, and Activities. National Security Archive, January 20, 2016.
- Here’s Aaron Hernandez’s full ‘Lifetime Loyalty’ neck tattoo. Boston Globe, December 24, 2015.
- Muslim-American Communities Should Not Be Blamed for Violent Extremism. New York Times, December 6, 2015.
- Attentats de Paris : les services secrets américains savaient. Midi Libre, November 19, 2015.
- Attentats de Paris : le rapport prémonitoire des services secrets américains. Le Parisien, November 19, 2015.
- En mai, les Etats-Unis avaient alerté l’Europe sur les risques d’attentats. Le Figaro, November 19, 2015
- Attentats à Paris : les États-Unis avaient alerté sur les risques d’attentats et la dangerosité d’Abdelhamid Abaaoud. fr, November 18, 2015.
- US Intel Foresaw Paris-Style Attack in Europe. ABC News, November 17, 2015.
- DHS intel assessment warned of alleged Paris ringleader. CNN, November 17, 2015.
- Muslim students in California face discrimination. Al Jazeera, October 31, 2015.
- Military looks to upgrade its “tactical biometrics” with Identity Dominance System 2. Ars Technica, October 9, 2015.
- The U.S. Army Has More Than a Dozen Spy Planes in South Korea. War is Boring, September 16, 2015.
- Build Your Own Scary Surveillance Jeep For Under $5000 With This Hacker’s Guide. Forbes, September 15, 2015.
- 4 hard-earned lessons about cyber ops. Foreign Policy, September 14, 2015.
- Here’s What Our Obsession With Apple Really Says About Us. Mic, September 9, 2015.
- Every surface ship in the Chinese navy, in one chart. Business Insider, August 26, 2015.
- Right-wing extremists plotting violent attacks on US Muslims, FBI warns. Electronic Intifada, August 25, 2015.
- FBI Warns Right-Wing Militias Are Targeting Mosques and Muslims. Alternet, August 20, 2015.
- FBI: Anti-Muslim Voices Fuel Increased Threat From Militias. Georgetown University Bridge Initiative, August 20, 2015.
- CAIR Urges Safety Precautions After FBI Report Says Militias are Targeting U.S. Muslim Institutions. Council on American-Islamic Relations, August 18, 2015.
- Intimidating Military Personnel by Targeting Their Families. Schneier on Security, August 12, 2015.
- Before ISIS recruited on Twitter, the U.S. worried about jihadists on Myspace. Daily Dot, July 16, 2015.
- Revealing the RATs and scoring the agencies. FCW, June 29, 2015.
- Week of truth for surveillance — Kerry talks cyber in Asia — ‘I hacked an airplane engine’. Politico, May 18, 2015.
- Behold the Stupidest Government Report EVER. Gawker, May 4, 2015.
- Inside the Military-Police Center That Spies on Baltimore’s Rioters. Gawker, May 1, 2015.
- Combat Tech Is Turning Baltimore Into A Paramilitary Zone. Gizmodo Australia, April 30, 2015.
- Que sont les IMSI-catchers, ces valises qui espionnent les téléphones portables? Le Monde, March 31, 2015.
- The CIA and Signals Intelligence. National Security Archive, March 20, 2015.
- The complex draw of the Islamic State. Tampa Tribune, March 15, 2015.
- DOD guide looks beyond FedRAMP protections. FCW, February 9, 2015.
- Will Sharing Cyberthreat Information Help Defend the United States? Brookings Institution, January 20, 2015.
- To Stop Al Qaeda We Must Change the Way We React to Its Attacks. Huffington Post, January 11, 2015.
- Mad Men: Inside the Men’s Rights Movement—and the Army of Misogynists and Trolls It Spawned. Mother Jones, January 2015.
- Copyright Law as a Tool for State Censorship of the Internet. EFF, December 3, 2014.
- Morning Cybersecurity. Politico, December 1, 2014.
- The Feds Are Now Using ‘Stingrays’ in Planes to Spy on Our Phone Calls. Wired, November 14, 2014.
- Recently declassified TSA reports from 2011 said no immediate threats to freight rail, mass transit. FierceHomelandSecurity, October 30, 2014.
- Counter-Unconventional Warfare Is the Way of the Future. How Can We Get There? Council on Foreign Relations, October 23, 2014.
- 27 Phrases Only Spies Will Understand. Business Insider, September 3, 2014.
- ‘Sovereign citizen’ group duped youngsters into collecting intel on local police. Raw Story, September 2, 2014
- Term Of The Day: ‘Google Dorking’. Business Insider, August 28, 2014.
- Feds warn first responders of dangerous hacking tool: Google Search. Ars Technica, August 27, 2014.
- NHTSA takes next step on national crash-avoidance system. FCW, August 19, 2014
- How to talk about blowing things up in cyberspace, according to the military. Washington Post, July 23, 2014.
- When Terrorists Have Drones. Bloomberg View, July 22, 2014.
- A few thousand dollars – the price of life for civilians killed in war zones. Thomson Reuters Foundation, July 16, 2014.
- Spreadsheets list prices paid for an Afghan life, a cow and a car. Thomson Reuters Foundation, July 16, 2014.
- FBI issues phish warning to feds. FCW, June 26, 2014.
- Hackers Target the World Cup. WPTV, June 9, 2014.
- How the US institutionalized surveillance. Al Jazeera America, May 24, 2014.
- Florida Cops’ Secret Weapon: Warrantless Cellphone Tracking. Wired, March 3, 2014.
- The Rules of Drone Warfare. Time, December 29, 2013.
- FirstNet will let two more BTOP grantees use its 700 MHz spectrum for LTE networks. FierceWirelessTech, December 18, 2013.
- DARPA Tried to Build Skynet in the 1980s. Gizmodo, December 18, 2013.
- Good Read: ‘The Real Purpose of Oakland’s Surveillance Center’. KQED, December 18, 2013.
- How NSA Mass Surveillance is Hurting the US Economy. EFF, November 27, 2013.
- Dette vil være spesielt uheldig for vårt sykehjem. Dagbladet, November 27, 2013.
- Colorado fire officials fear explosion of marijuana oil production. Denver Post, November 18, 2013.
- Flere titalls norsksomaliere innkalt til PST-samtaler. Aftenposten, October 11, 2013.
- Slik var jakten på internetts største narkobaron. Aftenposten, October 9, 2013.
- US Navy SEALs face a fight in Somalia. Global Post, October 7, 2013.
- The Silk Road Online Drug Marketplace by the Numbers. Mashable, October 4, 2013.
- The Limits Of Intelligence Gathering: Kenyan Govt. Warned A Year Before Attack That Terrorists Were Targeting Westgate Mall. TechDirt, October 2, 2013.
- Silk Road Kingpin Allegedly Ordered 2 Hits, but Where Are the Bodies? Mashable, October 3, 2013.
- Contrary to what you’ve heard, Android is almost impenetrable to malware. Quartz, October 3, 2013.
- The US Army Guide That Teaches Soldiers To Recognize Terrorist Logos. Gizmodo, September 27, 2013.
- I ‘Got Snatched’: Daniel McGowan’s Bizarre Trip Through America’s Prison System. Huffington Post, September 12, 2013.
- Jihadist terrorism in America since 9/11. CNN, September 10, 2013.
- Syrian Electronic Army placed on FBI wanted list. ZDNet, September 6, 2013.
- The FBI Is Now at War with Syrian Hackers. The Atlantic Wire, September 6, 2013.
- FBI Warns Of Syrian Electronic Army Hacking Threat. Information Week, September 6, 2013.
- FBI Adds Syrian Electronic Army To Wanted List; Supporters Of Hacker Collective Will Be Regarded As Terrorists. International Business Times, September 5, 2013.
- Snowden-Unterlagen: Al-Qaida wappnet sich gegen Kampfdrohnen. Der Spiegel, September 4, 2013.
- How to Defeat the Drones. Slate, September 4, 2013.
- Here’s How Al-Qaeda Tried to Sabotage American Drones. The Atlantic, September 3, 2013.
- Android KitKat unveiled in Google surprise move. BBC, September 3, 2013.
- The GOP should support Obama on Syria. Washington Post, September 3, 2013.
- Android is Target of 79 Percent of Mobile Malware, Government Report Says. ABC News, August 28, 2013.
- S. Government Issues Warning About Security on Android Phones. New York Times, August 28, 2013.
- DHS, FBI warn first responders of Android threat. SC Magazine, August 28, 2013.
- Android ‘accounts for 79% of phone malware’. BBC, August 28, 2013.
- 79 Percent of Mobile Malware Targets Android. PC Magazine, August 28, 2013.
- S.: Apple’s iOS accounts for only 0.7% of mobile malware. Fortune, August 27, 2013.
- Four Out of Five Malware Menaces Choose Android. AllThingsD, August 27, 2013.
- S. agencies report concerns over Android security vulnerabilities. UPI, August 27, 2013.
- US government says Android is a malware magnet thanks to OS fragmentation. The Verge, August 27, 2013.
- S. security agencies say Android mobile main target for malware. Reuters, August 27, 2013.
- Public Intelligence releases Android threat warning from Homeland Security and the FBI. SlashGear, August 26, 2013.
- Internal US government memo warns authorities about Android malware threats. The Next Web, August 26, 2013.
- Android Malware: 44 Percent Of Android Users Vulnerable To Attacks According To U.S. Government. International Business Times, August 26, 2013.
- Android security holes worry FBI, DHS. CNET, August 26, 2013.
- Millions Of Android Users Vulnerable To Security Breaches. Business Insider, August 25, 2013.
- Vil utvikle en superledende datamaskin. no, August 9, 2013.
- The reality behind prison tattoos. HLN, August 8, 2013.
- A Comprehensive Guide to Cooking Meth on ‘Breaking Bad’. Vice, August 11, 2013.
- Mexican Cartels Are Recruiting US Soldiers As Hitmen, And The Pay Is Good. Business Insider, August 5, 2013.
- Telekom-Tochter stellt US-Geheimdiensten Daten zur Verfügung. Süddeutsche.de, July 23, 2013.
- FCC to El Reg: Telstra’s ‘secret FBI snoop’ doc public since 2001. The Register, July 17, 2013.
- FBI handed access to Telstra’s cables. SC Magazine, July 12, 2013.
- Telstra signed deal that would have allowed US spying. The Guardian, July 12, 2013.
- Telstra’s deal with the devil: FBI access to its undersea cables. Crikey, July 12, 2013.
- Somali American caught up in a shadowy Pentagon counterpropaganda campaign. Washington Post, July 7, 2013.
- Latest Glenn Greenwald Scoop Vindicates One Of The Original NSA Whistleblowers. Business Insider, June 27, 2013.
- Sheriff aware of report about suspected terror cell in Brooke Co. WTOV, June 26, 2013.
- 10 things to know about the NSA. Politico, June 12, 2013.
- How to Build a Secret Facebook. Vice, June 11, 2013.
- Inside the NSA’s secret Utah data center. Fox News, June 11, 2013.
- A Blizzard of Snowdens. National Review, June 10, 2013.
- Verizon Allegedly Built A Fiber Optic Cable To Give The Feds Access To Communications. Business Insider, June 10, 2013.
- What We Don’t Know About Spying on Citizens: Scarier Than What We Know. The Atlantic, June 6, 2013.
- NSA data collection turns attention to Utah Data Center. KSTU, June 6, 2013.
- Secret court says yes when NSA seeks authority to spy. Deseret News, June 6, 2013.
- Shackles, masks and nasal tubes: Gitmo revises force-feeding techniques. RT, May 13, 2013.
- Federal judge denies motion to throw out evidence gathered via fake cell tower. Ars Technica, May 8, 2013.
- Attacks Like the Boston Bombing Are Nearly Unpreventable. Time, May 6, 2013.
- Spletni navdihi za izdelovalce bomb. Mladina, May 5, 2013.
- Photos: Stark Scenes From the Guantanamo Hunger Strike. Mother Jones, May 4, 2013.
- Mapped: The U.S. military’s presence in Africa. Foreign Policy, May 1, 2013.
- “Guns Not Bombs”. Jacobin, April 26, 2013.
- Boston marathon attack: How radical websites and mystery man ‘Misha’ turned Tamerlan Tsarnaev to terror. com.au, April 24, 2013.
- How A Pressure Cooker Bomb Works. Popular Science, April 23, 2013.
- Here’s the Jihadist Magazine That Taught the Boston Bombers to Kill. Gawker, April 23, 2013.
- Mexico’s Zetas Cartel Recruiting Americans Since 2010. Fox News, April 23, 2013.
- Mexican Cartel Has Been Recruiting Americans Since 2010. Univision, April 22, 2013.
- Drone Strikes and the Boston Marathon Bombing. The Atlantic, April 21, 2013.
- FBI Interviewed Bombing Suspect in 2011 at Russia’s Request. ProPublica, April 19, 2013.
- Don’t Panic, But Mexico’s Zetas Cartel Wants to Recruit Your Kids. Wired, April 18, 2013.
- YouTube ‘Russian’ Guns And Explosives Expert Referenced In FBI Bulletin. Business Insider, April 18, 2013.
- FBI Warned in March That ‘Exploding Targets’ Could Fuel Homemade Bombs. Wired, April 17, 2013.
- Homeland Security Warned In 2004, 2010 Of Pressure Cooker Bombs Like Those In Boston Marathon Explosions. Fast Company, April 16, 2013.
- A history of pressure cooker bombs. CBC, April 16, 2013.
- Pressure-cooker bombs in Boston: lethal do-it-yourself. The Guardian, April 16, 2013.
- Pressure cookers have been used to hide IEDs in Afghanistan for years. Foreign Policy, April 16, 2013.
- President Obama to speak in Boston on Thursday. Politico, April 16, 2013.
- New York will Geld mit Überwachungstechnik verdienen. Die Zeit, April 4, 2013.
- New e-mails reveal Feds not “forthright” about fake cell tower devices. Ars Technica, March 27, 2013.
- She’s Just Not That Into You: Air Force Warns of Online ‘Sextortion’. Wired, March 26, 2013.
- Are Urban Explorers Really a Threat to Our National Security? The Atlantic Cities, March 21, 2013.
- Urban Exploration Helps Terrorism, Counterterrorism Agency Warns. Wired, March 19, 2013.
- Consent and Ending Violence Against Women and Children. Huffington Post, March 4, 2013.
- Details Revealed on Secret U.S. “Ragtime” Domestic Surveillance Program. Slate, February 28, 2013.
- Intelligence gathered by anti-terror agency largely a mystery. North Carolina Star News, February 22, 2013.
- 7 Obscure, Remote and Super-Geeky Military Bases. Wired, February 22, 2013.
- Do we really want gadgets that watch us all the time? TechRadar, February 14, 2013.
- Is This the Secret U.S. Drone Base in Saudi Arabia? Wired, February 7, 2013.
- Where We Know There Are US Drones. International Business Times, February 6, 2013.
- Inside the US military’s tactical IRC system. The Verge, January 31, 2013
- Mass Shooters: Mostly Solo White Guys, Lots Mad at Their Jobs, Still Not Much We Can Do in Public Policy Terms. Reason, January 30, 2013.
- Report From Homeland Security Details ‘Commonalities’ In Mass Shootings. NPR, January 30, 2013.
- Here Are the Patterns the Feds Found for U.S. Mass Killings. Wired, January 30, 2013.
- Spy Bases: 9 Secretive HQs of the World’s Intelligence Agencies. Wired, January 22, 2013.
- What we learned from the Stratfor document dump. San Diego CityBeat, January 9, 2013.
- How to Build a Spy-Proof Room. Time, January 3, 2013.
- Is Your Healthcare Data Vulnerable to Hacks? Mashable, December 27, 2012.
- Healthcare needs a lesson in cybersecurity 101, report says. GigaOm, December 26, 2012.
- The DHS: Selling Fear And Uncertainty; Buying Sno-Cone Machines And Latrines-On-Wheels. TechDirt, December 14, 2012.
- Intruders hack industrial heating system using backdoor posted online. Ars Technica, December 13, 2012.
- FBI Memo: Hackers Breached Heating System via Backdoor. Wired, December 13, 2012.
- The DVR That Watches You Back: Verizon Applies For ‘Ambient Action’ Detecting Device Patent. Techdirt, December 7, 2012.
- If You Eat Something, Say Something: DHS Sounds The Alarm On The ‘Terrorist Implications’ Of Food Trucks. Techdirt, November 12, 2012.
- Sorry About That, Chief: A Class in Classification. Time, November 1, 2012.
- Angst vor den fliegenden Augen. Der Spiegel, October 25, 2012.
- Could Food Trucks Be Used For Terrorism? Zagat, October 25, 2012.
- Food Trucks: Trendy Treat or Terrorist Threat? Bon Appetit, October 25, 2012.
- Food Truck Terrorism? FDNY Report Says Trucks Pose Serious Threat. Huffington Post, October 25, 2012.
- Are Food Trucks Terrorist Threats? The FDNY Seems to Think So. Village Voice, October 25, 2012.
- Food Trucks Are Increasingly Serious Terrorism Threat, Says NYC’s Fire Department. Gizmodo, October 24, 2012.
- Terrorist ließ sich von FBI-Agenten narren. de, October 18, 2012.
- Insurgent Bombs Spread Way Beyond Iraq and Afghanistan. Wired, October 17, 2012.
- Cloak Blade: First It Was Octo-Mom – Now It’s Octo-Rotor . Time, September 27, 2012.
- Deadlier drones are coming. Global Post, September 23, 2012.
- Tattoos: Klassische Motive – und ihre Bedeutung. Der Spiegel, September 18, 2012.
- HACKED STRATFOR EMAILS: DEA Told To Back Off From The Brother Of Afghan President Hamid Karzai. Business Insider, September 18, 2012.
- City cancels plans for Super Bowl drone despite enthusiasm and interest from NOPD, others. The Lens, September 17, 2012.
- Nuclear Terrorism: How Big a Threat? National Security Archive, September 7, 2012.
- Exclusive: Fast and Furious IG report slams ATF Phoenix personnel. CBS, August 27, 2012.
- The National Security Agency’s Domestic Spying Program. New York Times, August 23, 2012.
- Whither WikiLeaks? Cryptome has you covered. InfoWorld, August 21, 2012.
- TrapWire spioniert Bürger in großem Stil aus. Die Zeit, August 13, 2012.
- Training the Afghan Military. Time, August 10, 2012.
- NYPD to launch city-wide surveillance to track criminals, terrorists. Global Post, August 8, 2012.
- No terrorism, but questions, in Colorado theater shooting rampage. Government Security News, July 23, 2012.
- In May, DHS warned about terrorist attacks on movie theaters. Washington Examiner, July 21, 2012.
- How the Air Force Stops Social Media from Spilling Military Secrets. Gizmodo, July 17, 2012.
- fire agency tests bomb recipe in terror magazine. California Watch, July 17, 2012.
- Air Force to Mil-Tweeters: You’re All Clueless N00bs. Wired, July 16, 2012.
- Immigrants with ‘gang tattoos’ denied U.S. visas: report. Yahoo News, July 11, 2012.
- Will your Internet provider be spying on you? CNN, July 6, 2012.
- Courage Services, Inv. (as in, Invisible). Time, July 3, 2012.
- Drones: Another Target for Hackers. PC World, July 1, 2012.
- Tattoos: the hidden meanings. The Guardian, June 27, 2012.
- Domestic Drones Are Here…To Stay. Council on Foreign Relations, June 21, 2012.
- The Military’s Plans for Drones at Home. PBS, June 19, 2012.
- Software updates for lifesaving medical devices found tainted with malware. Computerworld, June 19, 2012.
- 64 drone bases now located throughout United States. PressTV, June 18, 2012.
- Is a Military Drone Base Coming to Your Hometown? ABC News, June 18, 2012.
- The Man Behind the ‘Blue Ball’ Emails Scandal That Snared Brett McGurk. The Daily Beast, June 14, 2012.
- Senate bill aims to crack down on domestic drone surveillance. Ars Technica, June 14, 2012.
- Lawmakers erect challenges to drones in US airspace. Fox News, June 14, 2012.
- Public Intelligence identifies 64 aerial drone bases in the US. The Verge, June 13, 2012.
- Revealed: 64 Drone Bases on American Soil. Wired, June 13, 2012.
- PsyWar of Words. Time, June 12, 2012.
- Did You Hear the One about U.S. Internment Camps? Foreign Policy, May 17, 2012.
- How Police Track Your Phone. PC Magazine, May 16, 2012.
- Money As a Weapon System Afghanistan (MAAWS-A). Time, May 15, 2012.
- Fear the zombie drone. Salon, May 8, 2012.
- Leaseweb laakt handelen overheid bij neerhalen site. Webwereld, May 5, 2012.
- FBI: Motorcycle Gang Trademarked Logo to Keep Narcs at Bay. Wired, April 18, 2012.
- Homeland Security’s ‘Pre-Crime’ Screening Will Never Work. The Atlantic, April 17, 2012.
- Pricey ‘stingray’ gadget lets cops track cellphones without telco help. NBC, April 3, 2012.
- Boredom, terror, deadly mistakes: Secrets of the new drone war. Salon, April 3, 2012.
- NSA dismisses claims Utah Data Center watches average Americans. Fox News, March 28, 2012.
- La sonrisa de un asesino. El Pais, March 17, 2012.
- Police Try To Intimidate Occupy. Adbusters, March 14, 2012.
- Gangster handbook: CBSA looks to tattoos to detect gang members. Vancouver Sun, March 3 2012.
- Angry Birds, Meet Jailbirds: New App Helps You Snitch on Your Friends. Wired, March 3, 2012.
- The Meanings of Gang Tattoos, Explained By Canadian Border Protection. Gawker, March 3, 2012.
- “Green on Blue”. Time, March 2, 2012.
- Gangs Use Skype to Conduct Operations. Security Management, March 1, 2012.
- Killed at Their Desks: The Growth of the (Human) IED Threat — and Mutual Mistrust — in Afghanistan. Time, February 27, 2012.
- Taliban Suicide Attacks Have Held Steady for Most of the War. Wired, February 24, 2012.
- The FBI and the DOJ want you to report suspicious people and monitor social networks. Goodbye liberty. NetworkWorld, February 17, 2012.
- Nanosecond Trading Could Make Markets Go Haywire. Wired, February 16, 2012.
- Fliers Reveal Profile Of A Perfect Terrorist (They Pay For Coffee With Cash, Apparently). Huffington Post, February 16, 2012.
- Warning: You Might Be a Terrorist If You Buy Your Morning Coffee With Cash. Village Voice, February 14, 2012.
- FBI: online privacy is voor terroristen. Web Wereld, February 5, 2012.
- The Wrong Way To Monitor Internet Cafes for Terrorists. Slate, February 2, 2012.
- Targeting Waste. Time, January 26, 2012.
- Condolence payments to Afghans total millions. Army Times, January 23, 2012.
- “Automatische Kennzeichenfahndung”: Vorratsdatenspeicherung jetzt auch von Autos. Netzpolitik, January 17, 2012.
- Marine Corps manual offers a blunt, revealing portrait of Afghan war. Washington Post, January 11, 2012.
- Would It Have Made a Difference? Time, January 5, 2012.
- Debbie Cook, Former Scientology Executive, Blasts Church Leadership In Email. Huffington Post, January 4, 2012.
- The Military’s Wish List for Non-Lethal Weapons. The Atlantic, January 4, 2012.
- Pentagon’s non-lethal weapon projects leaked – including a laser beam that ‘steers enemy planes’. Daily Mail, January 4, 2012.
- The Pentagon’s Premise: This Won’t Hurt. Much. Time, January 4, 2012.
- US military’s non-lethal weapon plans revealed. The Register, January 4, 2012.
- US non-lethal weapon ‘wish list’ revealed on the net. BBC, January 4, 2012
- Exposed: The Military’s Freakiest ‘Non-Lethal’ Weapon Ideas. Wired, January 3, 2012.
- Official: US limits intel value of drones. AP, December 18, 2011.
- Amid Claims of More Captured Drones, a Report on Their Vulnerability. New York Times, December 15, 2011.
- Leak Shows Blizzard Ready to Collaborate with Law Enforcement Over World of Warcraft. Softpedia, November 23, 2011.
- Police procedures leaked for getting into Facebook, other accounts. CNET, November 23, 2011.
- Facebook’s Increasingly Lenient Police Officer Guidelines. The Atlantic, November 23, 2011.
- Hackers Leak Facebook Law Enforcement Guidelines. Talking Points Memo, November 23, 2011.
- World of Warcraft ‘Law Enforcement Guide’ Supposedly Reveals What Blizzard Would Tell the Cops about You. Kotaku, November 21, 2011.
- Cyber-security of continent’s power grid ‘chaotic,’ report warns. Montreal Gazette, November 15, 2011.
- OpCartel, a Name Emerges. Forbes, November 5, 2011.
- DHS Identifies Method Terrorists Could Use To Attack U.S. Water Supplies. Security Management, October 25, 2011.
- DHS: Anonymous not a threat to industrial systems, for now. Government Computer News, October 18, 2011.
- Hacktivist participation in Occupy protests draw federal attention. KALW, October 18, 2011.
- The government has it wrong on Anonymous and critical infrastructure. SC Magazine, October 18, 2011.
- Can Anonymous Cripple Critical U.S. Infrastructure? InformationWeek, October 18, 2011.
- Could Anonymous Take Down Critical U.S. Infrastructure? PC Magazine, October 18, 2011.
- DHS issues warning that Anonymous may attack infrastructure. Computerworld, October 18, 2011.
- ‘Anonymous’ Wants to Hack U.S. Industrial Control Systems, DHS Says. Government Technology, October 18, 2011.
- DHS: Anonymous Interested in Hacking Nation’s Infrastructure. Wired, October 17, 2011.
- Hacktivists pose growing threat to industrial computing. The Register, October 17, 2011.
- Hacker group threatens industrial computer systems. Washington Times, October 17, 2011.
- DHS assessed Anonymous threat to industrial control systems. The Inquirer, October 17, 2011.
- ‘Occupy Wall St.’ to resist mayor’s order to vacate park on Friday. Raw Story, October 13, 2011.
- The Onion Predicts the Future: Al Qaeda vs. 9/11 Truthers. Mother Jones, October 3, 2011.
- CIA Drone Strike in Yemen Silences al-Qaeda’s Most-Effective English Voice. Bloomberg, October 1, 2011.
- Al-Qaida Tells Iran: Stop Promoting Sept. 11 Conspiracy Theories. NPR, September 28, 2011.
- Qaida Magazine Reduced To Reminiscing About 9/11. Wired, September 27, 2011.
- Obama must deal with Turkey-Israel crisis. Washington Post, September 16, 2011.
- Ridding Fukushima of radiation contamination. Al-Jazeera, September 12, 2011.
- As cartels rapidly expand in U.S. cities, authorities confront futility of drug arrests. Raw Story, September 8, 2011.
- Spokane Martin Luther King Jr. Day would-be bomber pleads guilty. Los Angeles Times, September 7, 2011.
- Ambushes By Mexican Cartels Use Military Tactics. Security Management, September 2, 2011.
- Military Plans to Squash Civil Unrest in the USA. Network World, August 17, 2011.
- The New European Far-Right. New York Review of Books, August 9, 2011.
- Anonymous are script kiddies, says DHS. Fierce Government IT, August 7, 2011.
- Anonymous Hacking Skills “Rudimentary” For Now. InformationWeek, August 4, 2011.
- FBI Document Reveals Spokane Bomb Was Radio-Controlled. NPR, August 4, 2011.
- US Homeland Security warns about Anonymous. The Inquirer, August 3, 2011.
- Law Enforcement: Gangs, terrorists plot evil over Xbox and PS3. Computer World, August 2, 2011.
- Gangi Nowego Jorku porozumiewają się przez konsole do gier. pl, July 30, 2011.
- Reading the Pictures: Norway Massacre: What’s in a Headshot? Huffington Post, July 26, 2011.
- Noorse schutter had afkeer van islam. NOS Nieuws, July 23, 2011.
- Norway’s Terrorist in Disguise. The Daily Beast, July 23, 2011.
- Online, Clues to a Suspected Attacker’s Motives. New York Times, July 23, 2011.
- A Little Late to the Party: Al-Qaeda Magazine Pokes Fun at Anthony Weiner. TIME, July 22, 2011.
- Terrorist Magazine Celebrates Its Most Epic Fails. Wired, July 19, 2011.
- “Zetas” secuestran y extorsionan en EU. El Universal, July 16, 2011.
- A new law-enforcement tool: Facebook searches. Reuters, July 12, 2011.
- Hacker legen Al-Kaida lahm. n-tv, June 30, 2011.
- News of the world: Sarko yanked, indictments in Hariri probe, Obama sends Gates off with Medal of Freedom. Yahoo News, June 30, 2011.
- Two Former Blackwater Employees Heading to Prison. Project on Government Oversight, June 29, 2011.
- Highlights of What’s Been Found in LulzSec’s Arizona Documents. The Atlantic, June 24, 2011.
- British spies swap cupcake recipes into al-Qaida magazine. Yahoo News, June 3, 2011.
- Britit täyttivät Al-Qaidan nettilehden leivosresepteillä. It-viiko, June 3, 2011.
- British spy agents reportedly hack Al Qaeda magazine, replacing its bomb-making instructions with recipes for cupcakes. Los Angeles Times, June 3, 2011.
- Hacket inn USAs beste muffins i al-Qaida-magasin. Dagbladet, June 3, 2011.
- Operation Cupcake: MI6 replaces al-Qaeda bomb-making instructions with cupcake recipes. Washington Post, June 3, 2011.
- Britain mounted secret 2010 cyberwarfare attack on al-Q. The Register, June 2, 2011.
- Stop the Presses! Spooks Hacked al-Qaida Online Mag. Wired, June 1, 2011.
- Jihad in the Digital Age. Investigative Project on Terrorism, May 31, 2011.
- New Terrorist Threats: Greenpeace and a Dead Elephant. Mother Jones, May 17, 2011.
- Leyniklúbbur Davíðs, Geirs og Björns? Ný bók segir áhrif Bilderberg klúbbsins ofmetin. Pressan, May 12, 2011.
- Kabul Bank fraud: consultants ignored warning signs, report says. The Guardian, May 11, 2011.
- Green Is the New Red: The Crackdown on Environmental Activists. Mother Jones, May 11, 2011.
- Facebook: Simply a Spying Machine? IT World, May 8, 2011.
- US spooks to build 60 megawatt data center. The Register, May 4, 2011.
- Here’s what happens when the police subpoena your Facebook. The Next Web, May 2, 2011.
- Verizon to Slap Phones With Location-Tracking Disclaimers. TIME, April 29, 2011.
- Terrorism, Eh? Qaida Member Snitched for Canada. Wired, April 26, 2011.
- Terrorists Could Exploit Hurricane in U.S., Report Warns. Global Security Newswire, April 25, 2011.
- Spokane Bomb Suspect Accused Of Hate Crime. NPR, April 22, 2011.
- DHS Weather Forecast: Stormy with a Chance of Terror. Wired, April 22, 2011.
- MENA Revolutions: Implications for Al Qaeda. Journal of Foreign Relations, April 3, 2011.
- ‘Paranoia Meter’ Is HBGary’s Plot to Find the Pentagon’s Next WikiLeaker. Wired, April 3, 2011.
- Gadhafi in Groucho Glasses? Even al-Qaida Thinks He’s a ‘Lunatic’. AOL News, March 31, 2011.
- Al-Qaeda magazine’s latest issue covers Middle East ‘revolution’. Yahoo News, March 30, 2011.
- Al-Qaeda Mag: We Heart The Mideast Revolts. Wired, March 30, 2011.
- US soldiers posed with dead Afghan. Al Jazeera, March 22, 2011.
- Amerikaanse militairen poseren met Afghaanse lijken. nl, March 21, 2011.
- The War-Crimes Photos the Army Apologized For. Gawker, March 21, 2011.
- US army soldiers pose with dead Afghan. Al Jazeera, March 21, 2011.
- Army Apologizes After Published Photos Show U.S. Soldiers Posing With Afghan Corpse. Fox News, March 21, 2011.
- FBI report details bomb’s makeup. Spokane Spokesman-Review, March 17, 2011.
- FBI/DHS Document Confirms That MLK Day Bomb Was Viable. Talking Points Memo, March 17, 2011.
- Documents reveal contents of Spokane backpack bomb. KTVB, March 17, 2011.
- Intelligence Report Confirms Viability of MLK Day Bomb. KXLY, March 16, 2011.
- ‘Jihad Cosmo’ magazine tells women how to raise warriors. Toronto Star, March 15, 2011.
- Are the Bank of America leaks a smoking gun or a dud? American Independent, March 14, 2011.
- ‘For official use only’ doc directs police to pipe down on Facebook. Center for Investigative Reporting, February 23, 2011.
- Army of fake social media friends to promote propaganda. Computer World, February 22, 2011.
- Look Who Wants To Be Facebook Friends. Voice of America, February 18, 2011.
- Revolution U. Foreign Policy, February 16, 2011.
- Assange Witness Raises Questions About Alleged Sex Victim. AOL News, February 4, 2011.
- Counterfeit law badges pass security points. Federal Times, January 23, 2011.
- How To: Run Snitches Inside Terrorist Groups. Wired, December 24, 2010.
- How To Fly The Harrier Jump Jet. Jalopnik, December 20, 2010.
- Air Force ‘Routinely’ Blocks Access To News Websites; HuffPost Caught In The Web. Huffington Post, December 17, 2010.
- North Korea Breaks Into Twitter, Facebook, YouTube. The Atlantic Wire, December 16, 2010.
- North Korea’s Viral Vids Will Send You Screaming to Your Secret Bunker. Wired, December 13, 2010.
- Osama Wants To Be Your Facebook Friend. Wired, December 6, 2010.
- I pacchi bomba e Al Qaeda: l’obiettivo è danneggiare l’industria dell’aviazione. Corriere Della Sera, November 21, 2010.
- Top 10 oddities at the Seoul G20. Toronto Star, November 10 ,2010.
- Farligere for norske soldater enn andre allierte. Aftenposten, November 7, 2010.
- Secrets of the ‘anti-secrecy’ sites laid bare. BBC, October 20, 2010.
- How to build a police department from scratch. Slate, October 20, 2010.
- CNN says Pakistan protecting Osama bin Laden; France on alert for terrorist attacks. Christian Science Monitor, October 18, 2010.
- Al-Qaeda: Kør folk ned på Strøget. dk, October 13, 2010.
- Nova revija Al Kaide zagovornikom džihada ponuja nasvete, kako izvesti teroristične napade. si, October 13, 2010.
- Terroraufruf in Online-Magazin. Der Standard, October 12, 2010.
- ‘Blackwater’ gets new US contract. Al Jazeera, October 2, 2010.
- Doc of the Day: Feds’ Guide To Snitching on Your Terrorist Neighbor. Wired, September 22, 2010.
- FBI Keeping Watch on Quran-Burning Threat. Newsweek, September 8, 2010.
- Disturbing Images Show The Dark Reality Of Mexico’s Drug Violence. Business Insider, September 8, 2010.
- The Futility of an Israeli Air Strike Against Iran’s Nuclear Sites. The Atlantic, August 18, 2010.
- With Iran And Afghanistan Heating Up, Here Are The Threats The U.S. Air Force Is Really Worried About. Business Insider, July 27, 2010.
- God Is Great. Inspire Is Not. Slate, July 20, 2010.
- The Hazmat Suicides. Occupational Health & Safety, July 1, 2010.
- Why The Sun Never Sets On The British Petroleum Empire. Business Insider, June 4, 2010.
- Why BP just doesn’t care. AlterNet, June 3, 2010.
- P. Had No Idea What Animals Even Live in the Gulf. Vanity Fair, May 28, 2010.
- Why Wasn’t There a Better Plan? Newsweek, May 27, 2010.
- Waarom BP liegt over de olieramp in de Golf van Mexico. be, May 26, 2010.
- BP’s Gulf Oil Spill “Plan”. Mother Jones, May 26, 2010.
- The 7 dumbest things in BP’s spill response plan. Grist, May 25, 2010.
- BP’s Response Plan Was A Joke, Group Charges. Huffington Post, May 24, 2010.
Scholarly Articles and Research Reports
- Leslie Stanfield. Predicting Cyber Attacks: A Study of the Successes and Failures of the Intelligence Community. Small Wars Journal, July 2016.
- Andy Wang. Stealing Press Credentials: Law Enforcement Identity Misappropriation of the Press in the Cyber Era. University of Miami National Security & Armed Conflict Law Review, Vol. V1, 2016.
- Faisal Hassan Hamed. Challenges facing the security services in Saudi Arabia. Arab Journal of Security Studies, 2016.
- Andrew Hemmer. Duty of Candor in the Digital Age: The Need for Heightened Judicial Supervision of Stingray Searches. Chicago-Kent Law Review, 2016.
- Xander Kirke. Violence and Political Myth: Radicalizing Believers in the Pages of Inspire Magazine. International Political Sociology. Vol. 9, Issue 4, December 2015.
- Antonio José Balloni and Andrew S. Targowski. Challenges and Reflections on Information, Knowledge, and Wisdom Societies and Sociotechnical Systems. Enterprise Systems: Strategic, Organizational and Technological Dimensions Vol 198, April 2015.
- Denise Garcia. Killer Robots: Why the US should Lead the Ban. Global Policy, Vol. 6, Issue 1, February 2015.
- Susanne Fogger and Teena M. McGuinness. Adolescents at Risk: Pain Pills to Heroin: Part II. Journal of Psychosocial Nursing and Mental Health Services. Vol. 53, Issue 53, February 2015.
- Michael Wigginton, Robert Burton, Carl Jensen, David McElreath, Stephen Mallory and Daniel A. Dossd. Al-Qods Force: Iran’s weapon of choice to export terrorism. Journal of Policing, Intelligence and Counter Terrorism Vol. 10, Issue 2, 2015.
- Bart Forsyth. Banning Bulk: Passage of the USA FREEDOM Act and Ending Bulk Collection. Washington and Lee Law Review, 2015.
- Bertold Schweitzer. Modeling Mechanisms of Democratic Transition in the Arab Uprisings. Middle East Critique Vol. 24, Issue 1, 2015.
- Doc Searls. Eof: big bad data. Linux Journal Volume 2014, Issue 247, November 2014.
- Elizabeth K. Hawthorne and Rose K. Shumba. Teaching Digital Forensics and Cyber Investigations Online: Our Experiences. European Scientific Journal, September 2014.
- Fotini Bellou. Cultural Awareness in Peace Operations: Effective Marketing or Strategic Communications. Procedia – Social and Behavioral Sciences, Vol. 148, August 2014.
- Linda Lye. StingRays: The Most Common Surveillance Tool the Government Won’t Tell You About, A Guide for Criminal Defense Attorneys. ACLU of Northern California, June 27, 2014.
- Michał Matyasik. Secure Sustainable Development: Impact of Social Media on Political and Social Crises. Journal of Security and Sustainability Issues Vol. 4, No. 1, 2014.
- Patricia Goedde. Human Rights of Guantanamo Detainees under International and US Law: Revisiting the US Supreme Court Cases. Journal of East Asia and International Law, 2014.
- Elke Krahmann. The UN Guidelines on the Use of Armed Guards. International Community law Review Vol. 16, Issue 4, 2014.
- Paul D. Williams. After Westgate: opportunities and challenges in the war against Al-Shabaab. International Affairs Vol. 90, Issue 4, 2014.
- Elysse Stolpe. MS-13 and Domestic Juvenile Sex Trafficking: Causes, Correlates, and Solutions. Virginia Journal of Social Policy & the Law, 2014.
- Matthew Ruskin. Playing in the Dark: How Online Games Provide Shelter for Criminal Organizations in the Surveillance Age. Journal of International & Comparative Law, 2014.
- Veronika Hajdu. Using Environmental Analysis in the Field of Marketing and Psychological Operations. Military Science Review/Hadtudományi Szemle, 2014.
- Camilla Guldahl Cooper. Rules of Engagement Demystified: A Study of the History, Development and Use of ROEs. Military Law and the Law of War Review, 2014.
- Rita Tehan. Cybersecurity: Authoritative Reports and Resources. Congressional Research Service Report for Congress, March 20, 2013.
- Tibor Rozsa. NATO Information Operations in Theory and in Practice Battling for Hearts and Minds in Afghanistan. AARMS: Academic & Applied Research in Military & Public Management, Vol. 12 Issue 1, January 2013.
- Norman Coleman. Fukushima and the Future of Radiation Research. Radiation Research Vol. 179, No. 1, 2013.
- Spencer Willardson. Strategic intelligence during coin detention operations – relational data and understanding latent terror networks. Defense & Security Analysis 29, No. 1, 2013.
- Brian B. Kelly. Investing in a Centralized Cybersecurity Infrastructure: Why “Hacktivism” Can and Should Influence Cybersecurity Reform. Boston University Law Review, October 2012.
- Jennifer A. Gershman and Andrea D. Fass. Synthetic Cathinones (‘Bath Salts’) Legal and Health Care Challenges. Pharmacy and Therapeutics 37(10), October 2012.
- Faiza Patel and Andrew Sullivan. A Proposal for an NYPD Inspector General. Brennan Center for Justice at New York University School of Law, October 2012.
- Michael Kugelman. Social media in Pakistan: catalyst for communication, not change. Norwegian Peacebuilding Resource Center, August 2012.
- Thomas K. Duncan and Christopher J. Coyne. The Overlooked Costs of the Permanent War Economy: A Market Process Approach. George Mason University Working Paper in Economics, July 2012.
- Dayong Lee, Garry Milman, David M. Schwope, Allan J. Barnes, David A. Gorelick and Marilyn A. Huestis. Cannabinoid Stability in Authentic Oral Fluid after Controlled Cannabis Smoking. Clinical Chemistry V 58, No. 7, July 2012.
- Farhan Hyder Sahito and Wolfgang Slany. Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments. International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 4, No.5, June 2013.
- Eric Sterner. The Paradox of Cyber Protest. George C. Marshall Institute, April 2012.
- Bryan Mercurio. Beyond the Text: The Significance of the Anti-Counterfeiting Trade Agreement. Journal of International Economic Law, April 2012.
- Stephanie K. Pell and Christopher Soghoian. Can You See Me Now?: Toward Reasonable Standards for Law Enforcement Access to Location Data that Congress Could Enact.Berkeley Technology Law Journal, April 2012.
- Angela Gendron and Martin Rudner. Assessing Cyber Threats to Canadian Infrastructure. Report prepared by the Canadian Security Intelligence Service, March 2012.
- Anne Thomson, James Fennell, and Craig Matheson. Danish support to statebuilding and improved livelihoods in Afghanistan. Danish International Development Agency Evaluation Study, 2012.
- Torin Monahan and Priscilla M. Regan. Zones of Opacity: Data Fusion in Post-9/11 Security Organizations. Canadian Journal of Law and Society Vol. 27, No. 3, 2012.
- Eric A. Posner. Deference to the Executive in the United States After September 11: Congress, the Courts, and the Office of Legal Counsel. Harvard Journal of Law & Public Policy, Vol. 35, 2012.
- Beau Barnes. Confronting the One-Man Wolf Pack: Adapting Law Enforcement and Prosecution Responses to the Threat of Lone Wolf Terrorism. Boston University Law Review, Vol. 92, No. 1613, 2012.
- Robert Chesney. Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate. Journal of National Security Law and Policy, Vol. 5, 2012.
- Bryan C. Price. Targeting Top Terrorists: How Leadership Decapitation Contributes to Counterterrorism. International Security, 36, No. 4, 2012.
- Ted Reynolds. Ethical and legal issues surrounding academic research into online radicalisation: a UK experience. Critical Studies on Terrorism Volume 5, Issue 3, 2012.
- Bart Smedts. Iran’s nuclear programme: civil and/or military goals? Defense & Security Analysis Volume 28, Issue 3, 2012.
- Caren Myers Morrison. Passwords, Profiles, and the Privilege Against Self-Incrimination: Facebook and the Fifth Amendment. Arkansas Law Review 65(133), 2012.
- Heather Hrychuk. Decision Making at the Theatre Strategic Level: ISAF HQ. Journal of Military and Strategic Studies 14, Issues 3 & 4, 2012.
- Fernando M. Pinguelo, Wayne Lee and Bradford W. Muller. Virtual Crimes, Real Damages Part II: What Businesses Can Do Today to Protect Themselves from Cybercrime, and What Public-Private Partnerships are Attempting to Achieve for the Nation of Tomorrow. Virginia Journal of Law and Technology Vol. 17, No. 1, 2012.
- Azra Naseem. The literal truth about terrorism: an analysis of post-9/11 popular US non-fiction books on terrorism. Critical Studies on Terrorism 5, No. 3, 2012.
- Christina Hellmich. Fighting Al Qaeda in Yemen? Rethinking the Nature of the Islamist Threat and the Effectiveness of U.S. Counterterrorism Strategy. Studies in Conflict & Terrorism Volume 35, Issue 9, 2012.
- Collin D. Swan. Spot-On Contracting: Improving Transparency & Contractor Personnel Monitoring in Contingency Operations. Journal of Contract Management, 2012.
- John M. Owen. Copyright Law: Graduated Response Systems and the Market for Copyrighted Works. Berkeley Technology Law Journal, 2012.
- Hakan Şentürk, C. Zaim Çil, and Şeref Sağıroğlu. Cyber Security Analysis of Turkey. International Journal of Information Security Science Vol.1, No. 4, 2012.
- Philip A. Schrodt. Precedents, Progress, and Prospects in Political Event Data. International Interactions: Empirical and Theoretical Research in International Relations 38, No. 4, 2012.
- Brad A. Gutierrez, Sarah DeCristofaro and Michael Woods. What Americans Think of International Humanitarian Law. International Review of the Red Cross, 93, No. 884, December 2011.
- Iran and the Nuclear Issue. Belgium Royal Higher Institute for Defense Centre for Security and Defense Studies, October 2011.
- “Just Don’t Call It a Militia” Impunity, Militias, and the “Afghan Local Police”. Human Rights Watch, September 2011.
- Torin Monahan and Priscilla M. Regan. Centers of Concatenation: Fusing Data in Post-9/11 Security Organizations. Vanderbilt University and George Mason University, August 2011.
- Yoram Schweitzer and Gilad Stern. A Golden Opportunity? Al-Qaeda and the Uprisings in the Middle East. Institute for National Security Studies Strategic Assessment, July 2011.
- Mike German and Jay Stanley. Drastic Measures Required: Congress Needs to Overhaul U.S. Secrecy Laws and Increase Oversight of the Secret Security Establishment. American Civil Liberties Union, July 2011.
- Gar y Clyde Hufbauer, Meera Fickling, and Woan Foong Wong. Revitalizing the Export-Import Bank. Peterson Institute for International Ecomonics Policy Brief, May 2011.
- Annyssa Bellal, Gilles Giacca, and Stuart Casey-Maslen. International law and armed non-state actors in Afghanistan. International Review of the Red Cross Volume 93 Number 881, March 2011.
- Sandra Zellmer, Joel Mintz, and Robert Glicksman. Throwing Precaution to the Wind: NEPA and the Deepwater Horizon Blowout. Journal of Energy and Environmental Law, February 2011.
- Rick Nelson and Thomas M. Sanderson. A Threat Transformed: Al-Qaeda and Associated Movements in 2011. Center for Strategic and International Studies, February 2011.
- Margot E. Kaminski. An Overview and the Evolution of the Anti-Counterfeiting Trade Agreement (ACTA). American University Washington College of Law Program on Information Justice and Intellectual Property, January 2011.
- Christopher Soghoian. An End to Privacy Theater: Exposing and Discouraging Corporate Disclosure of User Data to the Government. Minnesota Journal of Law, Science & Technology, 2011.
- Tyler Wall and Torin Monahan. Surveillance and violence from afar: The politics of drones and liminal security-scapes. Theoretical Criminology 15(3) 239–254, 2011.
- Marc Lynch. Explaining the Awakening: Engagement, Publicity, and the Transformation of Iraqi Sunni Political Attitudes. Security Studies, 20, No. 1, 2011.
- Deborah D. Avant and Renée de Nevers. Military Contractors & the American Way of War. Daedalus Vol. 140, No. 3, 2011.
- Gregg P. Macey. Environmental Crisis and the Paradox of Organizing. Brigham Young University Law Review, 2011.
- Angela D. Bussone. Security for Liberty: Ten Years after 9/11, Why Americans Should Care about the Extension of the Patriot Act and its Civil Liberties Implications. 13 Florida Coastal Law Review 85, 2011.
- Pratik Mehta and Rebecca Smith-Bindman. Airport Full-Body Screening: What Is the Risk?. Archives of Internal Medicine, 2011.
- Howell, K. Babe. Fear Itself: The Impact of Allegations of Gang Affiliation on Pre-Trial Detention. 23 St. Thomas Law Review 620, 2011.
- Robin L. Thompson. Radicalization and the Use of Social Media. Journal of Strategic Security, 4 (4): 167-190, 2011.
- Michael N. Widener. Bridging the Gulf: Using Mediated, Consensus-Based Regulation to Reconcile Competing Public Policy Agendas in Disaster Mitigation. Albany Law Review 74: 587, 2011.
- Vincent Toubiana and Helen Nissenbaum. Analysis of Google Logs Retention Policies. Journal of Privacy and Confidentiality Vol. 3, Number 1, 2011.
- Jack Barclay. Challenging the Influence of Anwar Al-Awlaki. International Centre for the Study of Radicalisation and Political Violence, September 2010.
- Demetri Kantarelis. The banking firm: theoretical principles and their violations in the USA. International Journal of Business Continuity and Risk Management. 1, No. 3, 2010.
- Alexander William Beadle. Protection of civilians in theory – a comparison of UN and Nato approaches. Norwegian Defence Research Establishment (FFI), December 15, 2010.
- Ian MacDonald. Deepwater disaster: how the oil spill estimates got it wrong. 7, No. 4, December 2010.
- Eli Berman, Michael Callen, Joseph H. Felter, Jacob N. Shapiro. Do Working Men Rebel? Insurgency and Unemployment in Iraq and the Philippines. National Bureau of Economic Research Working Paper No. 15547, November 2009.