The report examines and assesses the possibilities for obtaining information for the benefit of the security services. The main practical approaches and their specifics regarding the collection of intelligence informaThe report examines and assesses the possibilities for obtaining information for the benefit of the security services. The main practical approaches and their specifics regarding the collection of intelligence information are highlighted.tion are highlighted.
- Greene, Kate. Reality Mining. Sandy Pentland is using data gathered by cell phones to learn about human behavior. – In: MIT Technology Review February 19, (2008) http://www2.technologyreview.com/news/409598/tr10-reality-mining/
- Greenwald, Glenn. NSA taps in to internet giants' systems to mine user data, secret files reveal. – In: The Guardian 6 June (2013). http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data
- Kent, Sherman. Strategic intelligence for American world policy. Princeton University Press, (1966).
- Kondratiev, Alexander. Based on open sources. - In: Military industrial courier. MIC, September 16, (2009), № 36 (302)
- Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring Act of 2015 or the USA FREEDOM Act of 2015. https://www.congress.gov/bill/114th-congress/house-bill/2048
- Marks, Paul. Pentagon sets its sights on social networking websites. - In: New Scientist [онлайн]. June 9, (2006) https://www.newscientist.com/article/mg19025556-200- pentagon-sets-its-sights-on-social-networking-websites/