{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:00:30Z","timestamp":1743109230662,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319123998"},{"type":"electronic","value":"9783319124001"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12400-1_27","type":"book-chapter","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T15:15:00Z","timestamp":1414509300000},"page":"276-285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions"],"prefix":"10.1007","author":[{"given":"Yvo","family":"Desmedt","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,29]]},"reference":[{"key":"27_CR1","unstructured":"Anonymous: Word of Mouth Democracy for the 99%: A Corporate Spiritual Democracy. CreateSpace Independent Publishing Platform, 26 September 2013"},{"key":"27_CR2","volume-title":"The Puzzle Palace","author":"J Bamford","year":"1985","unstructured":"Bamford, J.: The Puzzle Palace. Penguin Books, New York (1985)"},{"key":"27_CR3","volume-title":"IBM and the Holocaust: The Strategic Alliance between Nazi Germany and America\u2019s Most Powerful Corporation","author":"E Black","year":"2001","unstructured":"Black, E.: IBM and the Holocaust: The Strategic Alliance between Nazi Germany and America\u2019s Most Powerful Corporation. Three Rivers Press, New York (2001)"},{"key":"27_CR4","volume-title":"The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?","author":"D Brin","year":"1999","unstructured":"Brin, D.: The Transparent Society: Will Technology Force Us To Choose Between Privacy And Freedom?. Perseus Books, Cambridge (1999)"},{"key":"27_CR5","unstructured":"Carpets. http:\/\/www.lung.org\/healthy-air\/home\/resources\/carpets.html"},{"key":"27_CR6","unstructured":"Connolly, M.: Granite state could use more \u2018blue sky\u2019. Concord Monitor, 5 March 2012"},{"key":"27_CR7","unstructured":"Cooke, R.: Migraine and me. The Guardian, 9 May 2009. http:\/\/www.theguardian.com\/lifeandstyle\/2009\/may\/10\/migraine"},{"key":"27_CR8","unstructured":"National Research Council: Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. The National Academies Press, Washington, DC (2008)"},{"key":"27_CR9","unstructured":"Dunn, T.M.: Track crime on net or we\u2019ll see more people die. The Sun, 3 December 2012"},{"key":"27_CR10","unstructured":"Evans, K.: Jeffrey Sachs rails against ex-fed chief Greenspan. The Wall Street Journal (2009)"},{"key":"27_CR11","unstructured":"Fear pays: Chertoff, ex-security officials slammed for cashing in on government experience. The Huffington Post, 23 November 2010. http:\/\/www.huffingtonpost.com\/2010\/11\/23\/fear_pays_chertoff_n_787711.html (updated 25 March 2011)"},{"key":"27_CR12","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1038\/scientificamerican0308-98","volume":"298","author":"M Fischetti","year":"2008","unstructured":"Fischetti, M.: The switch is on. Sci. Am. 298, 98\u201399 (2008)","journal-title":"Sci. Am."},{"key":"27_CR13","unstructured":"Goodman, P.S.: Taking hard new look at a Greenspan legacy. New York Times, 8 October 2008. http:\/\/www.nytimes.com\/2008\/10\/09\/business\/economy\/09greenspan.html"},{"key":"27_CR14","doi-asserted-by":"publisher","unstructured":"Hosein, G.: Threatening the open society: Comparing anti-terror policies and strategies in the U.S. and Europe. Comparative report. https:\/\/www.privacyinternational.org\/sites\/privacyinternational.org\/files\/file-downloads\/ comparativeterrorreportdec2005.pdf. Privacy International, 13 December 2005 DOI:10.1007\/978-3-319-12400-1","DOI":"10.1007\/978-3-319-12400-1"},{"key":"27_CR15","doi-asserted-by":"publisher","unstructured":"Isely, L.: Alan Greenspan\u2019s deregulation and inadequate regulation led to another bubble. The Nation, 7 February 2013. http:\/\/nationbuilders.thenation.com\/profiles\/blogs\/alan-greenspan-s-deregulation-and-inadequate-regulation-led-to DOI:10.1007\/978-3-319-12400-1","DOI":"10.1007\/978-3-319-12400-1"},{"key":"27_CR16","unstructured":"Jaslow, R.: Europe bans airport scanners over cancer fears: How about U.S.? CBS News, 17 November 2011"},{"key":"27_CR17","volume-title":"The Codebreakers","author":"D Kahn","year":"1967","unstructured":"Kahn, D.: The Codebreakers. MacMillan Publishing Co., New York (1967)"},{"key":"27_CR18","unstructured":"Kindy, K.: Ex-homeland security chief head said to abuse public trust by touting body scanners. The Washington Post, 1 January 2010. http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2009\/12\/31\/AR2009123102821.html"},{"key":"27_CR19","unstructured":"Liptak, A.: Major ruling shields privacy of cellphones: Supreme court says phones can\u2019t be searched without a warrant. New York Times, 25 June 2014. http:\/\/www.nytimes.com\/2014\/06\/26\/us\/supreme-court-cellphones-search-privacy.html"},{"key":"27_CR20","unstructured":"Only 1% of Snowden files published - Guardian editor BBC News UK, 3 December 2013. http:\/\/www.bbc.com\/news\/uk-25205846"},{"key":"27_CR21","unstructured":"Osama bin Laden driver\u2019s conviction quashed by US appeals court, 16 October 2012. http:\/\/www.theguardian.com\/world\/2012\/oct\/16\/osama-bin-laden-driver-conviction-quashed"},{"key":"27_CR22","unstructured":"Patriot Act, bill summary & status 107th congress (2001\u20132002) h.r.3162. http:\/\/thomas.loc.gov\/cgi-bin\/bdquery\/z?d107:H.R.3162:"},{"key":"27_CR23","unstructured":"Povoledo, E., Fountain, H.: Italy orders jail terms for 7 who didn\u2019t warn of deadly earthquake. The New York Times, 22 October 2012"},{"key":"27_CR24","unstructured":"Schneier, B.: The myth of the \u2018transparent society\u2019, 6 March 2008. http:\/\/www.wired.com\/politics\/security\/commentary\/securitymatters\/2008\/03\/securitymatters_0306"},{"key":"27_CR25","doi-asserted-by":"publisher","unstructured":"State and major urban area fusion centers. http:\/\/www.dhs.gov\/state-and-major-urban-area-fusion-centers DOI:10.1007\/978-3-319-12400-1","DOI":"10.1007\/978-3-319-12400-1"},{"key":"27_CR26","unstructured":"The ghettos (a teachers guide to the holocaust). http:\/\/fcit.usf.edu\/holocaust\/timeline\/ghettos.htm"},{"key":"27_CR27","unstructured":"The official report of The Fukushima Nuclear Accident Independent Investigation Commission, executive summary (2012). http:\/\/warp.da.ndl.go.jp\/info:ndljp\/pid\/3856371\/naiic.go.jp\/wp-content\/uploads\/2012\/09\/NAIIC_report_lo_res10.pdf"},{"key":"27_CR28","unstructured":"Tymoshenko convicted, sentenced to 7 years in prison, ordered to pay state $${\\$}$$188 million. Kyiv Post, 11 October 2011. http:\/\/www.kyivpost.com\/content\/ukraine\/tymoshenko-convicted-sentenced-to-7-years-in-priso-114528.html"},{"key":"27_CR29","unstructured":"U.S. senate report on fusion centers, committee on homeland security and governmental affairs (full text) October 2012. https:\/\/archive.org\/stream\/446657-fusion-centers\/446657-fusion-centers_djvu.txt"},{"key":"27_CR30","first-page":"1007","volume":"28","author":"DE Vandercoy","year":"1994","unstructured":"Vandercoy, D.E.: The history of the second amendment. Valparaiso Univ. Law Rev. 28, 1007\u20131039 (1994)","journal-title":"Valparaiso Univ. Law Rev."}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12400-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T03:36:27Z","timestamp":1674272187000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12400-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319123998","9783319124001"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12400-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"29 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}