J. Bamford, The Shadow Factory, 2008.

J. Bell and B. Whaley, Cheating and Deception, Transaction Publishers, 1991.

B. Berkowitz and A. Goodman, Strategic Intelligence for American National Security, 1989.

G. Bush, Executive Order 13292 ? Further Amendment to Executive Order 12958, as Amended, Classified National Security Information, The White Housewww.archives.gov/isoo/policy-documents/eo- 12958-amendment, 2003.

J. Dunnigan and A. Nofi, Victory and Deceit, 2001.

C. Fowler and R. Nesbit, Tactical deception in air-land warfare, Journal of Electronic Defense, vol.18, issue.6, pp.37-79, 1995.

S. Gerwehr and R. Glenn, Unweaving the Web ? Deception and Adaptation in Future Urban Operations, 2002.

W. Laqueur, The Uses and Limits of Intelligence, Transaction Publishers, 1993.

D. Patranabis, Sensors and Transducers, 2004.

E. Poteat, The use and abuse of intelligence: An intelligence provider's perspective, Diplomacy and Statecraft, pp.1-16, 2000.

J. Richelson, The US Intelligence Community, 1999.

J. Risen and D. Rohde, A hostile land foils the quest for bin Laden, 2004.

N. Rowe and H. Rothstein, Two taxonomies of deception for attacks on information systems, Journal of Information Warfare, vol.3, issue.2, pp.27-39, 2004.

D. Sanger, Rice to discuss antiproliferation program, 2005.

J. Yuill, D. Denning, and F. Feer, Using deception to hide things from hackers: Processes, principles, and techniques, Journal of Information Warfare, vol.5, issue.3, pp.26-40, 2006.

J. Yuill, F. Feer, and D. Denning, Designing deception operations for computer network defense, Proceedings of the DoD Cyber Crime Conference (www.jimyuill.com/research-papers/DoD-Cyber-Crime-deceptionprocess .pdf), 2005.