Московская милиция мониторит “Твиттер”
// Вебпланета, 10 ноября 2009 года. webplanet.ru/news/life/2009/11/10/iopasnaitrud-na.html.Плющев, Александр Поисковые системы как стратегический и политический ресурс
// Эхо Москвы, 24 января 2010 года. echo.msk.ru/programs/tochka/651123-echo/.Панкавец, Зміцер КДБ вербуе праз
vkontakte.ru // Наша нiва, 19 декабря 2009 года. http://nn.by/?c=ar&i=23079.Armstrong Moore, E. Google Flu Trends: Take with Grain of Salt
// CNET News, May 17, 2010. news.cnet.com/8301-27083_3-20005150-247.html.Azerbaijani Authorities Interrogate Music Fan over Eurovision Vote for Armenia
// Radio Free Europe/Radio Liberty, August 14, 2009.Balduzzi, M., et al. Abusing Social Networks for Automated User
Profiling
// International Secure Systems Lab (March 2010). Bannon, L. J. Forgetting as a Feature, not a Bug: The Duality of Me-mory and Implications for Ubiquitous Computing // CoDesign 2, no. 1 (2006): 3–15.Bennett, C. J., and C. D. Raab The Governance of Privacy: Policy Instruments in Global Perspective
. Farnham, UK: Ashgate, 2003.Bilton, N. An Average American Consumes
34 Gigabytes a Day, Study Says // New York Times, December 9, 2009.Blanchette, J. F., and D. G. Johnson Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness
// Information Society 18, no. 1 (2002): 33–45.Bonneau, J., Anderson, J., Anderson, R., and F. Stajano Eight Friends Are Enough: Social Graph Approximation via Public Listings
/ In: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13–18. 2009.Bunyan, T. Just over the Horizon: The Surveillance Society and the State in the EU
// Race & Class 51, no. 3 (2010): 1.Cambodia Shuts Off SMS Ahead of Elections
// Associated Press, April 2, 2007.Carver, G. A., Jr. Intelligence in the Age of Glasnost
// Foreign Af-fairs 69 (1989): 147.Clover, C. Stalin-Era Files Raided in “War over Memory”
// Finan-cial Times, December 7, 2008.Cohen, J. Children of Jihad: A Young American’s Travels Among the Youth of the Middle East
. New York: Gotham, 2007.Dementis, G., and G. Sousa A Legal Reasoning Component of a Network Security Command and Control System
. Master’s thesis, Naval Postgraduate School, Monterey, CA, 2010.Dodge, M., and R. Kitchin The Ethics of Forgetting in an Age of
Pervasive Computing
// CASA Working Papers 92 (2005). Elliott, C. Hotels Connecting Dots to Online Reviewers // TribuneMedia Services, June 4, 2010.
Faris, R., Roberts, H, and S. Wang China’s Green Dam: The Implications of Government Control Encroaching on the Home PC
// OpenNet Initiative, June 2009. opennet.net/chinas-green-dam-the-implications-government-control-encroaching-home-pc.Fassihi, F. Iranian Crackdown Goes Global
// Wall Street Journal, December 3, 2009.FBI Backs Record-Keeping on Prepaid Cell Phones
// Associated Press, July 31, 2010.George-Cosh, D. Blackberry Maker Silent on UAE Security Talks
// National (Abu Dhabi), July 29, 2010.Google: Critics of Vietnam Mine Face Online Attack
// Associated Press, March 31, 2010.Google Says Vietnam Mine Opponents Under Cyber Attack
// BBC News, March 31, 2010.Government to Banish Unbranded Mobile Phones
// SiliconIndia, July 14, 2010.www.siliconindia.com/shownews/Government_to_banish_ unbranded_mobile_phones_-nid-69662.html.Graham, S., and D. Wood Digitizing Surveillance: Categorization, Space, Inequality
// Critical Social Policy 23, no. 2 (2003): 227. Heintz, J. Text Messages Warn of Violence in Belarus // AssociatedPress, March 18, 2006.