BigoDTsoukalaA, 2008Terror, Insecurity and Liberty: Illiberal Practices of Liberal Regimes After 9/11 (Routledge, London)
4.
CramptonJ W, 2002, “The risks of security”Environment and Planning D: Society and Space20631–635
5.
CramptonJ WGrahamMPoorthuisASheltonTStephensMWilsonM WZookM, 2013, “Beyond the geotag: Situating ‘big data’ and leveraging the potential of the geoweb”Cartography and Geographic Information Science40130–139
6.
CramptonJ WRobertsSPoorthuisA, forthcoming, “The new political economy of geographic intelligence”Annals of the Association of American Geographers
7.
DemarestG, 2003Mapping Colombia: The Correlation Between Land Data and Strategy (Strategic Studies Institute, US Army War College, Carlisle, PA)
8.
de MontjoyeY-AHildalgoC AVerleysenMBlondelV D, 2013, “Unique in the crowd: The privacy bounds of human mobility”Scientific Reports31–5
9.
GreenwaldG, 2013, “NSA collecting phone records of millions of Verizon customers daily”The Guardian 6 June
10.
HannahM, 2010Dark Territory in the Information Age: Learning from the West German Census Controversies of the 1980s (Ashgate, Farnham, Surrey)
11.
HellmanC, 2011, “The real US national security budget”TomDispatch 1 March
12.
LacosteY, 2012 [1976] La Géographie, ça Sert d'abord à Faire la Guerre (Éditions La Découverte, Paris)
13.
LichtblauE, 2012, “Wireless firms are flooded by requests to aid surveillance”The New York Times 8 July
14.
NeocleousM, 2008Critique of Security (McGill-Queen's University Press, Montreal)