skip to main content
research-article
Free Access

The NSA and Snowden: securing the all-seeing eye

Published:01 May 2014Publication History
Skip Abstract Section

Abstract

How good security at the NSA could have stopped him.

References

  1. Allen, J. NSA to cut system administrators by 90 percent to limit data access. Reuters. Aug. 9, 2013; http://www.reuters.com/article/2013/08/09/us-usa-security-nsa-leaks-idUSBRE97801020130809.Google ScholarGoogle Scholar
  2. Block, M. Snowden's document leaks shocked the NSA, and more may be on the way. National Public Radio. Dec. 17, 2013; http://www.npr.org/templates/story/story.php?storyId=252006951.Google ScholarGoogle Scholar
  3. Brosnahan, J. and West, T. Brief of Amicus Curiae Mark Klein. May 4, 2006; https://www.eff.org/files/filenode/att/kleinamicus.pdf.Google ScholarGoogle Scholar
  4. Chimel v. California, 395 U.S. 752, 761 (1969).Google ScholarGoogle Scholar
  5. Cohn, C. and Higgins, P. Rating Obama's NSA reform plan: EFF scorecard explained. Electronic Frontier Foundation, Jan. 17, 2014; https://www.eff.org/deeplinks/2014/01/rating-obamas-nsa-reform-plan-eff-scorecard-explained.Google ScholarGoogle Scholar
  6. Coke's Reports 91a, 77 Eng. Rep. 194 (K.B. 1604).Google ScholarGoogle Scholar
  7. Davidson, A. Judge Pauley to the N.S.A.: Go Big. The New Yorker. Dec. 28, 2013; http://www.newyorker.com/online/blogs/closeread/2013/12/judge-pauley-to-the-nsa-go-big.html.Google ScholarGoogle Scholar
  8. Davidson, J. NSA to cut 90 percent of systems administrators. Washington Post. Aug. 13, 2013; http://www.washingtonpost.com/blogs/federal-eye/wp/2013/08/13/nsa-to-cut-90-percent-of-systems-administrators/.Google ScholarGoogle Scholar
  9. Defense Logistics Agency. Critical nuclear weapon design information access certificate; http://www.dla.mil/dss/forms/fillables/DL1710.pdf.Google ScholarGoogle Scholar
  10. Department of Defense Trusted Computer System Evaluation Criteria, a.k.a., Orange Book 1985; http://csrc.nist.gov/publications/history/dod85.pdf.Google ScholarGoogle Scholar
  11. Dilanian, K. Officials: Edward Snowden took NSA secrets on thumb drive. Los Angeles Times. June 13, 2013; http://articles.latimes.com/2013/jun/13/news/la-pn-snowden-nsa-secrets-thumb-drive-20130613.Google ScholarGoogle Scholar
  12. Electronic Frontier Foundation (eff.org). NSA spying video, includes comments from many well-known respected people and reminders of past violations; http://www.youtube.com/watch?v=aGmiw_rrNxk.Google ScholarGoogle Scholar
  13. Esposito, R. Snowden impersonated NSA officials, sources say. NBC News. Aug. 28, 2013; http://investigations.nbcnews.com/_news/2013/08/28/20234171-snowden-impersonated-nsa-officials-sources-say?lite.Google ScholarGoogle Scholar
  14. Everett, B. and Min Kim, S. Lawmakers praise, pan President Obama's NSA plan. Politico. Jan. 17, 2014; http://www.politico.com/story/2014/01/rand-paul-response-nsa-speech-102319.html.Google ScholarGoogle Scholar
  15. GNU Privacy Guard; http://www.gnupg.org.Google ScholarGoogle Scholar
  16. Howell's State Trials 1029, 95 Eng. 807 (1705).Google ScholarGoogle Scholar
  17. Klein, M. and Bamford, J. Wiring Up the Big Brother Machine…and Fighting It. Booksurge Publishing, 2009.Google ScholarGoogle Scholar
  18. Legal Information Institute, Cornell University Law School. Fourth Amendment: an overview; http://www.law.cornell.edu/wex/fourth_amendment.Google ScholarGoogle Scholar
  19. Miller, J. CBS News "60 Minutes." Dec. 15, 2013; http://www.cbsnews.com/news/nsa-speaks-out-on-snowden-spying/.Google ScholarGoogle Scholar
  20. Lemos, R. Security guru: Let's secure the Net. ZDnet, 2002; http://www.zdnet.com/news/security-guru-lets-secure-the-net/120859.Google ScholarGoogle Scholar
  21. Mears, B. and Perez, E. Judge: NSA domestic phone data-mining unconstitutional. CNN. Dec. 17, 2013; http://www.cnn.com/2013/12/16/justice/nsa-surveillance-court-ruling/.Google ScholarGoogle Scholar
  22. Nakashima, E. A story of surveillance. Washington Post. Nov 7, 2007; http://www.washingtonpost.com/wp-dyn/content/article/2007/11/07/AR2007110700006.html.Google ScholarGoogle Scholar
  23. Napolitano, A.P. A presidential placebo -- Obama's massive NSA spying program still alive and well. Fox News. Jan. 23, 2014; http://www.foxnews.com/opinion/2014/01/23/presidential-placebo-obama-massive-nsa-spying-program-still-alive-and-well/.Google ScholarGoogle Scholar
  24. Presidential Executive Order 13526 12/29/2009; http://www.whitehouse.gov/the-press-office/executive-order-classified-national-security-information.Google ScholarGoogle Scholar
  25. Rosenbach, M. Prism exposed: Data surveillance with global implications. Spiegel Online International. June 10, 2013: 2; http://www.spiegel.de/international/world/prism-leak-inside-the-controversial-us-data-surveillance-program-a-904761.html.Google ScholarGoogle Scholar
  26. Schwartz, M. Thumb drive security: Snowden 1, NSA 0. InformationWeek. June 14, 2013; http://www.informationweek.com/infrastructure/storage/thumb-drive-security-snowden-1-nsa-0/d/d-id/1110380.Google ScholarGoogle Scholar
  27. Shiffman, J., Cooke, K. Exclusive: U.S. directs agents to cover up program used to investigate Americans. Reuters. Aug. 05, 2013; http://www.reuters.com/article/2013/08/05/us-dea-sod-idUSBRE97409R20130805.Google ScholarGoogle Scholar
  28. Smith, C. BGR. Jan. 23, 2014; http://news.yahoo.com/watchdog-says-nsa-phone-spying-program-illegal-end-130014396.html.Google ScholarGoogle Scholar
  29. Toxen, B. Real-world Linux Security: Intrusion Detection, Prevention, and Recovery. 2nd Edition. Prentice Hall, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. U. S. Courts. What does the Fourth Amendment mean?; http://www.uscourts.gov/educational-resources/get-involved/constitution-activities/fourth-amendment/fourth-amendment-mean.aspx.Google ScholarGoogle Scholar
  31. U.S. Government Printing Office. Fourth Amendment; http://beta.congress.gov/content/conan/pdf/GPO-CONAN-2013-10-5.pdf.Google ScholarGoogle Scholar
  32. Washington Post. Transcript of President Obama's Jan. 17 speech on NSA reforms, 2014; http://www.washingtonpost.com/politics/full-text-of-president-obamas-jan-17-speech-on-nsa-reforms/2014/01/17/fa33590a-7f8c-11e3-9556-4a4bf7bcbd84_story.html.Google ScholarGoogle Scholar
  33. Wikipedia. Public-key cryptography; http://en.wikipedia.org/wiki/Public-key_cryptographyGoogle ScholarGoogle Scholar
  34. Wikipedia. Edward Snowden; http://en.wikipedia.org/wiki/Edward_Snowden#NSA_rulings_in_federal_court.Google ScholarGoogle Scholar

Index Terms

  1. The NSA and Snowden: securing the all-seeing eye

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image Communications of the ACM
                Communications of the ACM  Volume 57, Issue 5
                May 2014
                110 pages
                ISSN:0001-0782
                EISSN:1557-7317
                DOI:10.1145/2594413
                • Editor:
                • Moshe Y. Vardi
                Issue’s Table of Contents

                Copyright © 2014 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 May 2014

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
                • Popular
                • Refereed

              PDF Format

              View or Download as a PDF file.

              PDFChinese translation

              eReader

              View online with eReader.

              eReader

              HTML Format

              View this article in HTML Format .

              View HTML Format