Page 222 - Privacy in a Cyber Age Policy and Practice
P. 222

210  NOTES

           41.  Bill Gertz, “Top Gun Takeover: Stolen F-35 Secrets Showing up in China’s Stealth
              Fighter,”  The Washington Times,  http://www.washingtontimes.com/news/
              2014/mar/13/f-35-secrets-now-showing-chinas-stealth-fighter/?page=all
              (accessed June 29, 2014).
           42.  Richard A. Clarke, Cyber War: The Next Threat to National Security and What
              to Do About It (New York: Harper Collins, 2010).
           43.  Financial Stability Oversight Council, “2014 Annual Report,” http://www.treasury.
              gov/initiatives/fsoc/Documents/FSOC%202014%20Annual%20Report.pdf
              (accessed June 29, 2014).
           44.  United States Government Accountability Office, “Maritime Critical Infrastruc-
              ture Protection: DHS Needs to Better Address Port Security,” http://www.gao.
              gov/assets/670/663828.pdf (accessed June 29, 2014).
           45.  Amitai Etzioni, “The Bankruptcy of Liberalism and Conservatism,” 39–65.
           46.  “Cybersecurity: Coming Soon to a Government Contract Near You,” Venable
              LLP,  http://www.venable.com/cybersecurity-coming-soon-to-a-government-
              contract-near-you-02-04-2014/ (accessed 30 June 2014).


                                     Chapter 7

             1.  I am indebted to Jesse Spafford for his extensive research assistance on this chap-
              ter and to Ashley McKinless and Erin Syring for comments on a previous draft.
             2.  See Amitai Etzioni, The New Golden Rule: Community and Morality in a Demo-
              cratic Society (New York: Basic Books, 1996).
             3.  I have previously discussed this balance in the context of privacy and public
              health, public safety, sex offenders, and freedom of the press, among other
              rights. See Amitai Etzioni,  The Limits of Privacy (New York: Basic Books,
              1999); Amitai Etzioni, “The Privacy Merchants: What Is To Be Done?” Journal
              of Constitutional Law 14, 4 (March 2012): 929–51; and Amitai Etzioni, How
              Patriotic Is the Patriot Act?: Freedom versus Security in the Age of Terrorism
              (New York: Routledge, 2004).
             4.  Gerald Gaus and Shane D. Courtland, “Liberalism,” in Edward N. Zalta, ed.,
              The Stanford Encyclopedia of Philosophy (Spring 2011), http://plato.stanford.
              edu/entries/liberalism/. Also: John Rawls,  A Theory of Justice, rev. ed.
              (Cambridge, MA: Belknap Press, 1999).
             5.  Amitai Etzioni, “Communitarianism,”Encyclopædia Britannica, Online
              Academic Edition, http://www.britannica.com/EBchecked/topic/1366457/
              communitarianism (accessed June 21, 2013).
             6.  David R. Jones, “Party Polarization and Legislative Gridlock,” Political Research
              Quarterly 54, 1 (March 2001): 125–41.
             7.  Private communication with Strossen.
            8.  Stewart Baker, Skating on Stilts: Why We Aren’t Stopping Tomorrow’s Terrorism
              (Stanford, CA: Hoover Institution Press, 2010): 27.
             9.  Marc Rotenberg, “Restoring a Public Interest Vision of Law in the Age of the
              Internet,” Duke Law & Technology Review 7 (2004): 7–15.
   217   218   219   220   221   222   223   224   225   226   227