- Allen, J. NSA to cut system administrators by 90 percent to limit data access. Reuters. Aug. 9, 2013; http://www.reuters.com/article/2013/08/09/us-usa-security-nsa-leaks-idUSBRE97801020130809.Google Scholar
- Block, M. Snowden's document leaks shocked the NSA, and more may be on the way. National Public Radio. Dec. 17, 2013; http://www.npr.org/templates/story/story.php?storyId=252006951.Google Scholar
- Brosnahan, J. and West, T. Brief of Amicus Curiae Mark Klein. May 4, 2006; https://www.eff.org/files/filenode/att/kleinamicus.pdf.Google Scholar
- Chimel v. California, 395 U.S. 752, 761 (1969).Google Scholar
- Cohn, C. and Higgins, P. Rating Obama's NSA reform plan: EFF scorecard explained. Electronic Frontier Foundation, Jan. 17, 2014; https://www.eff.org/deeplinks/2014/01/rating-obamas-nsa-reform-plan-eff-scorecard-explained.Google Scholar
- Coke's Reports 91a, 77 Eng. Rep. 194 (K.B. 1604).Google Scholar
- Davidson, A. Judge Pauley to the N.S.A.: Go Big. The New Yorker. Dec. 28, 2013; http://www.newyorker.com/online/blogs/closeread/2013/12/judge-pauley-to-the-nsa-go-big.html.Google Scholar
- Davidson, J. NSA to cut 90 percent of systems administrators. Washington Post. Aug. 13, 2013; http://www.washingtonpost.com/blogs/federal-eye/wp/2013/08/13/nsa-to-cut-90-percent-of-systems-administrators/.Google Scholar
- Defense Logistics Agency. Critical nuclear weapon design information access certificate; http://www.dla.mil/dss/forms/fillables/DL1710.pdf.Google Scholar
- Department of Defense Trusted Computer System Evaluation Criteria, a.k.a., Orange Book 1985; http://csrc.nist.gov/publications/history/dod85.pdf.Google Scholar
- Dilanian, K. Officials: Edward Snowden took NSA secrets on thumb drive. Los Angeles Times. June 13, 2013; http://articles.latimes.com/2013/jun/13/news/la-pn-snowden-nsa-secrets-thumb-drive-20130613.Google Scholar
- Electronic Frontier Foundation (eff.org). NSA spying video, includes comments from many well-known respected people and reminders of past violations; http://www.youtube.com/watch?v=aGmiw_rrNxk.Google Scholar
- Esposito, R. Snowden impersonated NSA officials, sources say. NBC News. Aug. 28, 2013; http://investigations.nbcnews.com/_news/2013/08/28/20234171-snowden-impersonated-nsa-officials-sources-say?lite.Google Scholar
- Everett, B. and Min Kim, S. Lawmakers praise, pan President Obama's NSA plan. Politico. Jan. 17, 2014; http://www.politico.com/story/2014/01/rand-paul-response-nsa-speech-102319.html.Google Scholar
- GNU Privacy Guard; http://www.gnupg.org.Google Scholar
- Howell's State Trials 1029, 95 Eng. 807 (1705).Google Scholar
- Klein, M. and Bamford, J. Wiring Up the Big Brother Machine…and Fighting It. Booksurge Publishing, 2009.Google Scholar
- Legal Information Institute, Cornell University Law School. Fourth Amendment: an overview; http://www.law.cornell.edu/wex/fourth_amendment.Google Scholar
- Miller, J. CBS News "60 Minutes." Dec. 15, 2013; http://www.cbsnews.com/news/nsa-speaks-out-on-snowden-spying/.Google Scholar
- Lemos, R. Security guru: Let's secure the Net. ZDnet, 2002; http://www.zdnet.com/news/security-guru-lets-secure-the-net/120859.Google Scholar
- Mears, B. and Perez, E. Judge: NSA domestic phone data-mining unconstitutional. CNN. Dec. 17, 2013; http://www.cnn.com/2013/12/16/justice/nsa-surveillance-court-ruling/.Google Scholar
- Nakashima, E. A story of surveillance. Washington Post. Nov 7, 2007; http://www.washingtonpost.com/wp-dyn/content/article/2007/11/07/AR2007110700006.html.Google Scholar
- Napolitano, A.P. A presidential placebo -- Obama's massive NSA spying program still alive and well. Fox News. Jan. 23, 2014; http://www.foxnews.com/opinion/2014/01/23/presidential-placebo-obama-massive-nsa-spying-program-still-alive-and-well/.Google Scholar
- Presidential Executive Order 13526 12/29/2009; http://www.whitehouse.gov/the-press-office/executive-order-classified-national-security-information.Google Scholar
- Rosenbach, M. Prism exposed: Data surveillance with global implications. Spiegel Online International. June 10, 2013: 2; http://www.spiegel.de/international/world/prism-leak-inside-the-controversial-us-data-surveillance-program-a-904761.html.Google Scholar
- Schwartz, M. Thumb drive security: Snowden 1, NSA 0. InformationWeek. June 14, 2013; http://www.informationweek.com/infrastructure/storage/thumb-drive-security-snowden-1-nsa-0/d/d-id/1110380.Google Scholar
- Shiffman, J., Cooke, K. Exclusive: U.S. directs agents to cover up program used to investigate Americans. Reuters. Aug. 05, 2013; http://www.reuters.com/article/2013/08/05/us-dea-sod-idUSBRE97409R20130805.Google Scholar
- Smith, C. BGR. Jan. 23, 2014; http://news.yahoo.com/watchdog-says-nsa-phone-spying-program-illegal-end-130014396.html.Google Scholar
- Toxen, B. Real-world Linux Security: Intrusion Detection, Prevention, and Recovery. 2nd Edition. Prentice Hall, 2002. Google ScholarDigital Library
- U. S. Courts. What does the Fourth Amendment mean?; http://www.uscourts.gov/educational-resources/get-involved/constitution-activities/fourth-amendment/fourth-amendment-mean.aspx.Google Scholar
- U.S. Government Printing Office. Fourth Amendment; http://beta.congress.gov/content/conan/pdf/GPO-CONAN-2013-10-5.pdf.Google Scholar
- Washington Post. Transcript of President Obama's Jan. 17 speech on NSA reforms, 2014; http://www.washingtonpost.com/politics/full-text-of-president-obamas-jan-17-speech-on-nsa-reforms/2014/01/17/fa33590a-7f8c-11e3-9556-4a4bf7bcbd84_story.html.Google Scholar
- Wikipedia. Public-key cryptography; http://en.wikipedia.org/wiki/Public-key_cryptographyGoogle Scholar
- Wikipedia. Edward Snowden; http://en.wikipedia.org/wiki/Edward_Snowden#NSA_rulings_in_federal_court.Google Scholar
Index Terms
- The NSA and Snowden: securing the all-seeing eye
Recommendations
The NSA and Snowden: Securing the All-Seeing Eye: How good security at the NSA could have stopped him
ProvenanceEdward Snowden, while an NSA (National Security Agency) contractor at Booz Allen Hamilton in Hawaii, copied up to 1.7 million top-secret and above documents, smuggling copies on a thumb drive out of the secure facility in which he worked, and later ...
The NSA and Edward Snowden: surveillance in the 21st century
Special Issue on WhistleblowingThis paper examines the case and background of Edward Snowden, the history and purpose of the National Security Agency (NSA), legality and American public opinion and its aftermath.
Report of a debate on Snowden's actions by ACM members
Special Issue on WhistleblowingIn 2012 Edward Snowden starting releasing a cache of computer files to a small number of journalists, which he claimed to have copied from servers at the US' National Security Agency (NSA). The NSA have disputed the context or interpretation of some of ...
Comments