In lieu of an abstract, here is a brief excerpt of the content:

341 WORKS CITED Adams, James. The Next World War: Computers Are the Weapons and the Front Line Is Everywhere. New York: Simon & Schuster, 1998. ———. “Virtual Defense.” Foreign Affairs 80:3 (May/June 2001). Agee, Philip. Inside the Company: CIA Diary. Bungay, Suffolk: Chaucer Press, 1975. Ahern Jr., Thomas L. CIA and Rural Pacification. Washington, DC: Central Intelligence Agency, 2001. ———. CIA and the Generals: Covert Support to Military Government in South Vietnam. Washington, DC: Central Intelligence Agency, 1998. ———. CIA and the House of Ngo: Covert Action in South Vietnam, 1954– 63. Washington, DC: Central Intelligence Agency, 2000. ———. Good Questions, Wrong Answers: CIA’s Estimates of Arms Traffic through Sihanoukville, Cambodia, during the Vietnam War. Washington, DC: Central Intelligence Agency, 2004. ———. Undercover Armies: CIA and Surrogate Warfare in Laos. Washington, DC: Central Intelligence Agency, 2006. Aid, Matthew M. The Secret Sentry: The Untold History of the National Security Agency. New York: Bloomsbury, 2009. Aldrich, Richard J. GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency. London: HarperPress, 2010. ———. The Hidden Hand: Britain, America, and Cold War Secret Intelligence. London: John Murray, 2001. ———. “Policing the Past: Official History, Secrecy and British Intelligence since 1945.” English Historical Review 119 (2004). ———. “‘A Skeleton in Our Cupboard’: British Interrogation Procedures in Northern Ireland.” In Dover and Goodman, eds. Learning from the Secret Past. Alexander, Keith B. Command Posture Statement. US Cyber Command, House Committee on Armed Services, March 20, 2012; accessed 342 works cited August 1, 2012, at www.au.af.mil/au/awc/awcgate/postures/ posture_cybercom_20mar2012.pdf. Alexander, Martin S. “Radio-Intercepts, Reconnaissance and Raids: French Operational Intelligence and Communications in 1940.” Intelligence and National Security 28:3 (June 2013): 349–51. Allen, Michael. Blinking Red: Crisis and Compromise in American Intelligence after 9/11. Arlington, VA: Potomac Institute Press, 2013. Alperovitch, Dmitri, Vice President, Threat Research (McAfee). Revealed: Operation Shady RAT. August 3, 2011; accessed July 24, 2012, at www.mcafee.com/us/resources/white-papers/wp-operationshady -rat.pdf. Alvarez, David J. Secret Messages: Codebreaking and American Diplomacy, 1930–1945. Lawrence: University Press of Kansas, 2000. Andrew, Christopher. Defend the Realm: The Authorized History of MI5. New York: Alfred A. Knopf, 2009. ———. Her Majesty’s Secret Service: The Making of the British Intelligence Community. New York: Viking, 1986. Andrew, Christopher, and Vasili Mitrokhin. The Mitrokhin Archive: The KGB in Europe and the West. London: Penguin, 1999. ———. The World Was Going Our Way: The KGB and the Battle for the Third World. New York: Basic Books, 2005. Anthony, Victor B., and Richard R. Sexton. The United States Air Force in Southeast Asia: The War in Northern Laos, 1954–1973. Washington, DC: Center for Air Force History, 1993. Applebaum, Anne. Iron Curtain: The Crushing of Eastern Europe. New York: Doubleday, 2012. Assange, Julian. “The Nonlinear Effects of Leaks on Unjust Systems of Governance.” Interesting Question [weblog]. December 31, 2006; accessed August 12, 2012, at http://web.archive.org/ web/20071020051936/http://iq.org/. Atkinson, Rick. An Army at Dawn: The War in North Africa, 1942–1943. New York: Henry Holt, 2002. ———. The Day of Battle: The War in Sicily and Italy, 1943–1944. New York: Henry Holt, 2008 [2007]. Babington-Smith, Constance. Air Spy: The Story of Photo Intelligence in World War II. New York: Harper, 1957. [18.191.5.239] Project MUSE (2024-04-24 10:45 GMT) works cited 343 Baer, Robert. See No Evil: The True Story of a Ground Soldier in the CIA’s War on Terrorism. New York: Random House, 2003 [2002]. Baev, Jordan. “Spying on the West: Soviet-Bulgarian Scientific Intelligence Cooperation.” January 2011; accessed May 19, 2012, at Parallel History Project website, http://php.isn.ethz.ch/collections/coll_ KGBBulg/intro_baev.cfm?navinfo=126115. Baker, Stewart. Testimony before a hearing on the administration’s use of FISA authorities, Committee on the Judiciary, US House of Representatives, July 17, 2013, 9; accessed September 28, 2013, at www.skatingonstilts.com/files/pdf-of-baker-testimony-to-housejudiciary -committee-on-fisa-.pdf. Ball, Desmond, and Robert C. Toth. “Revising the SIOP: Taking WarFighting to Dangerous Extremes.” International Security 15:4 (Spring 1990). Bamford, Bradley M. “The Role and Effectiveness of Intelligence in Northern Ireland.” Intelligence and National Security 20:4 (Dec. 2005). Bamford, James. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency. New York: Anchor, 2002 [2001]. ———. The Puzzle Palace: A Report on NSA, America’s Most Secret Agency. Boston: Houghton Mifflin, 1982. Barrass, Gordon S. The Great Cold War: A Journey through the Hall of...

Share