webpage
Business Insider
Kelley
Michael
After Action Report
Defense
Michael Kelley
Military
NSA
Spying
Surveillance
Verizon Allegedly Built A Fiber Optic Cable To Give The Feds Access To Communications
Verizon allegedly set up a fiber-optic line running from New Jersey to Virginia to give the government access to all communications.
2013-06-10
http://www.businessinsider.com/verizon-gives-all-data-to-the-government-2013-6
2013-06-28 14:46:47
attachment
Snapshot
2013-06-28 14:46:47
http://www.businessinsider.com/verizon-gives-all-data-to-the-government-2013-6
text/html
utf-8
newspaperArticle
Reuters
Bamford
James
Franklin D. Roosevelt
Henry L. Stimson
Herbert O. Yardley
James Bamford
Marlborough Churchill
Newcomb Carlton
United States
W. Preston Corderman
COLUMN - Building America's secret surveillance state: James Bamford
(Fixes typo in 19th paragraph)By James BamfordJune 10 (Reuters) - God we trust, goes an old NationalSecurity Agency joke. All others we monitor.First, the Guardian reported details on a domestic telephonedragnet
Mon Jun 10 14:52:02 UTC 2013
COLUMN - Building America's secret surveillance state
http://www.reuters.com/article/2013/06/10/bamford-nsa-idUSL2N0EM0SG20130610
2013-06-28 14:47:10
Reuters
attachment
Snapshot
2013-06-28 14:47:10
http://www.reuters.com/article/2013/06/10/bamford-nsa-idUSL2N0EM0SG20130610
text/html
utf-8
newspaperArticle
Threat Level
Bamford
James
The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Level | Wired.com
The National Security Agency's immensely secret project in the Utah desert will intercept, analyze, and store yottabytes of the world's communications—including yours.
2012-03-15
http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/
2013-06-28 14:47:32
attachment
Snapshot
2013-06-28 14:47:32
http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1
text/html
utf-8
newspaperArticle
WIRED
AT&T Whistle-Blower's Evidence
Former technician Mark Klein gives a firsthand account of finding a secret room routing U.S. internet traffic straight to the NSA -- along with documents he says prove his case.
2006-05-17
http://www.wired.com/science/discoveries/news/2006/05/70908
2013-06-28 14:47:36
attachment
Snapshot
2013-06-28 14:47:36
http://www.wired.com/science/discoveries/news/2006/05/70908
text/html
utf-8
webpage
Common Dreams
Lichtblau
Eric
Risen
James
Shane
Scott
Officials Seek to Protect Firms Aiding NSA Spying
2007-12-16
https://www.commondreams.org/archive/2007/12/16/5855
2013-06-28 14:47:38
attachment
Snapshot
2013-06-28 14:47:38
https://www.commondreams.org/archive/2007/12/16/5855
text/html
utf-8
newspaperArticle
Threat Level
Bamford
James
Shady Companies With Ties to Israel Wiretap the U.S. for the NSA | Threat Level | Wired.com
The NSA is growing bigger and more powerful. But behind its curtains of secrecy, the secretive spying agency is relying on contractors with checkered pasts and ties to Israeli intelligence to build out and run its massive eavesdropping operations.
2012-04-03
http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/
2013-06-28 14:47:40
attachment
Snapshot
2013-06-28 14:47:40
http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/all/1
text/html
utf-8
newspaperArticle
Wired UK
Wright
Paul
Meet Prism's little brother: Socmint (Wired UK)
For the past two years a tight-lipped and little talked about unit within the Metropolitan Police has been conducting blanket surveillance of British citizens' public social media conversations
2013-06-26
Meet Prism's little brother
http://www.wired.co.uk/news/archive/2013-06/26/socmint
2013-06-28 14:47:53
attachment
Snapshot
2013-06-28 14:47:53
http://www.wired.co.uk/news/archive/2013-06/26/socmint
text/html
utf-8
newspaperArticle
Wired UK
Shubber
Kadhim
A simple guide to GCHQ's internet surveillance programme Tempora (Wired UK)
What is Tempora? How does GCHQ analyse torrents of the world's internet data and how does it differ from the NSA's Prism programme?
2013-06-24
http://www.wired.co.uk/news/archive/2013-06/24/gchq-tempora-101
2013-06-28 14:48:01
attachment
Snapshot
2013-06-28 14:48:01
http://www.wired.co.uk/news/archive/2013-06/24/gchq-tempora-101
text/html
utf-8
newspaperArticle
ZDNet
Jr.
Neil
Spy agency taps into undersea cable | ZDNet
The NSA is looking for new ways to snoop, since advances in telecommunications have muffled its ears. Now it's splicing into undersea fiber-optic cables-a potentially illegal and not-yet-successful move.
2001-05-23
http://www.zdnet.com/news/spy-agency-taps-into-undersea-cable/115877
2013-06-28 14:48:17
attachment
Snapshot
2013-06-28 14:48:17
http://www.zdnet.com/news/spy-agency-taps-into-undersea-cable/115877
text/html
utf-8
webpage
Democracy Now!
Goodman
Amy
James Bamford: "The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America"
The Bush administration’s wiretapping program has come under new scrutiny this week. Two influential congressional committees have opened probes into allegations US intelligence spied on the phone calls of American military personnel, journalists and aid workers in Iraq. We speak to James Bamford about the NSA’s spying on Americans, the agency’s failings pre-9/11 and the ties between NSA and the nation’s telecommunications companies. [includes rush transcript]
2008-10-14
James Bamford
http://www.democracynow.org/2008/10/14/james_bamford_the_shadow_factory_the
2013-06-28 14:48:21
attachment
Snapshot
2013-06-28 14:48:21
http://www.democracynow.org/2008/10/14/james_bamford_the_shadow_factory_the#
text/html
utf-8
newspaperArticle
Comment is free
Kinzer
Stephen
Bolivia
Cuba
Ecuador
Edward Snowden
Peru
United States
US politics
Venezuela
World news
Latin America is ready to defy the US over Snowden and other issues
Latin America has long lived in the US shadow, but the fact that some countries might take Snowden shows how that's changed
2013-06-25T12:16EDT
en-GB
http://www.guardian.co.uk/commentisfree/2013/jun/25/edward-snowden-ecuador-defy-united-states
2013-06-28 14:52:10
The Guardian
The Guardian
ISSN 0261-3077
attachment
Guardian Snapshot
2013-06-28 14:52:17
http://www.guardian.co.uk/commentisfree/2013/jun/25/edward-snowden-ecuador-defy-united-states
text/html
utf-8
videoRecording
Nashville
Tennessee
Official: Water complaints could be 'act of terrorism'
NASHVILLE -- A Tennessee Department of Environment and Conservation deputy director warned a group of Maury County residents that unfounded complaints about water quality could be considered an 'act of terrorism.'
2013-06-21
Official
http://www.usatoday.com/story/news/nation/2013/06/21/official-says-water-complaints-act-of-terrorism/2445071/
2013-06-28 14:52:22
www.usatoday.com
attachment
Snapshot
2013-06-28 14:52:22
http://www.usatoday.com/story/news/nation/2013/06/21/official-says-water-complaints-act-of-terrorism/2445071/
text/html
utf-8
webpage
CBS News
Orr
Bob
CIA
David Petraeus
dpst cbspetraeus
Paula Broadwell
resignation
Email investigation led to discovery of Petraeus' affair
When the CIA director's name surfaced in another probe, agents became concerned Petraeus or his email accounts may have been compromised
2012-11-10
http://www.cbsnews.com/8301-18563_162-57548122/email-investigation-led-to-discovery-of-petraeus-affair/
2013-06-28 14:52:36
attachment
Snapshot
2013-06-28 14:52:36
http://www.cbsnews.com/8301-18563_162-57548122/email-investigation-led-to-discovery-of-petraeus-affair/
text/html
iso-8859-1
newspaperArticle
U.S.
Liptak
Adam
Decisions and Verdicts
Fourth Amendment (US Constitution)
Prisons and Prisoners
Search and Seizure
States (US)
Supreme Court
Justices Approve Strip Searches for Any Offense
The court ruled that people arrested for any offense, however minor, may be forced to strip before being jailed, even if there is no suspicion of contraband.
2012-04-02
https://www.nytimes.com/2012/04/03/us/justices-approve-strip-searches-for-any-offense.html
2013-06-28 14:52:44
NYTimes.com
The New York Times
ISSN 0362-4331
attachment
New York Times Snapshot
2013-06-28 14:53:05
https://www.nytimes.com/2012/04/03/us/justices-approve-strip-searches-for-any-offense.html?_r=1&pagewanted=all
text/html
utf-8
newspaperArticle
The Atlantic Wire
Bump
Philip
Barack Obama
FISA
Privacy
Meet the 16 People Responsible for Protecting Your Privacy
There are two groups appointed with the task of ensuring that the government doesn't invade your privacy. The first is a secret court comprised of judges with heavy background in prosecution. The second is a civilian panel which the president is meeting with for the first time today. Feel better?
2013-06-21
http://www.theatlanticwire.com/politics/2013/06/meet-16-people-responsible-protecting-your-privacy/66473/
2013-06-28 14:52:47
attachment
Snapshot
2013-06-28 14:52:47
http://www.theatlanticwire.com/politics/2013/06/meet-16-people-responsible-protecting-your-privacy/66473/
text/html
utf-8
newspaperArticle
Mashable
Franceschi-Bicchierai
Lorenzo
google wikileaks uncategorized us-world us world
Google Handed Over Emails of Wikileaks Volunteers to U.S. Government
Google handed over a vast amount of data pertaining to the Gmail accounts of two former Wikileaks volunteers to the U.S. government.
2013-06-22
http://mashable.com/2013/06/22/google-wikileaks/
2013-06-28 14:53:01
attachment
Disclosure Order EC139.pdf
application/pdf
attachment
Disclosure Order SW 594.pdf
application/pdf
attachment
On Confirmed Assumptions
2013-09-17 19:49:56
http://anarchism.is/
text/html
utf-8
attachment
Order-EC105.pdf
application/pdf
attachment
Order EC139.pdf
application/pdf
attachment
Snapshot
2013-06-28 14:53:01
http://mashable.com/2013/06/22/google-wikileaks/
text/html
utf-8
attachment
Warrant SW594.pdf
application/pdf
newspaperArticle
Firstpost
china
Edward Snowden
hong kong
internet freedom
john kerry
NSA
russia
snooping
theysaidit
us
Kerry defends NSA surveillance, slams Snowden
'We do not look at content. We do not look at individual emails. We do not listen to people's calls. We take painstaking efforts sometimes at the expense of endangering ourselves, to protect the rights of people, he said.
2013-06-24
http://www.firstpost.com/world/john-kerry-defends-nsa-surveillance-slams-edward-snowden-901079.html
2013-06-28 14:53:13
attachment
Snapshot
2013-06-28 14:53:13
http://www.firstpost.com/world/john-kerry-defends-nsa-surveillance-slams-edward-snowden-901079.html
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Greenwald
Glenn
Ball
James
Fisa court
Law
NSA
Obama administration
Prism
Privacy
Surveillance
The NSA files
US constitution and civil liberties
US national security
World news
The top secret rules that allow NSA to use US data without a warrant
Fisa court submissions show broad scope of procedures governing NSA's surveillance of Americans' communication• Document one: procedures used by NSA to target non-US persons• Document two: procedures used by NSA to minimise data collected from US persons
2013-06-20T18:59EDT
en-GB
http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant
2013-06-28 14:53:19
The Guardian
attachment
Guardian Snapshot
2013-06-28 14:53:26
http://www.guardian.co.uk/world/2013/jun/20/fisa-court-nsa-without-warrant
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Greenwald
Glenn
Fisa court
NSA
Obama administration
Privacy
Surveillance
The NSA files
United States
US constitution and civil liberties
US national security
World news
Fisa court oversight: a look inside a secret and empty process
Obama and other NSA defenders insist there are robust limitations on surveillance but the documents show otherwise
2013-06-18T19:36EDT
en-GB
Fisa court oversight
http://www.guardian.co.uk/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy
2013-06-28 14:53:29
The Guardian
attachment
Guardian Snapshot
2013-06-28 14:53:41
http://www.guardian.co.uk/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy
text/html
utf-8
webpage
Techdirt.
Geigner
Timothy
Stop & Frisk Accomplishments: Barely Any Illegal Weapons Recovered, But Tons Of Weed Smokers Jailed | Techdirt
We've already discussed the abomination NYC Mayor Bloomberg has unleashed on his own people in the form of random searches of scary dark-skinned people, more commonly known as stop and frisk. The justification of a blatantly racist policy that...
2013-05-30
Stop & Frisk Accomplishments
https://www.techdirt.com/articles/20130523/08220523185/stop-frisk-accomplishments-barely-any-illegal-weapons-recovered-tons-weed-smokers-jailed.shtml
2013-06-28 14:53:34
attachment
Snapshot
2013-06-28 14:53:34
https://www.techdirt.com/articles/20130523/08220523185/stop-frisk-accomplishments-barely-any-illegal-weapons-recovered-tons-weed-smokers-jailed.shtml
text/html
iso-8859-1
videoRecording
Spitz
Malte
data
Talks
technology
TED
telecom
Malte Spitz: Your phone company is watching | Video on TED.com
What kind of data is your cell phone company collecting? Malte Spitz wasn’t too worried when he asked his operator in Germany to share information stored about him. Multiple unanswered requests and a lawsuit later, Spitz received 35,830 lines of code -- a detailed, nearly minute-by-minute account of half a year of his life.
2012-06
10:10
English
Malte Spitz
http://www.ted.com/talks/malte_spitz_your_phone_company_is_watching.html
2013-06-28 14:53:46
www.ted.com
CC-BY-NC-ND
attachment
MalteSpitz_2012G-480p.mp4
video/mp4
windows-1252
attachment
Snapshot
2013-06-28 14:53:46
http://www.ted.com/talks/malte_spitz_your_phone_company_is_watching.html#
text/html
utf-8
newspaperArticle
Ars Technica
Goodin
Dan
Use of Tor and e-mail crypto could increase chances that NSA keeps your data
When it comes to surveillance rules, some US people are more equal than others.
2013-06-20
http://arstechnica.com/tech-policy/2013/06/use-of-tor-and-e-mail-crypto-could-increase-chances-that-nsa-keeps-your-data/
2013-06-28 14:53:53
attachment
Snapshot
2013-06-28 14:53:53
http://arstechnica.com/tech-policy/2013/06/use-of-tor-and-e-mail-crypto-could-increase-chances-that-nsa-keeps-your-data/
text/html
utf-8
newspaperArticle
Spiegel Online
Augstein
Jakob
Internet
United States
Jakob Augstein: Data Spying Programs Threaten German Security
Overzealous data collectors in the US and Great Britain have no right to investigate German citizens. The German government must protect people from unauthorized access by foreign intelligence agencies, and it must act now. This is a matter of national security.
24.06.2013
Jakob Augstein
http://www.spiegel.de/international/germany/jakob-augstein-data-spying-programs-threaten-german-security-a-907577.html
2013-06-28 14:53:59
Spiegel Online
attachment
Jakob Augstein: Data Spying Programs Threaten German Security - SPIEGEL ONLINE
2013-06-28 14:54:02
http://www.spiegel.de/international/germany/jakob-augstein-data-spying-programs-threaten-german-security-a-907577.html
text/html
iso-8859-1
newspaperArticle
The Atlantic
Friedersdorf
Conor
2 Senators Say the NSA Is Still Feeding Us False Information
How can a democratic republic function when the bureaucrats are constantly misleading the people?
Jun 25 2013, 6:15 AM ET
http://www.theatlantic.com/politics/archive/2013/06/2-senators-say-the-nsa-is-still-feeding-us-false-information/277187/
2013-06-28 14:54:04
attachment
The Atlantic Print View
2013-06-28 14:54:08
http://www.theatlantic.com/politics/print/2013/06/2-senators-say-the-nsa-is-still-feeding-us-false-information/277187/
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Greenwald
Glenn
Ackerman
Spencer
Data protection
Internet
NSA
The NSA files
United States
US national security
World news
How the NSA is still harvesting your online data
Files show vast scale of current NSA metadata programs, with one stream alone celebrating 'one trillion records processed'
2013-06-27T11:03EDT
en-GB
http://www.guardian.co.uk/world/2013/jun/27/nsa-online-metadata-collection
2013-06-28 14:54:09
The Guardian
attachment
Guardian Snapshot
2013-06-28 14:54:14
http://www.guardian.co.uk/world/2013/jun/27/nsa-online-metadata-collection
text/html
utf-8
newspaperArticle
Bloomberg
Bershidsky
Leonid
U.S. Surveillance Is Not Aimed at Terrorists
The debate over the U.S. government’s monitoring of digital communications suggests that Americans are willing to allow it as long as it is genuinely targeted at terrorists. What they fail to realize is that the surveillance systems are best suited for gathering information on law-abiding citizens.
2013-06-23
http://www.bloomberg.com/news/2013-06-23/u-s-surveillance-is-not-aimed-at-terrorists.html
2013-06-28 14:54:12
attachment
Bloomberg Printable
2013-06-28 14:54:20
http://www.bloomberg.com/news/print/2013-06-23/u-s-surveillance-is-not-aimed-at-terrorists.html
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Wilson
Valerie Plame
Wilson
Joe
Bradley Manning
Civil liberties - international
Data protection
Edward Snowden
Fisa court
NSA
Obama administration
Prism
Privacy
Surveillance
The NSA files
United States
US Congress
US constitution and civil liberties
US national security
US politics
World news
The NSA's metastasised intelligence-industrial complex is ripe for abuse
Where oversight and accountability have failed, Snowden's leaks have opened up a vital public debate on our rights and privacy
2013-06-23T08:00EDT
en-GB
http://www.guardian.co.uk/commentisfree/2013/jun/23/nsa-intelligence-industrial-complex-abuse
2013-06-28 14:54:17
The Guardian
attachment
Guardian Snapshot
2013-06-28 14:54:32
http://www.guardian.co.uk/commentisfree/2013/jun/23/nsa-intelligence-industrial-complex-abuse
text/html
utf-8
newspaperArticle
Computerworld
Horowitz
Michael
Perfect Forward Secrecy can block the NSA from secure web pages, but no one uses it
Perfect Forward Privacy is an obscure SSL configuration option that increases security. Until a few days ago, I had never heard of it. Almost no one uses it. Without it, a single piece of data is all that stands between the NSA and all the HTTPS encrypted web pages from a website of interest. One key can decrypt every "secure" web page a site has ever sent. In this fairly long and technical blog, I speculate on how the NSA might, perhaps, possibly be able to see right through SSL, TLS and HTTPS.
2013-06-21T16:49-04:00
http://blogs.computerworld.com/encryption/22366/can-nsa-see-through-encrypted-web-pages-maybe-so
2013-06-28 14:54:21
attachment
Snapshot
2013-06-28 14:54:21
http://blogs.computerworld.com/encryption/22366/can-nsa-see-through-encrypted-web-pages-maybe-so
text/html
utf-8
blogPost
Daily Kos
Destin
Liepar
Barrett Brown
Daily Kos: HBGary, Palantir, Prism, Facebook & The Industrial Surveillance Complex
Part 1 of several to come:
Lets begin a couple years back with the release of the hacked e-mails of defense contractor HBGary by Anonymous. Many readers will be familiar with these events as it was ...
2013-06-23
http://www.dailykos.com/story/2013/06/23/1218189/-HBGary-Palantir-Prism-Facebook-The-Industrial-Surveillance-Complex
2013-06-28 14:54:27
en
Daily Kos
attachment
How Spy Agency Contractors Have Already Abused Their Power | The Nation
2013-09-17 20:19:52
http://www.thenation.com/blog/174741/how-spy-agency-contractors-have-already-abused-their-power#axzz2X3gPL9fK
text/html
utf-8
attachment
Michael Hastings Email About FBI Investigation - Business Insider
2013-09-17 20:19:37
http://www.businessinsider.com/michael-hastings-email-about-fbi-investigation-2013-6
text/html
utf-8
attachment
Nathaniel Fick, Former CNAS Chief, Heads Cyber Targeting Firm | Defense News | defensenews.com
2013-09-17 20:19:27
http://www.defensenews.com/article/20130115/C4ISR01/301150007/Nathaniel-Fick-Former-CNAS-Chief-Heads-Cyber-Targeting-Firm
text/html
windows-1252
attachment
Snapshot
2013-06-28 14:54:27
http://www.dailykos.com/story/2013/06/23/1218189/-HBGary-Palantir-Prism-Facebook-The-Industrial-Surveillance-Complex
text/html
utf-8
attachment
The Strange Case of Barrett Brown | The Nation
2013-09-17 20:19:43
http://www.thenation.com/article/174851/strange-case-barrett-brown#axzz2X3gPL9fK
text/html
utf-8
attachment
Why Is Barrett Brown Facing 100 Years in Prison? | VICE Canada
2013-09-17 20:19:31
http://www.vice.com/en_ca/read/why-is-barrett-brown-facing-100-years-in-jail
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Greenwald
Glenn
Ackerman
Spencer
Data protection
Fisa court
George Bush
Internet
NSA
Obama administration
Privacy
Surveillance
technology
The NSA files
United States
US national security
World news
NSA collected US email records in bulk for more than two years under Obama
• Secret program launched by Bush continued 'until 2011'• Fisa court renewed collection order every 90 days• Current NSA programs still mine US internet metadata
2013-06-27T11:20EDT
en-GB
http://www.guardian.co.uk/world/2013/jun/27/nsa-data-mining-authorised-obama
2013-06-28 14:55:00
The Guardian
attachment
Guardian Snapshot
2013-06-28 14:55:03
http://www.guardian.co.uk/world/2013/jun/27/nsa-data-mining-authorised-obama
text/html
utf-8
newspaperArticle
Threat Level
Zetter
Kim
Feds 'Pinged' Sprint GPS Data 8 Million Times Over a Year | Threat Level | Wired.com
Sprint Nextel provided law enforcement agencies with customer location data more than 8 million times between September 2008 and October 2009, accordin
2009-12-01
Feds ‘Pinged’ Sprint GPS Data 8 Million Times Over a Year
http://www.wired.com/threatlevel/2009/12/gps-data/
2013-06-28 14:55:07
attachment
Snapshot
2013-06-28 14:55:07
http://www.wired.com/threatlevel/2009/12/gps-data
text/html
utf-8
radioBroadcast
Berkes
Howard
Amid Data Controversy, NSA Builds Its Biggest Data Farm : NPR
The Utah Data Center, 26 miles south of Salt Lake City, will begin operations in September. Though the NSA director has said it won't hold data on U.S. citizens, privacy advocates worry about the agency's expanding capabilities.
NPR.org
2013-06-10
Amid Data Controversy, NSA Builds Its Biggest Data Farm
http://www.npr.org/2013/06/10/190160772/amid-data-controversy-nsa-builds-its-biggest-data-farm
2013-06-28 14:55:11
attachment
20130610_me_11.mp3
audio/mpeg
windows-1252
attachment
Snapshot
2013-06-28 14:55:11
http://www.npr.org/2013/06/10/190160772/amid-data-controversy-nsa-builds-its-biggest-data-farm
text/html
utf-8
newspaperArticle
Threat Level
Poulsen
Kevin
WikiLeaks Volunteer Was a Paid Informant for the FBI | Threat Level | Wired.com
Sigurdur “Siggi” Thordarson served two masters, working for the secret-spilling website and simultaneously spilling its secrets to the U.S. government in exchange for $5,000.
2013-06-27
http://www.wired.com/threatlevel/2013/06/wikileaks-mole/
2013-06-28 14:55:15
attachment
Snapshot
2013-06-28 14:55:15
http://www.wired.com/threatlevel/2013/06/wikileaks-mole/
text/html
utf-8
webpage
Winston
Ali
License-plate readers let police collect millions of records on drivers
2013-06-26
http://cironline.org/reports/license-plate-readers-let-police-collect-millions-records-drivers-4883
2013-06-28 14:55:22
attachment
Snapshot
2013-06-28 14:55:22
http://cironline.org/reports/license-plate-readers-let-police-collect-millions-records-drivers-4883
text/html
utf-8
newspaperArticle
Opinion
The New York Times
ISSN 0362-4331
Granick
Jennifer Stisa
Sprigman
Christopher Jon
National Security Agency
Surveillance of Citizens by Government
United States Politics and Government
USA PATRIOT Act
The Criminal N.S.A.
The N.S.A.’s mass surveillance violates the Constitution and has never been authorized by Congress or the courts.
2013-06-27
https://www.nytimes.com/2013/06/28/opinion/the-criminal-nsa.html
2013-06-28 14:56:37
NYTimes.com
attachment
New York Times Snapshot
2013-06-28 14:56:37
https://www.nytimes.com/2013/06/28/opinion/the-criminal-nsa.html?_r=0
text/html
utf-8
newspaperArticle
Business Insider
Kelley
Michael
Defense
Michael Kelley
Military
NSA
Spying
Surveillance
Latest Glenn Greenwald Scoop Vindicates One Of The Original NSA Whistleblowers
"I can pull your entire life together."
2013-06-27
http://www.businessinsider.com/nsa-whistleblower-william-binney-was-right-2013-6
2013-06-28 14:57:50
attachment
Snapshot
2013-06-28 14:57:50
http://www.businessinsider.com/nsa-whistleblower-william-binney-was-right-2013-6
text/html
utf-8
webpage
NSA Spying Helped by “Military Digital Complex” and Commercialized Internet
McChesney
Robert
NSA Spying Helped by “Military Digital Complex” and Commercialized Internet | Accuracy.Org
2013-06-17
http://www.accuracy.org/release/nsa-spying-helped-by-military-digital-complex-and-commercialized-internet/
2013-06-28 15:04:59
attachment
NSA Spying Helped by “Military Digital Complex” and Commercialized Internet | Accuracy.Org
2013-06-28 15:05:00
http://www.accuracy.org/release/nsa-spying-helped-by-military-digital-complex-and-commercialized-internet/
text/html
utf-8
webpage
Reed
Kevin
Infrastructure of a police state - World Socialist Web Site
2013-06-25
https://www.wsws.org/en/articles/2013/06/25/infr-j25.html
2013-06-28 15:05:03
attachment
Infrastructure of a police state - World Socialist Web Site
2013-06-28 15:05:04
https://www.wsws.org/en/articles/2013/06/25/infr-j25.html
text/html
utf-8
blogPost
Schneier on security
Schneier
Bruce
Schneier on Security: Finding Sociopaths on Facebook
2013-06-19
https://www.schneier.com/blog/archives/2013/06/finding_sociopa.html
2013-06-28 15:05:08
attachment
Schneier on Security: Finding Sociopaths on Facebook
2013-06-28 15:05:09
https://www.schneier.com/blog/archives/2013/06/finding_sociopa.html
text/html
utf-8
webpage
Office of the Director of National Intelligence
Office of the Director of National Intelligence
Department of Justice
ODNI and DOJ updated guidelines for NCTC access, retention, use, and dissemination of information in datasets containing non-terrorism information
2012-03-22
http://www.dni.gov/index.php/newsroom/press-releases/96-press-releases-2012/528-odni-and-doj-update-guidelines-for-nctc-access,-retention,-use,-and-dissemination-of-information-in-datasets-containing-non-terrorism-information
2013-06-28 15:05:10
attachment
ODNI and DOJ updated guidelines for NCTC access, retention, use, and dissemination of information in datasets containing non-terrorism information
2013-06-28 15:05:11
http://www.dni.gov/index.php/newsroom/press-releases/96-press-releases-2012/528-odni-and-doj-update-guidelines-for-nctc-access,-retention,-use,-and-dissemination-of-information-in-datasets-containing-non-terrorism-information
text/html
utf-8
attachment
Phoca.pdf
application/pdf
newspaperArticle
Harris
Shane
The NSA Can't Tell the Difference Between an American and a Foreigner - By Shane Harris | Foreign Policy
2013-06-28
http://www.foreignpolicy.com/articles/2013/06/27/the_nsa_cant_tell_the_difference_between_an_american_and_a_foreigner?page=0,1
2013-06-28 15:05:13
attachment
The NSA Can't Tell the Difference Between an American and a Foreigner - By Shane Harris | Foreign Policy
2013-09-17 21:16:39
http://www.foreignpolicy.com/articles/2013/06/27/the_nsa_cant_tell_the_difference_between_an_american_and_a_foreigner?page=0,1
text/html
utf-8
webpage
NSA's Utah Data Center Suffers New Round Of Electrical Problems - Forbes
http://www.forbes.com/sites/kashmirhill/2013/10/17/nsas-utah-data-center-suffers-new-round-of-electrical-problems/
2013-10-21 15:20:29
attachment
NSA's Utah Data Center Suffers New Round Of Electrical Problems - Forbes
2013-10-21 15:20:30
http://www.forbes.com/sites/kashmirhill/2013/10/17/nsas-utah-data-center-suffers-new-round-of-electrical-problems/
text/html
utf-8
newspaperArticle
Schofield
Matthew
Memories of Stasi color Germans’ view of U.S. surveillance programs | McClatchy
2013-06-26
http://www.mcclatchydc.com/2013/06/26/195045/memories-of-stasi-color-germans.html
2013-06-28 15:05:16
attachment
Memories of Stasi color Germans’ view of U.S. surveillance programs | McClatchy
2013-06-28 15:05:17
http://www.mcclatchydc.com/2013/06/26/195045/memories-of-stasi-color-germans.html#.Uc2j5iCa1pB
text/html
utf-8
blogPost
Easily Distracted
Burke
Timothy
The Slow Poison of the Covert Imagination | Easily Distracted
2013-06-10
http://blogs.swarthmore.edu/burke/blog/2013/06/10/the-slow-poison-of-the-covert-imagination/
2013-06-28 15:15:27
attachment
The Slow Poison of the Covert Imagination | Easily Distracted
2013-06-28 15:15:28
http://blogs.swarthmore.edu/burke/blog/2013/06/10/the-slow-poison-of-the-covert-imagination/
text/html
utf-8
journalArticle
Harvard Law Review
1880 (2013)
Solove
Daniel
Privacy Self-Management and the Consent Dilemma
2012-11-04
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2171018
2013-06-28 15:15:32
attachment
Privacy Self-Management and the Consent Dilemma by Daniel J. Solove :: SSRN
2013-06-28 15:15:33
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2171018
text/html
utf-8
attachment
SSRN-id2171018.pdf
application/pdf
webpage
Salon.com
Lennard
Natasha
occupy
Security expert: All Occupiers’ phones were logged
News
2013-06-06
http://www.salon.com/2013/06/06/security_expert_all_occupiers_phones_were_logged/
2013-06-28 15:15:43
attachment
Security expert: All Occupiers’ phones were logged - Salon.com
2013-06-28 15:15:44
http://www.salon.com/2013/06/06/security_expert_all_occupiers_phones_were_logged/
text/html
utf-8
webpage
MIT Technology Review
Leber
Jessica
Mobile Call Logs Can Reveal a Lot to the NSA | MIT Technology Review
2013-06-18
http://www.technologyreview.com/news/516181/mobile-call-logs-can-reveal-a-lot-to-the-nsa/
2013-06-28 15:16:03
attachment
Mobile Call Logs Can Reveal a Lot to the NSA | MIT Technology Review
2013-06-28 15:16:04
http://www.technologyreview.com/news/516181/mobile-call-logs-can-reveal-a-lot-to-the-nsa/
text/html
utf-8
webpage
New York Times
Savage
Charlie
N.S.A. Chief Says Surveillance Has Stopped Dozens of Plots - NYTimes.com
2013-06-18
https://www.nytimes.com/2013/06/19/us/politics/nsa-chief-says-surveillance-has-stopped-dozens-of-plots.html?pagewanted=2&_r=0
2013-06-28 15:16:27
attachment
N.S.A. Chief Says Surveillance Has Stopped Dozens of Plots - NYTimes.com
2013-06-28 15:16:28
https://www.nytimes.com/2013/06/19/us/politics/nsa-chief-says-surveillance-has-stopped-dozens-of-plots.html?pagewanted=2&_r=0
text/html
utf-8
attachment
N.S.A. Chief Says Surveillance Has Stopped Dozens of Plots - NYTimes.com
2013-09-17 21:25:59
http://www.nytimes.com/2013/06/19/us/politics/nsa-chief-says-surveillance-has-stopped-dozens-of-plots.html?pagewanted=1&_r=0&gwh=CC3BE712BA5EB010EBB33DAB7F35E960
text/html
utf-8
webpage
The New Yorker
Wu
Tim
Why Monopolies Make Government Spying Easier : The New Yorker
2013-06-18
http://www.newyorker.com/online/blogs/elements/2013/06/why-monopolies-make-spying-easier.html?mbid=social_retweet
2013-06-28 15:16:38
attachment
Why Monopolies Make Government Spying Easier : The New Yorker
2013-06-28 15:16:39
http://www.newyorker.com/online/blogs/elements/2013/06/why-monopolies-make-spying-easier.html?mbid=social_retweet
text/html
iso-8859-1
webpage
Forbes
Tanner
Adam
Never Give Stores Your ZIP Code. Here's Why - Forbes
2013-06-19
http://www.forbes.com/sites/adamtanner/2013/06/19/theres-a-billion-reasons-not-to-give-stores-your-zip-code-ever/
2013-06-28 15:17:01
attachment
Never Give Stores Your ZIP Code. Here's Why - Forbes
2013-06-28 15:17:02
http://www.forbes.com/sites/adamtanner/2013/06/19/theres-a-billion-reasons-not-to-give-stores-your-zip-code-ever/
text/html
utf-8
webpage
New York Times
Risen
James
Wingfield
Nick
Web’s Reach Binds N.S.A. and Silicon Valley Leaders - NYTimes.com
2013-06-19
https://www.nytimes.com/2013/06/20/technology/silicon-valley-and-spy-agency-bound-by-strengthening-web.html?_r=0
2013-06-28 15:17:04
attachment
Web’s Reach Binds N.S.A. and Silicon Valley Leaders - NYTimes.com
2013-06-28 15:17:05
https://www.nytimes.com/2013/06/20/technology/silicon-valley-and-spy-agency-bound-by-strengthening-web.html?_r=0
text/html
utf-8
attachment
Web’s Reach Binds N.S.A. and Silicon Valley Leaders - NYTimes.com
2013-09-17 21:29:27
http://www.nytimes.com/2013/06/20/technology/silicon-valley-and-spy-agency-bound-by-strengthening-web.html?pagewanted=2&_r=0
text/html
utf-8
webpage
Stray
Jonathan
FAQ: What You Need to Know About the NSA’s Surveillance Programs - ProPublica
2013-06-27
https://www.propublica.org/article/nsa-data-collection-faq
2013-06-28 15:19:34
attachment
FAQ: What You Need to Know About the NSA’s Surveillance Programs - ProPublica
2013-06-28 15:19:35
https://www.propublica.org/article/nsa-data-collection-faq
text/html
utf-8
webpage
Devereaux
Ryan
Fresh questions for NYPD as CIA collaboration revealed in new report | World news | guardian.co.uk
2013-06-27
http://www.guardian.co.uk/world/2013/jun/27/nypd-cia-collaboration-surveillance
2013-06-28 15:22:11
attachment
Fresh questions for NYPD as CIA collaboration revealed in new report | World news | guardian.co.uk
2013-06-28 15:22:12
http://www.guardian.co.uk/world/2013/jun/27/nypd-cia-collaboration-surveillance
text/html
utf-8
newspaperArticle
Featured Articles
Chicago Tribune
Albright
Joseph
Kunstel
Marcia
Ex-official: Cia Helped Jail Mandela - Chicago Tribune
1990-06-10
http://articles.chicagotribune.com/1990-06-10/news/9002170271_1_anti-apartheid-activities-gerard-ludi-cia-spokesman-mark-mansfield
2013-06-28 16:41:57
attachment
Ex-official: Cia Helped Jail Mandela - Chicago Tribune
2013-06-28 16:41:58
http://articles.chicagotribune.com/1990-06-10/news/9002170271_1_anti-apartheid-activities-gerard-ludi-cia-spokesman-mark-mansfield
text/html
utf-8
blogPost
MediaPost
Davis
Wendy
MediaPost Publications FCC Extends Some Privacy Protections To Wireless Users 06/27/2013
2013-06-27
http://www.mediapost.com/publications/article/203515/tk.html#axzz2XXoBd3FW
2013-06-28 20:21:47
attachment
MediaPost Publications FCC Extends Some Privacy Protections To Wireless Users 06/27/2013
2013-06-28 20:21:48
http://www.mediapost.com/publications/article/203515/tk.html#axzz2XXoBd3FW
text/html
utf-8
newspaperArticle
Jarvis
Jeff
We need encryption for private communications | Jeff Jarvis | Comment is free | guardian.co.uk
2013-06-29
http://www.guardian.co.uk/commentisfree/2013/jun/29/google-facebook-data-encryption
2013-06-29 14:54:44
attachment
We need encryption for private communications | Jeff Jarvis | Comment is free | guardian.co.uk
2013-06-29 14:54:45
http://www.guardian.co.uk/commentisfree/2013/jun/29/google-facebook-data-encryption
text/html
utf-8
newspaperArticle
Kravets
David
Encryption Has Foiled Wiretaps for First Time Ever, Feds Say | Threat Level | Wired.com
2013-06-28
http://www.wired.com/threatlevel/2013/06/encryption-foiled-wiretaps/
2013-06-29 14:54:53
attachment
Encryption Has Foiled Wiretaps for First Time Ever, Feds Say | Threat Level | Wired.com
2013-06-29 14:54:54
http://www.wired.com/threatlevel/2013/06/encryption-foiled-wiretaps/
text/html
utf-8
newspaperArticle
The Atlantic
Granick
Jennifer
Sprigman
Christopher Jon
U.S Government Surveillance: Bad for Silicon Valley, Bad for Democracy Around the World
2013-06-28
http://www.theatlantic.com/technology/archive/2013/06/us-government-surveillance-bad-for-silicon-valley-bad-for-democracy-around-the-world/277335/
2013-06-29 15:05:28
attachment
U.S Government Surveillance: Bad for Silicon Valley, Bad for Democracy Around the World - Christopher Jon Sprigman and Jennifer Granick - The Atlantic
2013-06-29 15:05:29
http://www.theatlantic.com/technology/archive/2013/06/us-government-surveillance-bad-for-silicon-valley-bad-for-democracy-around-the-world/277335/
text/html
utf-8
blogPost
TechCrunch
Evans
Jon
Tomorrow’s Surveillance: Everyone, Everywhere, All The Time | TechCrunch
2013-06-29
http://techcrunch.com/2013/06/29/tomorrows-surveillance/#
2013-06-29 15:06:13
attachment
Tomorrow’s Surveillance: Everyone, Everywhere, All The Time | TechCrunch
2013-06-29 15:06:14
http://techcrunch.com/2013/06/29/tomorrows-surveillance/#
text/html
utf-8
newspaperArticle
Reuters
Breidthardt
Annika
U.S. taps half-billion German phone, internet links in month: report | Reuters
2013-06-30
http://www.reuters.com/article/2013/06/30/us-usa-germany-spying-idUSBRE95T04B20130630
2013-07-01 16:04:02
attachment
U.S. taps half-billion German phone, internet links in month: report | Reuters
2013-07-01 16:04:03
http://www.reuters.com/article/2013/06/30/us-usa-germany-spying-idUSBRE95T04B20130630
text/html
utf-8
blogPost
Wired - Threat Level
Zetter
Kim
Attorney General Secretly Granted Gov. Ability to Develop and Store Dossiers on Innocent Americans | Threat Level | Wired.com
2012-12-13
http://www.wired.com/threatlevel/2012/12/gov-dossiers-on-us-citizens/
2013-07-01 16:07:48
attachment
Attorney General Secretly Granted Gov. Ability to Develop and Store Dossiers on Innocent Americans | Threat Level | Wired.com
2013-07-01 16:07:49
http://www.wired.com/threatlevel/2012/12/gov-dossiers-on-us-citizens/
text/html
utf-8
newspaperArticle
Wall Street Journal
Angwin
Julia
U.S. Terrorism Agency to Tap a Vast Database of Citizens - WSJ.com
2012-12-13
http://online.wsj.com/article/SB10001424127887324478304578171623040640006.html
2013-07-01 16:11:00
attachment
U.S. Terrorism Agency to Tap a Vast Database of Citizens - WSJ.com
2013-07-01 16:11:01
http://online.wsj.com/article/SB10001424127887324478304578171623040640006.html
text/html
utf-8
blogPost
Wired - Threat Level
Zetter
Kim
U.K. Spy Agency Secretly Taps Over 200 Fiber-Optic Cables, Shares Data With the NSA | Threat Level | Wired.com
2013-06-21
http://www.wired.com/threatlevel/2013/06/gchq-tapped-200-cables/
2013-07-01 16:11:06
attachment
U.K. Spy Agency Secretly Taps Over 200 Fiber-Optic Cables, Shares Data With the NSA | Threat Level | Wired.com
2013-07-01 16:11:07
http://www.wired.com/threatlevel/2013/06/gchq-tapped-200-cables/
text/html
utf-8
newspaperArticle
The Salt Lake Tribune
Semerad
Tony
NSA in Utah: Mining a mountain of data | The Salt Lake Tribune
2013-06-29
http://www.sltrib.com/sltrib/news/56515678-78/data-nsa-http-www.html.csp
2013-07-01 19:25:32
attachment
NSA in Utah: Mining a mountain of data | The Salt Lake Tribune
2013-07-01 19:25:33
http://www.sltrib.com/sltrib/news/56515678-78/data-nsa-http-www.html.csp
text/html
utf-8
attachment
NSA in Utah: Mining a mountain of data | The Salt Lake Tribune
2013-07-01 19:25:37
http://www.sltrib.com/sltrib/news/56515678-78/data-nsa-http-www.html.csp?page=2
text/html
utf-8
attachment
NSA in Utah: Mining a mountain of data | The Salt Lake Tribune
2013-07-01 19:28:40
http://www.sltrib.com/sltrib/news/56515678-78/data-nsa-http-www.html.csp?page=3
text/html
utf-8
newspaperArticle
Bloomberg
Riley
Michael
U.S. Agencies Said to Swap Data With Thousands of Firms - Bloomberg
2013-06-15
http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html
2013-07-01 19:41:35
attachment
U.S. Agencies Said to Swap Data With Thousands of Firms - Bloomberg
2013-07-01 19:41:36
http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html
text/html
utf-8
report
Personal Privacy in an Information Society: The Report of the Privacy Protection Study Commission transmitted to President Jimmy Carter on July 12, 1977.
1977-07-12
Personal Privacy in an Information Society
http://aspe.hhs.gov/datacncl/1977privacy/c9.htm
2013-07-01 19:47:45
attachment
Personal Privacy in an Information Society: Chapter 9. Government Access toPersonal Records and "Private Papers"
2013-07-01 19:47:46
http://aspe.hhs.gov/datacncl/1977privacy/c9.htm
text/html
windows-1252
blogPost
Wired - Threat Level
Zetter
Kim
NSA Whistleblower: Wiretaps Were Combined with Credit Card Records of U.S. Citizens | Threat Level | Wired.com
2009-01-23
http://www.wired.com/threatlevel/2009/01/nsa-whistlebl-1/
2013-07-01 21:39:27
attachment
NSA Whistleblower: Wiretaps Were Combined with Credit Card Records of U.S. Citizens | Threat Level | Wired.com
2013-07-01 21:39:28
http://www.wired.com/threatlevel/2009/01/nsa-whistlebl-1/
text/html
utf-8
blogPost
Techdirt
Cushing
Tim
india
How The Indian Government's 'Central Monitoring System' Makes The NSA Look Like A Paragon Of Restraint | Techdirt
2013-07-01
https://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml
2013-07-03 21:36:03
attachment
How The Indian Government's 'Central Monitoring System' Makes The NSA Look Like A Paragon Of Restraint | Techdirt
2013-07-03 21:36:04
https://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml
text/html
windows-1252
blogPost
Beneath the Waves
Lincoln
Ben
Motorola Is Listening - Projects - Beneath the Waves
2013-07-01
http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html?source=hn
2013-07-03 21:36:24
attachment
Motorola Is Listening - Projects - Beneath the Waves
2013-07-03 21:36:25
http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html?source=hn
text/html
windows-1252
journalArticle
Scientific Reports
2013
March
de Montjoye
Yves-Alexandre
Hidalgo
César A.
Verleysen
Michael
Blondel
Vincent D.
Unique in the Crowd: The privacy bounds of human mobility
2013-03-25
http://www.nature.com/srep/2013/130325/srep01376/full/srep01376.html
2013-07-08 22:25:13
attachment
Unique in the Crowd: The privacy bounds of human mobility : Scientific Reports : Nature Publishing Group
2013-07-08 22:25:14
http://www.nature.com/srep/2013/130325/srep01376/full/srep01376.html
text/html
utf-8
blogPost
Schneier on security
Schneier
Bruce
Schneier on Security: Big Data Surveillance Results in Bad Policy
2013-07-08
https://www.schneier.com/blog/archives/2013/07/big_data_survei.html
2013-07-08 22:25:15
attachment
Schneier on Security: Big Data Surveillance Results in Bad Policy
2013-07-08 22:25:16
https://www.schneier.com/blog/archives/2013/07/big_data_survei.html
text/html
utf-8
newspaperArticle
Wall Street Journal
Gorman
Siobhan
Valentino-Devries
Jennifer
Secret Court's Redefinition of 'Relevant' Empowered Vast NSA Data-Gathering - WSJ.com
2013-07-08
http://online.wsj.com/article_email/SB10001424127887323873904578571893758853344-lMyQjAxMTAzMDAwODEwNDgyWj.html
2013-07-08 22:25:17
attachment
Secret Court's Redefinition of 'Relevant' Empowered Vast NSA Data-Gathering - WSJ.com
2013-07-08 22:25:18
http://online.wsj.com/article_email/SB10001424127887323873904578571893758853344-lMyQjAxMTAzMDAwODEwNDgyWj.html
text/html
utf-8
newspaperArticle
The Age
Dorling
Philip
Edward Snowden reveals Australia's Links To Secret US Spy Program
2013-07-08
http://www.theage.com.au/world/snowden-reveals-australias-links-to-us-spy-web-20130708-2plyg.html
2013-07-08 22:25:19
attachment
Edward Snowden reveals Australia's Links To Secret US Spy Program
2013-07-08 22:25:20
http://www.theage.com.au/world/snowden-reveals-australias-links-to-us-spy-web-20130708-2plyg.html
text/html
utf-8
webpage
Stöcker
Christian
Snowden Reveals How GCHQ in Britain Soaks Up Mass Internet Data - SPIEGEL ONLINE
2013-07-07
http://www.spiegel.de/international/world/snowden-reveals-how-gchq-in-britain-soaks-up-mass-internet-data-a-909852.html
2013-07-08 22:25:24
attachment
Snowden Reveals How GCHQ in Britain Soaks Up Mass Internet Data - SPIEGEL ONLINE
2013-07-08 22:25:25
http://www.spiegel.de/international/world/snowden-reveals-how-gchq-in-britain-soaks-up-mass-internet-data-a-909852.html
text/html
windows-1252
webpage
Hays
Tom
NYC cases show crooked cops' abuse of FBI database - Yahoo! News
2013-07-07
http://news.yahoo.com/nyc-cases-show-crooked-cops-abuse-fbi-database-162152158.html
2013-07-08 22:25:26
attachment
NYC cases show crooked cops' abuse of FBI database - Yahoo! News
2013-07-08 22:25:27
http://news.yahoo.com/nyc-cases-show-crooked-cops-abuse-fbi-database-162152158.html
text/html
utf-8
webpage
Timberg
Craig
Nakashima
Ellen
Agreements with private companies protect U.S. access to cables’ data for surveillance - The Washington Post
2013-07-06
http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story.html
2013-07-08 22:25:29
attachment
Agreements with private companies protect U.S. access to cables’ data for surveillance - The Washington Post
2013-07-08 22:25:30
http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story.html
text/html
utf-8
attachment
Agreements with private companies protect U.S. access to cables’ data for surveillance - The Washington Post
2014-05-22 19:32:10
http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story_1.html
text/html
utf-8
attachment
Agreements with private companies protect U.S. access to cables’ data for surveillance - The Washington Post
2014-05-22 19:32:16
http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story_2.html
text/html
utf-8
attachment
Agreements with private companies protect U.S. access to cables’ data for surveillance - The Washington Post
2014-05-22 19:32:21
http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story_3.html
text/html
utf-8
attachment
Agreements with private companies protect U.S. access to cables’ data for surveillance - The Washington Post
2014-05-22 19:32:26
http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story_4.html
text/html
utf-8
webpage
Bolivia Angered By Forced Landing of Morales Plane - SPIEGEL ONLINE
2013-07-03
http://www.spiegel.de/international/world/bolivia-angered-by-forced-landing-of-morales-plane-a-909219.html
2013-07-08 22:25:34
attachment
Bolivia Angered By Forced Landing of Morales Plane - SPIEGEL ONLINE
2013-07-08 22:25:35
http://www.spiegel.de/international/world/bolivia-angered-by-forced-landing-of-morales-plane-a-909219.html
text/html
windows-1252
newspaperArticle
Guardian
US Spying on Europe More Widespread than First Thought - SPIEGEL ONLINE
2013-07-01
http://www.spiegel.de/international/world/us-spying-on-europe-more-widespread-than-first-thought-a-908706.html
2013-07-08 22:25:39
attachment
US Spying on Europe More Widespread than First Thought - SPIEGEL ONLINE
2013-07-08 22:25:40
http://www.spiegel.de/international/world/us-spying-on-europe-more-widespread-than-first-thought-a-908706.html
text/html
windows-1252
newspaperArticle
Spiegel Online
Poitras
Laura
Rosenbach
Marcel
Schmid
Fidelius
Stark
Holger
Embassies
NSA Spied on European Union Offices
2013-06-29
http://www.spiegel.de/international/europe/nsa-spied-on-european-union-offices-a-908590.html
2013-07-08 22:25:42
attachment
NSA Spied on European Union Offices - SPIEGEL ONLINE
2013-07-08 22:25:43
http://www.spiegel.de/international/europe/nsa-spied-on-european-union-offices-a-908590.html
text/html
windows-1252
webpage
Daily Intelligencer
Roose
Kevin
The Surveillance-Free Day (Part I)
2013-07-29
http://nymag.com/daily/intelligencer/2013/07/surveillance-free-day-part-i.html
2013-08-02 17:49:14
attachment
The Surveillance-Free Day (Part I) -- Daily Intelligencer
2013-08-02 17:49:15
http://nymag.com/daily/intelligencer/2013/07/surveillance-free-day-part-i.html
text/html
utf-8
webpage
Brandon
John
Retail stores plan elaborate ways to track you | Fox News
2013-07-26
http://www.foxnews.com/tech/2013/07/26/retail-stores-plan-elaborate-ways-to-track/
2013-08-02 17:49:30
attachment
Retail stores plan elaborate ways to track you | Fox News
2013-08-02 17:49:31
http://www.foxnews.com/tech/2013/07/26/retail-stores-plan-elaborate-ways-to-track/
text/html
utf-8
webpage
Farivar
Cyrus
Moscow Metro says new tracking system is to find stolen phones; no one believes them | Ars Technica
2013-07-29
http://arstechnica.com/tech-policy/2013/07/moscow-metro-says-new-tracking-system-is-to-find-stolen-phones-no-one-believes-them/
2013-08-02 17:49:50
attachment
Moscow Metro says new tracking system is to find stolen phones; no one believes them | Ars Technica
2013-08-02 17:49:51
http://arstechnica.com/tech-policy/2013/07/moscow-metro-says-new-tracking-system-is-to-find-stolen-phones-no-one-believes-them/
text/html
utf-8
webpage
Winston
Ali
Oakland surveillance center progresses amid debate on privacy, data collection | The Center for Investigative Reporting
2013-07-18
http://cironline.org/reports/oakland-surveillance-center-progresses-amid-debate-privacy-data-collection-4978
2013-08-02 17:49:53
attachment
Oakland surveillance center progresses amid debate on privacy, data collection | The Center for Investigative Reporting
2013-08-02 17:49:54
http://cironline.org/reports/oakland-surveillance-center-progresses-amid-debate-privacy-data-collection-4978
text/html
utf-8
webpage
the Guardian
Greenwald
Glenn
XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World news | theguardian.com
2013-07-31
http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
2013-08-02 17:50:06
attachment
XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World news | theguardian.com
2013-08-02 17:50:07
http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data
text/html
utf-8
webpage
Hopkins
Nick
Borger
Julian
Exclusive: NSA pays £100m in secret funding for GCHQ | UK news | The Guardian
2013-08-01
http://www.theguardian.com/uk-news/2013/aug/01/nsa-paid-gchq-spying-edward-snowden
2013-08-02 17:50:20
attachment
Exclusive: NSA pays £100m in secret funding for GCHQ | UK news | The Guardian
2013-08-02 17:50:21
http://www.theguardian.com/uk-news/2013/aug/01/nsa-paid-gchq-spying-edward-snowden
text/html
utf-8
webpage
Kelley
Michael
How NSA Can Abuse Data On Americans - Business Insider
2013-07-09
http://www.businessinsider.com/how-nsa-can-abuse-data-on-americans-2013-7
2013-08-02 17:50:26
attachment
How NSA Can Abuse Data On Americans - Business Insider
2013-08-02 17:50:27
http://www.businessinsider.com/how-nsa-can-abuse-data-on-americans-2013-7
text/html
utf-8
webpage
Valentino-Devries
Jennifer
Yadron
Danny
FBI Taps Hacker Tactics to Spy on Suspects - WSJ.com
2013-08-01
http://online.wsj.com/article_email/SB10001424127887323997004578641993388259674-lMyQjAxMTAzMDAwMTEwNDEyWj.html?mod=wsj_valettop_email
2013-08-02 20:54:48
attachment
FBI Taps Hacker Tactics to Spy on Suspects - WSJ.com
2013-08-02 20:54:49
http://online.wsj.com/article_email/SB10001424127887323997004578641993388259674-lMyQjAxMTAzMDAwMTEwNDEyWj.html?mod=wsj_valettop_email
text/html
utf-8
webpage
Valentino-Devries
Jennifer
Yadron
Danny
How the FBI Hacks Criminal Suspects - Digits - WSJ
2013-08-01
http://blogs.wsj.com/digits/2013/08/01/how-the-fbi-hacks-criminal-suspects/
2013-08-02 20:54:54
attachment
How the FBI Hacks Criminal Suspects - Digits - WSJ
2013-08-02 20:54:55
http://blogs.wsj.com/digits/2013/08/01/how-the-fbi-hacks-criminal-suspects/
text/html
utf-8
webpage
Valentino-Devries
Jennifer
Yadron
Danny
BBC NEWS | In Depth | Echelon spy network revealed
2013-08-01
http://news.bbc.co.uk/2/hi/503224.stm
2013-08-05 19:00:34
attachment
BBC NEWS | In Depth | Echelon spy network revealed
2013-08-05 19:00:35
http://news.bbc.co.uk/2/hi/503224.stm
text/html
windows-1252
webpage
The Atlantic
Friedman
Allan
Why Wasn't the NSA Prepared? - Allan Friedman - The Atlantic
2013-08-02
http://www.theatlantic.com/national/archive/2013/08/why-wasnt-the-nsa-prepared/278310/
2013-08-05 19:01:02
attachment
Why Wasn't the NSA Prepared? - Allan Friedman - The Atlantic
2013-08-05 19:01:03
http://www.theatlantic.com/national/archive/2013/08/why-wasnt-the-nsa-prepared/278310/
text/html
utf-8
webpage
Gallagher
Sean
NSA’s Internet taps can find systems to hack, track VPNs and Word docs | Ars Technica
2013-08-01
http://arstechnica.com/tech-policy/2013/08/nsas-internet-taps-can-find-systems-to-hack-track-vpns-and-word-docs/
2013-08-05 19:15:39
attachment
NSA’s Internet taps can find systems to hack, track VPNs and Word docs | Ars Technica
2013-08-05 19:15:40
http://arstechnica.com/tech-policy/2013/08/nsas-internet-taps-can-find-systems-to-hack-track-vpns-and-word-docs/
text/html
utf-8
webpage
Bloomberg
Schneier
Bruce
The Public-Private Surveillance Partnership - Bloomberg
2013-07-31
http://www.bloomberg.com/news/2013-07-31/the-public-private-surveillance-partnership.html
2013-08-05 19:16:00
attachment
The Public-Private Surveillance Partnership - Bloomberg
2013-08-05 19:16:01
http://www.bloomberg.com/news/2013-07-31/the-public-private-surveillance-partnership.html
text/html
utf-8
webpage
Gude
Hubert
Poitras
Laura
Rosenbach
Marcel
German Intelligence Sends Massive Amounts of Data to the NSA - SPIEGEL ONLINE
2013-08-05
http://www.spiegel.de/international/world/german-intelligence-sends-massive-amounts-of-data-to-the-nsa-a-914821.html
2013-08-07 16:32:05
attachment
German Intelligence Sends Massive Amounts of Data to the NSA - SPIEGEL ONLINE
2013-08-07 16:32:06
http://www.spiegel.de/international/world/german-intelligence-sends-massive-amounts-of-data-to-the-nsa-a-914821.html
text/html
windows-1252
webpage
Savage
Charlie
N.S.A. Said to Search Content of Messages to and From U.S. - NYTimes.com
2013-08-08
http://www.nytimes.com/2013/08/08/us/broader-sifting-of-data-abroad-is-seen-by-nsa.html?hp&_r=1&pagewanted=all&
2013-08-08 20:35:41
attachment
N.S.A. Said to Search Content of Messages to and From U.S. - NYTimes.com
2013-08-08 20:35:42
http://www.nytimes.com/2013/08/08/us/broader-sifting-of-data-abroad-is-seen-by-nsa.html?hp&_r=1&pagewanted=all&
text/html
utf-8
webpage
Global Post
Purtill
Corinne
The curious case of Mahdi Hashi | GlobalPost
2013-08-09
http://www.globalpost.com/dispatch/news/regions/europe/united-kingdom/130808/britain-immigration-citizenship-mahdi-hashi
2013-08-09 17:38:27
attachment
The curious case of Mahdi Hashi | GlobalPost
2013-08-09 17:38:28
http://www.globalpost.com/dispatch/news/regions/europe/united-kingdom/130808/britain-immigration-citizenship-mahdi-hashi
text/html
utf-8
webpage
German companies to automatically encrypt emails
2013-08-09
http://bigstory.ap.org/article/german-companies-automatically-encrypt-emails
2013-08-09 17:39:15
attachment
German companies to automatically encrypt emails
2013-08-09 17:39:16
http://bigstory.ap.org/article/german-companies-automatically-encrypt-emails
text/html
utf-8
webpage
Ball
James
Ackerman
Spencer
NSA loophole allows warrantless search for US citizens' emails and phone calls | World news | theguardian.com
2013-08-09
http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls
2013-08-09 18:11:41
attachment
NSA loophole allows warrantless search for US citizens' emails and phone calls | World news | theguardian.com
2013-08-09 18:11:42
http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls
text/html
utf-8
webpage
Duckett
Chris
NSA hunger demands 29 petabytes of data a day | ZDNet
2013-08-12
http://www.zdnet.com/nsa-hunger-demands-29-petabytes-of-data-a-day-7000019255/
2013-08-12 18:18:40
attachment
NSA hunger demands 29 petabytes of data a day | ZDNet
2013-08-12 18:18:41
http://www.zdnet.com/nsa-hunger-demands-29-petabytes-of-data-a-day-7000019255/
text/html
utf-8
webpage
Sengupta
Somni
2 E-Mail Services Shut Down to Protect Customer Data - NYTimes.com
2013-08-08
http://bits.blogs.nytimes.com/2013/08/08/two-providers-of-encrypted-e-mail-shut-down/?_r=0
2013-08-12 19:03:02
attachment
2 E-Mail Services Shut Down to Protect Customer Data - NYTimes.com
2013-08-12 19:03:03
http://bits.blogs.nytimes.com/2013/08/08/two-providers-of-encrypted-e-mail-shut-down/?_r=0
text/html
utf-8
webpage
Dictionary Arbitrage and Section 215: “Relevant” | emptywheel
http://www.emptywheel.net/2013/08/10/dictionary-arbitrage-under-section-215-relevant/
2013-08-12 19:03:05
attachment
Dictionary Arbitrage and Section 215: “Relevant” | emptywheel
2013-08-12 19:03:06
http://www.emptywheel.net/2013/08/10/dictionary-arbitrage-under-section-215-relevant/
text/html
utf-8
webpage
Document Exploitation: More Misleading Information from ODNI on NSA Telephone Metadata Collection
http://www.docexblog.com/2013/07/more-misleading-information-from-odni.html
2013-08-12 19:03:08
attachment
Document Exploitation: More Misleading Information from ODNI on NSA Telephone Metadata Collection
2013-08-12 19:03:09
http://www.docexblog.com/2013/07/more-misleading-information-from-odni.html
text/html
utf-8
webpage
Germany Is a Both a Partner to and a Target of NSA Surveillance - SPIEGEL ONLINE
http://www.spiegel.de/international/world/germany-is-a-both-a-partner-to-and-a-target-of-nsa-surveillance-a-916029.html
2013-08-12 19:03:11
attachment
Germany Is a Both a Partner to and a Target of NSA Surveillance - SPIEGEL ONLINE
2013-08-12 19:03:12
http://www.spiegel.de/international/world/germany-is-a-both-a-partner-to-and-a-target-of-nsa-surveillance-a-916029.html
text/html
windows-1252
webpage
Wired Opinion
Sadowski
Jathan
Stop Thinking That Tech Hacks Are the Solution to Our Surveillance Woes | Wired Opinion | Wired.com
2013-08-12
http://www.wired.com/opinion/2013/08/yah-surveillance-sucks-but-technology-isnt-the-only-solution/
2013-08-12 19:04:31
attachment
Stop Thinking That Tech Hacks Are the Solution to Our Surveillance Woes | Wired Opinion | Wired.com
2013-08-12 19:04:32
http://www.wired.com/opinion/2013/08/yah-surveillance-sucks-but-technology-isnt-the-only-solution/
text/html
utf-8
webpage
Miller
Joe
BBC News - City of London calls halt to smartphone tracking bins
2013-08-12
http://www.bbc.co.uk/news/technology-23665490
2013-08-12 19:04:38
attachment
BBC News - City of London calls halt to smartphone tracking bins
2013-08-12 19:04:39
http://www.bbc.co.uk/news/technology-23665490
text/html
utf-8
webpage
How Laura Poitras Helped Snowden Spill His Secrets - NYTimes.com
http://mobile.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html?smid=tw-nytmedia&seid=auto&
2013-08-13 16:30:02
attachment
How Laura Poitras Helped Snowden Spill His Secrets - NYTimes.com
2013-08-13 16:30:03
http://mobile.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html?smid=tw-nytmedia&seid=auto&
text/html
utf-8
webpage
Exclusive: After Multiple Denials, CIA Admits to Snooping on Noam Chomsky | The Cable
http://thecable.foreignpolicy.com/posts/2013/08/13/after_multiple_denials_cia_admits_to_snooping_on_noam_chomsky
2013-08-13 16:30:35
attachment
Exclusive: After Multiple Denials, CIA Admits to Snooping on Noam Chomsky | The Cable
2013-08-13 16:30:36
http://thecable.foreignpolicy.com/posts/2013/08/13/after_multiple_denials_cia_admits_to_snooping_on_noam_chomsky
text/html
utf-8
webpage
Q. & A. - Edward Snowden Speaks to Peter Maass - NYTimes.com
http://www.nytimes.com/2013/08/18/magazine/snowden-maass-transcript.html?_r=1&
2013-08-13 16:33:11
attachment
Q. & A. - Edward Snowden Speaks to Peter Maass - NYTimes.com
2013-08-13 16:33:12
http://www.nytimes.com/2013/08/18/magazine/snowden-maass-transcript.html?_r=1&
text/html
utf-8
webpage
NSA, DEA, IRS Lie About Fact That Americans Are Routinely Spied On By Our Government: Time For A Special Prosecutor - Forbes
http://www.forbes.com/sites/jennifergranick/2013/08/14/nsa-dea-irs-lie-about-fact-that-americans-are-routinely-spied-on-by-our-government-time-for-a-special-prosecutor-2/
2013-08-16 15:55:41
attachment
NSA, DEA, IRS Lie About Fact That Americans Are Routinely Spied On By Our Government: Time For A Special Prosecutor - Forbes
2013-08-16 15:55:42
http://www.forbes.com/sites/jennifergranick/2013/08/14/nsa-dea-irs-lie-about-fact-that-americans-are-routinely-spied-on-by-our-government-time-for-a-special-prosecutor-2/
text/html
utf-8
webpage
Hosenball
Mark
Snowden downloaded NSA secrets while working for Dell, sources say | Reuters
2013-08-15
http://www.reuters.com/article/2013/08/15/usa-security-snowden-dell-idUSL2N0GF11220130815
2013-08-16 15:56:06
attachment
Snowden downloaded NSA secrets while working for Dell, sources say | Reuters
2013-08-16 15:56:07
http://www.reuters.com/article/2013/08/15/usa-security-snowden-dell-idUSL2N0GF11220130815
text/html
utf-8
webpage
NSA broke privacy rules thousands of times per year, audit finds - The Washington Post
http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_print.html
2013-08-16 16:00:13
attachment
NSA broke privacy rules thousands of times per year, audit finds - The Washington Post
2013-08-16 16:00:14
http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds/2013/08/15/3310e554-05ca-11e3-a07f-49ddc7417125_print.html
text/html
utf-8
webpage
Privatising intelligence gathering | ZDNet
http://www.zdnet.com/au/privatising-intelligence-gathering-7000019041/
2013-08-16 16:37:01
attachment
Privatising intelligence gathering | ZDNet
2013-08-16 16:37:02
http://www.zdnet.com/au/privatising-intelligence-gathering-7000019041/
text/html
utf-8
webpage
The New Yorker
Kerr
Orin
Why Your Cell Phone's Location Isn't Protected by the Fourth Amendment : The New Yorker
2013-08-05
http://www.newyorker.com/online/blogs/elements/2013/08/why-your-cell-phones-location-isnt-protected-by-the-fourth-amendment.html
2013-08-16 16:37:03
attachment
Why Your Cell Phone's Location Isn't Protected by the Fourth Amendment : The New Yorker
2013-08-16 16:37:04
http://www.newyorker.com/online/blogs/elements/2013/08/why-your-cell-phones-location-isnt-protected-by-the-fourth-amendment.html
text/html
windows-1252
webpage
Forrester
Staten
James
The Cost of PRISM Will Be Larger Than ITIF Projects | Forrester Blogs
2013-08-14
http://blogs.forrester.com/james_staten/13-08-14-the_cost_of_prism_will_be_larger_than_itif_projects
2013-08-16 17:10:31
attachment
The Cost of PRISM Will Be Larger Than ITIF Projects | Forrester Blogs
2013-08-16 17:10:32
http://blogs.forrester.com/james_staten/13-08-14-the_cost_of_prism_will_be_larger_than_itif_projects
text/html
utf-8
webpage
How Big Data Could Help Identify the Next Felon -- Or Blame the Wrong Guy - Bloomberg
http://www.bloomberg.com/news/2013-08-14/how-big-data-could-help-identify-the-next-felon-or-blame-the-wrong-guy.html
2013-08-16 17:10:34
attachment
How Big Data Could Help Identify the Next Felon -- Or Blame the Wrong Guy - Bloomberg
2013-08-16 17:10:35
http://www.bloomberg.com/news/2013-08-14/how-big-data-could-help-identify-the-next-felon-or-blame-the-wrong-guy.html
text/html
utf-8
webpage
Intelligence committee under pressure to explain if they withheld crucial NSA document | World news | theguardian.com
http://www.theguardian.com/world/2013/aug/14/nsa-intelligence-committee-under-pressure-document
2013-08-16 17:14:50
attachment
Intelligence committee under pressure to explain if they withheld crucial NSA document | World news | theguardian.com
2013-08-16 17:14:51
http://www.theguardian.com/world/2013/aug/14/nsa-intelligence-committee-under-pressure-document
text/html
utf-8
webpage
Groklaw - Forced Exposure ~pj
http://www.groklaw.net/article.php?story=20130818120421175
2013-08-20 18:08:50
attachment
Groklaw - Forced Exposure ~pj
2013-08-20 18:08:51
http://www.groklaw.net/article.php?story=20130818120421175
text/html
windows-1252
webpage
Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance | Freedom of the Press Foundation
https://pressfreedomfoundation.org/encryption-works
2013-08-20 18:39:46
attachment
Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance | Freedom of the Press Foundation
2013-08-20 18:39:47
https://pressfreedomfoundation.org/encryption-works
text/html
utf-8
webpage
The Daily Dot
Kloc
Joe
The Daily Dot - The definitive guide to NSA spy programs
2013-08-14
http://www.dailydot.com/politics/nsa-spy-prgrams-prism-fairview-blarney/
2013-08-20 18:39:52
attachment
The Daily Dot - The definitive guide to NSA spy programs
2013-08-20 18:39:53
http://www.dailydot.com/politics/nsa-spy-prgrams-prism-fairview-blarney/
text/html
utf-8
webpage
Facial Scanning Is Making Gains in Surveillance - NYTimes.com
http://www.nytimes.com/2013/08/21/us/facial-scanning-is-making-gains-in-surveillance.html?src=rechp&pagewanted=all&_r=0
2013-08-21 15:39:44
attachment
Facial Scanning Is Making Gains in Surveillance - NYTimes.com
2013-08-21 15:39:45
http://www.nytimes.com/2013/08/21/us/facial-scanning-is-making-gains-in-surveillance.html?src=rechp&pagewanted=all&_r=0
text/html
utf-8
webpage
The Guardian
Greenwald
Glenn
Snowden: UK government now leaking documents about itself | Glenn Greenwald | Comment is free | theguardian.com
2013-08-23
http://www.theguardian.com/commentisfree/2013/aug/23/uk-government-independent-military-base
2013-08-23 14:18:23
attachment
Snowden: UK government now leaking documents about itself | Glenn Greenwald | Comment is free | theguardian.com
2013-08-23 14:18:24
http://www.theguardian.com/commentisfree/2013/aug/23/uk-government-independent-military-base
text/html
utf-8
webpage
NSA has ability to read 75% of all US internet traffic - report — RT USA
http://rt.com/usa/nsa-programs-internet-surveillance-759/
2013-08-23 20:32:50
attachment
NSA has ability to read 75% of all US internet traffic - report — RT USA
2013-08-23 20:32:51
http://rt.com/usa/nsa-programs-internet-surveillance-759/
text/html
utf-8
webpage
David Miranda: 'They said I would be put in jail if I didn't co-operate' | World news | The Guardian
http://www.theguardian.com/world/2013/aug/19/david-miranda-interview-detention-heathrow
2013-08-23 20:33:02
attachment
David Miranda: 'They said I would be put in jail if I didn't co-operate' | World news | The Guardian
2013-08-23 20:33:03
http://www.theguardian.com/world/2013/aug/19/david-miranda-interview-detention-heathrow
text/html
utf-8
webpage
How We Killed Privacy -- in 4 Easy Steps - By Daveed Gartenstein-Ross and Kelsey D. Atherton | Foreign Policy
http://www.foreignpolicy.com/articles/2013/08/23/how_we_killed_privacy_nsa_surveillance
2013-08-24 19:01:29
attachment
How We Killed Privacy -- in 4 Easy Steps - By Daveed Gartenstein-Ross and Kelsey D. Atherton | Foreign Policy
2013-08-24 19:01:30
http://www.foreignpolicy.com/articles/2013/08/23/how_we_killed_privacy_nsa_surveillance
text/html
utf-8
webpage
Michael Geist - CSEC Commissioner: Canadians May Have Been Illegally Targeted in Surveillance Activities
http://www.michaelgeist.ca/content/view/6938/125/
2013-08-25 17:58:04
attachment
Michael Geist - CSEC Commissioner: Canadians May Have Been Illegally Targeted in Surveillance Activities
2013-08-25 17:58:05
http://www.michaelgeist.ca/content/view/6938/125/
text/html
utf-8
webpage
News from The Associated Press
http://hosted.ap.org/dynamic/stories/U/US_NSA_SURVEILLANCE_SNOWDEN?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2013-08-24-09-41-24
2013-08-25 17:58:23
attachment
News from The Associated Press
2013-08-25 17:58:24
http://hosted.ap.org/dynamic/stories/U/US_NSA_SURVEILLANCE_SNOWDEN?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2013-08-24-09-41-24
text/html
windows-1252
webpage
NSA hacked into encrypted UN communications, leaked documents show — Tech News and Analysis
http://gigaom.com/2013/08/25/nsa-hacked-into-un-communications-leaked-documents-show/
2013-08-25 17:58:30
attachment
NSA hacked into encrypted UN communications, leaked documents show — Tech News and Analysis
2013-08-25 17:58:31
http://gigaom.com/2013/08/25/nsa-hacked-into-un-communications-leaked-documents-show/
text/html
utf-8
webpage
How to Keep the NSA Out of Your Computer | Mother Jones
http://www.motherjones.com/politics/2013/08/mesh-internet-privacy-nsa-isp
2013-08-26 15:52:29
attachment
How to Keep the NSA Out of Your Computer | Mother Jones
2013-08-26 15:52:30
http://www.motherjones.com/politics/2013/08/mesh-internet-privacy-nsa-isp
text/html
utf-8
webpage
New York Times
Carr
David
War on Leaks Is Pitting Journalist vs. Journalist - NYTimes.com
2013-08-25
http://www.nytimes.com/2013/08/26/business/media/war-on-leaks-is-pitting-journalist-vs-journalist.html?pagewanted=2&_r=1&pagewanted=all
2013-08-26 16:15:31
attachment
War on Leaks Is Pitting Journalist vs. Journalist - NYTimes.com
2013-08-26 16:15:32
http://www.nytimes.com/2013/08/26/business/media/war-on-leaks-is-pitting-journalist-vs-journalist.html?pagewanted=2&_r=1&pagewanted=all
text/html
utf-8
webpage
How Snowden did it - Investigations
http://investigations.nbcnews.com/_news/2013/08/26/20197183-how-snowden-did-it?lite
2013-08-26 18:42:58
attachment
How Snowden did it - Investigations
2013-08-26 18:42:59
http://investigations.nbcnews.com/_news/2013/08/26/20197183-how-snowden-did-it?lite
text/html
utf-8
webpage
Ben Gharbia
Sami
Chelsea Manning and the Arab Spring — Republic of Tunisia — Medium
2013-08-27
https://medium.com/republic-of-tunisia/1907fec77df1
2013-08-28 16:01:05
attachment
Chelsea Manning and the Arab Spring — Republic of Tunisia — Medium
2013-08-28 16:01:06
https://medium.com/republic-of-tunisia/1907fec77df1
text/html
utf-8
webpage
NSA Collects 'Word for Word' Every Domestic Communication, Says Former Analyst | PBS NewsHour | Aug. 1, 2013 | PBS
http://www.pbs.org/newshour/bb/government_programs/july-dec13/whistleblowers_08-01.html
2013-08-28 19:41:26
attachment
NSA Collects 'Word for Word' Every Domestic Communication, Says Former Analyst | PBS NewsHour | Aug. 1, 2013 | PBS
2013-08-28 19:41:27
http://www.pbs.org/newshour/bb/government_programs/july-dec13/whistleblowers_08-01.html
text/html
utf-8
webpage
Esposito
Richard
Cole
Matthew
Windrem
Robert
Snowden impersonated NSA officials, sources say - Investigations
2013-08-29
http://investigations.nbcnews.com/_news/2013/08/29/20234171-snowden-impersonated-nsa-officials-sources-say?src=a0b
2013-08-29 18:09:03
attachment
Snowden impersonated NSA officials, sources say - Investigations
2013-08-29 18:09:04
http://investigations.nbcnews.com/_news/2013/08/29/20234171-snowden-impersonated-nsa-officials-sources-say?src=a0b
text/html
utf-8
webpage
Washington Post
Andrews
Wilson
Lindeman
Todd
The Black Budget: Top secret U.S. intelligence funding - Washington Post
2013-08-29
http://www.washingtonpost.com/wp-srv/special/national/black-budget/
2013-08-29 19:09:49
attachment
The Black Budget: Top secret U.S. intelligence funding - Washington Post
2013-08-29 19:09:50
http://www.washingtonpost.com/wp-srv/special/national/black-budget/
text/html
utf-8
webpage
Gellman
Barton
Miller
Greg
‘Black budget’ summary details U.S. spy network’s successes, failures and objectives - The Washington Post
2013-08-29
http://www.washingtonpost.com/world/national-security/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd-bcdc09410972_print.html
2013-08-29 19:11:54
attachment
‘Black budget’ summary details U.S. spy network’s successes, failures and objectives - The Washington Post
2013-08-29 19:11:55
http://www.washingtonpost.com/world/national-security/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives/2013/08/29/7e57bb78-10ab-11e3-8cdd-bcdc09410972_print.html
text/html
utf-8
webpage
How “cell tower dumps” caught the High Country Bandits—and why it matters | Ars Technica
http://arstechnica.com/tech-policy/2013/08/how-cell-tower-dumps-caught-the-high-country-bandits-and-why-it-matters/
2013-08-29 20:35:28
attachment
How “cell tower dumps” caught the High Country Bandits—and why it matters | Ars Technica
2013-08-29 20:35:29
http://arstechnica.com/tech-policy/2013/08/how-cell-tower-dumps-caught-the-high-country-bandits-and-why-it-matters/
text/html
utf-8
webpage
NSA paid millions to cover Prism compliance costs for tech companies | World news | The Guardian
http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid
2013-08-30 15:34:29
attachment
NSA paid millions to cover Prism compliance costs for tech companies | World news | The Guardian
2013-08-30 15:34:30
http://www.theguardian.com/world/2013/aug/23/nsa-prism-costs-tech-companies-paid
text/html
utf-8
webpage
Techdirt
Moody
Glyn
The Deeper Meaning Of Miranda's Detention And The Destruction Of The Guardian's Hard Drives | Techdirt
2013-08-28
http://www.techdirt.com/articles/20130827/09260924322/deeper-meaning-mirandas-detention-destruction-guardians-hard-drives.shtml
2013-08-30 15:34:56
attachment
The Deeper Meaning Of Miranda's Detention And The Destruction Of The Guardian's Hard Drives | Techdirt
2013-08-30 15:34:57
http://www.techdirt.com/articles/20130827/09260924322/deeper-meaning-mirandas-detention-destruction-guardians-hard-drives.shtml
text/html
windows-1252
webpage
Cáceres
Javier
Obermaier
Frederik
Leyendecker
Hans
Goetz
John
British Officials Have Far-Reaching Access To Internet And Telephone Communications
2013-08-28
http://international.sueddeutsche.de/post/59603415442/british-officials-have-far-reaching-access-to-internet
2013-08-30 18:09:55
attachment
British Officials Have Far-Reaching Access To Internet And Telephone Communications
2013-08-30 18:09:56
http://international.sueddeutsche.de/post/59603415442/british-officials-have-far-reaching-access-to-internet
text/html
utf-8
webpage
Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s - NYTimes.com
http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0
2013-09-03 15:03:37
attachment
Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s - NYTimes.com
2013-09-03 15:03:38
http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0
text/html
utf-8
webpage
Darlington
Shasta
Brazil, Mexico summon U.S. ambassadors over espionage reports - CNN.com
2013-09-03
http://www.cnn.com/2013/09/02/world/americas/brazil-mexico-nsa-spying/index.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+rss%2Fedition_world+%28RSS%3A+World%29
2013-09-03 16:38:07
attachment
Brazil, Mexico summon U.S. ambassadors over espionage reports - CNN.com
2013-09-03 16:38:08
http://www.cnn.com/2013/09/02/world/americas/brazil-mexico-nsa-spying/index.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+rss%2Fedition_world+%28RSS%3A+World%29
text/html
utf-8
webpage
Exclusive: CIA Files Prove America Helped Saddam as He Gassed Iran - By Shane Harris and Matthew M. Aid | Foreign Policy
http://www.foreignpolicy.com/articles/2013/08/25/secret_cia_files_prove_america_helped_saddam_as_he_gassed_iran?page=full#.UhrcJTGct-s.reddit
2013-09-03 16:49:58
attachment
Exclusive: CIA Files Prove America Helped Saddam as He Gassed Iran - By Shane Harris and Matthew M. Aid | Foreign Policy
2013-09-03 16:49:59
http://www.foreignpolicy.com/articles/2013/08/25/secret_cia_files_prove_america_helped_saddam_as_he_gassed_iran?page=full#.UhrcJTGct-s.reddit
text/html
utf-8
webpage
Fears of gun registry prompt NRA to back lawsuit against surveillance | Reuters
http://www.reuters.com/article/2013/09/05/us-usa-legal-nra-idUSBRE98401920130905
2013-09-05 15:37:01
attachment
Fears of gun registry prompt NRA to back lawsuit against surveillance | Reuters
2013-09-05 15:37:02
http://www.reuters.com/article/2013/09/05/us-usa-legal-nra-idUSBRE98401920130905
text/html
utf-8
webpage
N.S.A. Foils Much Internet Encryption - NYTimes.com
http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?_r=0&pagewanted=all
2013-09-05 19:57:12
attachment
N.S.A. Foils Much Internet Encryption - NYTimes.com
2013-09-05 19:57:13
http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?_r=0&pagewanted=all
text/html
utf-8
webpage
the Guardian
Ball
James
Julian
Borger
Greenwald
Glenn
US and UK spy agencies defeat privacy and security on the internet | World news | theguardian.com
2013-09-05
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
2013-09-05 20:00:23
attachment
US and UK spy agencies defeat privacy and security on the internet | World news | theguardian.com
2013-09-05 20:00:24
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security
text/html
utf-8
webpage
Green
Matthew
A Few Thoughts on Cryptographic Engineering: On the NSA
2013-09-05
http://blog.cryptographyengineering.com/2013/09/on-nsa.html
2013-09-06 15:49:48
attachment
A Few Thoughts on Cryptographic Engineering: On the NSA
2013-09-06 15:49:49
http://blog.cryptographyengineering.com/2013/09/on-nsa.html
text/html
utf-8
webpage
The Local
Sweden 'a close partner' in NSA surveillance - The Local
2013-09-06
http://www.thelocal.se/50096/20130906/
2013-09-07 14:55:20
attachment
Sweden 'a close partner' in NSA surveillance - The Local
2013-09-07 14:55:21
http://www.thelocal.se/50096/20130906/
text/html
windows-1252
webpage
Google encrypts data amid backlash against NSA spying - The Washington Post
http://www.washingtonpost.com/business/technology/google-encrypts-data-amid-backlash-against-nsa-spying/2013/09/06/9acc3c20-1722-11e3-a2ec-b47e45e6f8ef_story.html?hpid=z1
2013-09-07 14:55:31
attachment
Google encrypts data amid backlash against NSA spying - The Washington Post
2013-09-07 14:55:32
http://www.washingtonpost.com/business/technology/google-encrypts-data-amid-backlash-against-nsa-spying/2013/09/06/9acc3c20-1722-11e3-a2ec-b47e45e6f8ef_story.html?hpid=z1
text/html
utf-8
webpage
NSA Revelations Cast Doubt on the Entire Tech Industry | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/09/tech-industry-tainted/
2013-09-07 14:55:45
attachment
NSA Revelations Cast Doubt on the Entire Tech Industry | Threat Level | Wired.com
2013-09-07 14:55:46
http://www.wired.com/threatlevel/2013/09/tech-industry-tainted/
text/html
utf-8
webpage
Washington Post
Fung
Brian
The feds pay for 60 percent of Tor’s development. Can users trust it?
2013-09-06
http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/06/the-feds-pays-for-60-percent-of-tors-development-can-users-trust-it/
2013-09-07 14:55:51
attachment
The feds pay for 60 percent of Tor’s development. Can users trust it?
2013-09-07 14:55:52
http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/06/the-feds-pays-for-60-percent-of-tors-development-can-users-trust-it/
text/html
utf-8
webpage
NSA surveillance: how to stay secure | Bruce Schneier | World news | theguardian.com
http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance
2013-09-07 14:58:43
attachment
NSA surveillance: how to stay secure | Bruce Schneier | World news | theguardian.com
2013-09-07 14:58:44
http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance
text/html
utf-8
webpage
12 U.S. Intelligence Officials Tell Obama It Wasn’t Assad | Washington's Blog
2013-09-07
http://www.washingtonsblog.com/2013/09/12-u-s-intelligence-officials-tell-obama-it-wasnt-assad.html
2013-09-07 19:29:53
attachment
12 U.S. Intelligence Officials Tell Obama It Wasn’t Assad | Washington's Blog
2013-09-07 19:29:54
http://www.washingtonsblog.com/2013/09/12-u-s-intelligence-officials-tell-obama-it-wasnt-assad.html
text/html
utf-8
webpage
Legislation Seeks to Bar N.S.A. Tactic in Encryption - NYTimes.com
http://www.nytimes.com/2013/09/07/us/politics/legislation-seeks-to-bar-nsa-tactic-in-encryption.html?_r=1&
2013-09-07 19:48:13
attachment
Legislation Seeks to Bar N.S.A. Tactic in Encryption - NYTimes.com
2013-09-07 19:48:14
http://www.nytimes.com/2013/09/07/us/politics/legislation-seeks-to-bar-nsa-tactic-in-encryption.html?_r=1&
text/html
utf-8
webpage
Fantástico - NSA Documents Show United States Spied Brazilian Oil Giant
http://g1.globo.com/fantastico/noticia/2013/09/nsa-documents-show-united-states-spied-brazilian-oil-giant.html
2013-09-09 16:31:01
attachment
Fantástico - NSA Documents Show United States Spied Brazilian Oil Giant
2013-09-09 16:31:02
http://g1.globo.com/fantastico/noticia/2013/09/nsa-documents-show-united-states-spied-brazilian-oil-giant.html
text/html
utf-8
webpage
Ruling allowed NSA search of domestic e-mail
http://www.usatoday.com/story/news/nation/2013/09/08/nsa-domestic-email/2784141/
2013-09-09 16:54:42
attachment
Ruling allowed NSA search of domestic e-mail
2013-09-09 16:54:43
http://www.usatoday.com/story/news/nation/2013/09/08/nsa-domestic-email/2784141/
text/html
utf-8
email
de Raadt
Theo
Allegations regarding OpenBSD IPSEC
2010-12-15
http://article.gmane.org/gmane.os.bsd.india/696
2013-09-09 20:11:27
attachment
Allegations regarding OpenBSD IPSEC
2013-09-09 20:11:28
http://article.gmane.org/gmane.os.bsd.india/696
text/html
utf-8
webpage
Leak Source
Unreported/Unredacted NSA Slides/Program Names Revealed on Brazil News | LeakSource
2013-09-08
http://leaksource.wordpress.com/2013/09/09/unreportedunredacted-nsa-slidesprogram-names-revealed-on-brazil-news/
2013-09-10 16:00:01
attachment
Unreported/Unredacted NSA Slides/Program Names Revealed on Brazil News | LeakSource
2013-09-10 16:00:02
http://leaksource.wordpress.com/2013/09/09/unreportedunredacted-nsa-slidesprogram-names-revealed-on-brazil-news/
text/html
utf-8
webpage
Slate
Gallagher
Ryan
Shifting Shadow, STORMBREW, Flying Pig: New Snowden documents show NSA deemed Google networks a "target."
2013-09-09
http://www.slate.com/blogs/future_tense/2013/09/09/shifting_shadow_stormbrew_flying_pig_new_snowden_documents_show_nsa_deemed.html
2013-09-10 16:02:03
attachment
Shifting Shadow, STORMBREW, Flying Pig: New Snowden documents show NSA deemed Google networks a "target."
2013-09-10 16:02:04
http://www.slate.com/blogs/future_tense/2013/09/09/shifting_shadow_stormbrew_flying_pig_new_snowden_documents_show_nsa_deemed.html
text/html
utf-8
webpage
Johns Hopkins and the Case of the Missing NSA Blog Post - ProPublica
http://www.propublica.org/article/johns-hopkins-and-the-case-of-the-missing-nsa-blog-post
2013-09-10 16:02:28
attachment
Johns Hopkins and the Case of the Missing NSA Blog Post - ProPublica
2013-09-10 16:02:29
http://www.propublica.org/article/johns-hopkins-and-the-case-of-the-missing-nsa-blog-post
text/html
utf-8
webpage
Johns Hopkins University Falls Victim to the NSA Chilling Effect - Philip Bump - The Atlantic Wire
http://www.theatlanticwire.com/politics/2013/09/johns-hopkins-university-falls-victim-nsa-chilling-effect/69219/
2013-09-10 16:02:30
attachment
Johns Hopkins University Falls Victim to the NSA Chilling Effect - Philip Bump - The Atlantic Wire
2013-09-10 16:02:31
http://www.theatlanticwire.com/politics/2013/09/johns-hopkins-university-falls-victim-nsa-chilling-effect/69219/
text/html
utf-8
webpage
NSA spies reportedly exploited iPhone location bug not fixed until 2011 | Ars Technica
http://arstechnica.com/security/2013/09/nsa-spies-reportedly-exploited-iphone-location-bug-not-fixed-until-2011/
2013-09-10 16:02:45
attachment
NSA spies reportedly exploited iPhone location bug not fixed until 2011 | Ars Technica
2013-09-10 16:02:46
http://arstechnica.com/security/2013/09/nsa-spies-reportedly-exploited-iphone-location-bug-not-fixed-until-2011/
text/html
utf-8
webpage
NSA slides explain the PRISM data-collection program - The Washington Post
http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/
2013-09-10 16:16:16
attachment
NSA slides explain the PRISM data-collection program - The Washington Post
2013-09-10 16:16:17
http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/
text/html
utf-8
webpage
Government Documents Released Under House v. Napolitano Settlement | American Civil Liberties Union
https://www.aclu.org/HouseDocuments
2013-09-10 16:30:27
attachment
Government Documents Released Under House v. Napolitano Settlement | American Civil Liberties Union
2013-09-10 16:30:28
https://www.aclu.org/HouseDocuments
text/html
utf-8
webpage
NSA Phone Records Spying Said to Violate Rules for Years - Bloomberg
http://www.bloomberg.com/news/2013-09-10/nsa-phone-records-spying-violated-court-rules-for-years.html
2013-09-10 22:31:38
attachment
NSA Phone Records Spying Said to Violate Rules for Years - Bloomberg
2013-09-10 22:31:39
http://www.bloomberg.com/news/2013-09-10/nsa-phone-records-spying-violated-court-rules-for-years.html
text/html
utf-8
webpage
Docs: Officials misused US surveillance program
http://bigstory.ap.org/article/feds-plans-release-details-secret-spy-court
2013-09-10 22:31:56
attachment
Docs: Officials misused US surveillance program
2013-09-10 22:31:57
http://bigstory.ap.org/article/feds-plans-release-details-secret-spy-court
text/html
utf-8
webpage
The Guardian
Rosen
Jay
The NSA's next move: silencing university professors? | Jay Rosen | Comment is free | theguardian.com
2013-09-10
http://www.theguardian.com/commentisfree/2013/sep/10/nsa-matthew-green-takedown-blog-post-johns-hopkins
2013-09-10 22:44:49
attachment
The NSA's next move: silencing university professors? | Jay Rosen | Comment is free | theguardian.com
2013-09-10 22:44:50
http://www.theguardian.com/commentisfree/2013/sep/10/nsa-matthew-green-takedown-blog-post-johns-hopkins
text/html
utf-8
webpage
Government Announces Steps to Restore Confidence on Encryption Standards - NYTimes.com
http://bits.blogs.nytimes.com/2013/09/10/government-announces-steps-to-restore-confidence-on-encryption-standards/?_r=0
2013-09-11 13:26:56
attachment
Government Announces Steps to Restore Confidence on Encryption Standards - NYTimes.com
2013-09-11 13:26:57
http://bits.blogs.nytimes.com/2013/09/10/government-announces-steps-to-restore-confidence-on-encryption-standards/?_r=0
text/html
utf-8
webpage
Did the FBI Lean On Microsoft for Access to Its Encryption Software?
http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/
2013-09-11 19:40:09
attachment
Did the FBI Lean On Microsoft for Access to Its Encryption Software?
2013-09-11 19:40:10
http://mashable.com/2013/09/11/fbi-microsoft-bitlocker-backdoor/
text/html
utf-8
webpage
Government Releases NSA Surveillance Docs and Previously Secret FISA Court Opinions In Response to EFF Lawsuit | Electronic Frontier Foundation
https://www.eff.org/deeplinks/2013/09/government-releases-nsa-surveillance-docs-and-previously-secret-fisa-court
2013-09-11 19:42:07
attachment
Government Releases NSA Surveillance Docs and Previously Secret FISA Court Opinions In Response to EFF Lawsuit | Electronic Frontier Foundation
2013-09-11 19:42:08
https://www.eff.org/deeplinks/2013/09/government-releases-nsa-surveillance-docs-and-previously-secret-fisa-court
text/html
utf-8
webpage
NSA shares raw intelligence including Americans' data with Israel | World news | theguardian.com
http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents
2013-09-11 19:54:22
attachment
NSA shares raw intelligence including Americans' data with Israel | World news | theguardian.com
2013-09-11 19:54:23
http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents
text/html
utf-8
webpage
Edward Snowden Receives Support From Former GOP Sen. Gordon Humphrey
http://www.huffingtonpost.com/2013/07/16/edward-snowden-gordon-humphrey_n_3606491.html?view=screen
2013-09-12 16:04:05
attachment
Edward Snowden Receives Support From Former GOP Sen. Gordon Humphrey
2013-09-12 16:04:06
http://www.huffingtonpost.com/2013/07/16/edward-snowden-gordon-humphrey_n_3606491.html?view=screen
text/html
utf-8
webpage
NSA Leaker Edward Snowden: Spy, Patriot, Libertarian, Communist, Or What? The Man Washington Can’t Figure Out
http://www.ibtimes.com/nsa-leaker-edward-snowden-spy-patriot-libertarian-communist-or-what-man-washington-cant-figure-out
2013-09-12 16:04:14
attachment
NSA Leaker Edward Snowden: Spy, Patriot, Libertarian, Communist, Or What? The Man Washington Can’t Figure Out
2013-09-12 16:04:15
http://www.ibtimes.com/nsa-leaker-edward-snowden-spy-patriot-libertarian-communist-or-what-man-washington-cant-figure-out
text/html
utf-8
webpage
Edward Snowden Has Done the Senate Judiciary Committee's Work for Them - Philip Bump - The Atlantic Wire
http://www.theatlanticwire.com/politics/2013/07/edward-snowden-has-done-senate-judiciary-committees-work-them/67810/
2013-09-12 16:04:31
attachment
Edward Snowden Has Done the Senate Judiciary Committee's Work for Them - Philip Bump - The Atlantic Wire
2013-09-12 16:04:32
http://www.theatlanticwire.com/politics/2013/07/edward-snowden-has-done-senate-judiciary-committees-work-them/67810/
text/html
utf-8
webpage
Nelson
Steven
Bipartisan Peanut Gallery: Snowden Supporters Add Former GOP Senator to Their Ranks - Washington Whispers (usnews.com)
2013-07-16
http://www.usnews.com/news/blogs/washington-whispers/2013/07/16/bipartisan-peanut-gallery-snowden-supporters-add-former-gop-senator-to-their-ranks_print.html
2013-09-12 16:04:37
attachment
Bipartisan Peanut Gallery: Snowden Supporters Add Former GOP Senator to Their Ranks - Washington Whispers (usnews.com)
2013-09-12 16:04:38
http://www.usnews.com/news/blogs/washington-whispers/2013/07/16/bipartisan-peanut-gallery-snowden-supporters-add-former-gop-senator-to-their-ranks_print.html
text/html
utf-8
webpage
Edward Snowden’s father, in letter, compares son to Paul Revere, assails administration
http://www.washingtonpost.com/blogs/worldviews/wp/2013/07/02/edward-snowdens-in-letter-compares-son-to-paul-revere-assails-obama-administration/
2013-09-12 16:04:42
attachment
Edward Snowden’s father, in letter, compares son to Paul Revere, assails administration
2013-09-12 16:04:43
http://www.washingtonpost.com/blogs/worldviews/wp/2013/07/02/edward-snowdens-in-letter-compares-son-to-paul-revere-assails-obama-administration/
text/html
utf-8
webpage
Feds Stalked Airline Passenger Lists to Catch Manning's Friend, Documents Show | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/09/manning-friend-database-stalked/
2013-09-12 18:58:42
attachment
Feds Stalked Airline Passenger Lists to Catch Manning's Friend, Documents Show | Threat Level | Wired.com
2013-09-12 18:58:43
http://www.wired.com/threatlevel/2013/09/manning-friend-database-stalked/
text/html
utf-8
webpage
Tsukayama
Hayley
CloudFlare CEO: ‘Insane’ NSA gag order is costing U.S. tech firms customers
2013-09-12
http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/12/cloudflare-ceo-says-insane-nsa-gag-order-is-costing-u-s-tech-firms-customers/
2013-09-12 18:59:19
attachment
CloudFlare CEO: ‘Insane’ NSA gag order is costing U.S. tech firms customers
2013-09-12 18:59:20
http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/12/cloudflare-ceo-says-insane-nsa-gag-order-is-costing-u-s-tech-firms-customers/
text/html
utf-8
webpage
Edward Snowden, meet Jeff Bezos » Pressthink
http://pressthink.org/2013/08/edward-snowden-meet-jeff-bezos/#p18
2013-09-12 19:38:45
attachment
Edward Snowden, meet Jeff Bezos » Pressthink
2013-09-12 19:38:46
http://pressthink.org/2013/08/edward-snowden-meet-jeff-bezos/#p18
text/html
utf-8
webpage
Meet Hacking Team, the company that helps the police hack you | The Verge
http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers
2013-09-13 16:04:21
attachment
Meet Hacking Team, the company that helps the police hack you | The Verge
2013-09-13 16:04:22
http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers
text/html
utf-8
webpage
Fisa judge: Snowden's NSA disclosures triggered important spying debate | World news | The Guardian
http://www.theguardian.com/world/2013/sep/13/edward-snowden-nsa-disclosures-judge
2013-09-15 01:07:25
attachment
Fisa judge: Snowden's NSA disclosures triggered important spying debate | World news | The Guardian
2013-09-15 01:07:26
http://www.theguardian.com/world/2013/sep/13/edward-snowden-nsa-disclosures-judge
text/html
utf-8
webpage
FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/
2013-09-15 01:07:46
attachment
FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com
2013-09-15 01:07:47
http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/
text/html
utf-8
webpage
Smart
Nigel
Paterson
Kenneth
Ryan
Mark
Ryan
Peter
Sassone
Vladimiro
Schneider
Steve
Boiten
Eerke
Danezis
George
Groth
Jens
Hao
Feng
Bristol Cryptography Blog: Open Letter From UK Security Researchers
2013-09-16
http://bristolcrypto.blogspot.co.uk/2013/09/open-letter-from-uk-security-researchers.html
2013-09-16 16:31:12
attachment
Bristol Cryptography Blog: Open Letter From UK Security Researchers
2013-09-16 16:31:13
http://bristolcrypto.blogspot.co.uk/2013/09/open-letter-from-uk-security-researchers.html
text/html
utf-8
webpage
EFF
Banister
Dave
Crypto War
NIST
New NIST/NSA Revelations
6 May, 1993
https://w2.eff.org/Privacy/Newin/Cypherpunks/930506.cpsr.foia.results
2013-09-16 16:31:40
attachment
2013-09-16 16:31:41
https://w2.eff.org/Privacy/Newin/Cypherpunks/930506.cpsr.foia.results
text/plain
windows-1252
blogPost
Robin
Corey
University of Oregon to Faculty: You Belong to Me! | Corey Robin
2013-09-15
http://coreyrobin.com/2013/09/15/university-of-oregon-to-faculty-you-belong-to-me/
2013-09-16 16:35:42
attachment
University of Oregon to Faculty: You Belong to Me! | Corey Robin
2013-09-16 16:35:43
http://coreyrobin.com/2013/09/15/university-of-oregon-to-faculty-you-belong-to-me/
text/html
utf-8
webpage
Former NSA and CIA director says terrorists love using Gmail
http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/15/former-nsa-and-cia-director-says-terrorists-love-using-gmail/
2013-09-16 16:36:18
attachment
Former NSA and CIA director says terrorists love using Gmail
2013-09-16 16:36:19
http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/15/former-nsa-and-cia-director-says-terrorists-love-using-gmail/
text/html
utf-8
webpage
NSA collecting phone records of millions of Verizon customers daily | World news | The Guardian
http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order
2013-09-16 16:57:50
attachment
NSA collecting phone records of millions of Verizon customers daily | World news | The Guardian
2013-09-16 16:57:51
http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order
text/html
utf-8
webpage
Washington Post
Gellman
Barton
Poitras
Laura
U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program - The Washington Post
2013-6-06
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html
2013-09-16 16:58:06
attachment
NSA slides explain the PRISM data-collection program - The Washington Post
2014-01-28 21:00:19
http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/
text/html
utf-8
attachment
U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program - The Washington Post
2013-09-16 16:58:07
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html
text/html
utf-8
attachment
U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program - The Washington Post
2014-01-28 21:00:01
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html
text/html
utf-8
webpage
NSA Prism program taps in to user data of Apple, Google and others | World news | The Guardian
http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
2013-09-16 17:01:18
attachment
NSA Prism program taps in to user data of Apple, Google and others | World news | The Guardian
2013-09-16 17:01:19
http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
text/html
utf-8
webpage
Freeze
Colin
Data-collection program got green light from MacKay in 2011 - The Globe and Mail
2013-06-10
http://www.theglobeandmail.com/news/national/data-collection-program-got-green-light-from-mackay-in-2011/article12444909/
2013-09-16 17:01:22
attachment
Data-collection program got green light from MacKay in 2011 - The Globe and Mail
2013-09-16 17:01:23
http://www.theglobeandmail.com/news/national/data-collection-program-got-green-light-from-mackay-in-2011/article12444909/
text/html
utf-8
webpage
Dianne Feinstein: NSA needs no court to query database - Tim Mak - POLITICO.com
http://www.politico.com/story/2013/06/dianne-feinstein-nsa-92760.html#ixzz2W8UegAbU
2013-09-16 17:01:34
attachment
Dianne Feinstein: NSA needs no court to query database - Tim Mak - POLITICO.com
2013-09-16 17:01:35
http://www.politico.com/story/2013/06/dianne-feinstein-nsa-92760.html#ixzz2W8UegAbU
text/html
utf-8
webpage
Washington Post
Gellman
Barton
U.S. surveillance architecture includes collection of revealing Internet, phone metadata - The Washington Post
2013-06-15
http://m.washingtonpost.com/investigations/us-surveillance-architecture-includes-collection-of-revealing-internet-phone-metadata/2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_story.html
2013-09-16 17:01:39
attachment
U.S. surveillance architecture includes collection of revealing Internet, phone metadata - The Washington Post
2013-09-16 17:01:40
http://m.washingtonpost.com/investigations/us-surveillance-architecture-includes-collection-of-revealing-internet-phone-metadata/2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_story.html
text/html
utf-8
webpage
Bloomberg
Riley
Michael
U.S. Agencies Said to Swap Data With Thousands of Firms - Bloomberg
2013-06-15
http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html?alcmpid=breakingnews
2013-09-16 17:01:51
attachment
U.S. Agencies Said to Swap Data With Thousands of Firms - Bloomberg
2013-09-16 17:01:52
http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html?alcmpid=breakingnews
text/html
utf-8
webpage
Secret to Prism program: Even bigger data seizure
http://bigstory.ap.org/article/secret-prism-success-even-bigger-data-seizure
2013-09-16 17:01:57
attachment
Secret to Prism program: Even bigger data seizure
2013-09-16 17:01:58
http://bigstory.ap.org/article/secret-prism-success-even-bigger-data-seizure
text/html
utf-8
webpage
GCHQ intercepted foreign politicians' communications at G20 summits | UK news | The Guardian
http://www.theguardian.com/uk/2013/jun/16/gchq-intercepted-communications-g20-summits
2013-09-16 17:02:04
attachment
GCHQ intercepted foreign politicians' communications at G20 summits | UK news | The Guardian
2013-09-16 17:02:05
http://www.theguardian.com/uk/2013/jun/16/gchq-intercepted-communications-g20-summits
text/html
utf-8
webpage
Berlin Profits from US Spying Program and Is Planning Its Own - SPIEGEL ONLINE
2013-06-17
http://www.spiegel.de/international/germany/berlin-profits-from-us-spying-program-and-is-planning-its-own-a-906129.html
2013-09-16 17:02:13
attachment
Berlin Profits from US Spying Program and Is Planning Its Own - SPIEGEL ONLINE
2013-09-16 17:02:14
http://www.spiegel.de/international/germany/berlin-profits-from-us-spying-program-and-is-planning-its-own-a-906129.html
text/html
windows-1252
webpage
Greenwald
Glenn
Fisa court oversight: a look inside a secret and empty process | Glenn Greenwald | Comment is free | theguardian.com
2013-06-18
http://www.theguardian.com/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy
2013-09-16 17:02:25
attachment
Fisa court oversight: a look inside a secret and empty process | Glenn Greenwald | Comment is free | theguardian.com
2013-09-16 17:02:26
http://www.theguardian.com/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy
text/html
utf-8
webpage
SPIEGEL ONLINE
US Spying on Europe More Widespread than First Thought - SPIEGEL ONLINE
2013-07-01
http://www.spiegel.de/international/world/us-spying-on-europe-more-widespread-than-first-thought-a-908706.html
2013-09-16 17:02:34
attachment
US Spying on Europe More Widespread than First Thought - SPIEGEL ONLINE
2013-09-16 17:02:35
http://www.spiegel.de/international/world/us-spying-on-europe-more-widespread-than-first-thought-a-908706.html
text/html
windows-1252
webpage
Bolivia Angered By Forced Landing of Morales Plane - SPIEGEL ONLINE
2013-07-03
http://www.spiegel.de/international/world/bolivia-angered-by-forced-landing-of-morales-plane-a-909219.html
2013-09-16 17:02:37
attachment
Bolivia Angered By Forced Landing of Morales Plane - SPIEGEL ONLINE
2013-09-16 17:02:38
http://www.spiegel.de/international/world/bolivia-angered-by-forced-landing-of-morales-plane-a-909219.html
text/html
windows-1252
webpage
Timberg
Craig
Nakashima
Ellen
Agreements with private companies protect U.S. access to cables’ data for surveillance - The Washington Post
2013-08-16
http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story.html
2013-09-16 17:02:54
attachment
Agreements with private companies protect U.S. access to cables’ data for surveillance - The Washington Post
2013-09-16 17:02:55
http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story.html
text/html
utf-8
attachment
Agreements with private companies protect U.S. access to cables’ data for surveillance - The Washington Post
2014-05-27 20:00:02
http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story_1.html
text/html
utf-8
attachment
Agreements with private companies protect U.S. access to cables’ data for surveillance - The Washington Post
2014-05-27 20:00:10
http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story_2.html
text/html
utf-8
attachment
Agreements with private companies protect U.S. access to cables’ data for surveillance - The Washington Post
2014-05-27 20:00:15
http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story_3.html
text/html
utf-8
attachment
Agreements with private companies protect U.S. access to cables’ data for surveillance - The Washington Post
2014-05-27 20:00:21
http://www.washingtonpost.com/business/technology/agreements-with-private-companies-protect-us-access-to-cables-data-for-surveillance/2013/07/06/aa5d017a-df77-11e2-b2d4-ea6d8f477a01_story_4.html
text/html
utf-8
webpage
NYC cases show crooked cops' abuse of FBI database - Yahoo News
http://news.yahoo.com/nyc-cases-show-crooked-cops-abuse-fbi-database-162152158.html
2013-09-16 17:03:19
attachment
NYC cases show crooked cops' abuse of FBI database - Yahoo News
2013-09-16 17:03:20
http://news.yahoo.com/nyc-cases-show-crooked-cops-abuse-fbi-database-162152158.html
text/html
utf-8
webpage
Edward Snowden reveals Australia's Links To Secret US Spy Program
http://www.theage.com.au/world/snowden-reveals-australias-links-to-us-spy-web-20130708-2plyg.html
2013-09-16 17:03:26
attachment
Edward Snowden reveals Australia's Links To Secret US Spy Program
2013-09-16 17:03:27
http://www.theage.com.au/world/snowden-reveals-australias-links-to-us-spy-web-20130708-2plyg.html
text/html
utf-8
webpage
Secret Court's Redefinition of 'Relevant' Empowered Vast NSA Data-Gathering - WSJ.com
http://online.wsj.com/article_email/SB10001424127887323873904578571893758853344-lMyQjAxMTAzMDAwODEwNDgyWj.html
2013-09-16 17:04:24
attachment
Secret Court's Redefinition of 'Relevant' Empowered Vast NSA Data-Gathering - WSJ.com
2013-09-16 17:04:25
http://online.wsj.com/article_email/SB10001424127887323873904578571893758853344-lMyQjAxMTAzMDAwODEwNDgyWj.html
text/html
utf-8
webpage
Complete transcript of "The Encryption Wars: An Interview with Eben Moglen"
Worthington
Jay
Moglen
Eben
Crypto Wars
CABINET // Complete transcript of "The Encryption Wars: An Interview with Eben Moglen"
2001
http://www.cabinetmagazine.org/issues/1/i_moglen_1.php
2013-09-16 17:18:57
attachment
CABINET // Complete transcript of "The Encryption Wars: An Interview with Eben Moglen"
2013-09-16 17:18:58
http://www.cabinetmagazine.org/issues/1/i_moglen_1.php
text/html
utf-8
webpage
Moglen
Eben
Crypto Wars
So Much for Savages: Navajo 1, Government 0 in Final Moments of Play
1999-03
http://moglen.law.columbia.edu/publications/yu-encrypt.html
2013-09-16 17:20:16
attachment
So Much for Savages: Navajo 1, Government 0 in Final Moments of Play
2013-09-16 17:20:17
http://moglen.law.columbia.edu/publications/yu-encrypt.html
text/html
windows-1252
webpage
Mearlan
Lucas
Big data to drive a surveillance society - Computerworld
2011-03-24
http://www.computerworld.com/s/article/9215033/Big_data_to_drive_a_surveillance_society?taxonomyId=9&pageNumber=1
2013-09-16 19:42:05
attachment
Big data to drive a surveillance society - Computerworld
2013-09-16 19:42:06
http://www.computerworld.com/s/article/9215033/Big_data_to_drive_a_surveillance_society?taxonomyId=9&pageNumber=1
text/html
utf-8
webpage
slight paranoia: 8 Million Reasons for Real Surveillance Oversight
http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html
2013-09-16 19:42:13
attachment
slight paranoia: 8 Million Reasons for Real Surveillance Oversight
2013-09-16 19:42:14
http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html
text/html
utf-8
webpage
Inferring friendship network structure by using mobile phone data
http://www.pnas.org/content/106/36/15274
2013-09-16 19:42:32
attachment
Inferring friendship network structure by using mobile phone data
2013-09-16 19:42:33
http://www.pnas.org/content/106/36/15274
text/html
utf-8
webpage
Johnston
Casey
Cell phones show human movement predictable 93% of the time | Ars Technica
2010-02-23
http://arstechnica.com/science/2010/02/cell-phones-show-human-movement-predictable-93-of-the-time/
2013-09-16 19:42:37
attachment
Cell phones show human movement predictable 93% of the time | Ars Technica
2013-09-16 19:42:38
http://arstechnica.com/science/2010/02/cell-phones-show-human-movement-predictable-93-of-the-time/
text/html
utf-8
webpage
Zeit Online
Tell-all telephone | Data Protection | Digital | ZEIT ONLINE
2009-08-31
http://www.zeit.de/datenschutz/malte-spitz-data-retention
2013-09-16 19:43:01
attachment
Tell-all telephone | Data Protection | Digital | ZEIT ONLINE
2013-09-16 19:43:02
http://www.zeit.de/datenschutz/malte-spitz-data-retention
text/html
utf-8
webpage
How police have obtained iPhone, iPad tracking logs | Privacy Inc. - CNET News
http://news.cnet.com/8301-31921_3-20056344-281.html?part=rss&subj=news&tag=2547-1_3-0-20
2013-09-16 19:43:29
attachment
How police have obtained iPhone, iPad tracking logs | Privacy Inc. - CNET News
2013-09-16 19:43:30
http://news.cnet.com/8301-31921_3-20056344-281.html?part=rss&subj=news&tag=2547-1_3-0-20
text/html
utf-8
webpage
iPhone keeps record of everywhere you go | Technology | theguardian.com
http://www.theguardian.com/technology/2011/apr/20/iphone-tracking-prompts-privacy-fears
2013-09-16 19:43:36
attachment
iPhone keeps record of everywhere you go | Technology | theguardian.com
2013-09-16 19:43:37
http://www.theguardian.com/technology/2011/apr/20/iphone-tracking-prompts-privacy-fears
text/html
utf-8
webpage
Moynihan
Colin
City Subpoenas Creator of Text Messaging Code - New York Times
2008-03-30
http://www.nytimes.com/2008/03/30/nyregion/30text.html?_r=2&oref=slogin&oref=slogin
2013-09-16 19:43:42
attachment
City Subpoenas Creator of Text Messaging Code - New York Times
2013-09-16 19:43:43
http://www.nytimes.com/2008/03/30/nyregion/30text.html?_r=2&oref=slogin&oref=slogin
text/html
windows-1252
blogPost
Schneier on Security
Schneier
Bruce
What We Don't Know About Spying on Citizens: Scarier Than What We Know
2013-06-06
https://www.schneier.com/essay-429.html
2013-09-17 15:18:42
attachment
What We Don't Know About Spying on Citizens: Scarier Than What We Know
2013-09-17 15:18:43
https://www.schneier.com/essay-429.html
text/html
utf-8
webpage
Threat Level
Poulsen
Kevin
Whistle-Blower: Feds Have a Backdoor Into Wireless Carrier -- Congress Reacts | Threat Level | Wired.com
2008-03-06
http://www.wired.com/threatlevel/2008/03/whistleblower-f/
2013-09-16 19:46:35
attachment
Whistle-Blower: Feds Have a Backdoor Into Wireless Carrier -- Congress Reacts | Threat Level | Wired.com
2013-09-16 19:46:36
http://www.wired.com/threatlevel/2008/03/whistleblower-f/
text/html
utf-8
webpage
Qwest CEO Not Alone in Alleging NSA Started Domestic Phone Record Program 7 Months Before 9/11 | Threat Level | Wired.com
http://www.wired.com/threatlevel/2007/10/qwest-ceo-not-a/#previouspost
2013-09-16 19:48:20
attachment
Qwest CEO Not Alone in Alleging NSA Started Domestic Phone Record Program 7 Months Before 9/11 | Threat Level | Wired.com
2013-09-16 19:48:21
http://www.wired.com/threatlevel/2007/10/qwest-ceo-not-a/#previouspost
text/html
utf-8
webpage
FBI Tried to Cover Patriot Act Abuses With Flawed, Retroactive Subpoenas, Audit Finds | Threat Level | Wired.com
http://www.wired.com/threatlevel/2008/03/fbi-tried-to-co/
2013-09-16 19:48:54
attachment
FBI Tried to Cover Patriot Act Abuses With Flawed, Retroactive Subpoenas, Audit Finds | Threat Level | Wired.com
2013-09-16 19:48:55
http://www.wired.com/threatlevel/2008/03/fbi-tried-to-co/
text/html
utf-8
newspaperArticle
Maryland Politics
Washington Post
Rein
Lisa
Maryland Politics - Police Listed Gay Rights Group Among Terrorists
2009-01-23
http://voices.washingtonpost.com/annapolis/2009/01/equality_md_6pdf_equality_mary.html
2013-09-16 19:49:11
attachment
Equality MD 1.pdf
application/pdf
attachment
Equality MD 2.pdf
application/pdf
attachment
Equality MD 3.pdf
application/pdf
attachment
Equality MD 4.pdf
application/pdf
attachment
Equality MD 5.pdf
application/pdf
attachment
Equality MD 6.pdf
application/pdf
attachment
Maryland Politics - Police Listed Gay Rights Group Among Terrorists
2013-09-16 19:49:12
http://voices.washingtonpost.com/annapolis/2009/01/equality_md_6pdf_equality_mary.html
text/html
utf-8
webpage
Exclusive: Inside Account of U.S. Eavesdropping on Americans - ABC News
http://abcnews.go.com/Blotter/Story?id=5987804&page=1
2013-09-16 19:51:51
attachment
Exclusive: Inside Account of U.S. Eavesdropping on Americans - ABC News
2013-09-16 19:51:52
http://abcnews.go.com/Blotter/Story?id=5987804&page=1
text/html
utf-8
webpage
Modern Mechanix - Yesterday's Tomorrow Today
Charlie
THE NATIONAL DATA CENTER AND PERSONAL PRIVACY
2008-03-31
http://blog.modernmechanix.com/the-national-data-center-and-personal-privacy/
2013-09-16 19:52:01
attachment
THE NATIONAL DATA CENTER AND PERSONAL PRIVACY | Modern Mechanix
2013-09-16 19:52:02
http://blog.modernmechanix.com/the-national-data-center-and-personal-privacy/
text/html
utf-8
webpage
Barbaro
Michael
Zeller Jr.
Tom
A Face Is Exposed for AOL Searcher No. 4417749 - New York Times
2006-08-09
http://www.nytimes.com/2006/08/09/technology/09aol.html?_r=1&oref=slogin
2013-09-16 19:52:09
attachment
A Face Is Exposed for AOL Searcher No. 4417749 - New York Times
2013-09-16 19:52:10
http://www.nytimes.com/2006/08/09/technology/09aol.html?_r=1&oref=slogin
text/html
windows-1252
webpage
FBI Mined Grocery Store Records to Find Iranian Terrorists, CQ Reports -- Updated | Threat Level | Wired.com
http://www.wired.com/threatlevel/2007/11/fbi-mined-groce/
2013-09-16 19:52:24
attachment
FBI Mined Grocery Store Records to Find Iranian Terrorists, CQ Reports -- Updated | Threat Level | Wired.com
2013-09-16 19:52:25
http://www.wired.com/threatlevel/2007/11/fbi-mined-groce/
text/html
utf-8
webpage
Did credit card companies collaborate with the FBI's grocery data mining program? | Surveillance State - CNET News
http://news.cnet.com/8301-13739_3-9812473-46.html
2013-09-16 19:52:30
attachment
Did credit card companies collaborate with the FBI's grocery data mining program? | Surveillance State - CNET News
2013-09-16 19:52:31
http://news.cnet.com/8301-13739_3-9812473-46.html
text/html
utf-8
webpage
Government report: Data mining doesn't work well | Politics and Law - CNET News
http://news.cnet.com/8301-13578_3-10059987-38.html?part=rss&subj=news&tag=2547-1_3-0-20
2013-09-16 19:52:39
attachment
Government report: Data mining doesn't work well | Politics and Law - CNET News
2013-09-16 19:52:40
http://news.cnet.com/8301-13578_3-10059987-38.html?part=rss&subj=news&tag=2547-1_3-0-20
text/html
utf-8
webpage
Researchers find new, ultra-low-level method of hacking CPUs – and there’s no way to detect it | ExtremeTech
http://www.extremetech.com/extreme/166580-researchers-find-new-ultra-low-level-method-of-hacking-cpus-and-theres-no-way-to-detect-it
2013-09-17 15:18:48
attachment
Researchers find new, ultra-low-level method of hacking CPUs – and there’s no way to detect it | ExtremeTech
2013-09-17 15:18:49
http://www.extremetech.com/extreme/166580-researchers-find-new-ultra-low-level-method-of-hacking-cpus-and-theres-no-way-to-detect-it
text/html
utf-8
journalArticle
Columbia Business Law Review
2009
9
Simmons
Joshua
Buying You: The Government's Use of Fourth-Parties to Launder Data about 'The People'
Your information is for sale, and the government is buying it at alarming rates. The CIA, FBI, Justice Department, Defense Department, and other government agencies are at this very moment turning to a group of companies to provide them information that these companies can gather without the restrictions that bind government intelligence agencies. The information is gathered from sources that few would believe the government could gain unfettered access to, but which, under current Fourth Amendment doctrine and statutory protections, are completely accessible.
Fourth-parties, such as ChoicePoint or LexisNexis, are private companies that aggregate data for the government, and they comprise the private security-industrial complex that arose after the attacks of September 11, 2001. They are in the business of acquiring information, not from the information’s originator (the first-party), nor from the information’s anticipated recipient (the second-party), but from the unavoidable digital intermediaries that transmit and store the information (third-parties). These fourth-party companies act with impunity as they gather information that the government wants but would be unable to collect on its own due to Fourth Amendment or statutory prohibitions. This paper argues that when fourth-parties disclose to law enforcement information generated as a result of searches that would be violations had the government conducted the searches itself, those fourth-parties’ actions should be considered searches by agents of the government, and the data should retain privacy protections.
950-1014
2009-09-19
http://ssrn.com/abstract=1475524
2013-09-16
attachment
Buying You: The Government's Use of Fourth-Parties to Launder Data about 'The People' by Joshua L. Simmons :: SSRN
2013-09-16 20:03:45
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1475524
text/html
utf-8
attachment
SSRN-id1475524.pdf
application/pdf
webpage
Risen
James
Lichtblau
Eric
Bush Secretly Lifted Some Limits on Spying in U.S. After 9/11, Officials Say - New York Times
2005-12-15
http://emoglen.law.columbia.edu/CPC/NYT_15cnd-program.html
2013-09-16 20:04:24
attachment
Bush Secretly Lifted Some Limits on Spying in U.S. After 9/11, Officials Say - New York Times
2013-09-16 20:04:25
http://emoglen.law.columbia.edu/CPC/NYT_15cnd-program.html
text/html
windows-1252
webpage
Eggen
Dan
Bush Authorized Domestic Spying
2005-12-16
http://www.washingtonpost.com/wp-dyn/content/article/2005/12/16/AR2005121600021.html
2013-09-16 20:04:31
attachment
Bush Authorized Domestic Spying
2013-09-16 20:04:32
http://www.washingtonpost.com/wp-dyn/content/article/2005/12/16/AR2005121600021.html
text/html
utf-8
webpage
CNN.com - Bush says he signed NSA wiretap order - Dec 17, 2005
2005-12-17
http://www.cnn.com/2005/POLITICS/12/17/bush.nsa/
2013-09-16 20:04:40
attachment
CNN.com - Bush says he signed NSA wiretap order - Dec 17, 2005
2013-09-16 20:04:41
http://www.cnn.com/2005/POLITICS/12/17/bush.nsa/
text/html
windows-1252
webpage
Bush Defends Domestic Spying - CBS News
2009-02-11
http://www.cbsnews.com/stories/2006/01/01/politics/main1172507.shtml
2013-09-16 20:04:43
attachment
Bush Defends Domestic Spying - CBS News
2013-09-16 20:04:44
http://www.cbsnews.com/stories/2006/01/01/politics/main1172507.shtml
text/html
windows-1252
webpage
CNN.com - Gonzales to testify on domestic spying - Jan 13, 2006
2006-01-13
http://www.cnn.com/2006/POLITICS/01/13/nsa.congress/
2013-09-16 20:04:50
attachment
CNN.com - Gonzales to testify on domestic spying - Jan 13, 2006
2013-09-16 20:04:51
http://www.cnn.com/2006/POLITICS/01/13/nsa.congress/
text/html
windows-1252
webpage
ACLU Sues to Stop Illegal Spying on Americans, Saying President Is Not Above the Law | American Civil Liberties Union
2006-01-17
https://www.aclu.org/national-security/aclu-sues-stop-illegal-spying-americans-saying-president-not-above-law
2013-09-16 20:05:15
attachment
ACLU Sues to Stop Illegal Spying on Americans, Saying President Is Not Above the Law | American Civil Liberties Union
2013-09-16 20:05:16
https://www.aclu.org/national-security/aclu-sues-stop-illegal-spying-americans-saying-president-not-above-law
text/html
utf-8
webpage
FBI Misuses, Underreports Patriot Act Power: Audit | Threat Level | Wired.com
http://www.wired.com/threatlevel/2007/03/fbi_misuses_und/#more
2013-09-16 20:06:21
attachment
FBI Misuses, Underreports Patriot Act Power: Audit | Threat Level | Wired.com
2013-09-16 20:06:22
http://www.wired.com/threatlevel/2007/03/fbi_misuses_und/#more
text/html
utf-8
webpage
#08-200: 03-13-08 DOJ Statement Regarding OIG Report on National Security Letters
2008-03-13
http://www.justice.gov/opa/pr/2008/March/08_nsd_200.html
2013-09-16 20:08:39
attachment
#08-200: 03-13-08 DOJ Statement Regarding OIG Report on National Security Letters
2013-09-16 20:08:40
http://www.justice.gov/opa/pr/2008/March/08_nsd_200.html
text/html
windows-1252
webpage
New York Times
Stellin
Susan
The Border Is a Back Door for U.S. Device Searches - NYTimes.com
2013-09-09
http://www.nytimes.com/2013/09/10/business/the-border-is-a-back-door-for-us-device-searches.html?pagewanted=all&_r=0
2013-09-17 15:20:31
attachment
The Border Is a Back Door for U.S. Device Searches - NYTimes.com
2013-09-17 15:20:32
http://www.nytimes.com/2013/09/10/business/the-border-is-a-back-door-for-us-device-searches.html?pagewanted=all&_r=0
text/html
utf-8
webpage
Officials Say U.S. Wiretaps Exceeded Law - NYTimes.com
http://www.nytimes.com/2009/04/16/us/16nsa.html
2013-09-17 16:18:44
attachment
Officials Say U.S. Wiretaps Exceeded Law - NYTimes.com
2013-09-17 16:18:45
http://www.nytimes.com/2009/04/16/us/16nsa.html
text/html
windows-1252
webpage
Kravets
David
Appeals court revives lawsuit challenging NSA surveillance of Americans | Ars Technica
2011-03-21
http://arstechnica.com/tech-policy/2011/03/appeals-court-revives-lawsuit-challenging-nsa-surveillance-of-americans/
2013-09-17 16:18:48
attachment
Appeals court revives lawsuit challenging NSA surveillance of Americans | Ars Technica
2013-09-17 16:18:49
http://arstechnica.com/tech-policy/2011/03/appeals-court-revives-lawsuit-challenging-nsa-surveillance-of-americans/
text/html
utf-8
webpage
Senate Authorizes Broad Expansion Of Surveillance Act
http://www.washingtonpost.com/wp-dyn/content/article/2008/02/12/AR2008021201202.html
2013-09-17 16:19:24
attachment
Senate Authorizes Broad Expansion Of Surveillance Act
2013-09-17 16:19:25
http://www.washingtonpost.com/wp-dyn/content/article/2008/02/12/AR2008021201202.html
text/html
utf-8
webpage
NY Daily News
Smilowski
Brendan
Thinking about privacy in public - NY Daily News
2013-10-20
https://www.nydailynews.com/opinion/thinking-privacy-public-article-1.1490086
2013-10-21 15:24:19
attachment
Thinking about privacy in public - NY Daily News
2013-10-21 15:24:20
https://www.nydailynews.com/opinion/thinking-privacy-public-article-1.1490086
text/html
utf-8
document
Binney
William E.
Case3:08-cv-04373-JSW
Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities | Public Intelligence
2012-09-28
http://publicintelligence.net/binney-nsa-declaration/
2013-09-17 18:54:03
attachment
NSA-WilliamBinneyDeclaration.pdf
application/pdf
attachment
Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities | Public Intelligence
2013-09-17 18:54:04
http://publicintelligence.net/binney-nsa-declaration/
text/html
utf-8
webpage
America Snoops on Italian Emails, Text Messages and Conversations - Corriere.it
2013-10-22
http://www.corriere.it/13_ottobre_22/america-snoops-on-italian-emails-text-messages-and-conversations-93018016-3b0a-11e3-95f2-9a7a296f615f.shtml
2013-10-23 22:35:58
attachment
America Snoops on Italian Emails, Text Messages and Conversations - Corriere.it
2013-10-23 22:35:59
http://www.corriere.it/13_ottobre_22/america-snoops-on-italian-emails-text-messages-and-conversations-93018016-3b0a-11e3-95f2-9a7a296f615f.shtml
text/html
windows-1252
webpage
Goodin
Dan
Fatal crypto flaw in some government-certified smartcards makes forgery a snap | Ars Technica
2013-09-16
http://arstechnica.com/security/2013/09/fatal-crypto-flaw-in-some-government-certified-smartcards-makes-forgery-a-snap/
2013-09-17 20:41:31
attachment
Fatal crypto flaw in some government-certified smartcards makes forgery a snap | Ars Technica
2013-09-17 20:41:32
http://arstechnica.com/security/2013/09/fatal-crypto-flaw-in-some-government-certified-smartcards-makes-forgery-a-snap/
text/html
utf-8
attachment
Fatal crypto flaw in some government-certified smartcards makes forgery a snap | Ars Technica
2013-09-17 20:42:34
http://arstechnica.com/security/2013/09/fatal-crypto-flaw-in-some-government-certified-smartcards-makes-forgery-a-snap/2/
text/html
utf-8
webpage
Dissent or Terror Source Materials Archive | D.B.A. PRESS
2013-05-20
http://dbapress.com/source-materials-archive/dissent-or-terror-source-materials-archive
2013-09-17 21:06:50
attachment
Dissent or Terror Source Materials Archive | D.B.A. PRESS
2013-09-17 21:06:51
http://dbapress.com/source-materials-archive/dissent-or-terror-source-materials-archive
text/html
utf-8
webpage
The Wall Street Journal
Nagesh
Gautham
Gorman
Siobhan
The Perils of Texting While President - Washington Wire - WSJ
2013-10-25
http://blogs.wsj.com/washwire/2013/10/25/the-perils-of-texting-while-president/
2013-10-25 16:18:41
attachment
The Perils of Texting While President - Washington Wire - WSJ
2013-10-25 16:18:42
http://blogs.wsj.com/washwire/2013/10/25/the-perils-of-texting-while-president/
text/html
utf-8
webpage
Former PM Julia Gillard criticises Barack Obama's decision to cancel APEC visit over US government shutdown - ABC News (Australian Broadcasting Corporation)
http://mobile.abc.net.au/news/2013-10-25/gillard-slams-us-decision-to-cancel-apec-visit/5044744
2013-10-25 16:19:09
<p>"If my telephone was intercepted when I was prime minister, all that anybody would have heard would have been praise for President Obama." - Julia Gillard</p>
attachment
Former PM Julia Gillard criticises Barack Obama's decision to cancel APEC visit over US government shutdown - ABC News (Australian Broadcasting Corporation)
2013-10-25 16:19:10
http://mobile.abc.net.au/news/2013-10-25/gillard-slams-us-decision-to-cancel-apec-visit/5044744
text/html
utf-8
webpage
india
Indian Government Quietly Brings In Its 'Central Monitoring System': Total Surveillance Of All Telecommunications | Techdirt
http://www.techdirt.com/articles/20130508/09302923002/indian-government-quietly-brings-its-central-monitoring-system-total-surveillance-all-communications.shtml
2013-09-17 22:03:41
attachment
Indian Government Quietly Brings In Its 'Central Monitoring System': Total Surveillance Of All Telecommunications | Techdirt
2013-09-17 22:03:42
http://www.techdirt.com/articles/20130508/09302923002/indian-government-quietly-brings-its-central-monitoring-system-total-surveillance-all-communications.shtml
text/html
windows-1252
webpage
india
India sets up elaborate system to tap phone calls, e-mail | Reuters
http://in.reuters.com/article/2013/06/20/india-surveillance-idINL3N0EV1WT20130620
2013-09-17 22:03:43
attachment
India sets up elaborate system to tap phone calls, e-mail | Reuters
2013-09-17 22:03:44
http://in.reuters.com/article/2013/06/20/india-surveillance-idINL3N0EV1WT20130620
text/html
utf-8
webpage
india
India’s surveillance project may be as lethal as PRISM - The Hindu
http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece
2013-09-17 22:03:45
attachment
India’s surveillance project may be as lethal as PRISM - The Hindu
2013-09-17 22:03:46
http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece
text/html
utf-8
webpage
india
Govt tightens control for phone tapping - Times Of India
http://articles.timesofindia.indiatimes.com/2013-06-18/india/40047539_1_phone-tapping-cms-central-monitoring-system
2013-09-17 22:03:48
attachment
Govt tightens control for phone tapping - Times Of India
2013-09-17 22:03:49
http://articles.timesofindia.indiatimes.com/2013-06-18/india/40047539_1_phone-tapping-cms-central-monitoring-system
text/html
utf-8
blogPost
Emptywheel
Also, the Nail Polish Remover Lobby Didn’t Challenge Section 215 Orders | emptywheel
2013-09-17
http://www.emptywheel.net/2013/09/17/also-the-nail-polish-remover-lobby-didnt-challenge-section-215-orders/#
2013-09-18 17:03:49
attachment
Also, the Nail Polish Remover Lobby Didn’t Challenge Section 215 Orders | emptywheel
2013-09-18 17:03:50
http://www.emptywheel.net/2013/09/17/also-the-nail-polish-remover-lobby-didnt-challenge-section-215-orders/#
text/html
utf-8
newspaperArticle
The Guardian
Ackerman
Spencer
Fisa court: no telecoms company has ever challenged phone records orders | Law | theguardian.com
2013-09-17
http://www.theguardian.com/law/2013/sep/17/fisa-court-bulk-phone-records-collection
2013-09-18 17:04:43
attachment
Fisa court: no telecoms company has ever challenged phone records orders | Law | theguardian.com
2013-09-18 17:04:44
http://www.theguardian.com/law/2013/sep/17/fisa-court-bulk-phone-records-collection
text/html
utf-8
webpage
RSA Tells Its Developer Customers: Stop Using NSA-Linked Algorithm | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/09/rsa-advisory-nsa-algorithm/
2013-09-20 15:43:34
attachment
RSA Tells Its Developer Customers: Stop Using NSA-Linked Algorithm | Threat Level | Wired.com
2013-09-20 15:43:35
http://www.wired.com/threatlevel/2013/09/rsa-advisory-nsa-algorithm/
text/html
utf-8
newspaperArticle
USA Today
Heath
Brad
Justice Dept. watchdog never probed judges' NSA concerns
2013-09-19
http://www.usatoday.com/story/news/nation/2013/09/19/nsa-surveillance-justice-opr-investigation/2805867/
2013-09-20 15:44:09
attachment
Justice Dept. watchdog never probed judges' NSA concerns
2013-09-20 15:44:10
http://www.usatoday.com/story/news/nation/2013/09/19/nsa-surveillance-justice-opr-investigation/2805867/
text/html
utf-8
magazineArticle
Foreign Policy
Reed
John
An Enlisted Airman Deciphered al Qaeda's 'Conference Call' of Doom | Killer Apps
2013-09-18
http://killerapps.foreignpolicy.com/posts/2013/09/18/an_enlisted_airman_deciphered_al_qaedas_conference_call_of_doom
2013-09-22 17:28:14
attachment
An Enlisted Airman Deciphered al Qaeda's 'Conference Call' of Doom | Killer Apps
2013-09-23 15:28:53
http://killerapps.foreignpolicy.com/posts/2013/09/18/an_enlisted_airman_deciphered_al_qaedas_conference_call_of_doom
text/html
utf-8
webpage
Foreign Affairs
Heninger
Nadia
Halderman
J. Alex
Tales from the Crypto Community | Foreign Affairs
2013-09-25
http://www.foreignaffairs.com/articles/140214/nadia-heninger-and-j-alex-halderman/tales-from-the-crypto-community?cid=soc-twitter-in-snapshots-tales_From_the_crypto_community-102413
2013-10-25 16:20:16
attachment
Tales from the Crypto Community | Foreign Affairs
2013-10-25 16:20:17
http://www.foreignaffairs.com/articles/140214/nadia-heninger-and-j-alex-halderman/tales-from-the-crypto-community?cid=soc-twitter-in-snapshots-tales_From_the_crypto_community-102413
text/html
utf-8
newspaperArticle
National
The Hindu
India
Greenwald
Glenn
Saxena
Shobhan
India among top targets of spying by NSA - The Hindu
2013-09-23
http://www.thehindu.com/news/national/india-among-top-targets-of-spying-by-nsa/article5157526.ece?homepage=true
2013-09-23 14:31:18
attachment
India among top targets of spying by NSA - The Hindu
2013-09-23 14:31:19
http://www.thehindu.com/news/national/india-among-top-targets-of-spying-by-nsa/article5157526.ece?homepage=true
text/html
utf-8
newspaperArticle
San Jose Mercury News
Strohm
Chris
NSA documents: Spying violated court restrictions for years - San Jose Mercury News
2013-09-10
http://www.mercurynews.com/ci_24063111/nsa-documents-spying-violated-court-restrictions-years
2013-09-23 15:25:03
attachment
NSA documents: Spying violated court restrictions for years - San Jose Mercury News
2013-09-23 15:25:04
http://www.mercurynews.com/ci_24063111/nsa-documents-spying-violated-court-restrictions-years
text/html
utf-8
newspaperArticle
San Jose Mercury News
Nasko
Dan
Consumers worried about NSA intrusions have little recourse - San Jose Mercury News
2013-09-07
http://www.mercurynews.com/business/ci_24041867/consumers-worried-about-nsa-intrusions-have-little-recourse
2013-09-23 15:30:31
attachment
Consumers worried about NSA intrusions have little recourse - San Jose Mercury News
2013-09-23 15:30:32
http://www.mercurynews.com/business/ci_24041867/consumers-worried-about-nsa-intrusions-have-little-recourse
text/html
utf-8
newspaperArticle
Los Angeles Times
Williams
Carol J.
WikiLeaks cheers Snowden asylum in Russia; rights groups dubious - latimes.com
2013-08-01
http://www.latimes.com/news/world/worldnow/la-fg-wn-snowden-wikileaks-asylum-20130801,0,5224509.story
2013-09-23 15:49:12
attachment
WikiLeaks cheers Snowden asylum in Russia; rights groups dubious - latimes.com
2013-09-23 15:49:13
http://www.latimes.com/news/world/worldnow/la-fg-wn-snowden-wikileaks-asylum-20130801,0,5224509.story
text/html
utf-8
newspaperArticle
Los Angeles Times
Dilanian
Ken
U.S. shares raw intelligence data with Israel, leaked document shows - latimes.com
2013-09-11
http://www.latimes.com/world/la-fg-israel-nsa-20130912,0,3708841.story
2013-09-23 15:51:10
attachment
U.S. shares raw intelligence data with Israel, leaked document shows - latimes.com
2013-09-23 15:51:11
http://www.latimes.com/world/la-fg-israel-nsa-20130912,0,3708841.story
text/html
utf-8
newspaperArticle
Politics
Los Angeles Times
Parsons
Christi
Dilanian
Ken
Obama calls for changes to Patriot Act, surveillance procedures - latimes.com
2013-08-09
http://www.latimes.com/news/politics/la-pn-obama-patriot-act-oversight-20130809,0,2604335.story
2013-09-23 15:58:59
attachment
Obama calls for changes to Patriot Act, surveillance procedures - latimes.com
2013-09-23 15:59:00
http://www.latimes.com/news/politics/la-pn-obama-patriot-act-oversight-20130809,0,2604335.story
text/html
utf-8
newspaperArticle
Le Monde Diplomatique
Engelhardt
Tom
The making of a global security State - Le Monde diplomatique - English edition
English
2013-06-17
http://mondediplo.com/openpage/the-making-of-a-global-security-state
2013-09-23 16:03:28
attachment
The making of a global security State - Le Monde diplomatique - English edition
2013-09-23 16:03:29
http://mondediplo.com/openpage/the-making-of-a-global-security-state
text/html
utf-8
newspaperArticle
Le Monde Diplomatique
Van Buren
Peter
Welcome to post-Constitution America - Le Monde diplomatique - English edition
English
2013-08-05
http://mondediplo.com/openpage/welcome-to-post-constitution-america
2013-09-23 16:04:26
attachment
Welcome to post-Constitution America - Le Monde diplomatique - English edition
2013-09-23 16:04:27
http://mondediplo.com/openpage/welcome-to-post-constitution-america
text/html
utf-8
newspaperArticle
Foreign Policy
Harris
Shane
The Cowboy of the NSA - By Shane Harris | Foreign Policy
2013-09-09
http://www.foreignpolicy.com/articles/2013/09/08/the_cowboy_of_the_nsa_keith_alexander?page=full
2013-09-23 18:47:07
attachment
The Cowboy of the NSA - By Shane Harris | Foreign Policy
2013-09-23 18:47:08
http://www.foreignpolicy.com/articles/2013/09/08/the_cowboy_of_the_nsa_keith_alexander?page=full
text/html
utf-8
newspaperArticle
Foreign Policy
Harris
Shane
This is, hands down, the scariest part of the NSA revelations | FP Passport
2013-06-10
http://blog.foreignpolicy.com/posts/2013/06/10/prism_isn_t_the_scariest_part_of_the_nsa_revelations_phone_metadata
2013-09-23 18:55:44
attachment
This is, hands down, the scariest part of the NSA revelations | FP Passport
2013-09-23 18:55:45
http://blog.foreignpolicy.com/posts/2013/06/10/prism_isn_t_the_scariest_part_of_the_nsa_revelations_phone_metadata
text/html
utf-8
blogPost
Techdirt
Cushing
Tim
Without Any Legal Basis, The NYPD Has Been Classifying Its Own Documents For More Than A Decade | Techdirt
2013-09-13
http://www.techdirt.com/articles/20130917/05251924551/without-any-legal-basis-nypd-has-been-classifying-its-own-documents-more-than-decade.shtml
2013-09-23 19:12:38
attachment
Without Any Legal Basis, The NYPD Has Been Classifying Its Own Documents For More Than A Decade | Techdirt
2013-09-23 19:12:39
http://www.techdirt.com/articles/20130917/05251924551/without-any-legal-basis-nypd-has-been-classifying-its-own-documents-more-than-decade.shtml
text/html
windows-1252
webpage
EU Parliment agenda for September 24th, 2013 meeting of the Committee on Civil Liberties, Justice and Home Affairs
2013-09-24
http://www.europarl.europa.eu/meetdocs/2009_2014/organes/libe/libe_20130924_0900.htm
2013-09-24 15:46:10
attachment
2013-09-24 15:46:11
http://www.europarl.europa.eu/meetdocs/2009_2014/organes/libe/libe_20130924_0900.htm
text/html
windows-1252
newspaperArticle
New York Times
Savage
Charlie
Former F.B.I. Agent to Plead Guilty in Press Leak - NYTimes.com
2013-09-23
http://www.nytimes.com/2013/09/24/us/fbi-ex-agent-pleads-guilty-in-leak-to-ap.html?_r=0
2013-09-24 15:51:33
attachment
Former F.B.I. Agent to Plead Guilty in Press Leak - NYTimes.com
2013-09-24 15:51:34
http://www.nytimes.com/2013/09/24/us/fbi-ex-agent-pleads-guilty-in-leak-to-ap.html?_r=0
text/html
utf-8
newspaperArticle
New York Times
Savage
Charlie
Kaufman
Leslie
Phone Records of Journalists of The Associated Press Seized by U.S. - NYTimes.com
2013-05-15
http://www.nytimes.com/2013/05/14/us/phone-records-of-journalists-of-the-associated-press-seized-by-us.html
2013-09-24 15:56:11
attachment
Phone Records of Journalists of The Associated Press Seized by U.S. - NYTimes.com
2013-09-24 15:56:12
http://www.nytimes.com/2013/05/14/us/phone-records-of-journalists-of-the-associated-press-seized-by-us.html
text/html
utf-8
newspaperArticle
Le Monde Diplomatique
Poole
Patrick S.
Echelon
Most discreet intelligence agency - Le Monde diplomatique - English edition
English
1999-01
http://mondediplo.com/1999/01/05nsa
2013-09-24 16:02:35
attachment
Most discreet intelligence agency - Le Monde diplomatique - English edition
2013-09-24 16:02:36
http://mondediplo.com/1999/01/05nsa
text/html
utf-8
newspaperArticle
Le Monde Diplomatique
Rivière
Philippe
How the United States spies on us all - Le Monde diplomatique - English edition
English
1999-01
http://mondediplo.com/1999/01/04echelon
2013-09-24 16:04:19
attachment
How the United States spies on us all - Le Monde diplomatique - English edition
2013-09-24 16:04:20
http://mondediplo.com/1999/01/04echelon
text/html
utf-8
newspaperArticle
Le Monde Diplomatique
Hager
Nick
Israel’s omniscient ears - Le Monde diplomatique - English edition
English
2010-09
http://mondediplo.com/2010/09/04israelbase
2013-09-24 16:06:02
attachment
Israel’s omniscient ears - Le Monde diplomatique - English edition
2013-09-24 16:06:03
http://mondediplo.com/2010/09/04israelbase
text/html
utf-8
newspaperArticle
Le Monde Diplomatique
Hager
Nick
In the know - Le Monde diplomatique - English edition
English
2001-11
http://mondediplo.com/2001/11/18nsa
2013-09-24 16:07:04
attachment
In the know - Le Monde diplomatique - English edition
2013-09-24 16:07:05
http://mondediplo.com/2001/11/18nsa
text/html
utf-8
newspaperArticle
New York Times
Kanter
James
Greek cellphones tapped - The New York Times
2006-02-02
http://www.nytimes.com/2006/02/02/world/europe/02iht-greece.html
2013-09-24 16:14:19
attachment
Greek cellphones tapped - The New York Times
2013-09-24 16:14:20
http://www.nytimes.com/2006/02/02/world/europe/02iht-greece.html
text/html
utf-8
webpage
Tripsas
Spyros
Translation: Courtcase Evidence: USA Espionage against Greece
2013-09-23
http://wikileaks-press.org/translation-courtcase-evidence-usa-espionage-against-greece/
2013-09-24 16:16:41
attachment
Translation: Courtcase Evidence: USA Espionage against Greece
2013-09-24 16:16:42
http://wikileaks-press.org/translation-courtcase-evidence-usa-espionage-against-greece/
text/html
utf-8
newspaperArticle
epikaira
Τρίψα
Του Σπύρου
Στοιχεία της δικογραφίας για την κατασκοπεία των ΗΠΑ σε βάρος της Ελλάδας | Επίκαιρα Online | epikaira.gr
2011-09-14
http://www.epikaira.gr/epikairo.php?id=29406&category_id=0
2013-09-24 16:17:52
attachment
Στοιχεία της δικογραφίας για την κατασκοπεία των ΗΠΑ σε βάρος της Ελλάδας | Επίκαιρα Online | epikaira.gr
2013-09-24 16:17:53
http://www.epikaira.gr/epikairo.php?id=29406&category_id=0
text/html
iso-8859-7
blogPost
Pozen
David
Lawfare › What Happens When We Actually Catch Edward Snowden?
2013-07-15
http://www.lawfareblog.com/2013/07/what-happens-when-we-actually-catch-edward-snowden/
2013-09-24 18:29:49
attachment
Lawfare › What Happens When We Actually Catch Edward Snowden?
2013-09-24 18:29:50
http://www.lawfareblog.com/2013/07/what-happens-when-we-actually-catch-edward-snowden/
text/html
utf-8
newspaperArticle
Reuters
Bamford
James
NSA: Listening to everyone - except oversight | Reuters
2013-08-27
http://www.reuters.com/article/2013/08/27/us-nsa-listening-idUSBRE97Q04K20130827
2013-09-24 19:37:07
attachment
NSA: Listening to everyone - except oversight | Reuters
2013-09-24 19:37:08
http://www.reuters.com/article/2013/08/27/us-nsa-listening-idUSBRE97Q04K20130827
text/html
utf-8
newspaperArticle
Opinion
New
Ludlow
Peter
The Banality of Systemic Evil - NYTimes.com
2013-09-15
http://mobile.nytimes.com/blogs/opinionator/2013/09/15/the-banality-of-systemic-evil/
2013-09-24 20:48:12
attachment
The Banality of Systemic Evil - NYTimes.com
2013-09-24 20:48:13
http://mobile.nytimes.com/blogs/opinionator/2013/09/15/the-banality-of-systemic-evil/
text/html
utf-8
newspaperArticle
Le Monde Diplomatique
Champagne
Antoine
Watching over you - Le Monde diplomatique - English edition
English
2012-03
http://mondediplo.com/2012/03/16internet
2013-09-24 20:51:46
attachment
Watching over you - Le Monde diplomatique - English edition
2013-09-24 20:51:47
http://mondediplo.com/2012/03/16internet
text/html
utf-8
blogPost
0v
Housh
Greg
Barrett Brown
My Friend Barrett Brown
2013-09-25
http://0v.org/my-friend-barrett-brown/#.UkQoM1QQCf8
2013-09-26 12:27:50
attachment
My Friend Barrett Brown
2013-09-26 12:27:51
http://0v.org/my-friend-barrett-brown/#.UkQoM1QQCf8
text/html
utf-8
newspaperArticle
Associated Press
Barakat
Matthew
Scalia expects NSA program to end up in court
2013-09-25
http://bigstory.ap.org/article/scalia-expects-nsa-wiretaps-end-court
2013-09-26 12:35:59
attachment
Scalia expects NSA program to end up in court
2013-09-26 12:36:00
http://bigstory.ap.org/article/scalia-expects-nsa-wiretaps-end-court
text/html
utf-8
webpage
Ars Technica
Gallagher
Ryan
brokers
stingray
Meet the machines that steal your phone’s data | Ars Technica
2013-09-25
http://arstechnica.com/tech-policy/2013/09/meet-the-machines-that-steal-your-phones-data/
2013-09-26 12:36:57
attachment
Meet the machines that steal your phone’s data | Ars Technica
2013-09-26 12:36:58
http://arstechnica.com/tech-policy/2013/09/meet-the-machines-that-steal-your-phones-data/
text/html
utf-8
blogPost
Politico
Gerstein
Josh
Lavabit
Lavabit wants appeal unsealed - POLITICO.com
2013-09-25
http://www.politico.com/blogs/under-the-radar/2013/09/lavabit-wants-appeal-unsealed-173469.html
2013-09-26 12:46:09
attachment
Lavabit wants appeal unsealed - POLITICO.com
2013-09-26 12:46:10
http://www.politico.com/blogs/under-the-radar/2013/09/lavabit-wants-appeal-unsealed-173469.html
text/html
utf-8
webpage
License Plate Reader
License Plate Recognition
LPR
License Plate Recognition Technology (LPR) | Center for Evidence-Based Crime Policy
http://cebcp.org/lpr/
2013-09-26 12:53:01
attachment
9870 ANPR report qx5 latest 17Sep.qxd - ANPR_report_24_Oct.pdf
2013-09-26 12:56:12
http://cebcp.org/wp-content/lpr/ANPR_report_24_Oct.pdf
application/pdf
utf-8
attachment
A Report on the Utility of the Automated License Plate Recognition System in British Columbia - BritishColumbiaLPRreport.pdf
2013-09-26 12:55:58
http://cebcp.org/wp-content/lpr/BritishColumbiaLPRreport.pdf
application/pdf
utf-8
attachment
District - OSHP_eval.pdf
2013-09-26 12:56:03
http://cebcp.org/wp-content/lpr/OSHP_eval.pdf
application/pdf
utf-8
attachment
Document Title: - Evaluability_assessment.pdf
2013-09-26 12:54:43
http://cebcp.org/wp-content/lpr/Evaluability_assessment.pdf
application/pdf
utf-8
attachment
License Plate Recognition Technology (LPR) | Center for Evidence-Based Crime Policy
2013-09-26 12:53:02
http://cebcp.org/lpr/
text/html
utf-8
attachment
LICENSE PLATE RECOGNITION TECHNOLOGY (LPR) - LPR_FINAL.pdf
2013-09-26 12:57:16
http://cebcp.org/wp-content/evidence-based-policing/LPR_FINAL.pdf
application/pdf
utf-8
attachment
LPR Deployment in the Field | Center for Evidence-Based Crime Policy
2013-09-26 12:53:18
http://cebcp.org/lpr/lpr-deployment-in-the-field/
text/html
utf-8
attachment
LPR for Crime Analysts | Center for Evidence-Based Crime Policy
2013-09-26 12:53:37
http://cebcp.org/lpr/lpr-for-crime-analysts/
text/html
utf-8
attachment
LPR for Police Leadership | Center for Evidence-Based Crime Policy
2013-09-26 12:53:25
http://cebcp.org/lpr/lpr-for-police-leadership/
text/html
utf-8
attachment
LPR for Researchers | Center for Evidence-Based Crime Policy
2013-09-26 12:53:42
http://cebcp.org/lpr/lpr-for-researchers/
text/html
utf-8
attachment
LPR for the Community | Center for Evidence-Based Crime Policy
2013-09-26 12:53:30
http://cebcp.org/lpr/lpr-for-the-community/
text/html
utf-8
attachment
Microsoft Word - Final report PERF LPR study 12-7-11 submitted to NIJ.DOC - FinalreportPERFLPRstudy12-7-11submittedtoNIJ.PDF
2013-09-26 12:52:48
http://www.policeforum.org/library/technology/FinalreportPERFLPRstudy12-7-11submittedtoNIJ.PDF
application/pdf
utf-8
attachment
Thematic_Review_of_ANPR_v2[1].pdf
2013-09-26 12:56:07
http://cebcp.org/wp-content/lpr/Thematic_Review_of_ANPR_v2%5B1%5D.pdf
application/pdf
utf-8
newspaperArticle
The Hindu
Saxena
Shobhan
Embassies
NSA planted bugs at Indian missions in D.C., U.N. - The Hindu
2013-09-25
http://www.thehindu.com/news/international/world/nsa-planted-bugs-at-indian-missions-in-dc-un/article5164944.ece
2013-09-26 13:01:57
attachment
NSA planted bugs at Indian missions in D.C., U.N. - The Hindu
2013-09-26 13:01:58
http://www.thehindu.com/news/international/world/nsa-planted-bugs-at-indian-missions-in-dc-un/article5164944.ece
text/html
utf-8
newspaperArticle
Washington Post
Nakashima
Ellen
NSA leaks ‘extremely damaging,’ national intelligence director tells Senate hearing - The Washington Post
2013-09-27
http://www.washingtonpost.com/world/national-security/nsa-leaks-extremely-damaging-national-intelligence-director-tells-senate-hearing/2013/09/26/a01b4e08-26d3-11e3-b75d-5b7f66349852_story.html?hpid=z5
2013-09-27 16:34:24
attachment
NSA leaks ‘extremely damaging,’ national intelligence director tells Senate hearing - The Washington Post
2013-09-27 16:34:25
http://www.washingtonpost.com/world/national-security/nsa-leaks-extremely-damaging-national-intelligence-director-tells-senate-hearing/2013/09/26/a01b4e08-26d3-11e3-b75d-5b7f66349852_story.html?hpid=z5
text/html
utf-8
newspaperArticle
Foreign Policy
Aid
Matthew M.
Burr
William
Cold war
Secret Cold War Documents Reveal NSA Spied on Senators - By Matthew M. Aid and William Burr | Foreign Policy
2013-09-25
http://www.foreignpolicy.com/articles/2013/09/25/it_happened_here_NSA_spied_on_senators_1970s
2013-09-27 17:05:50
attachment
Secret Cold War Documents Reveal NSA Spied on Senators - By Matthew M. Aid and William Burr | Foreign Policy
2013-09-27 17:05:51
http://www.foreignpolicy.com/articles/2013/09/25/it_happened_here_NSA_spied_on_senators_1970s
text/html
utf-8
webpage
CNet
Moyer
Edward
Cold war
Past as prologue? Vietnam-era spying by NSA comes to light | Politics and Law - CNET News
2013-09-26
http://news.cnet.com/8301-13578_3-57604838-38/past-as-prologue-vietnam-era-spying-by-nsa-comes-to-light/
2013-09-27 17:06:50
attachment
Past as prologue? Vietnam-era spying by NSA comes to light | Politics and Law - CNET News
2013-09-27 17:06:51
http://news.cnet.com/8301-13578_3-57604838-38/past-as-prologue-vietnam-era-spying-by-nsa-comes-to-light/
text/html
utf-8
newspaperArticle
Washington Post
Peterson
Andrea
loveint
LOVEINT: When NSA officers use their spying power on love interests
2013-08-24
http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/24/loveint-when-nsa-officers-use-their-spying-power-on-love-interests/
2013-09-27 17:07:45
attachment
LOVEINT: When NSA officers use their spying power on love interests
2013-09-27 17:07:46
http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/24/loveint-when-nsa-officers-use-their-spying-power-on-love-interests/
text/html
utf-8
newspaperArticle
World News
The Telegraph
Alexander
Harriet
loveint
NSA employees spied on their lovers using eavesdropping programme - Telegraph
2013-08-24
http://www.telegraph.co.uk/news/worldnews/northamerica/usa/10263880/NSA-employees-spied-on-their-lovers-using-eavesdropping-programme.html
2013-09-27 17:08:39
attachment
NSA employees spied on their lovers using eavesdropping programme - Telegraph
2013-09-27 17:08:40
http://www.telegraph.co.uk/news/worldnews/northamerica/usa/10263880/NSA-employees-spied-on-their-lovers-using-eavesdropping-programme.html
text/html
utf-8
webpage
NBC News
Isikoff
Michael
loveint
'Loveint': NSA letter discloses employee eavesdropping on girlfriends, spouses - Investigations
2013-09-26
http://investigations.nbcnews.com/_news/2013/09/26/20709855-loveint-nsa-letter-discloses-employee-eavesdropping-on-girlfriends-spouses?lite
2013-09-27 17:09:59
attachment
'Loveint': NSA letter discloses employee eavesdropping on girlfriends, spouses - Investigations
2013-09-27 17:10:00
http://investigations.nbcnews.com/_news/2013/09/26/20709855-loveint-nsa-letter-discloses-employee-eavesdropping-on-girlfriends-spouses?lite
text/html
utf-8
magazineArticle
New Republic
Rosen
Jeffrey
Declassified Legal Opinions Show How Surveillance State Was Born | New Republic
2013-09-28
http://www.newrepublic.com/article/114795/declassified-legal-opinions-show-how-surveillance-state-was-born
2013-09-30 15:00:15
attachment
Declassified Legal Opinions Show How Surveillance State Was Born | New Republic
2013-09-30 15:00:16
http://www.newrepublic.com/article/114795/declassified-legal-opinions-show-how-surveillance-state-was-born
text/html
utf-8
attachment
Op. O.L.C. Supp. - op-supp.pdf
2013-09-30 15:01:16
https://www.fas.org/irp/agency/doj/olc/op-supp.pdf
application/pdf
utf-8
newspaperArticle
News
The Baltimore Sun
Rector
Kevin
Hopkins professor invited to review NSA documents leaked by Snowden - baltimoresun.com
2013-09-29
http://www.baltimoresun.com/news/maryland/education/blog/bs-md-jhu-professor-invite-20130929,0,2531733.story
2013-09-30 15:13:54
attachment
Hopkins professor invited to review NSA documents leaked by Snowden - baltimoresun.com
2013-09-30 15:13:55
http://www.baltimoresun.com/news/maryland/education/blog/bs-md-jhu-professor-invite-20130929,0,2531733.story
text/html
utf-8
magazineArticle
The New Yorker
Auletta
Ken
Ken Auletta: Can the Guardian Take Its Aggressive Investigations Global? : The New Yorker
2013-10-07
http://www.newyorker.com/reporting/2013/10/07/131007fa_fact_auletta?currentPage=all
2013-09-30 15:15:19
attachment
Ken Auletta: Can the Guardian Take Its Aggressive Investigations Global? : The New Yorker
2013-09-30 15:15:20
http://www.newyorker.com/reporting/2013/10/07/131007fa_fact_auletta?currentPage=all
text/html
windows-1252
newspaperArticle
AP
Barchfield
Jenny
U.S. assassination program
News from The Associated Press
2013-09-28
http://hosted.ap.org/dynamic/stories/L/LT_BRAZIL_GLENN_GREENWALD?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2013-09-28-20-46-34
2013-09-30 15:16:02
attachment
News from The Associated Press
2013-09-30 15:16:03
http://hosted.ap.org/dynamic/stories/L/LT_BRAZIL_GLENN_GREENWALD?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2013-09-28-20-46-34
text/html
windows-1252
newspaperArticle
Wall Street Journal
Robinson
Frances
Dwoskin
Elizabeth
NSA Internet Spying Sparks Race to Create Offshore Havens for Data Privacy - WSJ.com
2013-09-27
http://online.wsj.com/article_email/SB10001424052702303983904579096082938662594-lMyQjAxMTAzMDIwNzEyNDcyWj.html
2013-09-30 15:20:33
attachment
NSA Internet Spying Sparks Race to Create Offshore Havens for Data Privacy - WSJ.com
2013-09-30 15:20:34
http://online.wsj.com/article_email/SB10001424052702303983904579096082938662594-lMyQjAxMTAzMDIwNzEyNDcyWj.html
text/html
utf-8
newspaperArticle
New York Times
Poitras
Laura
Risen
James
N.S.A. Gathers Data on Social Connections of U.S. Citizens - NYTimes.com
2013-09-28
http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html?pagewanted=all&_r=1&
2013-09-30 15:21:25
attachment
N.S.A. Gathers Data on Social Connections of U.S. Citizens - NYTimes.com
2013-09-30 15:21:26
http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html?pagewanted=all&_r=1&
text/html
utf-8
newspaperArticle
Guardian
Ball
James
NSA stores metadata of millions of web users for up to a year, secret files show | World news | theguardian.com
2013-09-30
http://www.theguardian.com/world/2013/sep/30/nsa-americans-metadata-year-documents
2013-09-30 17:47:37
attachment
NSA stores metadata of millions of web users for up to a year, secret files show | World news | theguardian.com
2013-09-30 17:47:38
http://www.theguardian.com/world/2013/sep/30/nsa-americans-metadata-year-documents
text/html
utf-8
newspaperArticle
AP
White House defends NSA amid social mapping report
2013-09-30
http://bigstory.ap.org/article/white-house-defends-nsa-amid-social-mapping-report
2013-09-30 19:26:17
attachment
White House defends NSA amid social mapping report
2013-09-30 19:26:18
http://bigstory.ap.org/article/white-house-defends-nsa-amid-social-mapping-report
text/html
utf-8
newspaperArticle
New York Times
Carr
David
For Journalists, More Firepower to Protect Sources and Secrets - NYTimes.com
2013-09-29
http://www.nytimes.com/2013/09/30/business/media/for-journalists-more-firepower-to-protect-sources-and-secrets.html?smid=tw-share
2013-09-30 20:14:45
attachment
For Journalists, More Firepower to Protect Sources and Secrets - NYTimes.com
2013-09-30 20:14:46
http://www.nytimes.com/2013/09/30/business/media/for-journalists-more-firepower-to-protect-sources-and-secrets.html?smid=tw-share
text/html
utf-8
blogPost
Techdirt
Cushing
Tim
'See Something, Say Something' Campaign Creates Massive Database Of Useless Info From Citizens Spying On Each Other | Techdirt
2013-09-25
http://www.techdirt.com/articles/20130924/10470524637/documents-obtained-aclu-show-fusion-centers-broad-surveillance-americans-everyday-activities.shtml
2013-09-30 20:40:01
attachment
'See Something, Say Something' Campaign Creates Massive Database Of Useless Info From Citizens Spying On Each Other | Techdirt
2013-09-30 20:40:02
http://www.techdirt.com/articles/20130924/10470524637/documents-obtained-aclu-show-fusion-centers-broad-surveillance-americans-everyday-activities.shtml
text/html
windows-1252
blogPost
Blog of Rights
Mass
Julia Harumi
The Government is Spying on You: ACLU Releases New Evidence of Overly Broad Surveillance of Everyday Activities | American Civil Liberties Union
2013-09-19
https://www.aclu.org/blog/national-security-technology-and-liberty/government-spying-you-aclu-releases-new-evidence
2013-09-30 20:41:34
attachment
10-3-2012 PSI STAFF REPORT re FUSION CENTERS.2.pdf
application/pdf
attachment
2012.08.06 CCIC PRA resp. Encl. 7 (OCRed).pdf - asset_upload_file470_12586.pdf
2013-09-30 20:42:32
https://www.aclunc.org/sites/default/files/asset_upload_file470_12586.pdf
application/pdf
utf-8
attachment
asset_upload_file262_12586.pdf
2013-09-30 20:42:36
https://www.aclunc.org/sites/default/files/asset_upload_file262_12586.pdf
application/pdf
utf-8
attachment
The Government is Spying on You: ACLU Releases New Evidence of Overly Broad Surveillance of Everyday Activities | American Civil Liberties Union
2013-09-30 20:41:35
https://www.aclu.org/blog/national-security-technology-and-liberty/government-spying-you-aclu-releases-new-evidence
text/html
utf-8
newspaperArticle
New York Times
Gabriel
Trip
Shortcuts Seen by Firm Doing Security Checks - NYTimes.com
2013-09-27
http://www.nytimes.com/2013/09/28/us/pressure-reported-in-rush-to-meet-security-clearances-including-edward-snowden-and-aaron-alexis.html?pagewanted=all&_r=1&
2013-09-30 21:42:12
attachment
Shortcuts Seen by Firm Doing Security Checks - NYTimes.com
2013-09-30 21:42:13
http://www.nytimes.com/2013/09/28/us/pressure-reported-in-rush-to-meet-security-clearances-including-edward-snowden-and-aaron-alexis.html?pagewanted=all&_r=1&
text/html
utf-8
blogPost
TEchdirt
Masnick
Mike
Supporting EFF Means You're A Security Risk? | Techdirt
2013-06-27
http://www.techdirt.com/articles/20130626/00193023622/supporting-eff-means-youre-security-risk.shtml
2013-09-30 21:42:46
attachment
Supporting EFF Means You're A Security Risk? | Techdirt
2013-09-30 21:42:47
http://www.techdirt.com/articles/20130626/00193023622/supporting-eff-means-youre-security-risk.shtml
text/html
windows-1252
magazineArticle
Time
Katz
Andrew
Potential Blind Spots in Clearance Process that Gave Snowden Top-Secret Access | TIME.com
2013-06-15
http://nation.time.com/2013/06/15/potential-blind-spots-in-clearance-process-that-gave-snowden-top-secret-access/#ixzz2WZLrxpjT
2013-09-30 21:43:49
attachment
Potential Blind Spots in Clearance Process that Gave Snowden Top-Secret Access | TIME.com
2013-09-30 21:43:50
http://nation.time.com/2013/06/15/potential-blind-spots-in-clearance-process-that-gave-snowden-top-secret-access/#ixzz2WZLrxpjT
text/html
utf-8
newspaperArticle
Washington Post
Peterson
Andrea
Joseph Nacchio
Qwest
A CEO who resisted NSA spying is out of prison. And he feels ‘vindicated’ by Snowden leaks.
2013-09-30
http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/30/a-ceo-who-resisted-nsa-spying-is-out-of-prison-and-he-feels-vindicated-by-snowden-leaks/
2013-09-30 21:44:49
attachment
A CEO who resisted NSA spying is out of prison. And he feels ‘vindicated’ by Snowden leaks.
2013-09-30 21:44:50
http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/30/a-ceo-who-resisted-nsa-spying-is-out-of-prison-and-he-feels-vindicated-by-snowden-leaks/
text/html
utf-8
newspaperArticle
Opinion
Guardian
Goodale
James
To reform the NSA, fire officials who lie | James Goodale | Comment is free | theguardian.com
2013-09-25
http://www.theguardian.com/commentisfree/2013/sep/25/nsa-reform-fire-officials-lied
2013-09-30 21:47:16
attachment
To reform the NSA, fire officials who lie | James Goodale | Comment is free | theguardian.com
2013-09-30 21:47:17
http://www.theguardian.com/commentisfree/2013/sep/25/nsa-reform-fire-officials-lied
text/html
utf-8
newspaperArticle
Guardian
Arthur
Charles
Ex-Microsoft privacy adviser: I don't trust company after NSA revelations | World news | theguardian.com
2013-09-30
http://www.theguardian.com/world/2013/sep/30/microsoft-privacy-chief-nsa
2013-09-30 21:48:27
attachment
Ex-Microsoft privacy adviser: I don't trust company after NSA revelations | World news | theguardian.com
2013-09-30 21:48:28
http://www.theguardian.com/world/2013/sep/30/microsoft-privacy-chief-nsa
text/html
utf-8
magazineArticle
Foreign Policy
Harr
Metadata May Not Catch Many Terrorists, But It's Great at Busting Journalists' Sources | FP Passport
2013-09-24
http://blog.foreignpolicy.com/posts/2013/09/24/metadata_may_not_catch_many_terrorists_but_its_great_at_busting_journalists_sources
2013-09-30 21:50:57
attachment
Metadata May Not Catch Many Terrorists, But It's Great at Busting Journalists' Sources | FP Passport
2013-09-30 21:50:58
http://blog.foreignpolicy.com/posts/2013/09/24/metadata_may_not_catch_many_terrorists_but_its_great_at_busting_journalists_sources
text/html
utf-8
newspaperArticle
New York Times
Schmitt
Eric
Schmidt
Michael D.
Qaeda Plot Leak Has Undermined U.S. Intelligence - NYTimes.com
2013-09-29
http://www.nytimes.com/2013/09/30/us/qaeda-plot-leak-has-undermined-us-intelligence.html?nl=todaysheadlines&emc=edit_th_20130930&_r=1&
2013-10-01 15:44:58
attachment
Qaeda Plot Leak Has Undermined U.S. Intelligence - NYTimes.com
2013-10-01 15:44:59
http://www.nytimes.com/2013/09/30/us/qaeda-plot-leak-has-undermined-us-intelligence.html?nl=todaysheadlines&emc=edit_th_20130930&_r=1&
text/html
utf-8
newspaperArticle
Guardian
Greenwald
Glenn
Pentagon's new massive expansion of 'cyber-security' unit is about everything except defense | Glenn Greenwald | Comment is free | theguardian.com
2013-01-28
http://www.theguardian.com/commentisfree/2013/jan/28/pentagon-cyber-security-expansion-stuxnet
2013-10-01 18:03:41
attachment
Pentagon's new massive expansion of 'cyber-security' unit is about everything except defense | Glenn Greenwald | Comment is free | theguardian.com
2013-10-01 18:03:42
http://www.theguardian.com/commentisfree/2013/jan/28/pentagon-cyber-security-expansion-stuxnet
text/html
utf-8
blogPost
Secrecy News
Aftergood
Steven
National Counterterrorism Center (NCTC)
To Fix U.S. Intelligence, Shrink It? - Secrecy News
2013-09-30
http://blogs.fas.org/secrecy/2013/09/nctc-nolan/
2013-10-01 20:20:17
attachment
Information Sharing Rules of the Road - nctc-1.pdf
2013-10-01 20:21:43
http://www.fas.org/sgp/othergov/intel/nctc-1.pdf
application/pdf
utf-8
attachment
Microsoft Word - 205045_supp_undefined_B92E5D64-A6A8-11E2-B5F6-0E1B2E1BA5B1.doc - Nolan_Dissertation.PDF
2013-10-01 20:21:28
http://media.philly.com/documents/Nolan_Dissertation.PDF
application/pdf
utf-8
attachment
To Fix U.S. Intelligence, Shrink It? - Secrecy News
2013-10-01 20:20:18
http://blogs.fas.org/secrecy/2013/09/nctc-nolan/
text/html
utf-8
webpage
Snyder
Susan
National Counterterrorism Center (NCTC)
Covering the undercovers - Philly.com
2013-08-20
http://articles.philly.com/2013-08-20/news/41425761_1_cia-national-counterterrorism-center-sociology
2013-10-01 20:23:03
attachment
Covering the undercovers - Philly.com
2013-10-01 20:23:04
http://articles.philly.com/2013-08-20/news/41425761_1_cia-national-counterterrorism-center-sociology
text/html
utf-8
webpage
Center for Investigative Reporting
Schulz
G.W.
Zwerdling
Daniel
Easily obtained subpoenas turn your personal information against you | The Center for Investigative Reporting
2013-09-30
http://cironline.org/reports/easily-obtained-subpoenas-turn-your-personal-information-against-you-5104
2013-10-01 20:24:52
attachment
Easily obtained subpoenas turn your personal information against you | The Center for Investigative Reporting
2013-10-01 20:24:53
http://cironline.org/reports/easily-obtained-subpoenas-turn-your-personal-information-against-you-5104
text/html
utf-8
webpage
Center for Investigative Reporting
Schulz
G.W.
Becker
Andrew
Mall of America visitors unknowingly end up in counterterrorism reports | The Center for Investigative Reporting
2011-09-07
http://cironline.org/reports/mall-america-visitors-unknowingly-end-counterterrorism-reports-2914
2013-10-01 21:00:01
attachment
Mall of America visitors unknowingly end up in counterterrorism reports | The Center for Investigative Reporting
2013-10-01 21:00:02
http://cironline.org/reports/mall-america-visitors-unknowingly-end-counterterrorism-reports-2914
text/html
utf-8
webpage
Center for Investigative Reporting
Schulz
G.W.
Rare case sheds light on cellphone surveillance device | The Center for Investigative Reporting
2012-10-29
http://cironline.org/reports/rare-case-sheds-light-cellphone-surveillance-device-3950
2013-10-01 21:02:54
attachment
Rare case sheds light on cellphone surveillance device | The Center for Investigative Reporting
2013-10-01 21:02:55
http://cironline.org/reports/rare-case-sheds-light-cellphone-surveillance-device-3950
text/html
utf-8
webpage
Center for Investigative Reporting
Becker
Andrew
Schulz
G.W.
Report savages terrorism 'fusion centers' for high cost, low value | The Center for Investigative Reporting
2012-10-02
http://cironline.org/reports/report-savages-terrorism-fusion-centers-high-cost-low-value-3919
2013-10-01 21:03:21
attachment
10-2-12-psi-staff-report-re-fusion-centers.pdf
2013-10-01 21:04:10
https://s3.amazonaws.com/s3.documentcloud.org/documents/446073/10-2-12-psi-staff-report-re-fusion-centers.pdf
application/pdf
utf-8
attachment
Report savages terrorism 'fusion centers' for high cost, low value | The Center for Investigative Reporting
2013-10-01 21:03:22
http://cironline.org/reports/report-savages-terrorism-fusion-centers-high-cost-low-value-3919
text/html
utf-8
webpage
Center for Investigative Reporting
Schulz
G.W.
License Plate Reader
DEA installs license-plate recognition devices near Southwest border | The Center for Investigative Reporting
2012-07-11
http://cironline.org/reports/dea-installs-license-plate-recognition-devices-near-southwest-border-3635
2013-10-01 21:06:18
attachment
DEA installs license-plate recognition devices near Southwest border | The Center for Investigative Reporting
2013-10-01 21:06:19
http://cironline.org/reports/dea-installs-license-plate-recognition-devices-near-southwest-border-3635
text/html
utf-8
webpage
Center for Investigative Reporting
Schulz
G.W.
License Plate Reader
Police, lobbyists defeat bill to regulate license-plate scanners | The Center for Investigative Reporting
2012-06-20
http://cironline.org/reports/police-lobbyists-defeat-bill-regulate-license-plate-scanners-3605
2013-10-01 21:06:51
attachment
Police, lobbyists defeat bill to regulate license-plate scanners | The Center for Investigative Reporting
2013-10-01 21:06:52
http://cironline.org/reports/police-lobbyists-defeat-bill-regulate-license-plate-scanners-3605
text/html
utf-8
webpage
Center for Investigative Reporting
Schulz
G.W.
License Plate Reader
Private company hoarding license-plate data on US drivers | California Watch
2012-01-12
http://californiawatch.org/dailyreport/private-company-hoarding-license-plate-data-us-drivers-14379
2013-10-01 21:07:19
attachment
Private company hoarding license-plate data on US drivers | California Watch
2013-10-01 21:07:20
http://californiawatch.org/dailyreport/private-company-hoarding-license-plate-data-us-drivers-14379
text/html
utf-8
newspaperArticle
The Salt Lake Tribune
Gorrell
Mike
Utah Local News - Salt Lake City News, Sports, Archive - The Salt Lake Tribune
2011-01-07
http://www.sltrib.com/sltrib/money/50982461-79/center-construction-security-data.html.csp
2013-10-01 21:10:43
attachment
Utah Local News - Salt Lake City News, Sports, Archive - The Salt Lake Tribune
2013-10-01 21:10:44
http://www.sltrib.com/sltrib/money/50982461-79/center-construction-security-data.html.csp
text/html
utf-8
webpage
NSA
NSA PRESS RELEASE
2010 Press Release - NSA Honored at DoD's 30th Annual Disability Awards Ceremony - NSA/CSS
2011-01-06
http://www.nsa.gov/public_info/press_room/2011/utah_groundbreaking_ceremony.shtml
2013-10-01 21:12:51
Public Domain
attachment
2010 Press Release - NSA Honored at DoD's 30th Annual Disability Awards Ceremony - NSA/CSS
2013-10-01 21:12:52
http://www.nsa.gov/public_info/press_room/2011/utah_groundbreaking_ceremony.shtml
text/html
windows-1252
webpage
Center for Investigative Reporting
Schulz
G.W.
Bureaucrats can't resist celebrity snooping in government databases | The Center for Investigative Reporting
2010-10-13
http://cironline.org/blog/post/bureaucrats-cant-resist-celebrity-snooping-government-databases-821
2013-10-01 21:16:44
attachment
Bureaucrats can't resist celebrity snooping in government databases | The Center for Investigative Reporting
2013-10-01 21:16:45
http://cironline.org/blog/post/bureaucrats-cant-resist-celebrity-snooping-government-databases-821
text/html
utf-8
magazineArticle
Wired
Kraevts
David
How a Purse Snatching Led to the Legal Justification for NSA Domestic Spying | Threat Level | Wired.com
2013-10-02
http://www.wired.com/threatlevel/2013/10/nsa-smith-purse-snatching/
2013-10-02 16:22:12
attachment
How a Purse Snatching Led to the Legal Justification for NSA Domestic Spying | Threat Level | Wired.com
2013-10-02 16:22:13
http://www.wired.com/threatlevel/2013/10/nsa-smith-purse-snatching/
text/html
utf-8
webpage
CNet
Moyer
Edward
NSA, intelligence workers 'stretched to limit' by shutdown, official says | Politics and Law - CNET News
2013-10-01
http://news.cnet.com/8301-13578_3-57605526-38/nsa-intelligence-workers-stretched-to-limit-by-shutdown-official-says/
2013-10-02 16:22:54
attachment
NSA, intelligence workers 'stretched to limit' by shutdown, official says | Politics and Law - CNET News
2013-10-02 16:22:55
http://news.cnet.com/8301-13578_3-57605526-38/nsa-intelligence-workers-stretched-to-limit-by-shutdown-official-says/
text/html
utf-8
newspaperArticle
Guardian
Hopkins
Nick
Former NSA chief: western intelligence agencies must be more transparent | World news | The Guardian
2013-09-30
http://www.theguardian.com/world/2013/sep/30/nsa-director-intelligence-public-support
2013-10-02 16:23:21
attachment
Former NSA chief: western intelligence agencies must be more transparent | World news | The Guardian
2013-10-02 16:23:22
http://www.theguardian.com/world/2013/sep/30/nsa-director-intelligence-public-support
text/html
utf-8
newspaperArticle
New York Times
Savage
Charlie
N.S.A. Experiment Traced U.S. Cellphone Locations - NYTimes.com
2013-10-02
http://www.nytimes.com/2013/10/03/us/nsa-experiment-traced-us-cellphone-locations.html?hp&_r=1&
2013-10-02 16:23:49
attachment
N.S.A. Experiment Traced U.S. Cellphone Locations - NYTimes.com
2013-10-02 16:23:50
http://www.nytimes.com/2013/10/03/us/nsa-experiment-traced-us-cellphone-locations.html?hp&_r=1&
text/html
utf-8
blogPost
Techdirt
Masnick
Mike
Former DHS Chief Privacy Officer Recounts How She Was Regularly Called A 'Terrorist' By The Intelligence Community | Techdirt
2013-10-02
http://www.techdirt.com/articles/20131002/02052624725/former-dhs-chief-privacy-officer-recounts-how-she-was-regularly-called-terrorist-intelligence-community.shtml
2013-10-02 16:24:38
attachment
Former DHS Chief Privacy Officer Recounts How She Was Regularly Called A 'Terrorist' By The Intelligence Community | Techdirt
2013-10-02 16:24:39
http://www.techdirt.com/articles/20131002/02052624725/former-dhs-chief-privacy-officer-recounts-how-she-was-regularly-called-terrorist-intelligence-community.shtml
text/html
windows-1252
magazineArticle
Le Monde Diplomatique
Schiller
Dan
Whose Internet? - Le Monde diplomatique - English edition
2013-10
English
http://mondediplo.com/2013/10/09surveillance
2013-10-02 18:21:39
attachment
Backround - final draft USCIB FREE FLOW OF INFO NOI.pdf
2013-10-02 18:23:26
http://www.ntia.doc.gov/files/ntia/comments/100921457-0457-01/attachments/final%20draft%20USCIB%20FREE%20FLOW%20OF%20INFO%20NOI.pdf
application/pdf
utf-8
attachment
CommerceFreeExpressionNOIDraft - CommerceFreeExpressionNOI.pdf
2013-10-02 18:28:09
http://www.ntia.doc.gov/files/ntia/comments/100921457-0457-01/attachments/CommerceFreeExpressionNOI.pdf
application/pdf
utf-8
attachment
IPTF Global Free Flow of Information on the Internet Notice of Inquiry | NTIA
2013-10-02 18:23:16
http://www.ntia.doc.gov/federal-register-notices/2010/iptf-global-free-flow-information-internet-notice-inquiry
text/html
utf-8
attachment
Microsoft - Comments on the Free Flow of Information on the Internet - Dec 6 2010.pdf
2013-10-02 18:24:26
http://www.ntia.doc.gov/files/ntia/comments/100921457-0457-01/attachments/Microsoft%20-%20Comments%20on%20the%20Free%20Flow%20of%20Information%20on%20the%20Internet%20-%20Dec%206%202010.pdf
application/pdf
utf-8
attachment
Microsoft Word - CCIA Reply to DOC-NTIA NOI on Global Free Flow of Information.doc - CCIA Reply to DOC-NTIA NOI on Global Free Flow of Information.pdf
2013-10-02 18:28:55
http://www.ntia.doc.gov/files/ntia/comments/100921457-0457-01/attachments/CCIA%20Reply%20to%20DOC-NTIA%20NOI%20on%20Global%20Free%20Flow%20of%20Information.pdf
application/pdf
utf-8
attachment
Microsoft Word - TechAmericaResponse_DOCNOI_GlobalFreeFlowInformation_6Dec2010.doc - TechAmericaResponse_DOCNOI_GlobalFreeFlowInformation_6Dec2010._FINALpdf.pdf
2013-10-02 18:23:32
http://www.ntia.doc.gov/files/ntia/comments/100921457-0457-01/attachments/TechAmericaResponse_DOCNOI_GlobalFreeFlowInformation_6Dec2010._FINALpdf.pdf
application/pdf
utf-8
attachment
Whose Internet? - Le Monde diplomatique - English edition
2013-10-02 18:21:40
http://mondediplo.com/2013/10/09surveillance
text/html
utf-8
newspaperArticle
Guardian
Greenwald
Glenn
MacAskil
Ewen
Poitras
Laura
Ackerman
Spencer
Rushe
Dominic
Microsoft handed the NSA access to encrypted messages | World news | The Guardian
2013-07-11
http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data
2013-10-02 18:24:38
attachment
Microsoft handed the NSA access to encrypted messages | World news | The Guardian
2013-10-02 18:24:39
http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data
text/html
utf-8
newspaperArticle
Guardian
Arthur
Charles
Google is not 'in cahoots with NSA', says chief legal officer | Technology | theguardian.com
2013-06-20
http://www.theguardian.com/technology/2013/jun/19/google-drummond-nsa-interview-leaks
2013-10-02 18:28:17
attachment
Google is not 'in cahoots with NSA', says chief legal officer | Technology | theguardian.com
2013-10-02 18:28:18
http://www.theguardian.com/technology/2013/jun/19/google-drummond-nsa-interview-leaks
text/html
utf-8
newspaperArticle
Wall Street Journal
Alpert
Lukas I.
Snowden's Father Plans Trip to Russia Soon - WSJ.com
2013-10-02
http://online.wsj.com/article/SB10001424052702304906704579111140316598248.html
2013-10-02 19:03:06
attachment
Snowden's Father Plans Trip to Russia Soon - WSJ.com
2013-10-02 19:03:07
http://online.wsj.com/article/SB10001424052702304906704579111140316598248.html
text/html
utf-8
newspaperArticle
The CIO Report
Wall Street Journal
King
Rachel
NSA Involvement in NIST Encryption Standards Could Make Companies Less Competitive
2013-10-01
http://blogs.wsj.com/cio/2013/10/01/nsas-involvement-in-standards-setting-erodes-trust/?KEYWORDS=Snowden
2013-10-02 19:10:16
attachment
NSA Involvement in NIST Encryption Standards Could Make Companies Less Competitive - The CIO Report - WSJ
2013-10-02 19:10:17
http://blogs.wsj.com/cio/2013/10/01/nsas-involvement-in-standards-setting-erodes-trust/?KEYWORDS=Snowden
text/html
utf-8
newspaperArticle
Associated Press
Braun
Stephen
News from The Associated Press
2013-10-02
http://hosted.ap.org/dynamic/stories/U/US_NSA_SURVEILLANCE_SOCIAL_NETWORKS?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2013-10-02-11-33-15
2013-10-02 19:16:32
attachment
News from The Associated Press
2013-10-02 19:16:33
http://hosted.ap.org/dynamic/stories/U/US_NSA_SURVEILLANCE_SOCIAL_NETWORKS?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2013-10-02-11-33-15
text/html
windows-1252
newspaperArticle
The Washington Times
Waterman
Shaun
NSA chief admits figures on terror plots foiled by snooping are misleading - Washington Times
2013-10-02
http://www.washingtontimes.com/news/2013/oct/2/nsa-chief-figures-foiled-terror-plots-misleading/
2013-10-02 19:18:02
attachment
NSA chief admits figures on terror plots foiled by snooping are misleading - Washington Times
2013-10-02 19:18:03
http://www.washingtontimes.com/news/2013/oct/2/nsa-chief-figures-foiled-terror-plots-misleading/
text/html
utf-8
magazineArticle
New York Magazine
Wallace-Wells
Benjamin
Critics of U.S. Security State Can’t Get Visas -- Daily Intelligencer
2013-10-03
http://nymag.com/daily/intelligencer/2013/09/critics-of-us-security-state-cant-get-visas.html
2013-10-03 17:07:01
attachment
Critics of U.S. Security State Can’t Get Visas -- Daily Intelligencer
2013-10-03 17:07:02
http://nymag.com/daily/intelligencer/2013/09/critics-of-us-security-state-cant-get-visas.html
text/html
utf-8
newspaperArticle
Guardian
Bonner
Raymond
'Company A': the telecom that coached the FBI on how to spy on me | Raymond Bonner | Comment is free | theguardian.com
2013-10-03
http://www.theguardian.com/commentisfree/2013/oct/03/company-a-telecom-coached-fbi-spy
2013-10-03 21:41:29
attachment
'Company A': the telecom that coached the FBI on how to spy on me | Raymond Bonner | Comment is free | theguardian.com
2013-10-03 21:41:30
http://www.theguardian.com/commentisfree/2013/oct/03/company-a-telecom-coached-fbi-spy
text/html
utf-8
newspaperArticle
Washington Post
Gellman
Barton
Code name ‘Verax’: Snowden, in exchanges with Post reporter, made clear he knew risks - The Washington Post
2013-06-09
http://www.washingtonpost.com/world/national-security/code-name-verax-snowden-in-exchanges-with-post-reporter-made-clear-he-knew-risks/2013/06/09/c9a25b54-d14c-11e2-9f1a-1a7cdee20287_story.html
2013-10-08 15:22:57
attachment
Code name ‘Verax’: Snowden, in exchanges with Post reporter, made clear he knew risks - The Washington Post
2013-10-08 15:22:58
http://www.washingtonpost.com/world/national-security/code-name-verax-snowden-in-exchanges-with-post-reporter-made-clear-he-knew-risks/2013/06/09/c9a25b54-d14c-11e2-9f1a-1a7cdee20287_story.html
text/html
utf-8
attachment
Code name ‘Verax’: Snowden, in exchanges with Post reporter, made clear he knew risks - The Washington Post
2013-10-08 15:25:47
http://www.washingtonpost.com/world/national-security/code-name-verax-snowden-in-exchanges-with-post-reporter-made-clear-he-knew-risks/2013/06/09/c9a25b54-d14c-11e2-9f1a-1a7cdee20287_story_1.html
text/html
utf-8
newspaperArticle
Interview with Whistleblower Edward Snowden on Global Spying - SPIEGEL ONLINE
Statement by Edward Snowden to human rights groups at Moscow’s Sheremetyevo airport
2013-07-08
http://www.spiegel.de/international/world/interview-with-whistleblower-edward-snowden-on-global-spying-a-910006.html
2013-10-08 15:36:56
attachment
Edward Snowden Interview: 'US Multinationals Should Not Be Trusted' - SPIEGEL ONLINE
2013-10-08 15:38:29
http://www.spiegel.de/international/world/interview-with-whistleblower-edward-snowden-on-global-spying-a-910006-2.html
text/html
windows-1252
attachment
Interview with Whistleblower Edward Snowden on Global Spying - SPIEGEL ONLINE
2013-10-08 15:36:57
http://www.spiegel.de/international/world/interview-with-whistleblower-edward-snowden-on-global-spying-a-910006.html
text/html
windows-1252
newspaperArticle
South China Morning Post
Lam
Lana
EXCLUSIVE: Whistle-blower Edward Snowden talks to South China Morning Post | South China Morning Post
2013-06-13
http://www.scmp.com/news/hong-kong/article/1259335/exclusive-whistle-blower-edward-snowden-talks-south-china-morning
2013-10-08 15:45:15
attachment
EXCLUSIVE: Whistle-blower Edward Snowden talks to South China Morning Post | South China Morning Post
2013-10-08 15:45:16
http://www.scmp.com/news/hong-kong/article/1259335/exclusive-whistle-blower-edward-snowden-talks-south-china-morning
text/html
utf-8
newspaperArticle
South China Morning Post
Lam
Lana
Whistle-blower Edward Snowden tells SCMP: 'Let Hong Kong people decide my fate' | South China Morning Post
2013-06-13
http://www.scmp.com/news/hong-kong/article/1259422/edward-snowden-let-hong-kong-people-decide-my-fate
2013-10-08 15:51:13
attachment
Whistle-blower Edward Snowden tells SCMP: 'Let Hong Kong people decide my fate' | South China Morning Post
2013-10-08 15:51:14
http://www.scmp.com/news/hong-kong/article/1259422/edward-snowden-let-hong-kong-people-decide-my-fate
text/html
utf-8
newspaperArticle
Washington Post
Gellman
Barton
Edward Snowden comes forward as source of NSA leaks - The Washington Post
2013-06-09
http://www.washingtonpost.com/politics/intelligence-leaders-push-back-on-leakers-media/2013/06/09/fff80160-d122-11e2-a73e-826d299ff459_story.html
2013-10-08 15:59:28
attachment
Edward Snowden comes forward as source of NSA leaks - The Washington Post
2013-10-08 15:59:29
http://www.washingtonpost.com/politics/intelligence-leaders-push-back-on-leakers-media/2013/06/09/fff80160-d122-11e2-a73e-826d299ff459_story.html
text/html
utf-8
attachment
Edward Snowden comes forward as source of NSA leaks - The Washington Post
2013-10-08 16:00:06
http://www.washingtonpost.com/politics/intelligence-leaders-push-back-on-leakers-media/2013/06/09/fff80160-d122-11e2-a73e-826d299ff459_story_1.html
text/html
utf-8
attachment
Edward Snowden comes forward as source of NSA leaks - The Washington Post
2013-10-08 16:00:11
http://www.washingtonpost.com/politics/intelligence-leaders-push-back-on-leakers-media/2013/06/09/fff80160-d122-11e2-a73e-826d299ff459_story_2.html
text/html
utf-8
newspaperArticle
Guardian
Greenwald
Glenn
Edward Snowden: the whistleblower behind the NSA surveillance revelations | World news | The Guardian
2013-06-09
http://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance
2013-10-08 16:09:43
attachment
Edward Snowden: the whistleblower behind the NSA surveillance revelations | World news | The Guardian
2013-10-08 16:09:44
http://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance
text/html
utf-8
newspaperArticle
BBC
BBC staff
BBC News - US leaker Edward Snowden 'defending liberty'
2013-06-10
en-GB
http://www.bbc.co.uk/news/world-us-canada-22842837
2013-10-08 16:22:54
attachment
BBC News - US leaker Edward Snowden 'defending liberty'
2013-10-08 16:22:55
http://www.bbc.co.uk/news/world-us-canada-22842837
text/html
utf-8
newspaperArticle
Guardian
Edward Snowden: NSA whistleblower answers reader questions | World news | theguardian.com
2013-06-17
http://www.theguardian.com/world/2013/jun/17/edward-snowden-nsa-files-whistleblower
2013-10-08 16:29:43
attachment
Edward Snowden: NSA whistleblower answers reader questions | World news | theguardian.com
2013-10-08 16:29:44
http://www.theguardian.com/world/2013/jun/17/edward-snowden-nsa-files-whistleblower
text/html
utf-8
newspaperArticle
South China Morning Post
Lam
Lana
Snowden sought Booz Allen job to gather evidence on NSA surveillance | South China Morning Post
2013-06-25
http://www.scmp.com/news/hong-kong/article/1268209/snowden-sought-booz-allen-job-gather-evidence-nsa-surveillance
2013-10-08 16:30:31
attachment
Snowden sought Booz Allen job to gather evidence on NSA surveillance | South China Morning Post
2013-10-08 16:30:32
http://www.scmp.com/news/hong-kong/article/1268209/snowden-sought-booz-allen-job-gather-evidence-nsa-surveillance
text/html
utf-8
webpage
Wikileaks
Snowden
Edward Joseph
Statement by Edward Snowden to human rights groups at Moscow’s Sheremetyevo airport
2013-07-12
http://wikileaks.org/Statement-by-Edward-Snowden-to.html
2013-10-08 16:33:50
attachment
Statement by Edward Snowden to human rights groups at Moscow’s Sheremetyevo airport
2013-10-08 16:33:51
http://wikileaks.org/Statement-by-Edward-Snowden-to.html
text/html
utf-8
webpage
CNN
Smith
Matt
Pearson
Michael
Feds start building case against NSA leaker - CNN.com
2013-06-11
http://edition.cnn.com/2013/06/10/politics/nsa-leak/index.html
2013-10-08 16:43:30
attachment
Feds start building case against NSA leaker - CNN.com
2013-10-08 16:43:31
http://edition.cnn.com/2013/06/10/politics/nsa-leak/index.html
text/html
utf-8
book
Philadelphia
R. Bell
Paine
Thomas
Common Sense
1776-01-10
http://www.gutenberg.org/files/3755/3755-h/3755-h.htm
2013-10-08 17:25:16
Public Domain
attachment
The Project Gutenberg E-text of The Writings of Thomas Paine, Volume 1
2013-10-08 17:25:17
http://www.gutenberg.org/files/3755/3755-h/3755-h.htm
text/html
windows-1252
book
Gibbon
Edward
History Of The Decline And Fall Of The Roman Empire
1
6
Revised (1845
1782
English
The Decline And Fall Of The Roman Empire
http://www.gutenberg.org/files/731/731-h/731-h.htm#link32HCH0001
2013-10-08 17:28:08
Public Domain
attachment
History Of The Decline And Fall Of The Roman Empire, Volume 1 by Edward Gibbon,
2013-10-08 17:28:09
http://www.gutenberg.org/files/731/731-h/731-h.htm#link32HCH0001
text/html
windows-1252
newspaperArticle
Der Spiegel
BND lässt sich Abhören von Verbindungen deutscher Provider genehmigen - SPIEGEL ONLINE
2013-10-06
German
http://www.spiegel.de/spiegel/vorab/bnd-laesst-sich-abhoeren-von-verbindungen-deutscher-provider-genehmigen-a-926221.html
2013-10-08 18:45:49
attachment
BND lässt sich Abhören von Verbindungen deutscher Provider genehmigen - SPIEGEL ONLINE
2013-10-08 18:45:50
http://www.spiegel.de/spiegel/vorab/bnd-laesst-sich-abhoeren-von-verbindungen-deutscher-provider-genehmigen-a-926221.html
text/html
windows-1252
attachment
[Google Translate] BND can authorize interception of connections German provider
2013-10-08 18:46:54
http://translate.google.com/translate?sl=de&tl=en&js=n&prev=_t&hl=en&ie=UTF-8&u=http%3A%2F%2Fwww.spiegel.de%2Fspiegel%2Fvorab%2Fbnd-laesst-sich-abhoeren-von-verbindungen-deutscher-provider-genehmigen-a-926221.html
text/html
utf-8
blogPost
Ars Technica
Farivar
Cyrus
German NSA has deal to tap ISPs at major Internet Exchange | Ars Technica
2013-10-07
http://arstechnica.com/tech-policy/2013/10/german-nsa-has-deal-to-tap-isps-at-major-internet-exchange/
2013-10-08 18:47:56
attachment
German NSA has deal to tap ISPs at major Internet Exchange | Ars Technica
2013-10-08 18:47:57
http://arstechnica.com/tech-policy/2013/10/german-nsa-has-deal-to-tap-isps-at-major-internet-exchange/
text/html
utf-8
blogPost
Ars Technica
Brodkin
Jon
Meltdowns at NSA spy data center destroy equipment, delay opening | Ars Technica
2013-10-08
http://arstechnica.com/information-technology/2013/10/meltdowns-at-nsa-spy-data-center-destroy-equipment-delay-opening/
2013-10-08 18:50:00
attachment
Meltdowns at NSA spy data center destroy equipment, delay opening | Ars Technica
2013-10-08 18:50:01
http://arstechnica.com/information-technology/2013/10/meltdowns-at-nsa-spy-data-center-destroy-equipment-delay-opening/
text/html
utf-8
newspaperArticle
Foreign Policy
Harris
Shane
Hostile Takeover: Now The NSA Wants To Snoop on Wall Street, Too | Killer Apps
2013-10-08
http://killerapps.foreignpolicy.com/posts/2013/10/08/hostile_takeover_now_the_nsa_wants_to_watch_wall_streets_networks_too
2013-10-08 20:47:41
attachment
Hostile Takeover: Now The NSA Wants To Snoop on Wall Street, Too | Killer Apps
2013-10-08 20:47:42
http://killerapps.foreignpolicy.com/posts/2013/10/08/hostile_takeover_now_the_nsa_wants_to_watch_wall_streets_networks_too
text/html
utf-8
webpage
How the U.S. Is Spreading 'Procedures of Totalitarianism' - Politics - The Atlantic
http://www.theatlantic.com/politics/print/2013/10/how-the-us-is-spreading-procedures-of-totalitarianism/280454/
2013-10-11 21:35:53
attachment
How the U.S. Is Spreading 'Procedures of Totalitarianism' - Politics - The Atlantic
2013-10-11 21:35:54
http://www.theatlantic.com/politics/print/2013/10/how-the-us-is-spreading-procedures-of-totalitarianism/280454/
text/html
utf-8
webpage
N.S.A. Director Firmly Defends Surveillance Efforts - NYTimes.com
http://www.nytimes.com/2013/10/13/us/nsa-director-gives-firm-and-broad-defense-of-surveillance-efforts.html?pagewanted=2&_r=0&smid=re-share&pagewanted=all
2013-10-14 18:47:21
attachment
N.S.A. Director Firmly Defends Surveillance Efforts - NYTimes.com
2013-10-14 18:47:22
http://www.nytimes.com/2013/10/13/us/nsa-director-gives-firm-and-broad-defense-of-surveillance-efforts.html?pagewanted=2&_r=0&smid=re-share&pagewanted=all
text/html
utf-8
webpage
IBM researcher can decipher your personality from looking at 200 of your tweets | VentureBeat
http://venturebeat.com/2013/10/08/ibm-researcher-can-decipher-your-personality-in-200-tweets/
2013-10-14 18:47:33
attachment
IBM researcher can decipher your personality from looking at 200 of your tweets | VentureBeat
2013-10-14 18:47:34
http://venturebeat.com/2013/10/08/ibm-researcher-can-decipher-your-personality-in-200-tweets/
text/html
utf-8
webpage
Greenwald
Glenn
The perfect epitaph for establishment journalism | Glenn Greenwald | Comment is free | theguardian.com
2013-10-14
http://www.theguardian.com/commentisfree/2013/oct/14/independent-epitaph-establishment-journalism
2013-10-14 18:47:50
attachment
The perfect epitaph for establishment journalism | Glenn Greenwald | Comment is free | theguardian.com
2013-10-14 18:47:51
http://www.theguardian.com/commentisfree/2013/oct/14/independent-epitaph-establishment-journalism
text/html
utf-8
webpage
Wired Opinion
Stallman
Richard
Stallman: How Much Surveillance Can Democracy Withstand? | Wired Opinion | Wired.com
2013-10-14
http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/
2013-10-14 18:47:59
attachment
Stallman: How Much Surveillance Can Democracy Withstand? | Wired Opinion | Wired.com
2013-10-14 18:48:00
http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/
text/html
utf-8
webpage
Growing backlash to government surveillance - Yahoo News
http://news.yahoo.com/growing-backlash-government-surveillance-133706289.html
2013-10-14 18:53:53
attachment
Growing backlash to government surveillance - Yahoo News
2013-10-14 18:53:54
http://news.yahoo.com/growing-backlash-government-surveillance-133706289.html
text/html
utf-8
webpage
torrentfreak
Falkvinge
Rick
The Copyright Monopoly Can Only Be Enforced With Mass Wiretapping, And Must Therefore Be Torpedoed | TorrentFreak
2013-10-13
http://torrentfreak.com/copyright-monopoly-must-be-torpedoed-131013/
2013-10-14 18:54:00
attachment
The Copyright Monopoly Can Only Be Enforced With Mass Wiretapping, And Must Therefore Be Torpedoed | TorrentFreak
2013-10-14 18:54:01
http://torrentfreak.com/copyright-monopoly-must-be-torpedoed-131013/
text/html
utf-8
webpage
Schneier on Security: Fingerprinting Burner Phones
https://www.schneier.com/blog/archives/2013/10/fingerprinting_5.html
2013-10-14 18:54:05
attachment
Schneier on Security: Fingerprinting Burner Phones
2013-10-14 18:54:06
https://www.schneier.com/blog/archives/2013/10/fingerprinting_5.html
text/html
utf-8
webpage
New York Times
Sullivan
Margaret
The Disconnect on Anonymous Sources - NYTimes.com
2013-10-12
http://www.nytimes.com/2013/10/13/opinion/sunday/the-public-editor-the-disconnect-on-anonymous-sources.html?smid=tw-share
2013-10-14 18:54:32
attachment
The Disconnect on Anonymous Sources - NYTimes.com
2013-10-14 18:54:33
http://www.nytimes.com/2013/10/13/opinion/sunday/the-public-editor-the-disconnect-on-anonymous-sources.html?smid=tw-share
text/html
utf-8
webpage
GCHQ accused of monitoring privileged emails between lawyers and clients | UK news | The Guardian
http://www.theguardian.com/uk-news/2013/oct/13/gchq-accused-monitoring-privileged-emails-lawyer-client-libya?CMP=twt_gu
2013-10-14 18:54:36
attachment
GCHQ accused of monitoring privileged emails between lawyers and clients | UK news | The Guardian
2013-10-14 18:54:37
http://www.theguardian.com/uk-news/2013/oct/13/gchq-accused-monitoring-privileged-emails-lawyer-client-libya?CMP=twt_gu
text/html
utf-8
webpage
Wired UK
Greere
Duncan
The US is losing control of the internet (Wired UK)
2013-10-12
http://www.wired.co.uk/news/archive/2013-10/12/us-internet-control
2013-10-14 18:54:48
en-GB
attachment
The US is losing control of the internet (Wired UK)
2013-10-14 18:54:49
http://www.wired.co.uk/news/archive/2013-10/12/us-internet-control
text/html
utf-8
webpage
Ehley
Brianna
$2 Billion NSA Spy Center is Going Up in Flames | The Fiscal Times
2013-10-08
http://www.thefiscaltimes.com/Articles/2013/10/08/2-Billion-NSA-Spy-Center-Going-Flames
2013-10-14 18:55:32
attachment
$2 Billion NSA Spy Center is Going Up in Flames | The Fiscal Times
2013-10-14 18:55:33
http://www.thefiscaltimes.com/Articles/2013/10/08/2-Billion-NSA-Spy-Center-Going-Flames
text/html
utf-8
webpage
Fox News Latino
U.S. Monitors Latin American Communications At Will, Wikileaks' Julian Assange Says | Fox News Latino
2013-10-12
http://latino.foxnews.com/latino/news/2013/10/11/us-monitors-latam-communications-at-will-assange-says/?utm_source=dlvr.it&utm_medium=twitter
2013-10-14 18:55:46
attachment
U.S. Monitors Latin American Communications At Will, Wikileaks' Julian Assange Says | Fox News Latino
2013-10-14 18:55:47
http://latino.foxnews.com/latino/news/2013/10/11/us-monitors-latam-communications-at-will-assange-says/?utm_source=dlvr.it&utm_medium=twitter
text/html
utf-8
webpage
The Star
Malick
Heather
The PR fight to convince you privacy is worthless | Toronto Star
2013-10-11
http://www.thestar.com/news/gta/2013/10/11/the_pr_fight_to_convince_you_privacy_is_worthless.html
2013-10-14 18:55:53
attachment
The PR fight to convince you privacy is worthless | Toronto Star
2013-10-14 18:55:54
http://www.thestar.com/news/gta/2013/10/11/the_pr_fight_to_convince_you_privacy_is_worthless.html
text/html
utf-8
webpage
Leave oversight of surveillance to the judges | David Bickford | Comment is free | The Guardian
http://www.theguardian.com/commentisfree/2013/oct/11/mi5-public-open-mind-secrecy-security
2013-10-14 18:56:49
attachment
Leave oversight of surveillance to the judges | David Bickford | Comment is free | The Guardian
2013-10-14 18:56:50
http://www.theguardian.com/commentisfree/2013/oct/11/mi5-public-open-mind-secrecy-security
text/html
utf-8
webpage
Ackerman
Elise
AT&T-Backed Report Prompts Question: Should The U.S. Get Rid Of Phone Lines? - Forbes
2013-10-11
http://www.forbes.com/sites/eliseackerman/2013/10/11/att-backed-report-prompts-question-should-the-u-s-get-rid-of-phone-lines/
2013-10-14 18:57:45
attachment
AT&T-Backed Report Prompts Question: Should The U.S. Get Rid Of Phone Lines? - Forbes
2013-10-14 18:57:46
http://www.forbes.com/sites/eliseackerman/2013/10/11/att-backed-report-prompts-question-should-the-u-s-get-rid-of-phone-lines/
text/html
utf-8
webpage
GCHQ mass surveillance putting right to challenge state at risk, say lawyers | UK news | The Guardian
http://www.theguardian.com/law/2013/oct/13/gchq-surveillance-right-challenge-state-law
2013-10-14 19:01:49
attachment
GCHQ mass surveillance putting right to challenge state at risk, say lawyers | UK news | The Guardian
2013-10-14 19:01:50
http://www.theguardian.com/law/2013/oct/13/gchq-surveillance-right-challenge-state-law
text/html
utf-8
webpage
Rushe
Dominic
Zuckerberg: US government 'blew it' on NSA surveillance | Technology | theguardian.com
2013-09-11
http://www.theguardian.com/technology/2013/sep/11/yahoo-ceo-mayer-jail-nsa-surveillance
2013-10-17 15:24:12
attachment
Zuckerberg: US government 'blew it' on NSA surveillance | Technology | theguardian.com
2013-10-17 15:24:13
http://www.theguardian.com/technology/2013/sep/11/yahoo-ceo-mayer-jail-nsa-surveillance
text/html
utf-8
webpage
Mark Zuckerberg: U.S. gov't 'blew it' on communicating NSA actions | ZDNet
http://www.zdnet.com/mark-zuckerberg-u-s-govt-blew-it-on-communicating-nsa-actions-7000020514/
2013-10-17 15:25:20
attachment
Mark Zuckerberg: U.S. gov't 'blew it' on communicating NSA actions | ZDNet
2013-10-17 15:25:21
http://www.zdnet.com/mark-zuckerberg-u-s-govt-blew-it-on-communicating-nsa-actions-7000020514/
text/html
utf-8
webpage
EXCLUSIVE: Owner of Snowden’s Email Service on Why He Closed Lavabit Rather Than Comply With Gov’t | Democracy Now!
http://www.democracynow.org/2013/8/13/exclusive_owner_of_snowdens_email_service
2013-10-17 15:25:50
attachment
EXCLUSIVE: Owner of Snowden’s Email Service on Why He Closed Lavabit Rather Than Comply With Gov’t | Democracy Now!
2013-10-17 15:25:51
http://www.democracynow.org/2013/8/13/exclusive_owner_of_snowdens_email_service
text/html
utf-8
webpage
Former Internet Provider Gagged by National Security Letter Recounts How He Was Silenced for 6 Years | Democracy Now!
http://www.democracynow.org/2013/8/13/former_internet_provider_gagged_by_national
2013-10-17 15:26:04
attachment
Former Internet Provider Gagged by National Security Letter Recounts How He Was Silenced for 6 Years | Democracy Now!
2013-10-17 15:26:05
http://www.democracynow.org/2013/8/13/former_internet_provider_gagged_by_national
text/html
utf-8
webpage
James Bamford on NSA Secrets, Keith Alexander’s Influence & Massive Growth of Surveillance, Cyberwar | Democracy Now!
http://www.democracynow.org/2013/6/14/james_bamford_on_nsa_secrets_keith
2013-10-17 15:26:12
attachment
James Bamford on NSA Secrets, Keith Alexander’s Influence & Massive Growth of Surveillance, Cyberwar | Democracy Now!
2013-10-17 15:26:13
http://www.democracynow.org/2013/6/14/james_bamford_on_nsa_secrets_keith
text/html
utf-8
webpage
How NSA’s cyber sabotage puts us all at risk | American Civil Liberties Union
https://www.aclu.org/blog/national-security/how-nsas-cyber-sabotage-puts-us-all-risk
2013-10-17 15:30:22
attachment
How NSA’s cyber sabotage puts us all at risk | American Civil Liberties Union
2013-10-17 15:30:23
https://www.aclu.org/blog/national-security/how-nsas-cyber-sabotage-puts-us-all-risk
text/html
utf-8
webpage
SPIEGEL ONLINE
SPIEGEL Exclusive: NSA Spies on International Bank Transactions - SPIEGEL ONLINE
2013-09-15
http://www.spiegel.de/international/world/spiegel-exclusive-nsa-spies-on-international-bank-transactions-a-922276.html
2013-10-17 15:32:11
attachment
SPIEGEL Exclusive: NSA Spies on International Bank Transactions - SPIEGEL ONLINE
2013-10-17 15:32:12
http://www.spiegel.de/international/world/spiegel-exclusive-nsa-spies-on-international-bank-transactions-a-922276.html
text/html
windows-1252
webpage
Report: Documents show NSA involvement in drone program
http://www.usatoday.com/story/news/politics/2013/10/16/nsa-drone-campaign-cia/2998439/
2013-10-17 16:28:37
attachment
Report: Documents show NSA involvement in drone program
2013-10-17 16:28:38
http://www.usatoday.com/story/news/politics/2013/10/16/nsa-drone-campaign-cia/2998439/
text/html
utf-8
webpage
NSA director Keith Alexander and deputy expected to depart in early 2014 | World news | theguardian.com
http://www.theguardian.com/world/2013/oct/16/nsa-director-keith-alexander-depart
2013-10-17 16:45:09
attachment
NSA director Keith Alexander and deputy expected to depart in early 2014 | World news | theguardian.com
2013-10-17 16:45:10
http://www.theguardian.com/world/2013/oct/16/nsa-director-keith-alexander-depart
text/html
utf-8
webpage
‘Individual privacy vs collective security’? NO! | Paul Bernal's Blog
http://paulbernal.wordpress.com/2013/10/17/individual-privacy-vs-collective-security-no/
2013-10-17 16:45:41
attachment
‘Individual privacy vs collective security’? NO! | Paul Bernal's Blog
2013-10-17 16:45:42
http://paulbernal.wordpress.com/2013/10/17/individual-privacy-vs-collective-security-no/
text/html
utf-8
webpage
Documents reveal NSA’s extensive involvement in targeted killing program - The Washington Post
http://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html
2013-10-17 16:46:08
attachment
Documents reveal NSA’s extensive involvement in targeted killing program - The Washington Post
2013-10-17 16:46:09
http://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html
text/html
utf-8
webpage
Edward Snowden's father pleased with son's Moscow life - CNN.com
http://edition.cnn.com/2013/10/16/world/europe/russia-snowden-dad/index.html?eref=edition&utm_source=dlvr.it&utm_medium=twitter
2013-10-17 16:46:15
attachment
Edward Snowden's father pleased with son's Moscow life - CNN.com
2013-10-17 16:46:16
http://edition.cnn.com/2013/10/16/world/europe/russia-snowden-dad/index.html?eref=edition&utm_source=dlvr.it&utm_medium=twitter
text/html
utf-8
webpage
The Risks Digest - ACM Committee on Computers and Public Policy
The Risks Digest Volume 27: Issue 54
2013-10-16
http://catless.ncl.ac.uk/Risks/27.54.html#subj1
2013-10-17 16:47:46
attachment
The Risks Digest Volume 27: Issue 54
2013-10-17 16:47:47
http://catless.ncl.ac.uk/Risks/27.54.html#subj1
text/html
utf-8
webpage
Security Researchers Claim Apple Technically Capable Of Intercepting iMessages | TechCrunch
http://techcrunch.com/2013/09/19/security-researchers-claim-apple-others-technically-capable-of-intercepting-imessages/
2013-10-17 16:51:18
attachment
Security Researchers Claim Apple Technically Capable Of Intercepting iMessages | TechCrunch
2013-10-17 16:51:19
http://techcrunch.com/2013/09/19/security-researchers-claim-apple-others-technically-capable-of-intercepting-imessages/
text/html
utf-8
webpage
Reuters
Carew
Sinead
Verizon executive says tech firms 'grandstanding' over NSA: report | Reuters
2013-09-18
http://www.reuters.com/article/2013/09/18/us-usa-surveilliance-verizon-idUSBRE98H15U20130918
2013-10-17 16:51:28
attachment
Verizon executive says tech firms 'grandstanding' over NSA: report | Reuters
2013-10-17 16:51:29
http://www.reuters.com/article/2013/09/18/us-usa-surveilliance-verizon-idUSBRE98H15U20130918
text/html
utf-8
webpage
Phone companies remain silent over legality of NSA data collection | World news | theguardian.com
http://www.theguardian.com/world/2013/sep/18/phone-companies-silent-nsa-data-collection
2013-10-17 16:53:27
attachment
Phone companies remain silent over legality of NSA data collection | World news | theguardian.com
2013-10-17 16:53:28
http://www.theguardian.com/world/2013/sep/18/phone-companies-silent-nsa-data-collection
text/html
utf-8
webpage
ABC News
Starbucks wi-fi more secure than Pentagon network, US defence official says in 9/11 trial - ABC News (Australian Broadcasting Corporation)
2013-09-20
http://www.abc.net.au/news/2013-09-20/starbucks-wifi-was-more-secure-than-pentagon-system/4970660
2013-10-17 16:54:52
attachment
Starbucks wi-fi more secure than Pentagon network, US defence official says in 9/11 trial - ABC News (Australian Broadcasting Corporation)
2013-10-17 16:54:53
http://www.abc.net.au/news/2013-09-20/starbucks-wifi-was-more-secure-than-pentagon-system/4970660
text/html
utf-8
webpage
Report: Britain hacked Belgian telecom operator
http://bigstory.ap.org/article/report-britain-hacked-belgian-telecom-operator
2013-10-17 16:55:09
attachment
Report: Britain hacked Belgian telecom operator
2013-10-17 16:55:10
http://bigstory.ap.org/article/report-britain-hacked-belgian-telecom-operator
text/html
utf-8
webpage
Justice Dept. watchdog never probed judges' NSA concerns
http://www.usatoday.com/story/news/nation/2013/09/19/nsa-surveillance-justice-opr-investigation/2805867/
2013-10-17 16:55:14
attachment
Justice Dept. watchdog never probed judges' NSA concerns
2013-10-17 16:55:15
http://www.usatoday.com/story/news/nation/2013/09/19/nsa-surveillance-justice-opr-investigation/2805867/
text/html
utf-8
webpage
NSA Sends Letter to Its ‘Extended’ Family to Reassure Them That They Will ‘Weather’ This ‘Storm’ | The Dissenter
http://dissenter.firedoglake.com/2013/09/19/nsa-sends-letter-to-its-extended-family-to-reassure-them-that-they-will-weather-this-storm/
2013-10-17 16:55:58
attachment
NSA Sends Letter to Its ‘Extended’ Family to Reassure Them That They Will ‘Weather’ This ‘Storm’ | The Dissenter
2013-10-17 16:55:59
http://dissenter.firedoglake.com/2013/09/19/nsa-sends-letter-to-its-extended-family-to-reassure-them-that-they-will-weather-this-storm/
text/html
utf-8
webpage
Close the N.S.A.’s Back Doors - NYTimes.com
2013-09-21
http://www.nytimes.com/2013/09/22/opinion/sunday/close-the-nsas-back-doors.html?_r=0&adxnnl=1&adxnnlx=1382027349-C0Co+2evwxWmzirYIbDzLQ
2013-10-17 16:56:48
attachment
Close the N.S.A.’s Back Doors - NYTimes.com
2013-10-17 16:56:49
http://www.nytimes.com/2013/09/22/opinion/sunday/close-the-nsas-back-doors.html?_r=0&adxnnl=1&adxnnlx=1382027349-C0Co+2evwxWmzirYIbDzLQ
text/html
utf-8
webpage
Highways Agency tracks millions of motorists' handsets in 'smart' trials - Telegraph
http://www.telegraph.co.uk/motoring/10324356/Highways-Agency-tracks-millions-of-motorists-handsets-in-smart-trials.html
2013-10-17 16:57:32
attachment
Highways Agency tracks millions of motorists' handsets in 'smart' trials - Telegraph
2013-10-17 16:57:33
http://www.telegraph.co.uk/motoring/10324356/Highways-Agency-tracks-millions-of-motorists-handsets-in-smart-trials.html
text/html
utf-8
webpage
Post-PRISM, Google Confirms Quietly Moving To Make All Searches Secure, Except For Ad Clicks
http://searchengineland.com/post-prism-google-secure-searches-172487
2013-10-17 17:04:56
attachment
Post-PRISM, Google Confirms Quietly Moving To Make All Searches Secure, Except For Ad Clicks
2013-10-17 17:04:57
http://searchengineland.com/post-prism-google-secure-searches-172487
text/html
utf-8
webpage
Declassified Documents Reveal NSA Spying On Martin Luther King, Senators, And Journalists During Cold War - Business Insider
http://www.businessinsider.com/nsa-spying-cold-war-declassified-2013-9
2013-10-17 17:08:12
attachment
Declassified Documents Reveal NSA Spying On Martin Luther King, Senators, And Journalists During Cold War - Business Insider
2013-10-17 17:08:13
http://www.businessinsider.com/nsa-spying-cold-war-declassified-2013-9
text/html
utf-8
webpage
NSA leaks ‘extremely damaging,’ national intelligence director tells Senate hearing - The Washington Post
http://www.washingtonpost.com/world/national-security/nsa-leaks-extremely-damaging-national-intelligence-director-tells-senate-hearing/2013/09/26/a01b4e08-26d3-11e3-b75d-5b7f66349852_story.html?hpid=z5
2013-10-17 17:08:57
attachment
NSA leaks ‘extremely damaging,’ national intelligence director tells Senate hearing - The Washington Post
2013-10-17 17:08:58
http://www.washingtonpost.com/world/national-security/nsa-leaks-extremely-damaging-national-intelligence-director-tells-senate-hearing/2013/09/26/a01b4e08-26d3-11e3-b75d-5b7f66349852_story.html?hpid=z5
text/html
utf-8
webpage
Declassified FISA court documents on intelligence collection - The Washington Post
http://apps.washingtonpost.com/g/page/world/declassified-fisa-court-documents-on-intelligence-collection/447/
2013-10-17 17:09:27
attachment
Declassified FISA court documents on intelligence collection - The Washington Post
2013-10-17 17:09:28
http://apps.washingtonpost.com/g/page/world/declassified-fisa-court-documents-on-intelligence-collection/447/
text/html
utf-8
webpage
Past as prologue? Vietnam-era spying by NSA comes to light | Politics and Law - CNET News
http://news.cnet.com/8301-13578_3-57604838-38/past-as-prologue-vietnam-era-spying-by-nsa-comes-to-light/
2013-10-17 17:09:42
attachment
Past as prologue? Vietnam-era spying by NSA comes to light | Politics and Law - CNET News
2013-10-17 17:09:43
http://news.cnet.com/8301-13578_3-57604838-38/past-as-prologue-vietnam-era-spying-by-nsa-comes-to-light/
text/html
utf-8
webpage
Secret Cold War Documents Reveal NSA Spied on Senators - By Matthew M. Aid and William Burr | Foreign Policy
http://www.foreignpolicy.com/articles/2013/09/25/it_happened_here_NSA_spied_on_senators_1970s
2013-10-17 17:09:53
attachment
Secret Cold War Documents Reveal NSA Spied on Senators - By Matthew M. Aid and William Burr | Foreign Policy
2013-10-17 17:09:54
http://www.foreignpolicy.com/articles/2013/09/25/it_happened_here_NSA_spied_on_senators_1970s
text/html
utf-8
webpage
Have a Nice Day, N.S.A. - NYTimes.com
http://www.nytimes.com/2013/09/27/opinion/have-a-nice-day-nsa.html?hp&_r=0
2013-10-17 17:13:46
attachment
Have a Nice Day, N.S.A. - NYTimes.com
2013-10-17 17:13:47
http://www.nytimes.com/2013/09/27/opinion/have-a-nice-day-nsa.html?hp&_r=0
text/html
utf-8
webpage
The Daily Beast
Garman
Emma
What the Spies Knew: The Secret World of Anglo-American Intelligence - The Daily Beast
2013-09-21
http://www.thedailybeast.com/articles/2013/09/21/what-the-spies-knew-the-secret-world-of-anglo-american-intelligence.html?utm_source=buffer&utm_campaign=Buffer&utm_content=buffer1cba9&utm_medium=twitter
2013-10-17 17:14:55
attachment
What the Spies Knew: The Secret World of Anglo-American Intelligence - The Daily Beast
2013-10-17 17:14:56
http://www.thedailybeast.com/articles/2013/09/21/what-the-spies-knew-the-secret-world-of-anglo-american-intelligence.html?utm_source=buffer&utm_campaign=Buffer&utm_content=buffer1cba9&utm_medium=twitter
text/html
utf-8
webpage
Franceschi-Bicchierai
Lorenzo
Amendment to Defund NSA Phone Surveillance Program Is Defeated
2013-07-24
http://mashable.com/2013/07/24/amendment-defund-nsa-phone-surveillance-program-defeated/
2013-10-17 17:17:57
attachment
Amendment to Defund NSA Phone Surveillance Program Is Defeated
2013-10-17 17:17:58
http://mashable.com/2013/07/24/amendment-defund-nsa-phone-surveillance-program-defeated/
text/html
utf-8
webpage
Dianne Feinstein Accidentally Confirms That NSA Tapped The Internet Backbone | Techdirt
http://www.techdirt.com/articles/20130927/13562624678/dianne-feinstein-accidentally-confirms-that-nsa-tapped-internet-backbone.shtml
2013-10-17 17:18:15
attachment
Dianne Feinstein Accidentally Confirms That NSA Tapped The Internet Backbone | Techdirt
2013-10-17 17:18:16
http://www.techdirt.com/articles/20130927/13562624678/dianne-feinstein-accidentally-confirms-that-nsa-tapped-internet-backbone.shtml
text/html
windows-1252
webpage
Branfman
Fred
America’s creeping police state - Salon.com
2013-09-27
http://www.salon.com/2013/09/27/americas_terrifying_future_as_a_police_state_partner/
2013-10-17 17:19:15
attachment
America’s creeping police state - Salon.com
2013-10-17 17:19:16
http://www.salon.com/2013/09/27/americas_terrifying_future_as_a_police_state_partner/
text/html
utf-8
webpage
Metadata May Not Catch Many Terrorists, But It's Great at Busting Journalists' Sources | FP Passport
http://blog.foreignpolicy.com/posts/2013/09/24/metadata_may_not_catch_many_terrorists_but_its_great_at_busting_journalists_sources
2013-10-17 17:20:16
attachment
Metadata May Not Catch Many Terrorists, But It's Great at Busting Journalists' Sources | FP Passport
2013-10-17 17:20:17
http://blog.foreignpolicy.com/posts/2013/09/24/metadata_may_not_catch_many_terrorists_but_its_great_at_busting_journalists_sources
text/html
utf-8
webpage
How Congress Screwed Up America's Security Clearance System - By Rebecca LaFlure | Foreign Policy
http://www.foreignpolicy.com/articles/2013/10/01/how_congress_screwed_up_americas_security_clearance_system
2013-10-17 17:20:29
attachment
How Congress Screwed Up America's Security Clearance System - By Rebecca LaFlure | Foreign Policy
2013-10-17 17:20:30
http://www.foreignpolicy.com/articles/2013/10/01/how_congress_screwed_up_americas_security_clearance_system
text/html
utf-8
webpage
NSA had test project to collect data on Americans’ cellphone locations, director says - The Washington Post
http://www.washingtonpost.com/world/national-security/nsa-had-test-project-to-collect-data-on-americans-cellphone-locations-director-says/2013/10/02/65076278-2b71-11e3-8ade-a1f23cda135e_story.html?Post+generic=%3Ftid%3Dsm_twitter_washingtonpost
2013-10-17 17:21:49
attachment
NSA had test project to collect data on Americans’ cellphone locations, director says - The Washington Post
2013-10-17 17:21:50
http://www.washingtonpost.com/world/national-security/nsa-had-test-project-to-collect-data-on-americans-cellphone-locations-director-says/2013/10/02/65076278-2b71-11e3-8ade-a1f23cda135e_story.html?Post+generic=%3Ftid%3Dsm_twitter_washingtonpost
text/html
utf-8
webpage
BBC News - US spy chief: Shutdown 'damaging'
2013-10-02
http://www.bbc.co.uk/news/world-us-canada-24373300
2013-10-17 17:22:35
attachment
BBC News - US spy chief: Shutdown 'damaging'
2013-10-17 17:22:36
http://www.bbc.co.uk/news/world-us-canada-24373300
text/html
utf-8
webpage
Edward Snowden's E-Mail Provider Defied FBI Demands to Turn Over Crypto Keys, Documents Show | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/10/lavabit_unsealed/
2013-10-17 17:22:59
attachment
Edward Snowden's E-Mail Provider Defied FBI Demands to Turn Over Crypto Keys, Documents Show | Threat Level | Wired.com
2013-10-17 17:23:00
http://www.wired.com/threatlevel/2013/10/lavabit_unsealed/
text/html
utf-8
webpage
Perlroth
Nicole
Shane
Scott
As F.B.I. Pursued Snowden, an E-Mail Service Stood Firm - NYTimes.com
2013-10-02
http://www.nytimes.com/2013/10/03/us/snowdens-e-mail-provider-discusses-pressure-from-fbi-to-disclose-data.html?_r=0
2013-10-17 17:45:45
attachment
As F.B.I. Pursued Snowden, an E-Mail Service Stood Firm - NYTimes.com
2013-10-17 17:45:46
http://www.nytimes.com/2013/10/03/us/snowdens-e-mail-provider-discusses-pressure-from-fbi-to-disclose-data.html?_r=0
text/html
utf-8
webpage
Keith Alexander admits the NSA tracked Americans' cellphones in pilot project.
http://www.slate.com/blogs/future_tense/2013/10/02/keith_alexander_admits_the_nsa_tracked_americans_cellphones_in_pilot_project.html
2013-10-17 17:45:57
attachment
Keith Alexander admits the NSA tracked Americans' cellphones in pilot project.
2013-10-17 17:45:58
http://www.slate.com/blogs/future_tense/2013/10/02/keith_alexander_admits_the_nsa_tracked_americans_cellphones_in_pilot_project.html
text/html
utf-8
webpage
Law Enforcement Appliance Subverts SSL | Threat Level | Wired.com
http://www.wired.com/threatlevel/2010/03/packet-forensics
2013-10-17 17:47:37
attachment
Law Enforcement Appliance Subverts SSL | Threat Level | Wired.com
2013-10-17 17:47:38
http://www.wired.com/threatlevel/2010/03/packet-forensics
text/html
utf-8
webpage
Police Claim Encryption Use Is Illegal
http://cryptome.org/2013/09/police-crypto-illegal.htm
2013-10-17 17:47:51
attachment
Police Claim Encryption Use Is Illegal
2013-10-17 17:47:52
http://cryptome.org/2013/09/police-crypto-illegal.htm
text/html
utf-8
webpage
GCHQ faces legal challenge in European court over online privacy | UK news | The Guardian
http://www.theguardian.com/uk-news/2013/oct/03/gchq-legal-challenge-europe-privacy-surveillance
2013-10-17 17:48:11
attachment
GCHQ faces legal challenge in European court over online privacy | UK news | The Guardian
2013-10-17 17:48:12
http://www.theguardian.com/uk-news/2013/oct/03/gchq-legal-challenge-europe-privacy-surveillance
text/html
utf-8
webpage
The Guardian
Lanchester
John
The Snowden files: why the British public should be worried about GCHQ | World news | The Guardian
2013-10-03
http://www.theguardian.com/world/2013/oct/03/edward-snowden-files-john-lanchester
2013-10-17 17:50:36
attachment
The Snowden files: why the British public should be worried about GCHQ | World news | The Guardian
2013-10-17 17:50:37
http://www.theguardian.com/world/2013/oct/03/edward-snowden-files-john-lanchester
text/html
utf-8
webpage
Eset Research
Adobe Flash, The Spy in Your Computer – Part 1 - We Live Security
2010-10-06
http://www.welivesecurity.com/2010/10/06/adobe-flash-the-spy-in-your-computer-part-1/
2013-10-17 17:52:39
attachment
Adobe Flash, The Spy in Your Computer – Part 1 - We Live Security
2013-10-17 17:52:40
http://www.welivesecurity.com/2010/10/06/adobe-flash-the-spy-in-your-computer-part-1/
text/html
utf-8
webpage
NSA and GCHQ target Tor network that protects anonymity of web users | World news | The Guardian
http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
2013-10-17 17:52:50
attachment
NSA and GCHQ target Tor network that protects anonymity of web users | World news | The Guardian
2013-10-17 17:52:51
http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
text/html
utf-8
webpage
'Peeling back the layers of Tor with EgotisticalGiraffe' – read the document | World news | theguardian.com
http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document?CMP=twt_gu
2013-10-17 17:53:08
attachment
'Peeling back the layers of Tor with EgotisticalGiraffe' – read the document | World news | theguardian.com
2013-10-17 17:53:09
http://www.theguardian.com/world/interactive/2013/oct/04/egotistical-giraffe-nsa-tor-document?CMP=twt_gu
text/html
utf-8
webpage
The Guardian
'Tor Stinks' presentation – read the full document | World news | theguardian.com
2013-10-04
http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document
2013-10-17 17:53:22
attachment
'Tor Stinks' presentation – read the full document | World news | theguardian.com
2013-10-17 17:53:23
http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document
text/html
utf-8
webpage
the Guardian
Tor: 'The king of high-secure, low-latency anonymity' | World news | theguardian.com
2013-10-04
http://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity
2013-10-17 17:53:36
attachment
Tor: 'The king of high-secure, low-latency anonymity' | World news | theguardian.com
2013-10-17 17:53:37
http://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity
text/html
utf-8
webpage
Schneier
Bruce
Attacking Tor: how the NSA targets users' online anonymity | World news | theguardian.com
2013-10-04
http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity
2013-10-17 17:53:50
attachment
Attacking Tor: how the NSA targets users' online anonymity | World news | theguardian.com
2013-10-17 17:53:51
http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity
text/html
utf-8
webpage
In Obama’s war on leaks, reporters fight back - The Washington Post
http://www.washingtonpost.com/opinions/in-obamas-war-on-leaks-reporters-fight-back/2013/10/04/70231e1c-2aeb-11e3-b139-029811dbb57f_story.html
2013-10-17 17:55:08
attachment
In Obama’s war on leaks, reporters fight back - The Washington Post
2013-10-17 17:55:09
http://www.washingtonpost.com/opinions/in-obamas-war-on-leaks-reporters-fight-back/2013/10/04/70231e1c-2aeb-11e3-b139-029811dbb57f_story.html
text/html
utf-8
webpage
Secret NSA documents show campaign against Tor encrypted network - The Washington Post
http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html
2013-10-17 17:55:23
attachment
Secret NSA documents show campaign against Tor encrypted network - The Washington Post
2013-10-17 17:55:24
http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html
text/html
utf-8
webpage
GCHQ report on 'MULLENIZE' program to 'stain' anonymous electronic traffic - The Washington Post
http://apps.washingtonpost.com/g/page/world/gchq-report-on-mullenize-program-to-stain-anonymous-electronic-traffic/502/
2013-10-17 18:00:33
attachment
GCHQ report on 'MULLENIZE' program to 'stain' anonymous electronic traffic - The Washington Post
2013-10-17 18:00:34
http://apps.washingtonpost.com/g/page/world/gchq-report-on-mullenize-program-to-stain-anonymous-electronic-traffic/502/
text/html
utf-8
webpage
NSA Tracked US Cell Phone Locations For Two Years, Senator Says More Is Still Secret | Electronic Frontier Foundation
https://www.eff.org/deeplinks/2013/10/nsa-tracked-americans-cell-locations-two-years-senator-hints-theres-more
2013-10-17 18:00:50
attachment
NSA Tracked US Cell Phone Locations For Two Years, Senator Says More Is Still Secret | Electronic Frontier Foundation
2013-10-17 18:00:51
https://www.eff.org/deeplinks/2013/10/nsa-tracked-americans-cell-locations-two-years-senator-hints-theres-more
text/html
utf-8
webpage
How the NSA Thinks About Secrecy and Risk - Bruce Schneier - The Atlantic
http://www.theatlantic.com/technology/archive/2013/10/how-the-nsa-thinks-about-secrecy-and-risk/280258/
2013-10-17 18:01:01
attachment
How the NSA Thinks About Secrecy and Risk - Bruce Schneier - The Atlantic
2013-10-17 18:01:02
http://www.theatlantic.com/technology/archive/2013/10/how-the-nsa-thinks-about-secrecy-and-risk/280258/
text/html
utf-8
webpage
Canadian spies targeted Brazil’s Mines and Energy Ministry: report - The Globe and Mail
2013-10-06
http://www.theglobeandmail.com/news/national/canadian-spies-targeted-brazils-mines-and-energy-ministry-report/article14719807/#dashboard/follows/
2013-10-17 18:03:00
attachment
Canadian spies targeted Brazil’s Mines and Energy Ministry: report - The Globe and Mail
2013-10-17 18:03:01
http://www.theglobeandmail.com/news/national/canadian-spies-targeted-brazils-mines-and-energy-ministry-report/article14719807/#dashboard/follows/
text/html
utf-8
webpage
Selling Secrets of Phone Users to Advertisers - NYTimes.com
http://www.nytimes.com/2013/10/06/technology/selling-secrets-of-phone-users-to-advertisers.html?smid=re-share&_r=0
2013-10-17 18:03:19
attachment
Selling Secrets of Phone Users to Advertisers - NYTimes.com
2013-10-17 18:03:20
http://www.nytimes.com/2013/10/06/technology/selling-secrets-of-phone-users-to-advertisers.html?smid=re-share&_r=0
text/html
utf-8
webpage
All Things Digital
Hesseldahl
Arik
U.S. Intelligence Defends Attempts to Break Tor Anonymity Network - Arik Hesseldahl - News - AllThingsD
2013-10-05
http://allthingsd.com/20131005/us-intelligence-chief-defends-attempts-to-break-tor-anonymity-network/?mod=tweet
2013-10-17 18:04:40
attachment
U.S. Intelligence Defends Attempts to Break Tor Anonymity Network - Arik Hesseldahl - News - AllThingsD
2013-10-17 18:04:41
http://allthingsd.com/20131005/us-intelligence-chief-defends-attempts-to-break-tor-anonymity-network/?mod=tweet
text/html
utf-8
webpage
NSA using Browser Cookies to track Tor Users - The Hacker News
http://thehackernews.com/2013/10/nsa-using-browser-cookies-to-track-tor.html
2013-10-17 18:05:17
attachment
NSA using Browser Cookies to track Tor Users - The Hacker News
2013-10-17 18:05:18
http://thehackernews.com/2013/10/nsa-using-browser-cookies-to-track-tor.html
text/html
utf-8
webpage
Popkin
Helen A.S.
Careful what you tweet: Police, schools tap social media to track behavior - NBC News.com
2013-10-06
http://www.nbcnews.com/technology/careful-what-you-tweet-police-schools-tap-social-media-track-4B11215908
2013-10-17 18:05:50
attachment
Careful what you tweet: Police, schools tap social media to track behavior - NBC News.com
2013-10-17 18:05:51
http://www.nbcnews.com/technology/careful-what-you-tweet-police-schools-tap-social-media-track-4B11215908
text/html
utf-8
webpage
NSA inundated by FOIA requests after Snowden leaks | Muckrock
https://www.muckrock.com/news/archives/2013/oct/07/nsa-inundated-foia-requests-after-snowden-leaks/
2013-10-17 18:06:06
attachment
NSA inundated by FOIA requests after Snowden leaks | Muckrock
2013-10-17 18:06:07
https://www.muckrock.com/news/archives/2013/oct/07/nsa-inundated-foia-requests-after-snowden-leaks/
text/html
utf-8
webpage
Posts | Technology, Thoughts & Trinkets
http://www.christopher-parsons.com/posts/
2013-10-17 18:06:22
attachment
Posts | Technology, Thoughts & Trinkets
2013-10-17 18:06:23
http://www.christopher-parsons.com/posts/
text/html
utf-8
webpage
Seen by the State — Notes from a Strange World — Medium
https://medium.com/quinn-norton/2c7e04889d8e
2013-10-17 18:09:21
attachment
Seen by the State — Notes from a Strange World — Medium
2013-10-17 18:09:22
https://medium.com/quinn-norton/2c7e04889d8e
text/html
utf-8
webpage
NSA Data Center Failures Follow History of Electrical Troubles - Washington Wire - WSJ
http://blogs.wsj.com/washwire/2013/10/08/nsa-data-center-failures-follow-history-of-electrical-troubles/
2013-10-17 18:09:29
attachment
NSA Data Center Failures Follow History of Electrical Troubles - Washington Wire - WSJ
2013-10-17 18:09:30
http://blogs.wsj.com/washwire/2013/10/08/nsa-data-center-failures-follow-history-of-electrical-troubles/
text/html
utf-8
webpage
Ockenden
Will
Australia prepared briefing on US global internet spying program PRISM before Snowden revelations - ABC News (Australian Broadcasting Corporation)
2013-10-08
http://www.abc.net.au/news/2013-10-08/australia-prepared-briefing-on-prism-spying-program/5004290
2013-10-17 18:09:40
attachment
Australia prepared briefing on US global internet spying program PRISM before Snowden revelations - ABC News (Australian Broadcasting Corporation)
2013-10-17 18:09:41
http://www.abc.net.au/news/2013-10-08/australia-prepared-briefing-on-prism-spying-program/5004290
text/html
utf-8
blogPost
emptywheel
Wheeler
Why Did NSA Raise Traffickers for a Story about Drone Killing Terrorists? | emptywheel
2013-10-17
http://www.emptywheel.net/2013/10/17/why-did-nsa-raise-traffickers-for-story-about-drone-killing-terrorists/
2013-10-17 19:56:33
attachment
Why Did NSA Raise Traffickers for a Story about Drone Killing Terrorists? | emptywheel
2013-10-17 19:56:34
http://www.emptywheel.net/2013/10/17/why-did-nsa-raise-traffickers-for-story-about-drone-killing-terrorists/
text/html
utf-8
webpage
FRINFORMSUM 10/17/2013: Another Intelligence Chief Admits to Lying, NSA Knows your ‘Buddies’, and More | UNREDACTED
http://nsarchive.wordpress.com/2013/10/17/frinformsum-10172013-another-intelligence-chief-admits-to-lying-nsa-knows-your-buddies-and-more/
2013-10-17 19:57:54
attachment
FRINFORMSUM 10/17/2013: Another Intelligence Chief Admits to Lying, NSA Knows your ‘Buddies’, and More | UNREDACTED
2013-10-17 19:57:55
http://nsarchive.wordpress.com/2013/10/17/frinformsum-10172013-another-intelligence-chief-admits-to-lying-nsa-knows-your-buddies-and-more/
text/html
utf-8
webpage
Russian email provider fined after refusing to give up customer data — Tech News and Analysis
http://gigaom.com/2013/10/17/russian-email-provider-fined-after-refusing-to-give-up-customer-data/
2013-10-17 19:58:24
attachment
Russian email provider fined after refusing to give up customer data — Tech News and Analysis
2013-10-17 19:58:25
http://gigaom.com/2013/10/17/russian-email-provider-fined-after-refusing-to-give-up-customer-data/
text/html
utf-8
webpage
New EU rules to curb transfer of data to US after Edward Snowden revelations | World news | theguardian.com
http://www.theguardian.com/world/2013/oct/17/eu-rules-data-us-edward-snowden
2013-10-17 20:41:01
attachment
New EU rules to curb transfer of data to US after Edward Snowden revelations | World news | theguardian.com
2013-10-17 20:41:02
http://www.theguardian.com/world/2013/oct/17/eu-rules-data-us-edward-snowden
text/html
utf-8
webpage
Inside the NSA's Ultra-Secret China Hacking Group - By Matthew M. Aid | Foreign Policy
http://www.foreignpolicy.com/articles/2013/06/10/inside_the_nsa_s_ultra_secret_china_hacking_group
2013-10-17 20:43:41
attachment
Inside the NSA's Ultra-Secret China Hacking Group - By Matthew M. Aid | Foreign Policy
2013-10-17 20:43:42
http://www.foreignpolicy.com/articles/2013/06/10/inside_the_nsa_s_ultra_secret_china_hacking_group
text/html
utf-8
webpage
Dept of Defense to Report on "Authorized Leaks" - Secrecy News
http://blogs.fas.org/secrecy/2013/10/authorized-leaks/
2013-10-17 20:44:12
attachment
Dept of Defense to Report on "Authorized Leaks" - Secrecy News
2013-10-17 20:44:13
http://blogs.fas.org/secrecy/2013/10/authorized-leaks/
text/html
utf-8
webpage
10 reasons not to trust claims national security is being threatened by leaks | UK news | theguardian.com
2013-10-16
http://www.theguardian.com/uk-news/2013/oct/16/national-security-leaks-gchq-nsa-intelligence-agencies
2013-10-17 20:44:44
attachment
10 reasons not to trust claims national security is being threatened by leaks | UK news | theguardian.com
2013-10-17 20:44:45
http://www.theguardian.com/uk-news/2013/oct/16/national-security-leaks-gchq-nsa-intelligence-agencies
text/html
utf-8
webpage
NSA files: Australian spies scooped up thousands of email accounts to help US | World news | theguardian.com
http://www.theguardian.com/world/2013/oct/16/nsa-files-australian-spies-scooped-up-thousands-of-email-accounts-to-help-us?CMP=twt_fd
2013-10-17 20:45:35
attachment
NSA files: Australian spies scooped up thousands of email accounts to help US | World news | theguardian.com
2013-10-17 20:45:36
http://www.theguardian.com/world/2013/oct/16/nsa-files-australian-spies-scooped-up-thousands-of-email-accounts-to-help-us?CMP=twt_fd
text/html
utf-8
webpage
NSA collects millions of e-mail address books globally - The Washington Post
http://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html
2013-10-17 20:47:20
attachment
NSA collects millions of e-mail address books globally - The Washington Post
2013-10-17 20:47:21
http://www.washingtonpost.com/world/national-security/nsa-collects-millions-of-e-mail-address-books-globally/2013/10/14/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html
text/html
utf-8
webpage
Foreign Policy
Aid
Matthew M.
The NSA's New Code Breakers - By Matthew M. Aid | Foreign Policy
2013-10-15
http://www.foreignpolicy.com/articles/2013/10/15/the_nsa_s_new_codebreakers
2013-10-17 20:47:58
attachment
The NSA's New Code Breakers - By Matthew M. Aid | Foreign Policy
2013-10-17 20:47:59
http://www.foreignpolicy.com/articles/2013/10/15/the_nsa_s_new_codebreakers
text/html
utf-8
webpage
Wintour
Patrick
Snowden leaks: David Cameron urges committee to investigate Guardian | World news | theguardian.com
2013-10-16
http://www.theguardian.com/world/2013/oct/16/snowden-leaks-david-cameron-investigate-guardian
2013-10-17 20:48:37
attachment
Snowden leaks: David Cameron urges committee to investigate Guardian | World news | theguardian.com
2013-10-17 20:48:38
http://www.theguardian.com/world/2013/oct/16/snowden-leaks-david-cameron-investigate-guardian
text/html
utf-8
webpage
Former Labour minister accuses spies of ignoring MPs over surveillance | UK news | The Guardian
http://www.theguardian.com/uk-news/2013/oct/15/former-labour-minister-spies-surveillance
2013-10-17 20:49:09
attachment
Former Labour minister accuses spies of ignoring MPs over surveillance | UK news | The Guardian
2013-10-17 20:49:10
http://www.theguardian.com/uk-news/2013/oct/15/former-labour-minister-spies-surveillance
text/html
utf-8
webpage
POLITICO
Romm
Tony
Tech titans’ muted response on NSA data mining - Tony Romm - POLITICO.com
2013-10-16
http://www.politico.com/story/2013/10/tech-titans-muted-response-on-nsa-data-mining-98373.html
2013-10-17 20:50:51
attachment
Tech titans’ muted response on NSA data mining - Tony Romm - POLITICO.com
2013-10-17 20:50:52
http://www.politico.com/story/2013/10/tech-titans-muted-response-on-nsa-data-mining-98373.html
text/html
utf-8
webpage
Peterson
Andrea
Aaron Swartz’s last gift to journalism and online privacy finds a new home
2013-10-15
http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/15/aaron-swartzs-last-gift-to-journalism-and-online-privacy-finds-a-new-home/
2013-10-17 20:51:46
attachment
Aaron Swartz’s last gift to journalism and online privacy finds a new home
2013-10-17 20:51:47
http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/15/aaron-swartzs-last-gift-to-journalism-and-online-privacy-finds-a-new-home/
text/html
utf-8
webpage
DoJ: If we can track one American, we can track all Americans | Ars Technica
http://arstechnica.com/tech-policy/2013/10/doj-if-we-can-track-one-american-we-can-track-all-americans/
2013-10-17 20:53:46
attachment
DoJ: If we can track one American, we can track all Americans | Ars Technica
2013-10-17 20:53:47
http://arstechnica.com/tech-policy/2013/10/doj-if-we-can-track-one-american-we-can-track-all-americans/
text/html
utf-8
webpage
The Atlantic
Friedersdorf
Conor
The Single Best Overview of What the Surveillance State Does With Our Private Data - Conor Friedersdorf - The Atlantic
2013-10-09
http://www.theatlantic.com/politics/archive/2013/10/the-single-best-overview-of-what-the-surveillance-state-does-with-our-private-data/280411/
2013-10-17 21:07:15
attachment
The Single Best Overview of What the Surveillance State Does With Our Private Data - Conor Friedersdorf - The Atlantic
2013-10-17 21:07:16
http://www.theatlantic.com/politics/archive/2013/10/the-single-best-overview-of-what-the-surveillance-state-does-with-our-private-data/280411/
text/html
utf-8
webpage
Report: Obama often blocks press access to information
http://www.usatoday.com/story/news/2013/10/10/cpj-report-on-obama-press/2960607/
2013-10-17 21:07:59
attachment
Report: Obama often blocks press access to information
2013-10-17 21:08:00
http://www.usatoday.com/story/news/2013/10/10/cpj-report-on-obama-press/2960607/
text/html
utf-8
webpage
Patriot Act author prepares bill to put NSA bulk collection 'out of business' | World news | theguardian.com
http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill
2013-10-17 21:09:18
attachment
Patriot Act author prepares bill to put NSA bulk collection 'out of business' | World news | theguardian.com
2013-10-17 21:09:19
http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill
text/html
utf-8
webpage
RT
'US unchained itself from constitution': Whistleblowers on RT after secret Snowden meeting — RT News
2013-01-11
http://rt.com/news/rt-whistleblowers-snowden-prize-983/
2013-10-17 21:09:24
attachment
'US unchained itself from constitution': Whistleblowers on RT after secret Snowden meeting — RT News
2013-10-17 21:09:25
http://rt.com/news/rt-whistleblowers-snowden-prize-983/
text/html
utf-8
webpage
BBC News - Miranda detention powers unlawful, say MPs and peers
2013-10-11
http://www.bbc.co.uk/news/uk-politics-24495712
2013-10-17 21:10:00
attachment
BBC News - Miranda detention powers unlawful, say MPs and peers
2013-10-17 21:10:01
http://www.bbc.co.uk/news/uk-politics-24495712
text/html
utf-8
webpage
Skype under investigation in Luxembourg over link to NSA | Technology | theguardian.com
http://www.theguardian.com/technology/2013/oct/11/skype-ten-microsoft-nsa?CMP=twt_gu
2013-10-17 21:31:54
attachment
Skype under investigation in Luxembourg over link to NSA | Technology | theguardian.com
2013-10-17 21:31:55
http://www.theguardian.com/technology/2013/oct/11/skype-ten-microsoft-nsa?CMP=twt_gu
text/html
utf-8
webpage
SFGate
Temple
James
Stanford researchers discover ‘alarming’ method for phone tracking, fingerprinting through sensor flaws | The Technology Chronicles | an SFGate.com blog
2013-10-17
http://blog.sfgate.com/techchron/2013/10/10/stanford-researchers-discover-alarming-method-for-phone-tracking-fingerprinting-through-sensor-flaws/
2013-10-17 21:32:36
attachment
Stanford researchers discover ‘alarming’ method for phone tracking, fingerprinting through sensor flaws | The Technology Chronicles | an SFGate.com blog
2013-10-17 21:32:37
http://blog.sfgate.com/techchron/2013/10/10/stanford-researchers-discover-alarming-method-for-phone-tracking-fingerprinting-through-sensor-flaws/
text/html
utf-8
webpage
NSA Veterans: The White House Is Hanging Us Out to Dry - By Shane Harris | Foreign Policy
http://www.foreignpolicy.com/articles/2013/10/10/nsa_veterans_the_white_house_is_hanging_us_out_to_dry
2013-10-17 21:33:42
attachment
NSA Veterans: The White House Is Hanging Us Out to Dry - By Shane Harris | Foreign Policy
2013-10-17 21:33:43
http://www.foreignpolicy.com/articles/2013/10/10/nsa_veterans_the_white_house_is_hanging_us_out_to_dry
text/html
utf-8
webpage
Editors on the NSA files: 'What the Guardian is doing is important for democracy' | World news | The Guardian
http://www.theguardian.com/world/2013/oct/10/guardian-democracy-editors
2013-10-17 21:34:30
attachment
Editors on the NSA files: 'What the Guardian is doing is important for democracy' | World news | The Guardian
2013-10-17 21:34:31
http://www.theguardian.com/world/2013/oct/10/guardian-democracy-editors
text/html
utf-8
webpage
Perlroth
Nicole
A Conversation With Lavabit's Founder - NYTimes.com
2013-10-09
http://bits.blogs.nytimes.com/2013/10/09/a-conversation-with-lavabits-founder/?_r=0
2013-10-17 21:36:02
attachment
A Conversation With Lavabit's Founder - NYTimes.com
2013-10-17 21:36:03
http://bits.blogs.nytimes.com/2013/10/09/a-conversation-with-lavabits-founder/?_r=0
text/html
utf-8
webpage
Top websites secretly track your device fingerprint – KU Leuven
2013-09-17
http://www.kuleuven.be/english/news/several-top-websites-use-device-fingerprinting-to-secretly-track-users
2013-10-17 21:37:54
attachment
Top websites secretly track your device fingerprint – KU Leuven
2013-10-17 21:37:55
http://www.kuleuven.be/english/news/several-top-websites-use-device-fingerprinting-to-secretly-track-users
text/html
utf-8
report
Committee to Protect Journalists
Downie Jr.
Leonard
Rafsky
Sara
The Obama Administration and the Press - Leak investigations and surveillance in post-9/11 America
U.S. President Barack Obama came into office pledging open government, but he has fallen short of his promise. Journalists and transparency advocates say the White House curbs routine disclosure of information and deploys its own media to evade scrutiny by the press. Aggressive prosecution of leakers of classified information and broad electronic surveillance programs deter government sources from speaking to journalists.
2013-10-10
en-US
https://www.cpj.org/reports/2013/10/obama-and-the-press-us-leaks-surveillance-post-911.php
2013-10-17 21:38:25
attachment
The Obama Administration and the Press - Reports - Committee to Protect Journalists
2013-10-17 21:38:26
https://www.cpj.org/reports/2013/10/obama-and-the-press-us-leaks-surveillance-post-911.php
text/html
utf-8
webpage
magazine / issue / Laura Poitras filming NSA Utah Data Center construction site | MOUSSE CONTEMPORARY ART MAGAZINE
http://www.moussemagazine.it/articolo.mm?id=1020
2013-10-17 21:40:30
attachment
magazine / issue / Laura Poitras filming NSA Utah Data Center construction site | MOUSSE CONTEMPORARY ART MAGAZINE
2013-10-17 21:40:31
http://www.moussemagazine.it/articolo.mm?id=1020
text/html
utf-8
webpage
MI5's Andrew Parker lives in a different world | Clive Stafford Smith | Comment is free | theguardian.com
http://www.theguardian.com/commentisfree/2013/oct/10/mi5-andrew-parker-different-world-shaker-aamer
2013-10-17 21:41:40
attachment
MI5's Andrew Parker lives in a different world | Clive Stafford Smith | Comment is free | theguardian.com
2013-10-17 21:41:41
http://www.theguardian.com/commentisfree/2013/oct/10/mi5-andrew-parker-different-world-shaker-aamer
text/html
utf-8
webpage
NSA tries to regain industry’s trust to work cooperatively against cyber-threats - The Washington Post
http://www.washingtonpost.com/world/national-security/nsa-tries-to-regain-industrys-trust-to-work-cooperatively-against-cyber-threats/2013/10/09/93015af0-2561-11e3-b3e9-d97fb087acd6_story.html
2013-10-17 21:41:54
attachment
NSA tries to regain industry’s trust to work cooperatively against cyber-threats - The Washington Post
2013-10-17 21:41:55
http://www.washingtonpost.com/world/national-security/nsa-tries-to-regain-industrys-trust-to-work-cooperatively-against-cyber-threats/2013/10/09/93015af0-2561-11e3-b3e9-d97fb087acd6_story.html
text/html
utf-8
webpage
Wyden
Ron
Beware the business-as-usual brigade's efforts to sabotage new NSA oversight | Ron Wyden | Comment is free | theguardian.com
2013-10-09
http://www.theguardian.com/commentisfree/2013/oct/09/beware-sabotage-nsa-oversight
2013-10-17 21:42:13
attachment
Beware the business-as-usual brigade's efforts to sabotage new NSA oversight | Ron Wyden | Comment is free | theguardian.com
2013-10-17 21:42:14
http://www.theguardian.com/commentisfree/2013/oct/09/beware-sabotage-nsa-oversight
text/html
utf-8
webpage
Benkler
Yochai
Fact: the NSA gets negligible intel from Americans' metadata. So end collection | Yochai Benkler | Comment is free | theguardian.com
2013-10-08
http://www.theguardian.com/commentisfree/2013/oct/08/nsa-bulk-metadata-surveillance-intelligence
2013-10-17 21:44:40
attachment
Fact: the NSA gets negligible intel from Americans' metadata. So end collection | Yochai Benkler | Comment is free | theguardian.com
2013-10-17 21:44:41
http://www.theguardian.com/commentisfree/2013/oct/08/nsa-bulk-metadata-surveillance-intelligence
text/html
utf-8
webpage
Lukacs
Martin
Groves
Tim
Canadian spies met with energy firms, documents reveal | Environment | theguardian.com
2013-10-09
http://www.theguardian.com/environment/2013/oct/09/canadian-spies-met-energy-firms-documents?CMP=twt_gu
2013-10-17 21:45:10
attachment
Canadian spies met with energy firms, documents reveal | Environment | theguardian.com
2013-10-17 21:45:11
http://www.theguardian.com/environment/2013/oct/09/canadian-spies-met-energy-firms-documents?CMP=twt_gu
text/html
utf-8
webpage
Center for Democracy and Technology
Hall
Joseph Lorenzo
Technologists’ Submit Comments to the NSA Review Group | Center for Democracy & Technology
2013-10-04
https://www.cdt.org/tech-comment-nsa-review
2013-10-17 21:45:40
attachment
Technologists’ Submit Comments to the NSA Review Group | Center for Democracy & Technology
2013-10-17 21:45:41
https://www.cdt.org/tech-comment-nsa-review
text/html
utf-8
webpage
How The Indian Government's 'Central Monitoring System' Makes The NSA Look Like A Paragon Of Restraint | Techdirt
https://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml
2013-10-17 21:47:47
attachment
How The Indian Government's 'Central Monitoring System' Makes The NSA Look Like A Paragon Of Restraint | Techdirt
2013-10-17 21:47:48
https://www.techdirt.com/articles/20130629/17255423670/how-indian-governments-central-monitoring-system-makes-nsa-look-like-paragon-restraint.shtml
text/html
windows-1252
webpage
Police Versus Us: The Encryption Chasm
http://partners.nytimes.com/library/cyber/under/100197under-wayner.html
2013-10-17 21:48:27
attachment
Police Versus Us: The Encryption Chasm
2013-10-17 21:48:28
http://partners.nytimes.com/library/cyber/under/100197under-wayner.html
text/html
windows-1252
webpage
FBI Wants Backdoors in Facebook, Skype and Instant Messaging | Threat Level | Wired.com
http://www.wired.com/threatlevel/2012/05/fbi-seeks-internet-backdoors/
2013-10-17 21:48:37
attachment
FBI Wants Backdoors in Facebook, Skype and Instant Messaging | Threat Level | Wired.com
2013-10-17 21:48:38
http://www.wired.com/threatlevel/2012/05/fbi-seeks-internet-backdoors/
text/html
utf-8
webpage
N.S.A. Chief Says Surveillance Has Stopped Dozens of Plots - NYTimes.com
http://www.nytimes.com/2013/06/19/us/politics/nsa-chief-says-surveillance-has-stopped-dozens-of-plots.html?_r=1&adxnnl=1&pagewanted=1&adxnnlx=1382023988-GBgf2/TCE9bJEjYY/e636Q&
2013-10-17 21:48:49
attachment
N.S.A. Chief Says Surveillance Has Stopped Dozens of Plots - NYTimes.com
2013-10-17 21:48:50
http://www.nytimes.com/2013/06/19/us/politics/nsa-chief-says-surveillance-has-stopped-dozens-of-plots.html?_r=1&adxnnl=1&pagewanted=1&adxnnlx=1382023988-GBgf2/TCE9bJEjYY/e636Q&
text/html
utf-8
webpage
Officials alert foreign services that Snowden has documents on their cooperation with U.S. - The Washington Post
http://www.washingtonpost.com/world/national-security/officials-alert-foreign-services-that-snowden-has-documents-on-their-cooperation-with-us/2013/10/24/930ea85c-3b3e-11e3-a94f-b58017bfee6c_story.html
2013-10-25 16:20:35
attachment
Officials alert foreign services that Snowden has documents on their cooperation with U.S. - The Washington Post
2013-10-25 16:20:36
http://www.washingtonpost.com/world/national-security/officials-alert-foreign-services-that-snowden-has-documents-on-their-cooperation-with-us/2013/10/24/930ea85c-3b3e-11e3-a94f-b58017bfee6c_story.html
text/html
utf-8
webpage
Brown
Hayes
Activist Tweets Former NSA Chief's 'Off Record' Phone Call On Train | ThinkProgress
2013-10-24
http://thinkprogress.org/security/2013/10/24/2835201/hayden-acela-nsa/
2013-10-25 16:21:22
attachment
Activist Tweets Former NSA Chief's 'Off Record' Phone Call On Train | ThinkProgress
2013-10-25 16:21:23
http://thinkprogress.org/security/2013/10/24/2835201/hayden-acela-nsa/
text/html
utf-8
webpage
Leaked memos reveal GCHQ efforts to keep mass surveillance secret | UK news | The Guardian
http://www.theguardian.com/uk-news/2013/oct/25/leaked-memos-gchq-mass-surveillance-secret-snowden
2013-10-28 22:16:55
attachment
Leaked memos reveal GCHQ efforts to keep mass surveillance secret | UK news | The Guardian
2013-10-28 22:16:56
http://www.theguardian.com/uk-news/2013/oct/25/leaked-memos-gchq-mass-surveillance-secret-snowden
text/html
utf-8
webpage
Exclusive: 21 Nations Line Up Behind U.N. Effort to Restrain NSA | The Cable
http://thecable.foreignpolicy.com/posts/2013/10/25/exclusive_21_nations_line_up_behind_un_effort_to_restrain_nsa
2013-10-28 22:17:01
attachment
Exclusive: 21 Nations Line Up Behind U.N. Effort to Restrain NSA | The Cable
2013-10-28 22:17:02
http://thecable.foreignpolicy.com/posts/2013/10/25/exclusive_21_nations_line_up_behind_un_effort_to_restrain_nsa
text/html
utf-8
webpage
DOJ’s New “Transparency” on the Dragnet: Admitting Their “Physical Search” Was the “Dragnet” | emptywheel
http://www.emptywheel.net/2013/10/25/dojs-new-transparency-on-the-dragnet-admitting-their-physical-search-was-the-dragnet/
2013-10-28 22:17:08
attachment
DOJ’s New “Transparency” on the Dragnet: Admitting Their “Physical Search” Was the “Dragnet” | emptywheel
2013-10-28 22:17:09
http://www.emptywheel.net/2013/10/25/dojs-new-transparency-on-the-dragnet-admitting-their-physical-search-was-the-dragnet/
text/html
utf-8
webpage
In Spy Uproar, ‘Everyone Does It’ Just Won’t Do - NYTimes.com
http://www.nytimes.com/2013/10/26/world/europe/in-spy-uproar-everyone-does-it-just-wont-do.html?hp&_r=0
2013-10-28 22:17:58
attachment
In Spy Uproar, ‘Everyone Does It’ Just Won’t Do - NYTimes.com
2013-10-28 22:17:59
http://www.nytimes.com/2013/10/26/world/europe/in-spy-uproar-everyone-does-it-just-wont-do.html?hp&_r=0
text/html
utf-8
webpage
I challenged hackers to investigate me and what they found out is chilling | PandoDaily
http://pandodaily.com/2013/10/26/i-challenged-hackers-to-investigate-me-and-what-they-found-out-is-chilling/
2013-10-28 22:18:10
attachment
I challenged hackers to investigate me and what they found out is chilling | PandoDaily
2013-10-28 22:18:11
http://pandodaily.com/2013/10/26/i-challenged-hackers-to-investigate-me-and-what-they-found-out-is-chilling/
text/html
utf-8
webpage
Taylor
Guy
Armed agents seize records of reporter, Washington Times prepares legal action - Washington Times
2013-10-25
http://www.washingtontimes.com/news/2013/oct/25/armed-agents-seize-records-reporter-washington-tim/?page=1
2013-10-28 22:18:20
attachment
Armed agents seize records of reporter, Washington Times prepares legal action - Washington Times
2013-10-28 22:18:21
http://www.washingtontimes.com/news/2013/oct/25/armed-agents-seize-records-reporter-washington-tim/?page=1
text/html
utf-8
webpage
Edward Snowden's statement at Stop Watching Us rally, DC (Video) :: www.uruknet.info :: informazione dal medio oriente :: information from middle east :: [vs-1]
http://www.uruknet.info/?p=m102072&hd=&l=e
2013-10-28 22:18:26
attachment
Edward Snowden's statement at Stop Watching Us rally, DC (Video) :: www.uruknet.info :: informazione dal medio oriente :: information from middle east :: [vs-1]
2013-10-28 22:18:27
http://www.uruknet.info/?p=m102072&hd=&l=e
text/html
windows-1252
webpage
Federal Prosecutors, in a Policy Shift, Cite Warrantless Wiretaps as Evidence - NYTimes.com
http://www.nytimes.com/2013/10/27/us/federal-prosecutors-in-a-policy-shift-cite-warrantless-wiretaps-as-evidence.html
2013-10-28 22:18:31
attachment
Federal Prosecutors, in a Policy Shift, Cite Warrantless Wiretaps as Evidence - NYTimes.com
2013-10-28 22:18:32
http://www.nytimes.com/2013/10/27/us/federal-prosecutors-in-a-policy-shift-cite-warrantless-wiretaps-as-evidence.html
text/html
utf-8
webpage
The Guardian
Newell
Jim
Thousands gather in Washington for anti-NSA 'Stop Watching Us' rally | World news | theguardian.com
2013-10-26
http://www.theguardian.com/world/2013/oct/26/nsa-rally-stop-watching-washington-snowden?CMP=twt_gu
2013-10-28 22:18:35
attachment
Thousands gather in Washington for anti-NSA 'Stop Watching Us' rally | World news | theguardian.com
2013-10-28 22:18:36
http://www.theguardian.com/world/2013/oct/26/nsa-rally-stop-watching-washington-snowden?CMP=twt_gu
text/html
utf-8
webpage
Thomas
Emily
BBC News - US bugged Merkel's phone from 2002 until 2013, report claims
2013-10-27
http://www.bbc.co.uk/news/world-europe-24690055
2013-10-28 22:39:50
attachment
BBC News - US bugged Merkel's phone from 2002 until 2013, report claims
2013-10-28 22:39:51
http://www.bbc.co.uk/news/world-europe-24690055
text/html
utf-8
webpage
Everyone has secrets, so start worrying before the state grabs them all | The Sunday Times
http://www.thesundaytimes.co.uk/sto/comment/columns/JenniRussell/article1332483.ece
2013-10-28 22:39:59
attachment
Everyone has secrets, so start worrying before the state grabs them all | The Sunday Times
2013-10-28 22:40:00
http://www.thesundaytimes.co.uk/sto/comment/columns/JenniRussell/article1332483.ece
text/html
utf-8
webpage
Media reports suggest Obama knew NSA spied on Merkel | News | DW.DE | 27.10.2013
http://www.dw.de/media-reports-suggest-obama-knew-nsa-spied-on-merkel/a-17185662
2013-10-28 22:40:10
attachment
Media reports suggest Obama knew NSA spied on Merkel | News | DW.DE | 27.10.2013
2013-10-28 22:40:11
http://www.dw.de/media-reports-suggest-obama-knew-nsa-spied-on-merkel/a-17185662
text/html
utf-8
webpage
How embassy eavesdropping works | www.duncan.gn.apc.org
http://www.duncancampbell.org/embassy-bugging
2013-10-28 22:41:01
attachment
How embassy eavesdropping works | www.duncan.gn.apc.org
2013-10-28 22:41:02
http://www.duncancampbell.org/embassy-bugging
text/html
utf-8
webpage
Is Glenn Greenwald the Future of News? - NYTimes.com
http://www.nytimes.com/2013/10/28/opinion/a-conversation-in-lieu-of-a-column.html
2013-10-28 22:41:05
attachment
Is Glenn Greenwald the Future of News? - NYTimes.com
2013-10-28 22:41:06
http://www.nytimes.com/2013/10/28/opinion/a-conversation-in-lieu-of-a-column.html
text/html
utf-8
webpage
Mail Online
Thornhill
Ted
Spain claims NSA monitored 60 million phone calls in a single month | Mail Online
2013-10-28
http://www.dailymail.co.uk/news/article-2478204/Spain-claims-NSA-monitored-60-million-phone-calls-single-month.html
2013-10-28 22:41:15
attachment
Spain claims NSA monitored 60 million phone calls in a single month | Mail Online
2013-10-28 22:41:16
http://www.dailymail.co.uk/news/article-2478204/Spain-claims-NSA-monitored-60-million-phone-calls-single-month.html
text/html
windows-1252
webpage
BBC News - NSA 'monitored 60m Spanish calls in a month'
2013-10-28
http://www.bbc.co.uk/news/world-us-canada-24699733
2013-10-28 22:41:21
attachment
BBC News - NSA 'monitored 60m Spanish calls in a month'
2013-10-28 22:41:22
http://www.bbc.co.uk/news/world-us-canada-24699733
text/html
utf-8
blogPost
The New Yorker Blogs
Davidson
Amy
NSA
NSA Scandal
politics
How to Tell When the N.S.A. Is Lying
December 5, 2013
http://www.newyorker.com/online/blogs/closeread/2013/12/how-to-tell-when-the-nsa-is-lying.html
2013-12-06 21:49:17
attachment
The New Yorker
2013-12-06 21:49:19
http://www.newyorker.com/online/blogs/closeread/2013/12/how-to-tell-when-the-nsa-is-lying.html?printable=true
blogPost
Wired - Threat Level
Zetter
Kim
Cayman Islands Bank Gets Wikileaks Taken Offline in U.S
2008-02-18
http://www.wired.com/threatlevel/2008/02/cayman-island-b/
2013-11-05 20:12:10
attachment
Cayman Islands Bank Gets Wikileaks Taken Offline in U.S. -- Updated with Links | Threat Level | Wired.com
2013-11-05 20:12:11
http://www.wired.com/threatlevel/2008/02/cayman-island-b/
text/html
utf-8
attachment
Microsoft Word - 839242_1.DOC - Dynadot-injunction.pdf
2013-11-05 20:12:19
http://www.wired.com/images_blogs/threatlevel/files/Dynadot-injunction.pdf
application/pdf
utf-8
newspaperArticle
SFGate
Egelko
Bob
S.F. judge dissolves his Wikileaks injunction
2008-03-01
http://www.sfgate.com/bayarea/article/S-F-judge-dissolves-his-Wikileaks-injunction-3226168.php
2013-11-05 20:13:43
attachment
S.F. judge dissolves his Wikileaks injunction - SFGate
2013-11-05 20:13:44
http://www.sfgate.com/bayarea/article/S-F-judge-dissolves-his-Wikileaks-injunction-3226168.php
text/html
utf-8
newspaperArticle
US
New York Times
Liptak
Adam
Ralph Fertig’s Case Pits Free Speech Against Terror Fight
2010-02-10
http://www.nytimes.com/2010/02/11/us/11law.html?_r=0
2013-11-05 20:15:24
attachment
Ralph Fertig’s Case Pits Free Speech Against Terror Fight - NYTimes.com
2013-11-05 20:15:25
http://www.nytimes.com/2010/02/11/us/11law.html?_r=0
text/html
windows-1252
magazineArticle
PCWorld
Brandt
Andrew
Privacy Watch: Soon, Your Cell Phone May Be Tracking You
2004-02-25
http://www.techhive.com/article/114721/article.html
2013-11-05 20:18:20
attachment
Privacy Watch: Soon, Your Cell Phone May Be Tracking You | TechHive
2013-11-05 20:18:21
http://www.techhive.com/article/114721/article.html
text/html
utf-8
magazineArticle
WIRED
Singel
Ryan
U.S. Cell-Phone Tracking Clipped
2005-10-27
http://www.wired.com/science/discoveries/news/2005/10/69390
2013-11-05 20:19:44
attachment
U.S. Cell-Phone Tracking Clipped
2013-11-05 20:19:45
http://www.wired.com/science/discoveries/news/2005/10/69390
text/html
utf-8
newspaperArticle
Technology
Washington Post
Nakashima
Ellen
Cellphone Tracking Powers on Request
2007-11-23
http://www.washingtonpost.com/wp-dyn/content/article/2007/11/22/AR2007112201444.html?hpid=topnews
2013-11-05 20:20:42
attachment
Cellphone Tracking Powers on Request
2013-11-05 20:20:43
http://www.washingtonpost.com/wp-dyn/content/article/2007/11/22/AR2007112201444.html?hpid=topnews
text/html
utf-8
blogPost
Apple Fritter
Qwad
Tom
Data Mining 101: Finding Subversives with Amazon Wishlists
2006-01-04
http://www.applefritter.com/bannedbooks
2013-11-05 20:21:20
attachment
Data Mining 101: Finding Subversives with Amazon Wishlists | Applefritter
2013-11-05 20:21:21
http://www.applefritter.com/bannedbooks
text/html
utf-8
blogPost
Ars Technica
Stokes
Jon
warrantless wiretap
The new technology at the root of the NSA wiretap scandal
2005-12-20
http://arstechnica.com/uncategorized/2005/12/5808-2/
2013-11-05 20:24:22
attachment
The new technology at the root of the NSA wiretap scandal | Ars Technica
2013-11-05 20:24:23
http://arstechnica.com/uncategorized/2005/12/5808-2/
text/html
utf-8
blogPost
Ars Technica
Paul
Ryan
warrantless wiretap
President Bush, NSA accused of wiretap abuse
2005-12-17
http://arstechnica.com/uncategorized/2005/12/5791-2/
2013-11-05 20:25:08
attachment
President Bush, NSA accused of wiretap abuse | Ars Technica
2013-11-05 20:25:09
http://arstechnica.com/uncategorized/2005/12/5791-2/
text/html
utf-8
newspaperArticle
Business
Guardian
Boggan
Steve
Q. What could a boarding pass tell an identity fraudster about you? A. Way too much
2006-05-02
http://www.theguardian.com/business/2006/may/03/theairlineindustry.idcards
2013-11-05 20:27:07
attachment
Q. What could a boarding pass tell an identity fraudster about you? A. Way too much | Business | The Guardian
2013-11-05 20:27:08
http://www.theguardian.com/business/2006/may/03/theairlineindustry.idcards
text/html
utf-8
newspaperArticle
Technology
New York Times
Barbaro
Michael
Zeller Jr.
Tom
A Face Is Exposed for AOL Searcher No. 4417749
2006-08-09
http://www.nytimes.com/2006/08/09/technology/09aol.html?_r=1&oref=slogin&pagewanted=all
2013-11-05 20:28:05
attachment
A Face Is Exposed for AOL Searcher No. 4417749 - New York Times
2013-11-05 20:28:06
http://www.nytimes.com/2006/08/09/technology/09aol.html?_r=1&oref=slogin&pagewanted=all
text/html
windows-1252
blogPost
Ars Technica
Bangeman
Eric
AOL data leak may give data retention bill new life
2006-08-13
http://arstechnica.com/uncategorized/2006/08/7488/
2013-11-05 20:29:39
attachment
AOL data leak may give data retention bill new life | Ars Technica
2013-11-05 20:29:40
http://arstechnica.com/uncategorized/2006/08/7488/
text/html
utf-8
blogPost
Ars Technica
Anderson
Nate
AOL releases search data on 500,000 users (updated)
2006-08-07
http://arstechnica.com/uncategorized/2006/08/7433/
2013-11-05 20:31:07
attachment
AOL releases search data on 500,000 users (updated) | Ars Technica
2013-11-05 20:31:08
http://arstechnica.com/uncategorized/2006/08/7433/
text/html
utf-8
blogPost
TechCrunch
Arrington
Michael
AOL Proudly Releases Massive Amounts of Private Data
2006-08-06
http://techcrunch.com/2006/08/06/aol-proudly-releases-massive-amounts-of-user-search-data/
2013-11-05 20:31:34
attachment
AOL Proudly Releases Massive Amounts of Private Data | TechCrunch
2013-11-05 20:31:35
http://techcrunch.com/2006/08/06/aol-proudly-releases-massive-amounts-of-user-search-data/
text/html
utf-8
magazineArticle
PCWorld
Perez
Juan Carlos
Facebook's Beacon More Intrusive Than Previously Thought
2007-11-30
http://www.pcworld.com/article/140182/article.html
2013-11-05 20:34:19
attachment
Facebook's Beacon More Intrusive Than Previously Thought | PCWorld
2013-11-05 20:34:20
http://www.pcworld.com/article/140182/article.html
text/html
utf-8
newspaperArticle
New York Times
Hafner
Katie
Richtel
Matt
Google Resists U.S. Subpoena of Search Data
2006-01-19
http://emoglen.law.columbia.edu/CPC/NYT_20google.html
2013-11-05 20:35:48
attachment
Google Resists U.S. Subpoena of Search Data - New York Times
2013-11-05 20:35:49
http://emoglen.law.columbia.edu/CPC/NYT_20google.html
text/html
windows-1252
newspaperArticle
New York Times
Hafner
Katie
After Subpoenas, Internet Searches Give Some Pause
2006-01-25
http://emoglen.law.columbia.edu/CPC/NYT_25privacy.html
2013-11-05 20:36:50
attachment
After Subpoenas, Internet Searches Give Some Pause - New York Times
2013-11-05 20:36:51
http://emoglen.law.columbia.edu/CPC/NYT_25privacy.html
text/html
windows-1252
newspaperArticle
New York Times
Risen
James
Lichtblau
Eric
warrantless wiretap
Bush Secretly Lifted Some Limits on Spying in U.S. After 9/11, Officials Say
2005-12-15
http://emoglen.law.columbia.edu/CPC/NYT_15cnd-program.html
2013-11-05 20:37:22
attachment
Bush Secretly Lifted Some Limits on Spying in U.S. After 9/11, Officials Say - New York Times
2013-11-05 20:37:23
http://emoglen.law.columbia.edu/CPC/NYT_15cnd-program.html
text/html
windows-1252
attachment
DoJ Letter on Legal Authority for NSA Surveillance - spying_doj122205.pdf
2013-11-05 20:43:18
http://emoglen.law.columbia.edu/CPC/spying_doj122205.pdf
application/pdf
utf-8
attachment
Legal Authorities Supporting the Activities of the National Security Agency Described by the President - spying_doj011906.pdf
2013-11-05 20:49:21
http://emoglen.law.columbia.edu/CPC/spying_doj011906.pdf
application/pdf
utf-8
attachment
Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information - spying_crs010506.pdf
2013-11-05 20:43:22
http://emoglen.law.columbia.edu/CPC/spying_crs010506.pdf
application/pdf
utf-8
newspaperArticle
Washington Post
Eggen
Dan
warrantless wiretap
Bush Authorized Domestic Spying
2005-12-16
http://www.washingtonpost.com/wp-dyn/content/article/2005/12/16/AR2005121600021.html
2013-11-05 20:38:02
attachment
Bush Authorized Domestic Spying
2013-11-05 20:38:03
http://www.washingtonpost.com/wp-dyn/content/article/2005/12/16/AR2005121600021.html
text/html
utf-8
webpage
CNN
Kelli
Arena
warrantless wiretap
Bush says he signed NSA wiretap order
2005-12-17
http://www.cnn.com/2005/POLITICS/12/17/bush.nsa/
2013-11-05 20:38:33
attachment
CNN.com - Bush says he signed NSA wiretap order - Dec 17, 2005
2013-11-05 20:38:34
http://www.cnn.com/2005/POLITICS/12/17/bush.nsa/
text/html
windows-1252
webpage
CBS News
News
CBS
Press
Associated
warrantless wiretap
Bush Defends Domestic Spying
2009-02-11
http://www.cbsnews.com/stories/2006/01/01/politics/main1172507.shtml
2013-11-05 20:40:27
attachment
Bush Defends Domestic Spying - CBS News
2013-11-05 20:40:28
http://www.cbsnews.com/stories/2006/01/01/politics/main1172507.shtml
text/html
windows-1252
webpage
CNN
Frieden
Terry
warrantless wiretap
Gonzales to testify on domestic spying
2006-01-13
http://www.cnn.com/2006/POLITICS/01/13/nsa.congress/
2013-11-05 20:42:25
attachment
CNN.com - Gonzales to testify on domestic spying - Jan 13, 2006
2013-11-05 20:42:26
http://www.cnn.com/2006/POLITICS/01/13/nsa.congress/
text/html
windows-1252
document
Bradley
Curtis A.
Cole
David
Dellinger
Walter
Dworkin
Ronald
Epstein
Richard
Hongju Koh
Harold
Heymann
Philip B.
Lederman
Martin S.
Nolan
Beth
Sessions
William S.
Stone
Geoffrey R.
Sullivan
Kathleen M.
Tribe
Laurence H.
Van Alstyne
William W.
warrantless wiretap
A response to DoJ on warrantless surveillance
2006-01-09
attachment
A response to DoJ on warrantless surveillance - spying_doj-response.pdf
2013-11-05 20:48:10
http://emoglen.law.columbia.edu/CPC/spying_doj-response.pdf
<div id="outerContainer">
<div id="sidebarContainer"></div>
<div id="mainContainer">
<div id="viewerContainer">
<div id="viewer"><a name="1"></a>
<div id="pageContainer1" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 404px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">1</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 94.72px; transform: scale(0.661, 1); transform-origin: 0% 0% 0px;" dir="ltr">January 9, 2006</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.528565, 1); transform-origin: 0% 0% 0px;" dir="ltr">The Hon. Bill Frist The Hon. Harry Reid</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 149.92px; transform: scale(0.381257, 1); transform-origin: 0% 0% 0px;" dir="ltr">Majority Leader Minority Leader</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 168.32px; transform: scale(0.616907, 1); transform-origin: 0% 0% 0px;" dir="ltr">United States Senate</div>
<div style="font-size: 16px; font-family: serif; left: 288px; top: 168.32px; transform: scale(0.245677, 1); transform-origin: 0% 0% 0px;" dir="ltr">United States Senate</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 186.72px; transform: scale(0.632232, 1); transform-origin: 0% 0% 0px;" dir="ltr">Washington, D.C. 20510</div>
<div style="font-size: 16px; font-family: serif; left: 336px; top: 186.72px; transform: scale(0.604325, 1); transform-origin: 0% 0% 0px;" dir="ltr">Washington, D.C. 20510</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 223.52px; transform: scale(0.580823, 1); transform-origin: 0% 0% 0px;" dir="ltr">The Hon. J. Dennis Hastert The Hon. Nancy Pelosi</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 241.92px; transform: scale(0.476491, 1); transform-origin: 0% 0% 0px;" dir="ltr">Speaker Minority Leader</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 260.32px; transform: scale(0.594935, 1); transform-origin: 0% 0% 0px;" dir="ltr">U.S. House of Representatives</div>
<div style="font-size: 16px; font-family: serif; left: 384px; top: 260.32px; transform: scale(0.66656, 1); transform-origin: 0% 0% 0px;" dir="ltr">U.S. House of Representatives</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 278.72px; transform: scale(0.591258, 1); transform-origin: 0% 0% 0px;" dir="ltr">Washington, DC 20515 Washington, DC 20515</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 315.52px; transform: scale(0.564391, 1); transform-origin: 0% 0% 0px;" dir="ltr">The Hon. Arlen Specter The Hon. Patrick Leahy</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 333.92px; transform: scale(0.425609, 1); transform-origin: 0% 0% 0px;" dir="ltr">Chairman Ranking Minority Member</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 352.32px; transform: scale(0.653408, 1); transform-origin: 0% 0% 0px;" dir="ltr">Senate Judiciary Committee</div>
<div style="font-size: 16px; font-family: serif; left: 336px; top: 352.32px; transform: scale(0.596275, 1); transform-origin: 0% 0% 0px;" dir="ltr">Senate Judiciary Committee</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 370.72px; transform: scale(0.616907, 1); transform-origin: 0% 0% 0px;" dir="ltr">United States Senate</div>
<div style="font-size: 16px; font-family: serif; left: 288px; top: 370.72px; transform: scale(0.245677, 1); transform-origin: 0% 0% 0px;" dir="ltr">United States Senate</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 389.12px; transform: scale(0.632232, 1); transform-origin: 0% 0% 0px;" dir="ltr">Washington, D.C. 20510</div>
<div style="font-size: 16px; font-family: serif; left: 336px; top: 389.12px; transform: scale(0.604325, 1); transform-origin: 0% 0% 0px;" dir="ltr">Washington, D.C. 20510</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 425.92px; transform: scale(0.643443, 1); transform-origin: 0% 0% 0px;" dir="ltr">The Hon. F. James Sensenbrenner, Jr. The Hon. John Conyers</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 444.32px; transform: scale(0.425609, 1); transform-origin: 0% 0% 0px;" dir="ltr">Chairman Ranking Minority Member</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 462.72px; transform: scale(0.603504, 1); transform-origin: 0% 0% 0px;" dir="ltr">House Judiciary Committee House Judiciary Committee</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 481.12px; transform: scale(0.594935, 1); transform-origin: 0% 0% 0px;" dir="ltr">U.S. House of Representatives</div>
<div style="font-size: 16px; font-family: serif; left: 384px; top: 481.12px; transform: scale(0.66656, 1); transform-origin: 0% 0% 0px;" dir="ltr">U.S. House of Representatives</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 499.52px; transform: scale(0.591258, 1); transform-origin: 0% 0% 0px;" dir="ltr">Washington, DC 20515 Washington, DC 20515</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 536.32px; transform: scale(0.511546, 1); transform-origin: 0% 0% 0px;" dir="ltr">The Hon. Pat Roberts The</div>
<div style="font-size: 16px; font-family: serif; left: 412.88px; top: 536.32px; transform: scale(0.664833, 1); transform-origin: 0% 0% 0px;" dir="ltr">Hon. John D. Rockefeller, IV</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 554.72px; transform: scale(0.29048, 1); transform-origin: 0% 0% 0px;" dir="ltr">Chairman Vice Chairman</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 573.04px; transform: scale(0.642463, 1); transform-origin: 0% 0% 0px;" dir="ltr">Senate Select Committee on Intelligence Senate Select Committee on Intelligence</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 591.44px; transform: scale(0.616907, 1); transform-origin: 0% 0% 0px;" dir="ltr">United States Senate</div>
<div style="font-size: 16px; font-family: serif; left: 288px; top: 591.44px; transform: scale(0.245677, 1); transform-origin: 0% 0% 0px;" dir="ltr">United States Senate</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 609.84px; transform: scale(0.632232, 1); transform-origin: 0% 0% 0px;" dir="ltr">Washington, D.C. 20510</div>
<div style="font-size: 16px; font-family: serif; left: 336px; top: 609.84px; transform: scale(0.604325, 1); transform-origin: 0% 0% 0px;" dir="ltr">Washington, D.C. 20510</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 646.64px; transform: scale(0.579549, 1); transform-origin: 0% 0% 0px;" dir="ltr">The Hon. Peter Hoekstra The Hon. Jane Harman</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 665.04px; transform: scale(0.298851, 1); transform-origin: 0% 0% 0px;" dir="ltr">Chairman Ranking Minority Member</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 683.44px; transform: scale(0.676767, 1); transform-origin: 0% 0% 0px;" dir="ltr">Permanent Select Committee</div>
<div style="font-size: 16px; font-family: serif; left: 336px; top: 683.44px; transform: scale(0.612271, 1); transform-origin: 0% 0% 0px;" dir="ltr">Permanent Select Committee</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 701.84px; transform: scale(0.221484, 1); transform-origin: 0% 0% 0px;" dir="ltr">on Intelligence on Intelligence</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 720.24px; transform: scale(0.657641, 1); transform-origin: 0% 0% 0px;" dir="ltr">U.S. House of Representatives</div>
<div style="font-size: 16px; font-family: serif; left: 336px; top: 720.24px; transform: scale(0.590339, 1); transform-origin: 0% 0% 0px;" dir="ltr">U.S. House of Representatives</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 738.64px; transform: scale(0.632232, 1); transform-origin: 0% 0% 0px;" dir="ltr">Washington, D.C. 20515</div>
<div style="font-size: 16px; font-family: serif; left: 336px; top: 738.64px; transform: scale(0.604325, 1); transform-origin: 0% 0% 0px;" dir="ltr">Washington, D.C. 20515</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 793.84px; transform: scale(0.71152, 1); transform-origin: 0% 0% 0px;" dir="ltr">Dear Members of Congress:</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 830.64px; transform: scale(0.582312, 1); transform-origin: 0% 0% 0px;" dir="ltr">We are scholars of constitutional law a</div>
<div style="font-size: 16px; font-family: serif; left: 440.8px; top: 830.64px; transform: scale(0.66247, 1); transform-origin: 0% 0% 0px;" dir="ltr">nd former government officials. We write</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 849.04px; transform: scale(0.624072, 1); transform-origin: 0% 0% 0px;" dir="ltr">in our individual capacities as citizens concerne</div>
<div style="font-size: 16px; font-family: serif; left: 401.68px; top: 849.04px; transform: scale(0.656222, 1); transform-origin: 0% 0% 0px;" dir="ltr">d by the Bush Administration’s National Security</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 867.44px; transform: scale(0.66292, 1); transform-origin: 0% 0% 0px;" dir="ltr">Agency domestic spying program, as reported in the New York Times, and in particular to</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 885.84px; transform: scale(0.67687, 1); transform-origin: 0% 0% 0px;" dir="ltr">respond to the Justice Department’s December 2</div>
<div style="font-size: 16px; font-family: serif; left: 407.04px; top: 885.84px; transform: scale(0.621709, 1); transform-origin: 0% 0% 0px;" dir="ltr">2, 2005 letter to the majority and minority</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 904.24px; transform: scale(0.646451, 1); transform-origin: 0% 0% 0px;" dir="ltr">leaders of the House and Senate Intelligence</div>
<div style="font-size: 16px; font-family: serif; left: 380.4px; top: 904.24px; transform: scale(0.635466, 1); transform-origin: 0% 0% 0px;" dir="ltr">Committees setting forth the administration’s</div>
</div>
</div>
<a name="2"></a>
<div id="pageContainer2" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 404px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">2</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 94.72px; transform: scale(0.660883, 1); transform-origin: 0% 0% 0px;" dir="ltr">defense of the program.</div>
<div style="font-size: 10.64px; font-family: serif; left: 247.92px; top: 92.72px; transform: scale(0.886667, 1); transform-origin: 0% 0% 0px;" dir="ltr">1</div>
<div style="font-size: 16px; font-family: serif; left: 253.28px; top: 94.7199px; transform: scale(0.670211, 1); transform-origin: 0% 0% 0px;" dir="ltr">Although the program’s secrecy preven</div>
<div style="font-size: 16px; font-family: serif; left: 514.56px; top: 94.7199px; transform: scale(0.603505, 1); transform-origin: 0% 0% 0px;" dir="ltr">ts us from being privy to all of</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.12px; transform: scale(0.61942, 1); transform-origin: 0% 0% 0px;" dir="ltr">its details, the Justice Department’s defense of</div>
<div style="font-size: 16px; font-family: serif; left: 393.2px; top: 113.12px; transform: scale(0.66664, 1); transform-origin: 0% 0% 0px;" dir="ltr">what it concedes wa</div>
<div style="font-size: 16px; font-family: serif; left: 526.56px; top: 113.12px; transform: scale(0.622573, 1); transform-origin: 0% 0% 0px;" dir="ltr">s secret and warrantless</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.613973, 1); transform-origin: 0% 0% 0px;" dir="ltr">electronic surveillance of</div>
<div style="font-size: 16px; font-family: serif; left: 261.68px; top: 131.52px; transform: scale(0.628035, 1); transform-origin: 0% 0% 0px;" dir="ltr">persons within the United States fail</div>
<div style="font-size: 16px; font-family: serif; left: 494.08px; top: 131.52px; transform: scale(0.601431, 1); transform-origin: 0% 0% 0px;" dir="ltr">s to identify any plausible legal</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 149.92px; transform: scale(0.632603, 1); transform-origin: 0% 0% 0px;" dir="ltr">authority for such surveillance. Accordingly th</div>
<div style="font-size: 16px; font-family: serif; left: 399.52px; top: 149.92px; transform: scale(0.643283, 1); transform-origin: 0% 0% 0px;" dir="ltr">e program appears on its fa</div>
<div style="font-size: 16px; font-family: serif; left: 573.2px; top: 149.92px; transform: scale(0.59577, 1); transform-origin: 0% 0% 0px;" dir="ltr">ce to violate existing</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 168.32px; transform: scale(0.62272, 1); transform-origin: 0% 0% 0px;" dir="ltr">law.</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 205.12px; transform: scale(0.63017, 1); transform-origin: 0% 0% 0px;" dir="ltr">The basic legal question here is</div>
<div style="font-size: 16px; font-family: serif; left: 345.36px; top: 205.12px; transform: scale(0.61936, 1); transform-origin: 0% 0% 0px;" dir="ltr">not new. In 1978, after an ex</div>
<div style="font-size: 16px; font-family: serif; left: 537.2px; top: 205.12px; transform: scale(0.610251, 1); transform-origin: 0% 0% 0px;" dir="ltr">tensive investigation of the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 223.52px; transform: scale(0.63136, 1); transform-origin: 0% 0% 0px;" dir="ltr">privacy violations associated with foreign in</div>
<div style="font-size: 16px; font-family: serif; left: 379.92px; top: 223.52px; transform: scale(0.618966, 1); transform-origin: 0% 0% 0px;" dir="ltr">telligence surveillance pr</div>
<div style="font-size: 16px; font-family: serif; left: 540.8px; top: 223.52px; transform: scale(0.676947, 1); transform-origin: 0% 0% 0px;" dir="ltr">ograms, Congress and the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 241.92px; transform: scale(0.646133, 1); transform-origin: 0% 0% 0px;" dir="ltr">President enacted the Foreign</div>
<div style="font-size: 16px; font-family: serif; left: 289.76px; top: 241.92px; transform: scale(0.620518, 1); transform-origin: 0% 0% 0px;" dir="ltr">Intelligence Surveill</div>
<div style="font-size: 16px; font-family: serif; left: 419.92px; top: 241.92px; transform: scale(0.644701, 1); transform-origin: 0% 0% 0px;" dir="ltr">ance Act (FISA). Pub. L. 95-511, 92 Stat.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 260.32px; transform: scale(0.662975, 1); transform-origin: 0% 0% 0px;" dir="ltr">1783. FISA comprehensively regulates electronic</div>
<div style="font-size: 16px; font-family: serif; left: 420.72px; top: 260.32px; transform: scale(0.617727, 1); transform-origin: 0% 0% 0px;" dir="ltr">surveillance within the United States, striking</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 278.72px; transform: scale(0.651893, 1); transform-origin: 0% 0% 0px;" dir="ltr">a careful balance between prot</div>
<div style="font-size: 16px; font-family: serif; left: 291.52px; top: 278.72px; transform: scale(0.596976, 1); transform-origin: 0% 0% 0px;" dir="ltr">ecting civil liberties and pres</div>
<div style="font-size: 16px; font-family: serif; left: 476.4px; top: 278.72px; transform: scale(0.622528, 1); transform-origin: 0% 0% 0px;" dir="ltr">erving the “vitally important</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 297.12px; transform: scale(0.658997, 1); transform-origin: 0% 0% 0px;" dir="ltr">government purpose” of obtaining valuable intelligen</div>
<div style="font-size: 16px; font-family: serif; left: 438.56px; top: 297.12px; transform: scale(0.607573, 1); transform-origin: 0% 0% 0px;" dir="ltr">ce in order to safeguard national security.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 315.52px; transform: scale(0.605097, 1); transform-origin: 0% 0% 0px;" dir="ltr">S. Rep. No. 95-604, pt. 1, at 9 (1977).</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 352.32px; transform: scale(0.674687, 1); transform-origin: 0% 0% 0px;" dir="ltr">With minor exceptions, FISA authorizes</div>
<div style="font-size: 16px; font-family: serif; left: 407.12px; top: 352.32px; transform: scale(0.629486, 1); transform-origin: 0% 0% 0px;" dir="ltr">electronic surveillance only upon certain</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 370.72px; transform: scale(0.652987, 1); transform-origin: 0% 0% 0px;" dir="ltr">specified showings, and only if approved by a co</div>
<div style="font-size: 16px; font-family: serif; left: 409.28px; top: 370.72px; transform: scale(0.597151, 1); transform-origin: 0% 0% 0px;" dir="ltr">urt. The statute specifically allows for</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 389.12px; transform: scale(0.641493, 1); transform-origin: 0% 0% 0px;" dir="ltr">warrantless</div>
<div style="font-size: 16px; font-family: serif; left: 172.88px; top: 389.12px; transform: scale(0.749577, 1); transform-origin: 0% 0% 0px;" dir="ltr">wartime</div>
<div style="font-size: 16px; font-family: serif; left: 225.36px; top: 389.12px; transform: scale(0.616043, 1); transform-origin: 0% 0% 0px;" dir="ltr">domestic electronic surveillance—but only for the first fifteen days of a war.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 407.52px; transform: scale(0.648137, 1); transform-origin: 0% 0% 0px;" dir="ltr">50 U.S.C. § 1811. It makes criminal any electron</div>
<div style="font-size: 16px; font-family: serif; left: 413.68px; top: 407.52px; transform: scale(0.610914, 1); transform-origin: 0% 0% 0px;" dir="ltr">ic surveillance not authorized by statute,</div>
<div style="font-size: 16px; font-family: serif; left: 676.24px; top: 407.52px; transform: scale(0.51216, 1); transform-origin: 0% 0% 0px;" dir="ltr">id.</div>
<div style="font-size: 16px; font-family: serif; left: 696.72px; top: 407.52px; transform: scale(0.6, 1); transform-origin: 0% 0% 0px;" dir="ltr">§</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 425.92px; transform: scale(0.630255, 1); transform-origin: 0% 0% 0px;" dir="ltr">1809; and it expressly establishe</div>
<div style="font-size: 16px; font-family: serif; left: 304px; top: 425.92px; transform: scale(0.65135, 1); transform-origin: 0% 0% 0px;" dir="ltr">s FISA and specified provisions</div>
<div style="font-size: 16px; font-family: serif; left: 512.4px; top: 425.92px; transform: scale(0.624519, 1); transform-origin: 0% 0% 0px;" dir="ltr">of the federal criminal code</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 444.32px; transform: scale(0.668563, 1); transform-origin: 0% 0% 0px;" dir="ltr">(which govern wiretaps for crim</div>
<div style="font-size: 16px; font-family: serif; left: 303.04px; top: 444.32px; transform: scale(0.600743, 1); transform-origin: 0% 0% 0px;" dir="ltr">inal investigation) as the “</div>
<div style="font-size: 16px; font-family: serif; left: 471.12px; top: 444.32px; transform: scale(0.650916, 1); transform-origin: 0% 0% 0px;" dir="ltr">exclusive</div>
<div style="font-size: 16px; font-family: serif; left: 529.76px; top: 444.32px; transform: scale(0.663692, 1); transform-origin: 0% 0% 0px;" dir="ltr">means by which electronic</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 462.72px; transform: scale(0.654482, 1); transform-origin: 0% 0% 0px;" dir="ltr">surveillance ... may be conducted,” 18 U.</div>
<div style="font-size: 16px; font-family: serif; left: 364.32px; top: 462.72px; transform: scale(0.659086, 1); transform-origin: 0% 0% 0px;" dir="ltr">S.C. § 2511(2)(f) (emphasis added).</div>
<div style="font-size: 10.64px; font-family: serif; left: 594.88px; top: 460.72px; transform: scale(0.886667, 1); transform-origin: 0% 0% 0px;" dir="ltr">2</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 499.52px; transform: scale(0.600012, 1); transform-origin: 0% 0% 0px;" dir="ltr">The Department of Justice concedes that</div>
<div style="font-size: 16px; font-family: serif; left: 407.92px; top: 499.52px; transform: scale(0.713113, 1); transform-origin: 0% 0% 0px;" dir="ltr">the NSA program was not</div>
<div style="font-size: 16px; font-family: serif; left: 579.04px; top: 499.52px; transform: scale(0.647307, 1); transform-origin: 0% 0% 0px;" dir="ltr">authorized by any of</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 517.92px; transform: scale(0.633816, 1); transform-origin: 0% 0% 0px;" dir="ltr">the above provisions. It maintains, however,</div>
<div style="font-size: 16px; font-family: serif; left: 387.52px; top: 517.92px; transform: scale(0.625892, 1); transform-origin: 0% 0% 0px;" dir="ltr">that the program did not violate existing law</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 536.32px; transform: scale(0.671626, 1); transform-origin: 0% 0% 0px;" dir="ltr">because Congress implicitly authorized the NSA</div>
<div style="font-size: 16px; font-family: serif; left: 411.44px; top: 536.32px; transform: scale(0.656323, 1); transform-origin: 0% 0% 0px;" dir="ltr">program when it enacted the Authorization for</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 554.72px; transform: scale(0.688669, 1); transform-origin: 0% 0% 0px;" dir="ltr">Use of Military Force (AUMF) against al Qaed</div>
<div style="font-size: 16px; font-family: serif; left: 398.64px; top: 554.72px; transform: scale(0.630212, 1); transform-origin: 0% 0% 0px;" dir="ltr">a, Pub. L. No. 107-40, 115 Stat. 224 (2001). But</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 573.04px; transform: scale(0.694469, 1); transform-origin: 0% 0% 0px;" dir="ltr">the AUMF cannot reasonably be construed to</div>
<div style="font-size: 16px; font-family: serif; left: 387.52px; top: 573.04px; transform: scale(0.617543, 1); transform-origin: 0% 0% 0px;" dir="ltr">implicitly authorize warrantless electronic</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 591.44px; transform: scale(0.625512, 1); transform-origin: 0% 0% 0px;" dir="ltr">surveillance in the United Stat</div>
<div style="font-size: 16px; font-family: serif; left: 289.76px; top: 591.44px; transform: scale(0.689507, 1); transform-origin: 0% 0% 0px;" dir="ltr">es during wartime, where Congre</div>
<div style="font-size: 16px; font-family: serif; left: 503.44px; top: 591.44px; transform: scale(0.62128, 1); transform-origin: 0% 0% 0px;" dir="ltr">ss has expressly and specifically</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 609.84px; transform: scale(0.644918, 1); transform-origin: 0% 0% 0px;" dir="ltr">addressed that precise question in FISA and limite</div>
<div style="font-size: 16px; font-family: serif; left: 418.16px; top: 609.84px; transform: scale(0.613773, 1); transform-origin: 0% 0% 0px;" dir="ltr">d any such warrantless surveillance to the first</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 628.24px; transform: scale(0.57728, 1); transform-origin: 0% 0% 0px;" dir="ltr">fifteen days of war.</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 665.04px; transform: scale(0.660174, 1); transform-origin: 0% 0% 0px;" dir="ltr">The DOJ also invokes the President’s inherent</div>
<div style="font-size: 16px; font-family: serif; left: 440.96px; top: 665.04px; transform: scale(0.652389, 1); transform-origin: 0% 0% 0px;" dir="ltr">constitutional authority as Commander in</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 683.44px; transform: scale(0.611768, 1); transform-origin: 0% 0% 0px;" dir="ltr">Chief to collect “signals intelligence” targeted</div>
<div style="font-size: 16px; font-family: serif; left: 395.52px; top: 683.44px; transform: scale(0.655641, 1); transform-origin: 0% 0% 0px;" dir="ltr">at the enemy, and maintains that construing FISA</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 701.84px; transform: scale(0.625338, 1); transform-origin: 0% 0% 0px;" dir="ltr">to prohibit the President’s actions would raise co</div>
<div style="font-size: 16px; font-family: serif; left: 408.32px; top: 701.84px; transform: scale(0.628336, 1); transform-origin: 0% 0% 0px;" dir="ltr">nstitutional questions. But even conceding that</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 720.24px; transform: scale(0.64954, 1); transform-origin: 0% 0% 0px;" dir="ltr">the President in his role as Commander in Chief</div>
<div style="font-size: 16px; font-family: serif; left: 407.44px; top: 720.24px; transform: scale(0.625517, 1); transform-origin: 0% 0% 0px;" dir="ltr">may generally collect signals intelligence on the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 738.64px; transform: scale(0.664157, 1); transform-origin: 0% 0% 0px;" dir="ltr">enemy abroad, Congress indisputably has authority</div>
<div style="font-size: 16px; font-family: serif; left: 428px; top: 738.64px; transform: scale(0.604501, 1); transform-origin: 0% 0% 0px;" dir="ltr">to regulate electronic</div>
<div style="font-size: 16px; font-family: serif; left: 566.96px; top: 738.64px; transform: scale(0.62464, 1); transform-origin: 0% 0% 0px;" dir="ltr">surveillance within the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 757.04px; transform: scale(0.64865, 1); transform-origin: 0% 0% 0px;" dir="ltr">United States, as it has done in FISA. Where C</div>
<div style="font-size: 16px; font-family: serif; left: 400.8px; top: 757.04px; transform: scale(0.630857, 1); transform-origin: 0% 0% 0px;" dir="ltr">ongress has so regulated, th</div>
<div style="font-size: 16px; font-family: serif; left: 577.2px; top: 757.04px; transform: scale(0.609197, 1); transform-origin: 0% 0% 0px;" dir="ltr">e President can act in</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 775.44px; transform: scale(0.620992, 1); transform-origin: 0% 0% 0px;" dir="ltr">contravention of statute</div>
<div style="font-size: 16px; font-family: serif; left: 251.12px; top: 775.44px; transform: scale(0.582016, 1); transform-origin: 0% 0% 0px;" dir="ltr">only if his authority is</div>
<div style="font-size: 16px; font-family: serif; left: 396.48px; top: 775.44px; transform: scale(0.65152, 1); transform-origin: 0% 0% 0px;" dir="ltr">exclusive</div>
<div style="font-size: 16px; font-family: serif; left: 455.12px; top: 775.44px; transform: scale(0.60768, 1); transform-origin: 0% 0% 0px;" dir="ltr">, and not subject to the check of statutory</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 793.84px; transform: scale(0.639708, 1); transform-origin: 0% 0% 0px;" dir="ltr">regulation. The DOJ letter pointedly does not</div>
<div style="font-size: 16px; font-family: serif; left: 390.24px; top: 793.84px; transform: scale(0.624395, 1); transform-origin: 0% 0% 0px;" dir="ltr">make that extraordinary claim.</div>
<div style="font-size: 8.64px; font-family: serif; left: 96px; top: 850.24px; transform: scale(0.864, 1); transform-origin: 0% 0% 0px;" dir="ltr">1</div>
<div style="font-size: 13.36px; font-family: serif; left: 100.32px; top: 851.52px; transform: scale(0.662883, 1); transform-origin: 0% 0% 0px;" dir="ltr">The Justice Department letter can be found at</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9994px; top: 866.88px; transform: scale(0.810281, 1); transform-origin: 0% 0% 0px;" dir="ltr">www.nationalreview.com/pdf/12%2022%2005%20NSA%20letter.pdf</div>
<div style="font-size: 13.36px; font-family: serif; left: 471.92px; top: 866.88px; transform: scale(0.409985, 1); transform-origin: 0% 0% 0px;" dir="ltr">.</div>
<div style="font-size: 8.64px; font-family: serif; left: 96px; top: 896.24px; transform: scale(0.864, 1); transform-origin: 0% 0% 0px;" dir="ltr">2</div>
<div style="font-size: 13.36px; font-family: serif; left: 100.32px; top: 897.52px; transform: scale(0.674112, 1); transform-origin: 0% 0% 0px;" dir="ltr">More detail about the operation of FISA can be found in</div>
<div style="font-size: 13.36px; font-family: serif; left: 407.68px; top: 897.52px; transform: scale(0.715134, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congressional Research Servic</div>
<div style="font-size: 13.36px; font-family: serif; left: 573.521px; top: 897.52px; transform: scale(0.647645, 1); transform-origin: 0% 0% 0px;" dir="ltr">e, “Presidential Authority</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0007px; top: 912.88px; transform: scale(0.687417, 1); transform-origin: 0% 0% 0px;" dir="ltr">to Conduct Warrantless Electronic Surveillance to Gather Fo</div>
<div style="font-size: 13.36px; font-family: serif; left: 420.801px; top: 912.88px; transform: scale(0.649537, 1); transform-origin: 0% 0% 0px;" dir="ltr">reign Intelligence Information” (Jan. 5, 2006). This</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0007px; top: 928.24px; transform: scale(0.660855, 1); transform-origin: 0% 0% 0px;" dir="ltr">letter was drafted prior to release of the CRS Repo</div>
<div style="font-size: 13.36px; font-family: serif; left: 365.921px; top: 928.24px; transform: scale(0.668992, 1); transform-origin: 0% 0% 0px;" dir="ltr">rt, which corroborates the conclusions drawn here.</div>
</div>
</div>
<a name="3"></a>
<div id="pageContainer3" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 404px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">3</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 94.72px; transform: scale(0.685423, 1); transform-origin: 0% 0% 0px;" dir="ltr">Moreover, to construe the AUMF as the</div>
<div style="font-size: 16px; font-family: serif; left: 404.4px; top: 94.72px; transform: scale(0.63756, 1); transform-origin: 0% 0% 0px;" dir="ltr">DOJ suggests would itself raise serious</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.12px; transform: scale(0.632418, 1); transform-origin: 0% 0% 0px;" dir="ltr">constitutional questions under</div>
<div style="font-size: 16px; font-family: serif; left: 292px; top: 113.12px; transform: scale(0.696886, 1); transform-origin: 0% 0% 0px;" dir="ltr">the Fourth Amendment. The Supreme Court has never upheld</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.664491, 1); transform-origin: 0% 0% 0px;" dir="ltr">warrantless wiretapping with</div>
<div style="font-size: 16px; font-family: serif; left: 281.76px; top: 131.52px; transform: scale(0.626951, 1); transform-origin: 0% 0% 0px;" dir="ltr">in the United States. Accordingly,</div>
<div style="font-size: 16px; font-family: serif; left: 507.52px; top: 131.52px; transform: scale(0.603634, 1); transform-origin: 0% 0% 0px;" dir="ltr">the principle that statutes should</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 149.92px; transform: scale(0.626133, 1); transform-origin: 0% 0% 0px;" dir="ltr">be construed to avoid serious constitutional</div>
<div style="font-size: 16px; font-family: serif; left: 377.76px; top: 149.92px; transform: scale(0.648116, 1); transform-origin: 0% 0% 0px;" dir="ltr">questions provides an</div>
<div style="font-size: 16px; font-family: serif; left: 520.4px; top: 149.92px; transform: scale(0.619593, 1); transform-origin: 0% 0% 0px;" dir="ltr">additional reason for</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 168.32px; transform: scale(0.678189, 1); transform-origin: 0% 0% 0px;" dir="ltr">concluding that the AUMF does not authorize</div>
<div style="font-size: 16px; font-family: serif; left: 394.24px; top: 168.32px; transform: scale(0.576604, 1); transform-origin: 0% 0% 0px;" dir="ltr">the President’s actions here.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 205.28px; transform: scale(0.90496, 1); transform-origin: 0% 0% 0px;" dir="ltr">I. CONGRESS DID NOT IMPLICITLY AU</div>
<div style="font-size: 16px; font-family: serif; left: 404px; top: 205.28px; transform: scale(0.96171, 1); transform-origin: 0% 0% 0px;" dir="ltr">THORIZE THE NSA DOMESTIC SPYING</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 223.68px; transform: scale(0.930265, 1); transform-origin: 0% 0% 0px;" dir="ltr">PROGRAM IN THE AUMF, AND IN FACT EXPRESSLY PROHIBITED IT IN FISA</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 260.32px; transform: scale(0.660152, 1); transform-origin: 0% 0% 0px;" dir="ltr">The DOJ concedes (Letter at 4) that the NS</div>
<div style="font-size: 16px; font-family: serif; left: 421.2px; top: 260.32px; transform: scale(0.649155, 1); transform-origin: 0% 0% 0px;" dir="ltr">A program involves “electronic surveillance,”</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 278.72px; transform: scale(0.648011, 1); transform-origin: 0% 0% 0px;" dir="ltr">which is defined in FISA to</div>
<div style="font-size: 16px; font-family: serif; left: 277.44px; top: 278.72px; transform: scale(0.63285, 1); transform-origin: 0% 0% 0px;" dir="ltr">mean the interception of the</div>
<div style="font-size: 16px; font-family: serif; left: 460.88px; top: 278.72px; transform: scale(0.66836, 1); transform-origin: 0% 0% 0px;" dir="ltr">contents</div>
<div style="font-size: 16px; font-family: serif; left: 514.32px; top: 278.72px; transform: scale(0.616053, 1); transform-origin: 0% 0% 0px;" dir="ltr">of telephone, wire, or email</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 297.12px; transform: scale(0.621788, 1); transform-origin: 0% 0% 0px;" dir="ltr">communications that occur, at least in part,</div>
<div style="font-size: 16px; font-family: serif; left: 375.52px; top: 297.12px; transform: scale(0.622154, 1); transform-origin: 0% 0% 0px;" dir="ltr">in the United States. 50 U.S.C. §§ 1801(f)(1)-(2),</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 315.52px; transform: scale(0.668512, 1); transform-origin: 0% 0% 0px;" dir="ltr">1801(n). NSA engages in such surveillance without</div>
<div style="font-size: 16px; font-family: serif; left: 430.24px; top: 315.52px; transform: scale(0.604701, 1); transform-origin: 0% 0% 0px;" dir="ltr">judicial approval, a</div>
<div style="font-size: 16px; font-family: serif; left: 557.2px; top: 315.52px; transform: scale(0.656829, 1); transform-origin: 0% 0% 0px;" dir="ltr">nd apparently without</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 333.92px; transform: scale(0.666464, 1); transform-origin: 0% 0% 0px;" dir="ltr">the substantive showings that FISA requires—e.g</div>
<div style="font-size: 16px; font-family: serif; left: 413.2px; top: 333.92px; transform: scale(0.57184, 1); transform-origin: 0% 0% 0px;" dir="ltr">., that the subject is an</div>
<div style="font-size: 16px; font-family: serif; left: 555.92px; top: 333.92px; transform: scale(0.611589, 1); transform-origin: 0% 0% 0px;" dir="ltr">“agent of a foreign</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 352.32px; transform: scale(0.657013, 1); transform-origin: 0% 0% 0px;" dir="ltr">power.”</div>
<div style="font-size: 16px; font-family: serif; left: 155.12px; top: 352.32px; transform: scale(0.534, 1); transform-origin: 0% 0% 0px;" dir="ltr">Id.</div>
<div style="font-size: 16px; font-family: serif; left: 176.4px; top: 352.32px; transform: scale(0.668563, 1); transform-origin: 0% 0% 0px;" dir="ltr">§ 1805(a). The DOJ does not</div>
<div style="font-size: 16px; font-family: serif; left: 370.24px; top: 352.32px; transform: scale(0.629408, 1); transform-origin: 0% 0% 0px;" dir="ltr">argue that FISA itself au</div>
<div style="font-size: 16px; font-family: serif; left: 527.44px; top: 352.32px; transform: scale(0.620288, 1); transform-origin: 0% 0% 0px;" dir="ltr">thorizes such electronic</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 370.72px; transform: scale(0.645236, 1); transform-origin: 0% 0% 0px;" dir="ltr">surveillance; and, as the DOJ</div>
<div style="font-size: 16px; font-family: serif; left: 283.04px; top: 370.72px; transform: scale(0.653677, 1); transform-origin: 0% 0% 0px;" dir="ltr">letter acknowledges, 18 U.S.C.</div>
<div style="font-size: 16px; font-family: serif; left: 485.6px; top: 370.72px; transform: scale(0.671668, 1); transform-origin: 0% 0% 0px;" dir="ltr">§ 1809 makes criminal any</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 389.12px; transform: scale(0.626997, 1); transform-origin: 0% 0% 0px;" dir="ltr">electronic surveillance not au</div>
<div style="font-size: 16px; font-family: serif; left: 283.92px; top: 389.12px; transform: scale(0.583353, 1); transform-origin: 0% 0% 0px;" dir="ltr">thorized by statute.</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 425.92px; transform: scale(0.687573, 1); transform-origin: 0% 0% 0px;" dir="ltr">The DOJ nevertheless contends</div>
<div style="font-size: 16px; font-family: serif; left: 350.16px; top: 425.92px; transform: scale(0.647871, 1); transform-origin: 0% 0% 0px;" dir="ltr">that the surveillance is authorized by the AUMF, signed</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 444.32px; transform: scale(0.693987, 1); transform-origin: 0% 0% 0px;" dir="ltr">on September 18, 2001, which empowers the Presid</div>
<div style="font-size: 16px; font-family: serif; left: 428.88px; top: 444.32px; transform: scale(0.625432, 1); transform-origin: 0% 0% 0px;" dir="ltr">ent to use “all necessary and appropriate</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 462.72px; transform: scale(0.635881, 1); transform-origin: 0% 0% 0px;" dir="ltr">force against” al Qaeda. According to the</div>
<div style="font-size: 16px; font-family: serif; left: 369.28px; top: 462.72px; transform: scale(0.641485, 1); transform-origin: 0% 0% 0px;" dir="ltr">DOJ, collecting “signals intelligence” on the enemy,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 481.12px; transform: scale(0.636286, 1); transform-origin: 0% 0% 0px;" dir="ltr">even if it involves tapping U.S. phones wit</div>
<div style="font-size: 16px; font-family: serif; left: 369.36px; top: 481.12px; transform: scale(0.648044, 1); transform-origin: 0% 0% 0px;" dir="ltr">hout court approval or</div>
<div style="font-size: 16px; font-family: serif; left: 511.92px; top: 481.12px; transform: scale(0.605731, 1); transform-origin: 0% 0% 0px;" dir="ltr">probable cause, is a</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 499.52px; transform: scale(0.654903, 1); transform-origin: 0% 0% 0px;" dir="ltr">“fundamental incident of war” authorized by the</div>
<div style="font-size: 16px; font-family: serif; left: 410.08px; top: 499.52px; transform: scale(0.652525, 1); transform-origin: 0% 0% 0px;" dir="ltr">AUMF. This argument fails for four reasons.</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 536.32px; transform: scale(0.62368, 1); transform-origin: 0% 0% 0px;" dir="ltr">First</div>
<div style="font-size: 16px; font-family: serif; left: 175.2px; top: 536.32px; transform: scale(0.649227, 1); transform-origin: 0% 0% 0px;" dir="ltr">, and most importantly, the DOJ’s ar</div>
<div style="font-size: 16px; font-family: serif; left: 408.88px; top: 536.32px; transform: scale(0.647231, 1); transform-origin: 0% 0% 0px;" dir="ltr">gument rests on an unstated general</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 554.72px; transform: scale(0.657982, 1); transform-origin: 0% 0% 0px;" dir="ltr">“implication” from the AUMF that directly contradicts</div>
<div style="font-size: 16px; font-family: serif; left: 451.04px; top: 554.72px; transform: scale(0.68576, 1); transform-origin: 0% 0% 0px;" dir="ltr">express</div>
<div style="font-size: 16px; font-family: serif; left: 499.04px; top: 554.72px; transform: scale(0.6224, 1); transform-origin: 0% 0% 0px;" dir="ltr">and</div>
<div style="font-size: 16px; font-family: serif; left: 530.16px; top: 554.72px; transform: scale(0.611, 1); transform-origin: 0% 0% 0px;" dir="ltr">specific</div>
<div style="font-size: 16px; font-family: serif; left: 579.04px; top: 554.72px; transform: scale(0.656943, 1); transform-origin: 0% 0% 0px;" dir="ltr">language in FISA.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 573.04px; transform: scale(0.637606, 1); transform-origin: 0% 0% 0px;" dir="ltr">Specific and “carefully drawn” statutes prevail over</div>
<div style="font-size: 16px; font-family: serif; left: 427.44px; top: 573.04px; transform: scale(0.593409, 1); transform-origin: 0% 0% 0px;" dir="ltr">general statutes where there is a conflict.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 591.44px; transform: scale(0.68544, 1); transform-origin: 0% 0% 0px;" dir="ltr">Morales v. TWA, Inc.</div>
<div style="font-size: 16px; font-family: serif; left: 232.96px; top: 591.44px; transform: scale(0.652644, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 504 U.S. 374, 384-85 (1992) (quoting</div>
<div style="font-size: 16px; font-family: serif; left: 487.6px; top: 591.44px; transform: scale(0.649943, 1); transform-origin: 0% 0% 0px;" dir="ltr">International Paper Co. v. Ouelette</div>
<div style="font-size: 16px; font-family: serif; left: 715.12px; top: 591.44px; transform: scale(0.4, 1); transform-origin: 0% 0% 0px;" dir="ltr">,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 609.84px; transform: scale(0.664447, 1); transform-origin: 0% 0% 0px;" dir="ltr">479 U.S. 481, 494 (1987)). In FISA, Congress ha</div>
<div style="font-size: 16px; font-family: serif; left: 415.12px; top: 609.84px; transform: scale(0.621067, 1); transform-origin: 0% 0% 0px;" dir="ltr">s directly and specifically spoken on the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 628.24px; transform: scale(0.659392, 1); transform-origin: 0% 0% 0px;" dir="ltr">question of domestic warrantle</div>
<div style="font-size: 16px; font-family: serif; left: 293.76px; top: 628.24px; transform: scale(0.653022, 1); transform-origin: 0% 0% 0px;" dir="ltr">ss wiretapping, including during war</div>
<div style="font-size: 16px; font-family: serif; left: 528.72px; top: 628.24px; transform: scale(0.624406, 1); transform-origin: 0% 0% 0px;" dir="ltr">time, and it could not have</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 646.64px; transform: scale(0.656472, 1); transform-origin: 0% 0% 0px;" dir="ltr">spoken more clearly.</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 683.44px; transform: scale(0.692744, 1); transform-origin: 0% 0% 0px;" dir="ltr">As noted above, Congress has comprehensivel</div>
<div style="font-size: 16px; font-family: serif; left: 441.84px; top: 683.44px; transform: scale(0.605544, 1); transform-origin: 0% 0% 0px;" dir="ltr">y regulated all electronic surveillance in</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 701.84px; transform: scale(0.630793, 1); transform-origin: 0% 0% 0px;" dir="ltr">the United States, and authorizes such surveilla</div>
<div style="font-size: 16px; font-family: serif; left: 398.72px; top: 701.84px; transform: scale(0.62512, 1); transform-origin: 0% 0% 0px;" dir="ltr">nce only pursuant to specific statutes designated</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 720.24px; transform: scale(0.615947, 1); transform-origin: 0% 0% 0px;" dir="ltr">as the</div>
<div style="font-size: 13.36px; font-family: serif; left: 132.96px; top: 722.88px; transform: scale(0.581995, 1); transform-origin: 0% 0% 0px;" dir="ltr">“</div>
<div style="font-size: 16px; font-family: serif; left: 142.16px; top: 720.24px; transform: scale(0.651947, 1); transform-origin: 0% 0% 0px;" dir="ltr">exclusive</div>
<div style="font-size: 16px; font-family: serif; left: 200.8px; top: 720.24px; transform: scale(0.651116, 1); transform-origin: 0% 0% 0px;" dir="ltr">means by which electronic surveillance</div>
<div style="font-size: 16px; font-family: serif; left: 461.12px; top: 720.24px; transform: scale(0.600328, 1); transform-origin: 0% 0% 0px;" dir="ltr">. . . and the interception of domestic</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 738.64px; transform: scale(0.66662, 1); transform-origin: 0% 0% 0px;" dir="ltr">wire, oral, and electronic communications may be</div>
<div style="font-size: 16px; font-family: serif; left: 415.92px; top: 738.64px; transform: scale(0.654492, 1); transform-origin: 0% 0% 0px;" dir="ltr">conducted.” 18 U.S.C. § 2511(2)(f) (emphasis</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 757.04px; transform: scale(0.64516, 1); transform-origin: 0% 0% 0px;" dir="ltr">added).</div>
<div style="font-size: 16px; font-family: serif; left: 150.96px; top: 757.04px; transform: scale(0.731253, 1); transform-origin: 0% 0% 0px;" dir="ltr">Moreover, FISA</div>
<div style="font-size: 16px; font-family: serif; left: 260.64px; top: 757.04px; transform: scale(0.607013, 1); transform-origin: 0% 0% 0px;" dir="ltr">specifically</div>
<div style="font-size: 16px; font-family: serif; left: 333.52px; top: 757.04px; transform: scale(0.623923, 1); transform-origin: 0% 0% 0px;" dir="ltr">addresses the question of</div>
<div style="font-size: 16px; font-family: serif; left: 501.84px; top: 757.04px; transform: scale(0.672034, 1); transform-origin: 0% 0% 0px;" dir="ltr">domestic wiretapping during</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 775.44px; transform: scale(0.629259, 1); transform-origin: 0% 0% 0px;" dir="ltr">wartime. In a provision entitled “Authorizati</div>
<div style="font-size: 16px; font-family: serif; left: 385.28px; top: 775.44px; transform: scale(0.637715, 1); transform-origin: 0% 0% 0px;" dir="ltr">on during time of war,” FISA dictates that</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 793.84px; transform: scale(0.654929, 1); transform-origin: 0% 0% 0px;" dir="ltr">“[n]otwithstanding any other law,</div>
<div style="font-size: 16px; font-family: serif; left: 311.92px; top: 793.84px; transform: scale(0.594265, 1); transform-origin: 0% 0% 0px;" dir="ltr">the President, thr</div>
<div style="font-size: 16px; font-family: serif; left: 424.8px; top: 793.84px; transform: scale(0.700873, 1); transform-origin: 0% 0% 0px;" dir="ltr">ough the Attorney Gene</div>
<div style="font-size: 16px; font-family: serif; left: 578.88px; top: 793.84px; transform: scale(0.631857, 1); transform-origin: 0% 0% 0px;" dir="ltr">ral, may authorize</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 812.24px; transform: scale(0.618653, 1); transform-origin: 0% 0% 0px;" dir="ltr">electronic surveillance</div>
<div style="font-size: 16px; font-family: serif; left: 244.4px; top: 812.24px; transform: scale(0.642946, 1); transform-origin: 0% 0% 0px;" dir="ltr">without a court order under this subcha</div>
<div style="font-size: 16px; font-family: serif; left: 494.96px; top: 812.24px; transform: scale(0.609185, 1); transform-origin: 0% 0% 0px;" dir="ltr">pter to acquire foreign intelligence</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 830.64px; transform: scale(0.662933, 1); transform-origin: 0% 0% 0px;" dir="ltr">information</div>
<div style="font-size: 16px; font-family: serif; left: 175.52px; top: 830.64px; transform: scale(0.60816, 1); transform-origin: 0% 0% 0px;" dir="ltr">for a period not to exceed fif</div>
<div style="font-size: 16px; font-family: serif; left: 357.76px; top: 830.64px; transform: scale(0.648211, 1); transform-origin: 0% 0% 0px;" dir="ltr">teen calendar days following a declaration of war by</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 849.04px; transform: scale(0.7, 1); transform-origin: 0% 0% 0px;" dir="ltr">the Congress</div>
<div style="font-size: 16px; font-family: serif; left: 180px; top: 849.04px; transform: scale(0.6466, 1); transform-origin: 0% 0% 0px;" dir="ltr">.” 50 U.S.C. § 1811 (emphasis added).</div>
<div style="font-size: 16px; font-family: serif; left: 438.64px; top: 849.04px; transform: scale(0.678347, 1); transform-origin: 0% 0% 0px;" dir="ltr">Thus, even where Congress has declared</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 867.44px; transform: scale(0.674065, 1); transform-origin: 0% 0% 0px;" dir="ltr">war—a more formal step than an authorization such as the AUMF—the law limits warrantless</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 885.84px; transform: scale(0.609724, 1); transform-origin: 0% 0% 0px;" dir="ltr">wiretapping to the first fifteen days of the conf</div>
<div style="font-size: 16px; font-family: serif; left: 394.48px; top: 885.84px; transform: scale(0.624517, 1); transform-origin: 0% 0% 0px;" dir="ltr">lict. Congress explained</div>
<div style="font-size: 16px; font-family: serif; left: 556.72px; top: 885.84px; transform: scale(0.586138, 1); transform-origin: 0% 0% 0px;" dir="ltr">that if the President</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 904.24px; transform: scale(0.645553, 1); transform-origin: 0% 0% 0px;" dir="ltr">needed further warrantless surveillance during wart</div>
<div style="font-size: 16px; font-family: serif; left: 425.12px; top: 904.24px; transform: scale(0.619711, 1); transform-origin: 0% 0% 0px;" dir="ltr">ime, the fifteen days would be sufficient for</div>
</div>
</div>
<a name="4"></a>
<div id="pageContainer4" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 404px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">4</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 94.72px; transform: scale(0.668047, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress to consider and en</div>
<div style="font-size: 16px; font-family: serif; left: 276.4px; top: 94.72px; transform: scale(0.610092, 1); transform-origin: 0% 0% 0px;" dir="ltr">act further authorization.</div>
<div style="font-size: 10.64px; font-family: serif; left: 434.96px; top: 92.72px; transform: scale(0.886667, 1); transform-origin: 0% 0% 0px;" dir="ltr">3</div>
<div style="font-size: 16px; font-family: serif; left: 440.32px; top: 94.7199px; transform: scale(0.611621, 1); transform-origin: 0% 0% 0px;" dir="ltr">Rather than follow this course, the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.12px; transform: scale(0.632591, 1); transform-origin: 0% 0% 0px;" dir="ltr">President acted unilaterally and secretly in contravention of FISA’s terms. The DOJ letter</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.675706, 1); transform-origin: 0% 0% 0px;" dir="ltr">remarkably does not even</div>
<div style="font-size: 16px; font-family: serif; left: 264.88px; top: 131.52px; transform: scale(0.737417, 1); transform-origin: 0% 0% 0px;" dir="ltr">mention</div>
<div style="font-size: 16px; font-family: serif; left: 316.48px; top: 131.52px; transform: scale(0.654827, 1); transform-origin: 0% 0% 0px;" dir="ltr">FISA’s fifteen-day war provis</div>
<div style="font-size: 16px; font-family: serif; left: 512.88px; top: 131.52px; transform: scale(0.61116, 1); transform-origin: 0% 0% 0px;" dir="ltr">ion, which directly refutes the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 149.92px; transform: scale(0.612978, 1); transform-origin: 0% 0% 0px;" dir="ltr">President’s asserted “implied” authority.</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 186.72px; transform: scale(0.635292, 1); transform-origin: 0% 0% 0px;" dir="ltr">In light of the specific and comprehensive re</div>
<div style="font-size: 16px; font-family: serif; left: 429.68px; top: 186.72px; transform: scale(0.65164, 1); transform-origin: 0% 0% 0px;" dir="ltr">gulation of FISA, especi</div>
<div style="font-size: 16px; font-family: serif; left: 586px; top: 186.72px; transform: scale(0.598781, 1); transform-origin: 0% 0% 0px;" dir="ltr">ally the fifteen-day</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 205.12px; transform: scale(0.614131, 1); transform-origin: 0% 0% 0px;" dir="ltr">war provision, there is no basis for finding in</div>
<div style="font-size: 16px; font-family: serif; left: 384.4px; top: 205.12px; transform: scale(0.66249, 1); transform-origin: 0% 0% 0px;" dir="ltr">the AUMF’s general language implicit authority</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 223.52px; transform: scale(0.667858, 1); transform-origin: 0% 0% 0px;" dir="ltr">for unchecked warrantless domestic</div>
<div style="font-size: 16px; font-family: serif; left: 329.68px; top: 223.52px; transform: scale(0.6552, 1); transform-origin: 0% 0% 0px;" dir="ltr">wiretapping. As Justice Frankf</div>
<div style="font-size: 16px; font-family: serif; left: 526.08px; top: 223.52px; transform: scale(0.583509, 1); transform-origin: 0% 0% 0px;" dir="ltr">urter stated in rejecting a</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 241.92px; transform: scale(0.686475, 1); transform-origin: 0% 0% 0px;" dir="ltr">similar argument by President Truman when he</div>
<div style="font-size: 16px; font-family: serif; left: 404.8px; top: 241.92px; transform: scale(0.612333, 1); transform-origin: 0% 0% 0px;" dir="ltr">sought to defend the seizure of the steel mills</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 260.32px; transform: scale(0.654804, 1); transform-origin: 0% 0% 0px;" dir="ltr">during the Korean War on the basis of</div>
<div style="font-size: 16px; font-family: serif; left: 344.72px; top: 260.32px; transform: scale(0.671246, 1); transform-origin: 0% 0% 0px;" dir="ltr">implied congressional</div>
<div style="font-size: 16px; font-family: serif; left: 485.68px; top: 260.32px; transform: scale(0.60518, 1); transform-origin: 0% 0% 0px;" dir="ltr">authorization:</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 297.12px; transform: scale(0.615643, 1); transform-origin: 0% 0% 0px;" dir="ltr">It is one thing to draw an</div>
<div style="font-size: 16px; font-family: serif; left: 303.92px; top: 297.12px; transform: scale(0.64792, 1); transform-origin: 0% 0% 0px;" dir="ltr">intention of Congress from general language and to say</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 315.52px; transform: scale(0.645276, 1); transform-origin: 0% 0% 0px;" dir="ltr">that Congress would have explicitly writt</div>
<div style="font-size: 16px; font-family: serif; left: 408.4px; top: 315.52px; transform: scale(0.6492, 1); transform-origin: 0% 0% 0px;" dir="ltr">en what is inferred, where Congress has</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 333.92px; transform: scale(0.59056, 1); transform-origin: 0% 0% 0px;" dir="ltr">not addressed itself to a specific situati</div>
<div style="font-size: 16px; font-family: serif; left: 392px; top: 333.92px; transform: scale(0.637006, 1); transform-origin: 0% 0% 0px;" dir="ltr">on. It is quite impossible, however, when</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 352.32px; transform: scale(0.70016, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress did</div>
<div style="font-size: 16px; font-family: serif; left: 232px; top: 352.32px; transform: scale(0.602283, 1); transform-origin: 0% 0% 0px;" dir="ltr">specifically address itself to a prob</div>
<div style="font-size: 16px; font-family: serif; left: 454.64px; top: 352.32px; transform: scale(0.62271, 1); transform-origin: 0% 0% 0px;" dir="ltr">lem, as Congress did to that of</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 370.72px; transform: scale(0.593164, 1); transform-origin: 0% 0% 0px;" dir="ltr">seizure, to find secreted in the interstices</div>
<div style="font-size: 16px; font-family: serif; left: 404.88px; top: 370.72px; transform: scale(0.61576, 1); transform-origin: 0% 0% 0px;" dir="ltr">of legislation the very grant of power</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 389.12px; transform: scale(0.670507, 1); transform-origin: 0% 0% 0px;" dir="ltr">which Congress consciously withheld. To fi</div>
<div style="font-size: 16px; font-family: serif; left: 425.68px; top: 389.12px; transform: scale(0.613448, 1); transform-origin: 0% 0% 0px;" dir="ltr">nd authority so explicitly withheld is</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 407.52px; transform: scale(0.605539, 1); transform-origin: 0% 0% 0px;" dir="ltr">... to disrespect the whole legislative pr</div>
<div style="font-size: 16px; font-family: serif; left: 398.16px; top: 407.52px; transform: scale(0.618014, 1); transform-origin: 0% 0% 0px;" dir="ltr">ocess and the constitutional division of</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 425.92px; transform: scale(0.660389, 1); transform-origin: 0% 0% 0px;" dir="ltr">authority between President and Congress.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 462.72px; transform: scale(0.708874, 1); transform-origin: 0% 0% 0px;" dir="ltr">Youngstown Sheet & Tube Co. v. Sawyer</div>
<div style="font-size: 16px; font-family: serif; left: 358.24px; top: 462.72px; transform: scale(0.616773, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 343 U.S. 579, 609 (1952) (Frankfurter, J., concurring).</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 499.52px; transform: scale(0.770773, 1); transform-origin: 0% 0% 0px;" dir="ltr">Second</div>
<div style="font-size: 16px; font-family: serif; left: 190.24px; top: 499.52px; transform: scale(0.661104, 1); transform-origin: 0% 0% 0px;" dir="ltr">, the DOJ’s argument would require the</div>
<div style="font-size: 16px; font-family: serif; left: 447.92px; top: 499.52px; transform: scale(0.646032, 1); transform-origin: 0% 0% 0px;" dir="ltr">conclusion that Congress implicitly and</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 517.92px; transform: scale(0.74144, 1); transform-origin: 0% 0% 0px;" dir="ltr">sub</div>
<div style="font-size: 16px; font-family: serif; left: 122.24px; top: 517.92px; transform: scale(0.59066, 1); transform-origin: 0% 0% 0px;" dir="ltr">silentio</div>
<div style="font-size: 16px; font-family: serif; left: 169.44px; top: 517.92px; transform: scale(0.66147, 1); transform-origin: 0% 0% 0px;" dir="ltr">repealed 18 U.S.C. § 2511(</div>
<div style="font-size: 16px; font-family: serif; left: 348px; top: 517.92px; transform: scale(0.59232, 1); transform-origin: 0% 0% 0px;" dir="ltr">2)(f), the provision that id</div>
<div style="font-size: 16px; font-family: serif; left: 513.76px; top: 517.92px; transform: scale(0.632474, 1); transform-origin: 0% 0% 0px;" dir="ltr">entifies FISA and specific</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 536.32px; transform: scale(0.637343, 1); transform-origin: 0% 0% 0px;" dir="ltr">criminal code provisions as “the</div>
<div style="font-size: 16px; font-family: serif; left: 306.16px; top: 536.32px; transform: scale(0.652676, 1); transform-origin: 0% 0% 0px;" dir="ltr">exclusive</div>
<div style="font-size: 16px; font-family: serif; left: 364.88px; top: 536.32px; transform: scale(0.632229, 1); transform-origin: 0% 0% 0px;" dir="ltr">means by which electronic surveillance . . . may be</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 554.72px; transform: scale(0.656514, 1); transform-origin: 0% 0% 0px;" dir="ltr">conducted.” Repeals by implicati</div>
<div style="font-size: 16px; font-family: serif; left: 312.48px; top: 554.72px; transform: scale(0.6368, 1); transform-origin: 0% 0% 0px;" dir="ltr">on are strongly disfavored; they</div>
<div style="font-size: 16px; font-family: serif; left: 515.92px; top: 554.72px; transform: scale(0.631817, 1); transform-origin: 0% 0% 0px;" dir="ltr">can be established only by</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 573.04px; transform: scale(0.701978, 1); transform-origin: 0% 0% 0px;" dir="ltr">“overwhelming evidence,”</div>
<div style="font-size: 16px; font-family: serif; left: 271.44px; top: 573.04px; transform: scale(0.626353, 1); transform-origin: 0% 0% 0px;" dir="ltr">J.E.M. Ag. Supply, Inc. v. Pioneer Hi-Bred Int’l, Inc.</div>
<div style="font-size: 16px; font-family: serif; left: 609.6px; top: 573.04px; transform: scale(0.62748, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 534 U.S. 124,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 591.44px; transform: scale(0.650958, 1); transform-origin: 0% 0% 0px;" dir="ltr">137 (2001), and “‘the only permissibl</div>
<div style="font-size: 16px; font-family: serif; left: 336.8px; top: 591.44px; transform: scale(0.604292, 1); transform-origin: 0% 0% 0px;" dir="ltr">e justification for a repeal by im</div>
<div style="font-size: 16px; font-family: serif; left: 542px; top: 591.44px; transform: scale(0.606293, 1); transform-origin: 0% 0% 0px;" dir="ltr">plication is when the earlier</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 609.84px; transform: scale(0.593861, 1); transform-origin: 0% 0% 0px;" dir="ltr">and later statutes are irreconcilable,’”</div>
<div style="font-size: 16px; font-family: serif; left: 339.44px; top: 609.84px; transform: scale(0.51216, 1); transform-origin: 0% 0% 0px;" dir="ltr">id.</div>
<div style="font-size: 16px; font-family: serif; left: 359.92px; top: 609.84px; transform: scale(0.6552, 1); transform-origin: 0% 0% 0px;" dir="ltr">at 141-142 (quoting</div>
<div style="font-size: 16px; font-family: serif; left: 490.96px; top: 609.84px; transform: scale(0.719351, 1); transform-origin: 0% 0% 0px;" dir="ltr">Morton v. Mancari</div>
<div style="font-size: 16px; font-family: serif; left: 613.28px; top: 609.84px; transform: scale(0.627, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 417 U.S. 535,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 628.24px; transform: scale(0.688789, 1); transform-origin: 0% 0% 0px;" dir="ltr">550 (1974)). The AUMF and § 2511(2)(f) ar</div>
<div style="font-size: 16px; font-family: serif; left: 385.36px; top: 628.24px; transform: scale(0.598583, 1); transform-origin: 0% 0% 0px;" dir="ltr">e not irreconcilable, and there is</div>
<div style="font-size: 16px; font-family: serif; left: 594.64px; top: 628.24px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">no</div>
<div style="font-size: 16px; font-family: serif; left: 610.64px; top: 628.24px; transform: scale(0.592619, 1); transform-origin: 0% 0% 0px;" dir="ltr">evidence, let</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 646.64px; transform: scale(0.687048, 1); transform-origin: 0% 0% 0px;" dir="ltr">alone overwhelming evidence, that Congr</div>
<div style="font-size: 16px; font-family: serif; left: 363.92px; top: 646.64px; transform: scale(0.618785, 1); transform-origin: 0% 0% 0px;" dir="ltr">ess intended to repeal § 2511(2)(f).</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 683.44px; transform: scale(0.659947, 1); transform-origin: 0% 0% 0px;" dir="ltr">Third,</div>
<div style="font-size: 16px; font-family: serif; left: 183.6px; top: 683.44px; transform: scale(0.6704, 1); transform-origin: 0% 0% 0px;" dir="ltr">Attorney General Alberto Gonzales has</div>
<div style="font-size: 16px; font-family: serif; left: 444.88px; top: 683.44px; transform: scale(0.62658, 1); transform-origin: 0% 0% 0px;" dir="ltr">admitted that the administration did not</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 701.84px; transform: scale(0.682756, 1); transform-origin: 0% 0% 0px;" dir="ltr">seek to amend FISA to authorize the NSA spyi</div>
<div style="font-size: 16px; font-family: serif; left: 396.4px; top: 701.84px; transform: scale(0.6655, 1); transform-origin: 0% 0% 0px;" dir="ltr">ng program because it was advised that Congress</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 720.24px; transform: scale(0.692397, 1); transform-origin: 0% 0% 0px;" dir="ltr">would reject such an amendment.</div>
<div style="font-size: 10.64px; font-family: serif; left: 310.64px; top: 718.24px; transform: scale(0.886667, 1); transform-origin: 0% 0% 0px;" dir="ltr">4</div>
<div style="font-size: 16px; font-family: serif; left: 316px; top: 720.24px; transform: scale(0.642473, 1); transform-origin: 0% 0% 0px;" dir="ltr">The administration cannot argue on the one hand that</div>
<div style="font-size: 8.64px; font-family: serif; left: 96px; top: 788.96px; transform: scale(0.864, 1); transform-origin: 0% 0% 0px;" dir="ltr">3</div>
<div style="font-size: 13.36px; font-family: serif; left: 100.32px; top: 790.24px; transform: scale(0.654608, 1); transform-origin: 0% 0% 0px;" dir="ltr">“The Conferees intend that this [15-day] period will allo</div>
<div style="font-size: 13.36px; font-family: serif; left: 404.32px; top: 790.24px; transform: scale(0.666919, 1); transform-origin: 0% 0% 0px;" dir="ltr">w time for consideration of any amendment to this act that</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0007px; top: 805.52px; transform: scale(0.674035, 1); transform-origin: 0% 0% 0px;" dir="ltr">may be appropriate during a wartime emergency. . . . The</div>
<div style="font-size: 13.36px; font-family: serif; left: 409.12px; top: 805.52px; transform: scale(0.703595, 1); transform-origin: 0% 0% 0px;" dir="ltr">conferees expect that such amendment would be reported</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0007px; top: 820.88px; transform: scale(0.720167, 1); transform-origin: 0% 0% 0px;" dir="ltr">with recommendations within 7 days an</div>
<div style="font-size: 13.36px; font-family: serif; left: 308.96px; top: 820.88px; transform: scale(0.704621, 1); transform-origin: 0% 0% 0px;" dir="ltr">d that each House would vote on the am</div>
<div style="font-size: 13.36px; font-family: serif; left: 522.801px; top: 820.88px; transform: scale(0.664382, 1); transform-origin: 0% 0% 0px;" dir="ltr">endment within 7 days thereafter.”</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0007px; top: 836.24px; transform: scale(0.685162, 1); transform-origin: 0% 0% 0px;" dir="ltr">H.R. Conf. Rep. No. 95-1720, at 34 (1978).</div>
<div style="font-size: 8.64px; font-family: serif; left: 96px; top: 865.6px; transform: scale(0.864, 1); transform-origin: 0% 0% 0px;" dir="ltr">4</div>
<div style="font-size: 13.36px; font-family: serif; left: 100.32px; top: 866.88px; transform: scale(0.681165, 1); transform-origin: 0% 0% 0px;" dir="ltr">Attorney General Gonzales stated, “</div>
<div style="font-size: 13.36px; font-family: serif; left: 296.48px; top: 866.88px; transform: scale(0.702962, 1); transform-origin: 0% 0% 0px;" dir="ltr">We have had discussions with Congress in the past—certain members of</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9994px; top: 882.24px; transform: scale(0.679532, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress—as to whether or not FISA could be amended to allow us to adequately deal with this kind of threat, and</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9994px; top: 897.52px; transform: scale(0.646851, 1); transform-origin: 0% 0% 0px;" dir="ltr">we were advised that that would be difficult, if not impossible.”</div>
<div style="font-size: 13.36px; font-family: serif; left: 442.559px; top: 897.52px; transform: scale(0.686681, 1); transform-origin: 0% 0% 0px;" dir="ltr">Press Briefing by Attorney General Alberto</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9994px; top: 912.88px; transform: scale(0.723387, 1); transform-origin: 0% 0% 0px;" dir="ltr">Gonzales and General Michael Hayden, Principal Deputy</div>
<div style="font-size: 13.36px; font-family: serif; left: 402.959px; top: 912.88px; transform: scale(0.651237, 1); transform-origin: 0% 0% 0px;" dir="ltr">Director for National Intelligence (Dec. 19, 2005),</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9994px; top: 928.24px; transform: scale(0.642539, 1); transform-origin: 0% 0% 0px;" dir="ltr">available at</div>
<div style="font-size: 13.36px; font-family: serif; left: 162.639px; top: 928.24px; transform: scale(0.730673, 1); transform-origin: 0% 0% 0px;" dir="ltr">http://www.whitehouse.gov/news/releases/2005/12/20051219-1.html</div>
<div style="font-size: 13.36px; font-family: serif; left: 530.96px; top: 928.24px; transform: scale(0.420005, 1); transform-origin: 0% 0% 0px;" dir="ltr">.</div>
</div>
</div>
<a name="5"></a>
<div id="pageContainer5" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 404px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">5</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 94.72px; transform: scale(0.717934, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress authorized the NSA program in the AUM</div>
<div style="font-size: 16px; font-family: serif; left: 426.16px; top: 94.72px; transform: scale(0.608444, 1); transform-origin: 0% 0% 0px;" dir="ltr">F, and at the same time that it did not ask</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.12px; transform: scale(0.659111, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress for such authorization beca</div>
<div style="font-size: 16px; font-family: serif; left: 333.28px; top: 113.12px; transform: scale(0.653298, 1); transform-origin: 0% 0% 0px;" dir="ltr">use it feared Congress would say no.</div>
<div style="font-size: 10.64px; font-family: serif; left: 568.32px; top: 111.12px; transform: scale(0.886667, 1); transform-origin: 0% 0% 0px;" dir="ltr">5</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 149.92px; transform: scale(0.662103, 1); transform-origin: 0% 0% 0px;" dir="ltr">Finally</div>
<div style="font-size: 16px; font-family: serif; left: 190.32px; top: 149.92px; transform: scale(0.642905, 1); transform-origin: 0% 0% 0px;" dir="ltr">, the DOJ’s reliance upon</div>
<div style="font-size: 16px; font-family: serif; left: 357.28px; top: 149.92px; transform: scale(0.719511, 1); transform-origin: 0% 0% 0px;" dir="ltr">Hamdi v. Rumsfeld</div>
<div style="font-size: 16px; font-family: serif; left: 479.52px; top: 149.92px; transform: scale(0.617718, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 542 U.S. 507 (2004), to support its</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 168.32px; transform: scale(0.700259, 1); transform-origin: 0% 0% 0px;" dir="ltr">reading of the AUMF,</div>
<div style="font-size: 16px; font-family: serif; left: 243.04px; top: 168.32px; transform: scale(0.682667, 1); transform-origin: 0% 0% 0px;" dir="ltr">see</div>
<div style="font-size: 16px; font-family: serif; left: 263.52px; top: 168.32px; transform: scale(0.62122, 1); transform-origin: 0% 0% 0px;" dir="ltr">DOJ Letter at 3, is misplaced.</div>
<div style="font-size: 16px; font-family: serif; left: 462.16px; top: 168.32px; transform: scale(0.605352, 1); transform-origin: 0% 0% 0px;" dir="ltr">A plurality of the Court in</div>
<div style="font-size: 16px; font-family: serif; left: 637.68px; top: 168.32px; transform: scale(0.866528, 1); transform-origin: 0% 0% 0px;" dir="ltr">Hamdi</div>
<div style="font-size: 16px; font-family: serif; left: 681.12px; top: 168.32px; transform: scale(0.593653, 1); transform-origin: 0% 0% 0px;" dir="ltr">held</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 186.72px; transform: scale(0.662943, 1); transform-origin: 0% 0% 0px;" dir="ltr">that the AUMF authorized military detention of</div>
<div style="font-size: 16px; font-family: serif; left: 400.8px; top: 186.72px; transform: scale(0.65049, 1); transform-origin: 0% 0% 0px;" dir="ltr">enemy combatants captured on the battlefield</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 205.12px; transform: scale(0.665517, 1); transform-origin: 0% 0% 0px;" dir="ltr">abroad as a “fundamental in</div>
<div style="font-size: 16px; font-family: serif; left: 275.52px; top: 205.12px; transform: scale(0.644373, 1); transform-origin: 0% 0% 0px;" dir="ltr">cident of waging war.”</div>
<div style="font-size: 16px; font-family: serif; left: 430.16px; top: 205.12px; transform: scale(0.5792, 1); transform-origin: 0% 0% 0px;" dir="ltr">Id.</div>
<div style="font-size: 16px; font-family: serif; left: 447.52px; top: 205.12px; transform: scale(0.610659, 1); transform-origin: 0% 0% 0px;" dir="ltr">at 519. The plurality expressly limited</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 223.52px; transform: scale(0.652329, 1); transform-origin: 0% 0% 0px;" dir="ltr">this holding to individuals who we</div>
<div style="font-size: 16px; font-family: serif; left: 317.76px; top: 223.52px; transform: scale(0.614444, 1); transform-origin: 0% 0% 0px;" dir="ltr">re “part of or supporting forces</div>
<div style="font-size: 16px; font-family: serif; left: 520.48px; top: 223.52px; transform: scale(0.60539, 1); transform-origin: 0% 0% 0px;" dir="ltr">hostile to the United States or</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 241.92px; transform: scale(0.608564, 1); transform-origin: 0% 0% 0px;" dir="ltr">coalition partners</div>
<div style="font-size: 16px; font-family: serif; left: 211.52px; top: 241.92px; transform: scale(0.688532, 1); transform-origin: 0% 0% 0px;" dir="ltr">in Afghanistan and who engaged in an armed</div>
<div style="font-size: 16px; font-family: serif; left: 507.52px; top: 241.92px; transform: scale(0.618743, 1); transform-origin: 0% 0% 0px;" dir="ltr">conflict against the United States</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 260.32px; transform: scale(0.65936, 1); transform-origin: 0% 0% 0px;" dir="ltr">there</div>
<div style="font-size: 16px; font-family: serif; left: 128.96px; top: 260.32px; transform: scale(0.47824, 1); transform-origin: 0% 0% 0px;" dir="ltr">.”</div>
<div style="font-size: 16px; font-family: serif; left: 148px; top: 260.32px; transform: scale(0.5792, 1); transform-origin: 0% 0% 0px;" dir="ltr">Id.</div>
<div style="font-size: 16px; font-family: serif; left: 165.36px; top: 260.32px; transform: scale(0.610884, 1); transform-origin: 0% 0% 0px;" dir="ltr">at 516 (emphasis added). It is one thi</div>
<div style="font-size: 16px; font-family: serif; left: 409.6px; top: 260.32px; transform: scale(0.637413, 1); transform-origin: 0% 0% 0px;" dir="ltr">ng, however, to say that</div>
<div style="font-size: 16px; font-family: serif; left: 562.56px; top: 260.32px; transform: scale(0.586133, 1); transform-origin: 0% 0% 0px;" dir="ltr">foreign battlefield</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 278.72px; transform: scale(0.672456, 1); transform-origin: 0% 0% 0px;" dir="ltr">capture of enemy combatants is an</div>
<div style="font-size: 16px; font-family: serif; left: 317.84px; top: 278.72px; transform: scale(0.658729, 1); transform-origin: 0% 0% 0px;" dir="ltr">incident of waging war that Congr</div>
<div style="font-size: 16px; font-family: serif; left: 541.76px; top: 278.72px; transform: scale(0.596107, 1); transform-origin: 0% 0% 0px;" dir="ltr">ess intended to authorize.</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 297.12px; transform: scale(0.594741, 1); transform-origin: 0% 0% 0px;" dir="ltr">It is another matter entirely</div>
<div style="font-size: 16px; font-family: serif; left: 274.16px; top: 297.12px; transform: scale(0.639432, 1); transform-origin: 0% 0% 0px;" dir="ltr">to treat unchecked warrantless</div>
<div style="font-size: 16px; font-family: serif; left: 472.32px; top: 297.12px; transform: scale(0.70984, 1); transform-origin: 0% 0% 0px;" dir="ltr">domestic</div>
<div style="font-size: 16px; font-family: serif; left: 529.12px; top: 297.12px; transform: scale(0.613326, 1); transform-origin: 0% 0% 0px;" dir="ltr">spying as included in that</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 315.52px; transform: scale(0.624326, 1); transform-origin: 0% 0% 0px;" dir="ltr">authorization, especially where an existing statut</div>
<div style="font-size: 16px; font-family: serif; left: 408px; top: 315.52px; transform: scale(0.613011, 1); transform-origin: 0% 0% 0px;" dir="ltr">e specifies that other laws are the “exclusive</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 333.92px; transform: scale(0.668351, 1); transform-origin: 0% 0% 0px;" dir="ltr">means” by which electronic surveillance may be</div>
<div style="font-size: 16px; font-family: serif; left: 410.08px; top: 333.92px; transform: scale(0.648071, 1); transform-origin: 0% 0% 0px;" dir="ltr">conducted and provides that even a declaration</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 352.32px; transform: scale(0.650377, 1); transform-origin: 0% 0% 0px;" dir="ltr">of war authorizes such spying only</div>
<div style="font-size: 16px; font-family: serif; left: 323.6px; top: 352.32px; transform: scale(0.649061, 1); transform-origin: 0% 0% 0px;" dir="ltr">for a fifteen-day emergency period.</div>
<div style="font-size: 10.64px; font-family: serif; left: 550.56px; top: 350.32px; transform: scale(0.886667, 1); transform-origin: 0% 0% 0px;" dir="ltr">6</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 389.28px; transform: scale(0.874158, 1); transform-origin: 0% 0% 0px;" dir="ltr">II. CONSTRUING FISA TO PROHIBIT</div>
<div style="font-size: 16px; font-family: serif; left: 384.56px; top: 389.28px; transform: scale(1.0277, 1); transform-origin: 0% 0% 0px;" dir="ltr">WARRANTLESS DOMESTIC WIRETAPPING</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 407.68px; transform: scale(0.967723, 1); transform-origin: 0% 0% 0px;" dir="ltr">DOES NOT RAISE ANY SERIOUS CONSTITUTIONAL QUESTION, WHEREAS</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 426.08px; transform: scale(1.00295, 1); transform-origin: 0% 0% 0px;" dir="ltr">CONSTRUING THE AUMF TO AUTHORIZE</div>
<div style="font-size: 16px; font-family: serif; left: 427.12px; top: 426.08px; transform: scale(0.992872, 1); transform-origin: 0% 0% 0px;" dir="ltr">SUCH WIRETAPPING WOULD RAISE</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 444.48px; transform: scale(0.984756, 1); transform-origin: 0% 0% 0px;" dir="ltr">SERIOUS QUESTIONS UNDE</div>
<div style="font-size: 16px; font-family: serif; left: 312.88px; top: 444.48px; transform: scale(1.06472, 1); transform-origin: 0% 0% 0px;" dir="ltr">R THE FOURTH AMENDMENT</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 481.12px; transform: scale(0.656149, 1); transform-origin: 0% 0% 0px;" dir="ltr">The DOJ argues that FISA and the AUMF should be construed to permit the NSA</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 499.52px; transform: scale(0.671887, 1); transform-origin: 0% 0% 0px;" dir="ltr">program’s domestic surveillance because otherwis</div>
<div style="font-size: 16px; font-family: serif; left: 418.48px; top: 499.52px; transform: scale(0.656007, 1); transform-origin: 0% 0% 0px;" dir="ltr">e there might be a “conflict between FISA and</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 517.92px; transform: scale(0.6552, 1); transform-origin: 0% 0% 0px;" dir="ltr">the President’s Article II authority as Commande</div>
<div style="font-size: 16px; font-family: serif; left: 410.56px; top: 517.92px; transform: scale(0.635187, 1); transform-origin: 0% 0% 0px;" dir="ltr">r-in-Chief.” DOJ Letter</div>
<div style="font-size: 16px; font-family: serif; left: 569.12px; top: 517.92px; transform: scale(0.593013, 1); transform-origin: 0% 0% 0px;" dir="ltr">at 4. The statutory</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 536.32px; transform: scale(0.671295, 1); transform-origin: 0% 0% 0px;" dir="ltr">scheme described above is not ambiguous, and ther</div>
<div style="font-size: 16px; font-family: serif; left: 424.8px; top: 536.32px; transform: scale(0.620558, 1); transform-origin: 0% 0% 0px;" dir="ltr">efore the constitutional avoidance doctrine is</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 554.72px; transform: scale(0.62872, 1); transform-origin: 0% 0% 0px;" dir="ltr">not even implicated.</div>
<div style="font-size: 16px; font-family: serif; left: 234.24px; top: 554.72px; transform: scale(0.737227, 1); transform-origin: 0% 0% 0px;" dir="ltr">See</div>
<div style="font-size: 16px; font-family: serif; left: 256.4px; top: 554.72px; transform: scale(0.678667, 1); transform-origin: 0% 0% 0px;" dir="ltr">United States v. Oakland Cannabis Buyers’ Coop.</div>
<div style="font-size: 16px; font-family: serif; left: 582.16px; top: 554.72px; transform: scale(0.6424, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 532 U.S. 483, 494</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 573.04px; transform: scale(0.642748, 1); transform-origin: 0% 0% 0px;" dir="ltr">(2001) (the “canon of constitutional avoidance has</div>
<div style="font-size: 16px; font-family: serif; left: 423.52px; top: 573.04px; transform: scale(0.621645, 1); transform-origin: 0% 0% 0px;" dir="ltr">no application in the absence of statutory</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 591.44px; transform: scale(0.678307, 1); transform-origin: 0% 0% 0px;" dir="ltr">ambiguity”).</div>
<div style="font-size: 16px; font-family: serif; left: 177.28px; top: 591.44px; transform: scale(0.612827, 1); transform-origin: 0% 0% 0px;" dir="ltr">But were it implicated, it would work against the President, not in his favor.</div>
<div style="font-size: 8.64px; font-family: serif; left: 96px; top: 644.8px; transform: scale(0.864, 1); transform-origin: 0% 0% 0px;" dir="ltr">5</div>
<div style="font-size: 13.36px; font-family: serif; left: 100.32px; top: 646.08px; transform: scale(0.72144, 1); transform-origin: 0% 0% 0px;" dir="ltr">T</div>
<div style="font-size: 13.36px; font-family: serif; left: 111.84px; top: 646.08px; transform: scale(0.6697, 1); transform-origin: 0% 0% 0px;" dir="ltr">he administration had a convenient vehicle for seeking</div>
<div style="font-size: 13.36px; font-family: serif; left: 406.48px; top: 646.08px; transform: scale(0.756487, 1); transform-origin: 0% 0% 0px;" dir="ltr">any such amendment in the USA PATRIOT Act of 2001,</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0007px; top: 661.44px; transform: scale(0.677224, 1); transform-origin: 0% 0% 0px;" dir="ltr">Pub. L. No. 107-56, 115 Stat. 272, enacted in October 2001. The Patriot Act amended FISA in several respects,</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0007px; top: 676.8px; transform: scale(0.673502, 1); transform-origin: 0% 0% 0px;" dir="ltr">including in sections 218 (allowing FISA wiretaps in cr</div>
<div style="font-size: 13.36px; font-family: serif; left: 392.32px; top: 676.8px; transform: scale(0.675761, 1); transform-origin: 0% 0% 0px;" dir="ltr">iminal investigations) and 215 (popularly known as the</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0007px; top: 692.08px; transform: scale(0.639374, 1); transform-origin: 0% 0% 0px;" dir="ltr">“libraries provision”). Yet the administration did not</div>
<div style="font-size: 13.36px; font-family: serif; left: 382.96px; top: 692.08px; transform: scale(0.689883, 1); transform-origin: 0% 0% 0px;" dir="ltr">ask Congress to amend FISA to authorize the warrantless</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0007px; top: 707.44px; transform: scale(0.618487, 1); transform-origin: 0% 0% 0px;" dir="ltr">electronic surveillance at issue here.</div>
<div style="font-size: 10.64px; font-family: serif; left: 96px; top: 735.92px; transform: scale(0.886667, 1); transform-origin: 0% 0% 0px;" dir="ltr">6</div>
<div style="font-size: 13.36px; font-family: serif; left: 105.36px; top: 740.56px; transform: scale(0.702348, 1); transform-origin: 0% 0% 0px;" dir="ltr">The DOJ attempts to draw an analogy between FISA and 18 U.S.C. § 4001(a), which provides that the United</div>
<div style="font-size: 13.36px; font-family: serif; left: 96px; top: 756.48px; transform: scale(0.664374, 1); transform-origin: 0% 0% 0px;" dir="ltr">States may not detain a U.S. citizen “exce</div>
<div style="font-size: 13.36px; font-family: serif; left: 319.28px; top: 756.48px; transform: scale(0.647026, 1); transform-origin: 0% 0% 0px;" dir="ltr">pt pursuant to an act of Congress.”</div>
<div style="font-size: 13.36px; font-family: serif; left: 510.72px; top: 756.48px; transform: scale(0.715184, 1); transform-origin: 0% 0% 0px;" dir="ltr">The DOJ argues that just as the AUMF</div>
<div style="font-size: 13.36px; font-family: serif; left: 96px; top: 771.84px; transform: scale(0.697404, 1); transform-origin: 0% 0% 0px;" dir="ltr">was deemed to authorize the detention of Hamdi, 542 U.S.</div>
<div style="font-size: 13.36px; font-family: serif; left: 408.56px; top: 771.84px; transform: scale(0.678415, 1); transform-origin: 0% 0% 0px;" dir="ltr">at 519, so the AUMF satisfies FISA’s requirement that</div>
<div style="font-size: 13.36px; font-family: serif; left: 96px; top: 789.679px; transform: scale(0.657462, 1); transform-origin: 0% 0% 0px;" dir="ltr">electronic surveillance be “authorized</div>
<div style="font-size: 13.36px; font-family: serif; left: 301.12px; top: 789.679px; transform: scale(0.641593, 1); transform-origin: 0% 0% 0px;" dir="ltr">by statute.” DOJ Letter at 3-4.</div>
<div style="font-size: 13.36px; font-family: serif; left: 473.52px; top: 789.68px; transform: scale(0.680844, 1); transform-origin: 0% 0% 0px;" dir="ltr">The analogy is inapt. As noted above, FISA</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9998px; top: 805.52px; transform: scale(0.658741, 1); transform-origin: 0% 0% 0px;" dir="ltr">specifically limits warrantless domestic wartime surveillance to</div>
<div style="font-size: 13.36px; font-family: serif; left: 438.56px; top: 805.52px; transform: scale(0.624786, 1); transform-origin: 0% 0% 0px;" dir="ltr">the first fifteen days of the conflict, and 18 U.S.C. §</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9998px; top: 820.88px; transform: scale(0.639551, 1); transform-origin: 0% 0% 0px;" dir="ltr">2511(2)(f) specifies that existing law is the “exclusive</div>
<div style="font-size: 13.36px; font-family: serif; left: 387.84px; top: 820.88px; transform: scale(0.68483, 1); transform-origin: 0% 0% 0px;" dir="ltr">means” for domestic wiretapping. Section 4001(a), by</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9998px; top: 836.24px; transform: scale(0.651376, 1); transform-origin: 0% 0% 0px;" dir="ltr">contrast, neither expressly addresses detention of the en</div>
<div style="font-size: 13.36px; font-family: serif; left: 393.039px; top: 836.24px; transform: scale(0.680768, 1); transform-origin: 0% 0% 0px;" dir="ltr">emy during wartime nor attempts to create an exclusive</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9998px; top: 851.519px; transform: scale(0.672384, 1); transform-origin: 0% 0% 0px;" dir="ltr">mechanism for detention. Moreover, the analogy overlooks the carefully limited holding and rationale of the</div>
<div style="font-size: 13.36px; font-family: serif; left: 677.599px; top: 851.519px; transform: scale(0.907645, 1); transform-origin: 0% 0% 0px;" dir="ltr">Hamdi</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9998px; top: 866.879px; transform: scale(0.688471, 1); transform-origin: 0% 0% 0px;" dir="ltr">plurality, which found the AUMF to be an "explicit congre</div>
<div style="font-size: 13.36px; font-family: serif; left: 410.24px; top: 866.879px; transform: scale(0.637465, 1); transform-origin: 0% 0% 0px;" dir="ltr">ssional authorization for the detention of individuals in</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9998px; top: 882.239px; transform: scale(0.653003, 1); transform-origin: 0% 0% 0px;" dir="ltr">the narrow category we describe . . . . who fought against th</div>
<div style="font-size: 13.36px; font-family: serif; left: 415.2px; top: 882.239px; transform: scale(0.65075, 1); transform-origin: 0% 0% 0px;" dir="ltr">e United States in Afghanistan as part of the Taliban, an</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9998px; top: 897.519px; transform: scale(0.684426, 1); transform-origin: 0% 0% 0px;" dir="ltr">organization known to have supported the al Qaeda terrorist network," and whom "Congress sought to target in</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9998px; top: 912.879px; transform: scale(0.717233, 1); transform-origin: 0% 0% 0px;" dir="ltr">passing the AUMF” 542 U.S. at 518. By the government’s own admission, the NSA program is by no means so</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9998px; top: 928.239px; transform: scale(0.597543, 1); transform-origin: 0% 0% 0px;" dir="ltr">limited.</div>
<div style="font-size: 13.36px; font-family: serif; left: 143.76px; top: 928.239px; transform: scale(0.684199, 1); transform-origin: 0% 0% 0px;" dir="ltr">See</div>
<div style="font-size: 13.36px; font-family: serif; left: 165.6px; top: 928.239px; transform: scale(0.706462, 1); transform-origin: 0% 0% 0px;" dir="ltr">Gonzales/Hayden Press Briefing,</div>
<div style="font-size: 13.36px; font-family: serif; left: 346.4px; top: 928.239px; transform: scale(0.702012, 1); transform-origin: 0% 0% 0px;" dir="ltr">supra</div>
<div style="font-size: 13.36px; font-family: serif; left: 380px; top: 928.239px; transform: scale(0.621157, 1); transform-origin: 0% 0% 0px;" dir="ltr">note 4.</div>
</div>
</div>
<a name="6"></a>
<div id="pageContainer6" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 404px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">6</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 94.72px; transform: scale(0.710499, 1); transform-origin: 0% 0% 0px;" dir="ltr">Construing FISA and the AUMF according to</div>
<div style="font-size: 16px; font-family: serif; left: 394.24px; top: 94.72px; transform: scale(0.626839, 1); transform-origin: 0% 0% 0px;" dir="ltr">their plain meanings raises no serious</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.12px; transform: scale(0.62791, 1); transform-origin: 0% 0% 0px;" dir="ltr">constitutional questions regardi</div>
<div style="font-size: 16px; font-family: serif; left: 296.88px; top: 113.12px; transform: scale(0.642024, 1); transform-origin: 0% 0% 0px;" dir="ltr">ng the President’s duties under Ar</div>
<div style="font-size: 16px; font-family: serif; left: 515.12px; top: 113.12px; transform: scale(0.655334, 1); transform-origin: 0% 0% 0px;" dir="ltr">ticle II. Construing the AUMF</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.550027, 1); transform-origin: 0% 0% 0px;" dir="ltr">to</div>
<div style="font-size: 16px; font-family: serif; left: 112.48px; top: 131.52px; transform: scale(0.697387, 1); transform-origin: 0% 0% 0px;" dir="ltr">permit</div>
<div style="font-size: 16px; font-family: serif; left: 154.32px; top: 131.52px; transform: scale(0.672156, 1); transform-origin: 0% 0% 0px;" dir="ltr">unchecked warrantless wiretapping with</div>
<div style="font-size: 16px; font-family: serif; left: 416.32px; top: 131.52px; transform: scale(0.657061, 1); transform-origin: 0% 0% 0px;" dir="ltr">out probable cause, however, would raise</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 149.92px; transform: scale(0.677294, 1); transform-origin: 0% 0% 0px;" dir="ltr">serious questions under the Fourth Amendment.</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 186.72px; transform: scale(0.64594, 1); transform-origin: 0% 0% 0px;" dir="ltr">A. FISA’s Limitations Are Consistent with the President’s Article II Role</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 223.52px; transform: scale(0.646507, 1); transform-origin: 0% 0% 0px;" dir="ltr">We do not dispute that, absent</div>
<div style="font-size: 16px; font-family: serif; left: 337.76px; top: 223.52px; transform: scale(0.627066, 1); transform-origin: 0% 0% 0px;" dir="ltr">congressional action, the Pres</div>
<div style="font-size: 16px; font-family: serif; left: 531.84px; top: 223.52px; transform: scale(0.646486, 1); transform-origin: 0% 0% 0px;" dir="ltr">ident might have inherent</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 241.92px; transform: scale(0.632058, 1); transform-origin: 0% 0% 0px;" dir="ltr">constitutional authority to collect “signals intelligence” about the enemy abroad. Nor do we</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 260.32px; transform: scale(0.636612, 1); transform-origin: 0% 0% 0px;" dir="ltr">dispute that, had Congress ta</div>
<div style="font-size: 16px; font-family: serif; left: 280.56px; top: 260.32px; transform: scale(0.601806, 1); transform-origin: 0% 0% 0px;" dir="ltr">ken no action in this area,</div>
<div style="font-size: 16px; font-family: serif; left: 448.88px; top: 260.32px; transform: scale(0.640194, 1); transform-origin: 0% 0% 0px;" dir="ltr">the President might well be</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 278.72px; transform: scale(0.662235, 1); transform-origin: 0% 0% 0px;" dir="ltr">constitutionally empowered to</div>
<div style="font-size: 16px; font-family: serif; left: 294.64px; top: 278.72px; transform: scale(0.65472, 1); transform-origin: 0% 0% 0px;" dir="ltr">conduct domestic surveillance dire</div>
<div style="font-size: 16px; font-family: serif; left: 517.2px; top: 278.72px; transform: scale(0.63983, 1); transform-origin: 0% 0% 0px;" dir="ltr">ctly tied and narrowly confined</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 297.12px; transform: scale(0.6524, 1); transform-origin: 0% 0% 0px;" dir="ltr">to that goal—subject, of course, to Fourth Amen</div>
<div style="font-size: 16px; font-family: serif; left: 406.56px; top: 297.12px; transform: scale(0.636433, 1); transform-origin: 0% 0% 0px;" dir="ltr">dment limits. Indeed, in the years before FISA</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 315.52px; transform: scale(0.645084, 1); transform-origin: 0% 0% 0px;" dir="ltr">was enacted, the federal law involving wireta</div>
<div style="font-size: 16px; font-family: serif; left: 386.24px; top: 315.52px; transform: scale(0.632947, 1); transform-origin: 0% 0% 0px;" dir="ltr">pping specifically provi</div>
<div style="font-size: 16px; font-family: serif; left: 538.16px; top: 315.52px; transform: scale(0.62848, 1); transform-origin: 0% 0% 0px;" dir="ltr">ded that “[n]othing</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 333.92px; transform: scale(0.614295, 1); transform-origin: 0% 0% 0px;" dir="ltr">contained in this chapter or</div>
<div style="font-size: 16px; font-family: serif; left: 274.16px; top: 333.92px; transform: scale(0.672368, 1); transform-origin: 0% 0% 0px;" dir="ltr">in section 605 of the Communicati</div>
<div style="font-size: 16px; font-family: serif; left: 496px; top: 333.92px; transform: scale(0.621235, 1); transform-origin: 0% 0% 0px;" dir="ltr">ons Act of 1934 shall limit the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 352.32px; transform: scale(0.599965, 1); transform-origin: 0% 0% 0px;" dir="ltr">constitutional power of the President . . . to</div>
<div style="font-size: 16px; font-family: serif; left: 371.92px; top: 352.32px; transform: scale(0.646293, 1); transform-origin: 0% 0% 0px;" dir="ltr">obtain foreign intelligence information deemed</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 370.72px; transform: scale(0.60612, 1); transform-origin: 0% 0% 0px;" dir="ltr">essential to the security of the United</div>
<div style="font-size: 16px; font-family: serif; left: 338.16px; top: 370.72px; transform: scale(0.633457, 1); transform-origin: 0% 0% 0px;" dir="ltr">States.” 18 U.S.C.</div>
<div style="font-size: 16px; font-family: serif; left: 458.48px; top: 370.72px; transform: scale(0.638804, 1); transform-origin: 0% 0% 0px;" dir="ltr">§ 2511(3) (1976).</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 407.52px; transform: scale(0.652989, 1); transform-origin: 0% 0% 0px;" dir="ltr">But FISA specifically</div>
<div style="font-size: 16px; font-family: serif; left: 287.6px; top: 407.52px; transform: scale(0.666809, 1); transform-origin: 0% 0% 0px;" dir="ltr">repealed</div>
<div style="font-size: 16px; font-family: serif; left: 347.6px; top: 407.52px; transform: scale(0.629387, 1); transform-origin: 0% 0% 0px;" dir="ltr">that provision. FISA §</div>
<div style="font-size: 16px; font-family: serif; left: 498.64px; top: 407.52px; transform: scale(0.629061, 1); transform-origin: 0% 0% 0px;" dir="ltr">201(c), 92 Stat. 1797, and</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 425.92px; transform: scale(0.622429, 1); transform-origin: 0% 0% 0px;" dir="ltr">replaced it with language dictati</div>
<div style="font-size: 16px; font-family: serif; left: 301.36px; top: 425.92px; transform: scale(0.661619, 1); transform-origin: 0% 0% 0px;" dir="ltr">ng that FISA and the criminal code</div>
<div style="font-size: 16px; font-family: serif; left: 526.16px; top: 425.92px; transform: scale(0.639435, 1); transform-origin: 0% 0% 0px;" dir="ltr">are the “exclusive means” of</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 444.32px; transform: scale(0.648126, 1); transform-origin: 0% 0% 0px;" dir="ltr">conducting electronic survei</div>
<div style="font-size: 16px; font-family: serif; left: 277.28px; top: 444.32px; transform: scale(0.592015, 1); transform-origin: 0% 0% 0px;" dir="ltr">llance. In doing so,</div>
<div style="font-size: 16px; font-family: serif; left: 407.44px; top: 444.32px; transform: scale(0.640427, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress did not deny that the President has</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 462.72px; transform: scale(0.64472, 1); transform-origin: 0% 0% 0px;" dir="ltr">constitutional power to conduct</div>
<div style="font-size: 16px; font-family: serif; left: 302.24px; top: 462.72px; transform: scale(0.60971, 1); transform-origin: 0% 0% 0px;" dir="ltr">electronic surveillance for nati</div>
<div style="font-size: 16px; font-family: serif; left: 497.2px; top: 462.72px; transform: scale(0.632565, 1); transform-origin: 0% 0% 0px;" dir="ltr">onal security pur</div>
<div style="font-size: 16px; font-family: serif; left: 604.72px; top: 462.72px; transform: scale(0.596053, 1); transform-origin: 0% 0% 0px;" dir="ltr">poses; rather,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 481.12px; transform: scale(0.667954, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress properly concluded that “e</div>
<div style="font-size: 16px; font-family: serif; left: 329.68px; top: 481.12px; transform: scale(0.613811, 1); transform-origin: 0% 0% 0px;" dir="ltr">ven if the President has</div>
<div style="font-size: 16px; font-family: serif; left: 483.04px; top: 481.12px; transform: scale(0.616508, 1); transform-origin: 0% 0% 0px;" dir="ltr">the inherent authority</div>
<div style="font-size: 16px; font-family: serif; left: 624.8px; top: 481.12px; transform: scale(0.637728, 1); transform-origin: 0% 0% 0px;" dir="ltr">in the absence</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 499.52px; transform: scale(0.600366, 1); transform-origin: 0% 0% 0px;" dir="ltr">of legislation</div>
<div style="font-size: 16px; font-family: serif; left: 180px; top: 499.52px; transform: scale(0.62375, 1); transform-origin: 0% 0% 0px;" dir="ltr">to authorize warrantless electronic surv</div>
<div style="font-size: 16px; font-family: serif; left: 435.52px; top: 499.52px; transform: scale(0.61432, 1); transform-origin: 0% 0% 0px;" dir="ltr">eillance for foreign intelligence purposes,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 517.92px; transform: scale(0.66547, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress has the power to regula</div>
<div style="font-size: 16px; font-family: serif; left: 308.88px; top: 517.92px; transform: scale(0.62382, 1); transform-origin: 0% 0% 0px;" dir="ltr">te the conduct of such surveilla</div>
<div style="font-size: 16px; font-family: serif; left: 508.4px; top: 517.92px; transform: scale(0.62673, 1); transform-origin: 0% 0% 0px;" dir="ltr">nce by legislating a reasonable</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 536.32px; transform: scale(0.6756, 1); transform-origin: 0% 0% 0px;" dir="ltr">procedure, which then becomes the exclusiv</div>
<div style="font-size: 16px; font-family: serif; left: 379.44px; top: 536.32px; transform: scale(0.677257, 1); transform-origin: 0% 0% 0px;" dir="ltr">e means by which such surveillance may be</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 554.72px; transform: scale(0.640294, 1); transform-origin: 0% 0% 0px;" dir="ltr">conducted.” H.R. Rep. No. 95-1283, pt. 1, at 24</div>
<div style="font-size: 16px; font-family: serif; left: 409.76px; top: 554.72px; transform: scale(0.641803, 1); transform-origin: 0% 0% 0px;" dir="ltr">(1978) (emphasis added). This analysis,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 573.04px; transform: scale(0.67069, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress noted, was “supported by two successive Attorneys General.”</div>
<div style="font-size: 16px; font-family: serif; left: 558.56px; top: 573.04px; transform: scale(0.6616, 1); transform-origin: 0% 0% 0px;" dir="ltr">Id</div>
<div style="font-size: 16px; font-family: serif; left: 571.84px; top: 573.04px; transform: scale(0.4, 1); transform-origin: 0% 0% 0px;" dir="ltr">.</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 609.84px; transform: scale(0.627429, 1); transform-origin: 0% 0% 0px;" dir="ltr">To say that the President has inherent aut</div>
<div style="font-size: 16px; font-family: serif; left: 407.52px; top: 609.84px; transform: scale(0.61814, 1); transform-origin: 0% 0% 0px;" dir="ltr">hority does not mean that his authority is</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 628.24px; transform: scale(0.616769, 1); transform-origin: 0% 0% 0px;" dir="ltr">exclusive, or that his conduct</div>
<div style="font-size: 16px; font-family: serif; left: 287.12px; top: 628.24px; transform: scale(0.60447, 1); transform-origin: 0% 0% 0px;" dir="ltr">is not subject to statutory regu</div>
<div style="font-size: 16px; font-family: serif; left: 480.4px; top: 628.24px; transform: scale(0.65056, 1); transform-origin: 0% 0% 0px;" dir="ltr">lations enacted (as FISA was)</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 646.64px; transform: scale(0.643019, 1); transform-origin: 0% 0% 0px;" dir="ltr">pursuant to Congress’s Article</div>
<div style="font-size: 16px; font-family: serif; left: 295.12px; top: 646.64px; transform: scale(0.64368, 1); transform-origin: 0% 0% 0px;" dir="ltr">I powers. As Justice Jackson famously explained in his</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 665.04px; transform: scale(0.605523, 1); transform-origin: 0% 0% 0px;" dir="ltr">influential opinion in</div>
<div style="font-size: 16px; font-family: serif; left: 235.2px; top: 665.04px; transform: scale(0.708714, 1); transform-origin: 0% 0% 0px;" dir="ltr">Youngstown Sheet & Tube Co. v. Sawyer</div>
<div style="font-size: 16px; font-family: serif; left: 497.36px; top: 665.04px; transform: scale(0.60674, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 343 U.S. at 635 (Jackson, J.,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 683.44px; transform: scale(0.630048, 1); transform-origin: 0% 0% 0px;" dir="ltr">concurring), the Constitution “enjoins upon its br</div>
<div style="font-size: 16px; font-family: serif; left: 411.04px; top: 683.44px; transform: scale(0.65577, 1); transform-origin: 0% 0% 0px;" dir="ltr">anches separateness but interdependence,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 701.84px; transform: scale(0.649953, 1); transform-origin: 0% 0% 0px;" dir="ltr">autonomy but reciprocity. Presidential powers ar</div>
<div style="font-size: 16px; font-family: serif; left: 407.92px; top: 701.84px; transform: scale(0.626927, 1); transform-origin: 0% 0% 0px;" dir="ltr">e not fixed but fluctuate, depending upon their</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 720.24px; transform: scale(0.64248, 1); transform-origin: 0% 0% 0px;" dir="ltr">disjunction or conjunction with thos</div>
<div style="font-size: 16px; font-family: serif; left: 327.12px; top: 720.24px; transform: scale(0.652053, 1); transform-origin: 0% 0% 0px;" dir="ltr">e of Congress.” For example,</div>
<div style="font-size: 16px; font-family: serif; left: 522.64px; top: 720.24px; transform: scale(0.595073, 1); transform-origin: 0% 0% 0px;" dir="ltr">the President in his role as</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 738.64px; transform: scale(0.656407, 1); transform-origin: 0% 0% 0px;" dir="ltr">Commander in Chief directs military operations.</div>
<div style="font-size: 16px; font-family: serif; left: 411.04px; top: 738.64px; transform: scale(0.666015, 1); transform-origin: 0% 0% 0px;" dir="ltr">But the Framers gave Congress the power to</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 757.04px; transform: scale(0.622286, 1); transform-origin: 0% 0% 0px;" dir="ltr">prescribe rules for the regulation of the armed a</div>
<div style="font-size: 16px; font-family: serif; left: 400.72px; top: 757.04px; transform: scale(0.585674, 1); transform-origin: 0% 0% 0px;" dir="ltr">nd naval forces, Art. I, § 8, cl. 14, and if a duly</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 775.44px; transform: scale(0.634367, 1); transform-origin: 0% 0% 0px;" dir="ltr">enacted statute prohibits the military from engaging in torture or cruel, inhuman, and degrading</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 793.84px; transform: scale(0.62272, 1); transform-origin: 0% 0% 0px;" dir="ltr">treatment, the President must follow that dictate.</div>
<div style="font-size: 16px; font-family: serif; left: 415.04px; top: 793.84px; transform: scale(0.654315, 1); transform-origin: 0% 0% 0px;" dir="ltr">As Justice Jackson wrote, when the President</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 812.24px; transform: scale(0.624042, 1); transform-origin: 0% 0% 0px;" dir="ltr">acts in defiance of "the expressed or implied will of</div>
<div style="font-size: 16px; font-family: serif; left: 426.4px; top: 812.24px; transform: scale(0.638272, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress," his power is</div>
<div style="font-size: 16px; font-family: serif; left: 585.84px; top: 812.24px; transform: scale(0.577996, 1); transform-origin: 0% 0% 0px;" dir="ltr">"at its lowest ebb."</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 830.64px; transform: scale(0.619631, 1); transform-origin: 0% 0% 0px;" dir="ltr">343 U.S. at 637. In this setting, Jackson wrote, “P</div>
<div style="font-size: 16px; font-family: serif; left: 418.24px; top: 830.64px; transform: scale(0.642464, 1); transform-origin: 0% 0% 0px;" dir="ltr">residential power [is] mo</div>
<div style="font-size: 16px; font-family: serif; left: 578.64px; top: 830.64px; transform: scale(0.60392, 1); transform-origin: 0% 0% 0px;" dir="ltr">st vulnerable to attack</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 849.04px; transform: scale(0.61946, 1); transform-origin: 0% 0% 0px;" dir="ltr">and in the least favorable of po</div>
<div style="font-size: 16px; font-family: serif; left: 294.08px; top: 849.04px; transform: scale(0.59968, 1); transform-origin: 0% 0% 0px;" dir="ltr">ssible constitutional postures.”</div>
<div style="font-size: 16px; font-family: serif; left: 498.08px; top: 849.04px; transform: scale(0.5792, 1); transform-origin: 0% 0% 0px;" dir="ltr">Id.</div>
<div style="font-size: 16px; font-family: serif; left: 515.44px; top: 849.04px; transform: scale(0.57344, 1); transform-origin: 0% 0% 0px;" dir="ltr">at 640.</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 885.84px; transform: scale(0.636404, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress plainly has authority to regulate</div>
<div style="font-size: 16px; font-family: serif; left: 411.2px; top: 885.84px; transform: scale(0.65171, 1); transform-origin: 0% 0% 0px;" dir="ltr">domestic wiretapping by federal agencies</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 904.24px; transform: scale(0.639654, 1); transform-origin: 0% 0% 0px;" dir="ltr">under its Article I powers, and the DOJ does not</div>
<div style="font-size: 16px; font-family: serif; left: 409.2px; top: 904.24px; transform: scale(0.676076, 1); transform-origin: 0% 0% 0px;" dir="ltr">suggest otherwise. Indeed, when FISA was</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 922.64px; transform: scale(0.651232, 1); transform-origin: 0% 0% 0px;" dir="ltr">enacted, the Justice Department agreed that C</div>
<div style="font-size: 16px; font-family: serif; left: 388.8px; top: 922.64px; transform: scale(0.656493, 1); transform-origin: 0% 0% 0px;" dir="ltr">ongress had power to regulate such conduct, and</div>
</div>
</div>
<a name="7"></a>
<div id="pageContainer7" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 404px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">7</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 94.72px; transform: scale(0.630249, 1); transform-origin: 0% 0% 0px;" dir="ltr">could require judicial approval of</div>
<div style="font-size: 16px; font-family: serif; left: 310.16px; top: 94.72px; transform: scale(0.61227, 1); transform-origin: 0% 0% 0px;" dir="ltr">foreign intelligence surveillance.</div>
<div style="font-size: 10.64px; font-family: serif; left: 524.24px; top: 92.72px; transform: scale(0.886667, 1); transform-origin: 0% 0% 0px;" dir="ltr">7</div>
<div style="font-size: 16px; font-family: serif; left: 529.6px; top: 94.7199px; transform: scale(0.63728, 1); transform-origin: 0% 0% 0px;" dir="ltr">FISA does not prohibit</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.12px; transform: scale(0.63926, 1); transform-origin: 0% 0% 0px;" dir="ltr">foreign intelligence surveillance, but merely impos</div>
<div style="font-size: 16px; font-family: serif; left: 422.08px; top: 113.12px; transform: scale(0.634496, 1); transform-origin: 0% 0% 0px;" dir="ltr">es reasonable regulation</div>
<div style="font-size: 16px; font-family: serif; left: 580.64px; top: 113.12px; transform: scale(0.603804, 1); transform-origin: 0% 0% 0px;" dir="ltr">to protect legitimate</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.636439, 1); transform-origin: 0% 0% 0px;" dir="ltr">privacy rights. (For example, a</div>
<div style="font-size: 16px; font-family: serif; left: 293.28px; top: 131.52px; transform: scale(0.65825, 1); transform-origin: 0% 0% 0px;" dir="ltr">lthough FISA generally requires</div>
<div style="font-size: 16px; font-family: serif; left: 503.92px; top: 131.52px; transform: scale(0.611777, 1); transform-origin: 0% 0% 0px;" dir="ltr">judicial approval for electronic</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 149.92px; transform: scale(0.637583, 1); transform-origin: 0% 0% 0px;" dir="ltr">surveillance of persons within the United States</div>
<div style="font-size: 16px; font-family: serif; left: 401.76px; top: 149.92px; transform: scale(0.596007, 1); transform-origin: 0% 0% 0px;" dir="ltr">, it permits the executive branch to install a</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 168.32px; transform: scale(0.666773, 1); transform-origin: 0% 0% 0px;" dir="ltr">wiretap immediately so long as</div>
<div style="font-size: 16px; font-family: serif; left: 295.92px; top: 168.32px; transform: scale(0.617787, 1); transform-origin: 0% 0% 0px;" dir="ltr">it obtains judicial approval within 72 hours. 50 U.S.C. §</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 186.72px; transform: scale(0.594225, 1); transform-origin: 0% 0% 0px;" dir="ltr">1805(f).)</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 223.52px; transform: scale(0.614145, 1); transform-origin: 0% 0% 0px;" dir="ltr">Just as the President is bound by the statut</div>
<div style="font-size: 16px; font-family: serif; left: 414.16px; top: 223.52px; transform: scale(0.622196, 1); transform-origin: 0% 0% 0px;" dir="ltr">ory prohibition on torture, he is bound by the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 241.92px; transform: scale(0.625161, 1); transform-origin: 0% 0% 0px;" dir="ltr">statutory dictates of FISA.</div>
<div style="font-size: 10.64px; font-family: serif; left: 264.8px; top: 239.92px; transform: scale(0.886667, 1); transform-origin: 0% 0% 0px;" dir="ltr">8</div>
<div style="font-size: 16px; font-family: serif; left: 270.16px; top: 241.92px; transform: scale(0.678255, 1); transform-origin: 0% 0% 0px;" dir="ltr">The DOJ once infamously argued that the President as Commander</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 260.32px; transform: scale(0.630588, 1); transform-origin: 0% 0% 0px;" dir="ltr">in Chief could ignore even the criminal prohibition on torture,</div>
<div style="font-size: 10.64px; font-family: serif; left: 493.2px; top: 258.32px; transform: scale(0.886667, 1); transform-origin: 0% 0% 0px;" dir="ltr">9</div>
<div style="font-size: 16px; font-family: serif; left: 498.56px; top: 260.32px; transform: scale(0.596583, 1); transform-origin: 0% 0% 0px;" dir="ltr">and, more broadly still, that</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 278.72px; transform: scale(0.63724, 1); transform-origin: 0% 0% 0px;" dir="ltr">statutes may not “place</div>
<div style="font-size: 16px; font-family: serif; left: 248.88px; top: 278.72px; transform: scale(0.766133, 1); transform-origin: 0% 0% 0px;" dir="ltr">any</div>
<div style="font-size: 16px; font-family: serif; left: 271.92px; top: 278.72px; transform: scale(0.599712, 1); transform-origin: 0% 0% 0px;" dir="ltr">limits on the President's determinations as to any terrorist threat, the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 297.12px; transform: scale(0.633972, 1); transform-origin: 0% 0% 0px;" dir="ltr">amount of military force to be</div>
<div style="font-size: 16px; font-family: serif; left: 292.4px; top: 297.12px; transform: scale(0.631162, 1); transform-origin: 0% 0% 0px;" dir="ltr">used in response, or the method, timing, and nature of the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 315.52px; transform: scale(0.672, 1); transform-origin: 0% 0% 0px;" dir="ltr">response.”</div>
<div style="font-size: 10.64px; font-family: serif; left: 163.12px; top: 313.52px; transform: scale(0.893405, 1); transform-origin: 0% 0% 0px;" dir="ltr">10</div>
<div style="font-size: 16px; font-family: serif; left: 173.84px; top: 315.52px; transform: scale(0.644747, 1); transform-origin: 0% 0% 0px;" dir="ltr">But the administration withdrew th</div>
<div style="font-size: 16px; font-family: serif; left: 405.84px; top: 315.52px; transform: scale(0.658328, 1); transform-origin: 0% 0% 0px;" dir="ltr">e August 2002 torture memo after it was</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 333.92px; transform: scale(0.661575, 1); transform-origin: 0% 0% 0px;" dir="ltr">disclosed, and for good reason the DOJ does not adva</div>
<div style="font-size: 16px; font-family: serif; left: 439.92px; top: 333.92px; transform: scale(0.662415, 1); transform-origin: 0% 0% 0px;" dir="ltr">nce these extreme arguments here. Absent</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 352.32px; transform: scale(0.62858, 1); transform-origin: 0% 0% 0px;" dir="ltr">a serious question about FISA’s constitutionality,</div>
<div style="font-size: 16px; font-family: serif; left: 416.32px; top: 352.32px; transform: scale(0.632357, 1); transform-origin: 0% 0% 0px;" dir="ltr">there is no reason even to consider construing</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 370.72px; transform: scale(0.66882, 1); transform-origin: 0% 0% 0px;" dir="ltr">the AUMF to have implicitly overturned the care</div>
<div style="font-size: 16px; font-family: serif; left: 410.16px; top: 370.72px; transform: scale(0.65146, 1); transform-origin: 0% 0% 0px;" dir="ltr">fully designed regulatory regime that FISA</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 389.12px; transform: scale(0.595102, 1); transform-origin: 0% 0% 0px;" dir="ltr">establishes.</div>
<div style="font-size: 16px; font-family: serif; left: 173.28px; top: 389.12px; transform: scale(0.592996, 1); transform-origin: 0% 0% 0px;" dir="ltr">See, e.g.</div>
<div style="font-size: 16px; font-family: serif; left: 226.64px; top: 389.12px; transform: scale(0.4, 1); transform-origin: 0% 0% 0px;" dir="ltr">,</div>
<div style="font-size: 16px; font-family: serif; left: 230.64px; top: 389.12px; transform: scale(0.651893, 1); transform-origin: 0% 0% 0px;" dir="ltr">Reno v. Flores</div>
<div style="font-size: 16px; font-family: serif; left: 328.4px; top: 389.12px; transform: scale(0.63869, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 507 U.S. 292, 314 n.9 (1993) (</div>
<div style="font-size: 16px; font-family: serif; left: 532.88px; top: 389.12px; transform: scale(0.640096, 1); transform-origin: 0% 0% 0px;" dir="ltr">constitutional avoidance</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 407.52px; transform: scale(0.629813, 1); transform-origin: 0% 0% 0px;" dir="ltr">canon applicable only if the c</div>
<div style="font-size: 16px; font-family: serif; left: 284.8px; top: 407.52px; transform: scale(0.613236, 1); transform-origin: 0% 0% 0px;" dir="ltr">onstitutional question to be</div>
<div style="font-size: 16px; font-family: serif; left: 462.56px; top: 407.52px; transform: scale(0.622264, 1); transform-origin: 0% 0% 0px;" dir="ltr">avoided is a serious one, “</div>
<div style="font-size: 16px; font-family: serif; left: 630.56px; top: 407.52px; transform: scale(0.584594, 1); transform-origin: 0% 0% 0px;" dir="ltr">not to</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 425.92px; transform: scale(0.620842, 1); transform-origin: 0% 0% 0px;" dir="ltr">eliminate all possible cont</div>
<div style="font-size: 16px; font-family: serif; left: 263.52px; top: 425.92px; transform: scale(0.590368, 1); transform-origin: 0% 0% 0px;" dir="ltr">entions that the statute</div>
<div style="font-size: 16px; font-family: serif; left: 411.04px; top: 425.92px; transform: scale(0.72896, 1); transform-origin: 0% 0% 0px;" dir="ltr">might</div>
<div style="font-size: 16px; font-family: serif; left: 447.52px; top: 425.92px; transform: scale(0.633253, 1); transform-origin: 0% 0% 0px;" dir="ltr">be unconstitutional”) (emphasis in</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 444.32px; transform: scale(0.601926, 1); transform-origin: 0% 0% 0px;" dir="ltr">original; citation omitted).</div>
<div style="font-size: 10.64px; font-family: serif; left: 264.4px; top: 442.32px; transform: scale(0.893405, 1); transform-origin: 0% 0% 0px;" dir="ltr">11</div>
<div style="font-size: 8.64px; font-family: serif; left: 96px; top: 494.64px; transform: scale(0.864, 1); transform-origin: 0% 0% 0px;" dir="ltr">7</div>
<div style="font-size: 13.36px; font-family: serif; left: 103.68px; top: 495.92px; transform: scale(0.580097, 1); transform-origin: 0% 0% 0px;" dir="ltr">See, e.g.,</div>
<div style="font-size: 13.36px; font-family: serif; left: 154.799px; top: 495.92px; transform: scale(0.644557, 1); transform-origin: 0% 0% 0px;" dir="ltr">S. Rep. No. 95-604, pt. I, at 16 (1977)</div>
<div style="font-size: 12.64px; font-family: sans-serif; left: 361.04px; top: 496.64px; transform: scale(1.14771, 1); transform-origin: 0% 0% 0px;" dir="ltr">(</div>
<div style="font-size: 13.36px; font-family: serif; left: 366.8px; top: 495.92px; transform: scale(0.660623, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress’s assertion of power to regulate the President’s</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9995px; top: 511.2px; transform: scale(0.642583, 1); transform-origin: 0% 0% 0px;" dir="ltr">authorization of electronic surveillance for foreign in</div>
<div style="font-size: 13.36px; font-family: serif; left: 378.88px; top: 511.2px; transform: scale(0.677633, 1); transform-origin: 0% 0% 0px;" dir="ltr">telligence purposes was “concurred in by the Attorney</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9995px; top: 526.48px; transform: scale(0.658662, 1); transform-origin: 0% 0% 0px;" dir="ltr">General”); Foreign Intelligence Electronic Surveillance:</div>
<div style="font-size: 13.36px; font-family: serif; left: 401.759px; top: 526.48px; transform: scale(0.699334, 1); transform-origin: 0% 0% 0px;" dir="ltr">Hearings Before the Subcomm. on Legislation of the</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9995px; top: 541.84px; transform: scale(0.708538, 1); transform-origin: 0% 0% 0px;" dir="ltr">House Permanent Select Comm. on Intelligence, 95th Cong.,</div>
<div style="font-size: 13.36px; font-family: serif; left: 424.88px; top: 541.84px; transform: scale(0.684758, 1); transform-origin: 0% 0% 0px;" dir="ltr">2d Sess., at 31 (1978) (Letter from John M. Harmon,</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9995px; top: 557.2px; transform: scale(0.67795, 1); transform-origin: 0% 0% 0px;" dir="ltr">Assistant Attorney General, Office of Legal Counsel, to</div>
<div style="font-size: 13.36px; font-family: serif; left: 394.08px; top: 557.2px; transform: scale(0.721935, 1); transform-origin: 0% 0% 0px;" dir="ltr">Edward P. Boland, Chairman, House Permanent Select</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9995px; top: 572.479px; transform: scale(0.666207, 1); transform-origin: 0% 0% 0px;" dir="ltr">Comm. on Intelligence (Apr. 18, 1978)) (“it seems unreasonable to conclude that Congress, in the exercise of its</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9995px; top: 587.839px; transform: scale(0.649449, 1); transform-origin: 0% 0% 0px;" dir="ltr">powers in this area, may not vest in the courts</div>
<div style="font-size: 13.36px; font-family: serif; left: 340.399px; top: 587.839px; transform: scale(0.656143, 1); transform-origin: 0% 0% 0px;" dir="ltr">the authority to approve</div>
<div style="font-size: 13.36px; font-family: serif; left: 471.52px; top: 587.839px; transform: scale(0.62958, 1); transform-origin: 0% 0% 0px;" dir="ltr">intelligence su</div>
<div style="font-size: 13.36px; font-family: serif; left: 552.24px; top: 587.839px; transform: scale(0.636822, 1); transform-origin: 0% 0% 0px;" dir="ltr">rveillance”).</div>
<div style="font-size: 10.64px; font-family: serif; left: 96px; top: 616.32px; transform: scale(0.886667, 1); transform-origin: 0% 0% 0px;" dir="ltr">8</div>
<div style="font-size: 13.36px; font-family: serif; left: 105.36px; top: 620.96px; transform: scale(0.655442, 1); transform-origin: 0% 0% 0px;" dir="ltr">Indeed, Article II imposes on the President the general</div>
<div style="font-size: 13.36px; font-family: serif; left: 399.28px; top: 620.96px; transform: scale(0.66214, 1); transform-origin: 0% 0% 0px;" dir="ltr">obligation</div>
<div style="font-size: 13.36px; font-family: serif; left: 457.52px; top: 620.96px; transform: scale(0.662163, 1); transform-origin: 0% 0% 0px;" dir="ltr">to enforce laws that Congress has validly</div>
<div style="font-size: 13.36px; font-family: serif; left: 96px; top: 636.88px; transform: scale(0.676857, 1); transform-origin: 0% 0% 0px;" dir="ltr">enacted, including FISA: “he</div>
<div style="font-size: 13.36px; font-family: serif; left: 258.16px; top: 636.88px; transform: scale(0.651901, 1); transform-origin: 0% 0% 0px;" dir="ltr">shall</div>
<div style="font-size: 13.36px; font-family: serif; left: 284.16px; top: 636.88px; transform: scale(0.644749, 1); transform-origin: 0% 0% 0px;" dir="ltr">take Care that the Laws be faithfully</div>
<div style="font-size: 13.36px; font-family: serif; left: 485.52px; top: 636.88px; transform: scale(0.673964, 1); transform-origin: 0% 0% 0px;" dir="ltr">executed.” (emphasis added). The use of</div>
<div style="font-size: 13.36px; font-family: serif; left: 96px; top: 652.24px; transform: scale(0.669737, 1); transform-origin: 0% 0% 0px;" dir="ltr">the mandatory “shall” indicates that under our system of separated powers, he is duty-bound to execute the</div>
<div style="font-size: 13.36px; font-family: serif; left: 96px; top: 667.6px; transform: scale(0.678616, 1); transform-origin: 0% 0% 0px;" dir="ltr">provisions of FISA, not defy them.</div>
<div style="font-size: 8.64px; font-family: serif; left: 96px; top: 696.96px; transform: scale(0.864, 1); transform-origin: 0% 0% 0px;" dir="ltr">9</div>
<div style="font-size: 13.36px; font-family: serif; left: 110.32px; top: 698.24px; transform: scale(0.774657, 1); transform-origin: 0% 0% 0px;" dir="ltr">See</div>
<div style="font-size: 13.36px; font-family: serif; left: 128.88px; top: 698.24px; transform: scale(0.702292, 1); transform-origin: 0% 0% 0px;" dir="ltr">Memorandum from Jay S. Bybee, Assistant Attorney General, Department of Justice Office of Legal</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9994px; top: 713.6px; transform: scale(0.675079, 1); transform-origin: 0% 0% 0px;" dir="ltr">Counsel, to Alberto R. Gonzales, Counsel to the President, Re:</div>
<div style="font-size: 13.36px; font-family: serif; left: 431.199px; top: 713.6px; transform: scale(0.679186, 1); transform-origin: 0% 0% 0px;" dir="ltr">Standards of Conduct for Interrogation under 18</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9994px; top: 728.88px; transform: scale(0.740589, 1); transform-origin: 0% 0% 0px;" dir="ltr">U.S.C. §§ 2340-2340A</div>
<div style="font-size: 13.36px; font-family: serif; left: 220.48px; top: 728.88px; transform: scale(0.652727, 1); transform-origin: 0% 0% 0px;" dir="ltr">(Aug. 1, 2002), at 31.</div>
<div style="font-size: 8.64px; font-family: serif; left: 96px; top: 758.32px; transform: scale(0.864, 1); transform-origin: 0% 0% 0px;" dir="ltr">10</div>
<div style="font-size: 13.36px; font-family: serif; left: 104.64px; top: 759.6px; transform: scale(0.744633, 1); transform-origin: 0% 0% 0px;" dir="ltr">Memorandum from John C. Yoo, Deputy Assistant Atto</div>
<div style="font-size: 13.36px; font-family: serif; left: 408.319px; top: 759.6px; transform: scale(0.678111, 1); transform-origin: 0% 0% 0px;" dir="ltr">rney General, Office of Legal Counsel, to the Deputy</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0001px; top: 774.88px; transform: scale(0.668553, 1); transform-origin: 0% 0% 0px;" dir="ltr">Counsel to the President, Re:</div>
<div style="font-size: 13.36px; font-family: serif; left: 251.281px; top: 774.88px; transform: scale(0.685337, 1); transform-origin: 0% 0% 0px;" dir="ltr">The President’s Constitutional Authority To Conduct Military Operations Against</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0001px; top: 790.24px; transform: scale(0.720368, 1); transform-origin: 0% 0% 0px;" dir="ltr">Terrorists And Nations Supporting Them</div>
<div style="font-size: 13.36px; font-family: serif; left: 314.641px; top: 790.24px; transform: scale(0.632851, 1); transform-origin: 0% 0% 0px;" dir="ltr">(Sept. 25, 2001),</div>
<div style="font-size: 13.36px; font-family: serif; left: 410.481px; top: 790.24px; transform: scale(0.642488, 1); transform-origin: 0% 0% 0px;" dir="ltr">available at</div>
<div style="font-size: 13.36px; font-family: serif; left: 480.481px; top: 790.24px; transform: scale(0.774811, 1); transform-origin: 0% 0% 0px;" dir="ltr">www.usdoj.gov/olc/warpowers925.htm</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0003px; top: 805.52px; transform: scale(0.697225, 1); transform-origin: 0% 0% 0px;" dir="ltr">(emphasis added).</div>
<div style="font-size: 8.64px; font-family: serif; left: 96px; top: 834.96px; transform: scale(0.864, 1); transform-origin: 0% 0% 0px;" dir="ltr">11</div>
<div style="font-size: 13.36px; font-family: serif; left: 104.64px; top: 836.24px; transform: scale(0.702736, 1); transform-origin: 0% 0% 0px;" dir="ltr">Three years ago, the FISA Court of Review sugges</div>
<div style="font-size: 13.36px; font-family: serif; left: 380.239px; top: 836.24px; transform: scale(0.679173, 1); transform-origin: 0% 0% 0px;" dir="ltr">ted in dictum that Congress cannot “encroach on the</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0001px; top: 851.52px; transform: scale(0.668013, 1); transform-origin: 0% 0% 0px;" dir="ltr">President’s constitutional power” to con</div>
<div style="font-size: 13.36px; font-family: serif; left: 310.001px; top: 851.52px; transform: scale(0.634038, 1); transform-origin: 0% 0% 0px;" dir="ltr">duct foreign intelligence surveillance.</div>
<div style="font-size: 13.36px; font-family: serif; left: 518.08px; top: 851.52px; transform: scale(0.704203, 1); transform-origin: 0% 0% 0px;" dir="ltr">In re Sealed Case No. 02-001</div>
<div style="font-size: 13.36px; font-family: serif; left: 675.92px; top: 851.52px; transform: scale(0.622075, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 310</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0001px; top: 866.88px; transform: scale(0.692421, 1); transform-origin: 0% 0% 0px;" dir="ltr">F.3d 717, 742 (FIS Ct. Rev. 2002) (per curiam). The FISA Court of Review, however, did not hold that FISA was</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0001px; top: 882.24px; transform: scale(0.653137, 1); transform-origin: 0% 0% 0px;" dir="ltr">unconstitutional, nor has any other court suggested that</div>
<div style="font-size: 13.36px; font-family: serif; left: 394.241px; top: 882.24px; transform: scale(0.685677, 1); transform-origin: 0% 0% 0px;" dir="ltr">FISA’s modest regulations constitute an impermissible</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0001px; top: 897.52px; transform: scale(0.665727, 1); transform-origin: 0% 0% 0px;" dir="ltr">encroachment on presidential authority.</div>
<div style="font-size: 13.36px; font-family: serif; left: 314.48px; top: 897.52px; transform: scale(0.716881, 1); transform-origin: 0% 0% 0px;" dir="ltr">The FISA Court of Review relied upon</div>
<div style="font-size: 13.36px; font-family: serif; left: 526.561px; top: 897.52px; transform: scale(0.718793, 1); transform-origin: 0% 0% 0px;" dir="ltr">United States v. Truong Dihn Hung</div>
<div style="font-size: 13.36px; font-family: serif; left: 716.241px; top: 897.52px; transform: scale(0.420005, 1); transform-origin: 0% 0% 0px;" dir="ltr">,</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0014px; top: 912.88px; transform: scale(0.676801, 1); transform-origin: 0% 0% 0px;" dir="ltr">629 F.2d 908 (4th Cir. 1980)—but that court did not suggest that the President’s powers were beyond congressional</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0014px; top: 928.24px; transform: scale(0.62987, 1); transform-origin: 0% 0% 0px;" dir="ltr">control. To the contrary, the</div>
<div style="font-size: 13.36px; font-family: serif; left: 252.161px; top: 928.24px; transform: scale(0.761401, 1); transform-origin: 0% 0% 0px;" dir="ltr">Truong</div>
<div style="font-size: 13.36px; font-family: serif; left: 294.881px; top: 928.24px; transform: scale(0.641569, 1); transform-origin: 0% 0% 0px;" dir="ltr">court indicated that FISA’s restrictions</div>
<div style="font-size: 13.36px; font-family: serif; left: 505.522px; top: 928.24px; transform: scale(0.728788, 1); transform-origin: 0% 0% 0px;" dir="ltr">were</div>
<div style="font-size: 13.36px; font-family: serif; left: 534.721px; top: 928.24px; transform: scale(0.597006, 1); transform-origin: 0% 0% 0px;" dir="ltr">constitutional.</div>
<div style="font-size: 13.36px; font-family: serif; left: 620.641px; top: 928.24px; transform: scale(0.682571, 1); transform-origin: 0% 0% 0px;" dir="ltr">See</div>
<div style="font-size: 13.36px; font-family: serif; left: 642.48px; top: 928.24px; transform: scale(0.662851, 1); transform-origin: 0% 0% 0px;" dir="ltr">629 F.2d at</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0001px; top: 943.519px; transform: scale(0.670249, 1); transform-origin: 0% 0% 0px;" dir="ltr">915 n.4 (noting that “the imposition of a warrant requirement, beyond the constitutional minimum described in this</div>
</div>
</div>
<a name="8"></a>
<div id="pageContainer8" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 404px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">8</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 94.8px; transform: scale(0.620408, 1); transform-origin: 0% 0% 0px;" dir="ltr">B. Construing the AUMF to Authorize</div>
<div style="font-size: 16px; font-family: serif; left: 400px; top: 94.8px; transform: scale(0.703957, 1); transform-origin: 0% 0% 0px;" dir="ltr">Warrantless Domestic Wiretapping Would Raise</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.2px; transform: scale(0.65864, 1); transform-origin: 0% 0% 0px;" dir="ltr">Serious Constitutional Questions</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 150.16px; transform: scale(0.585651, 1); transform-origin: 0% 0% 0px;" dir="ltr">The principle that ambiguous</div>
<div style="font-size: 16px; font-family: serif; left: 336px; top: 150.16px; transform: scale(0.634292, 1); transform-origin: 0% 0% 0px;" dir="ltr">statutes should be construed to</div>
<div style="font-size: 16px; font-family: serif; left: 532.4px; top: 150.16px; transform: scale(0.613653, 1); transform-origin: 0% 0% 0px;" dir="ltr">avoid serious constitutional</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 168.56px; transform: scale(0.635878, 1); transform-origin: 0% 0% 0px;" dir="ltr">questions works against the administration, not in</div>
<div style="font-size: 16px; font-family: serif; left: 413.76px; top: 168.56px; transform: scale(0.647854, 1); transform-origin: 0% 0% 0px;" dir="ltr">its favor. Interpreting the AUMF and FISA to</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 186.96px; transform: scale(0.669711, 1); transform-origin: 0% 0% 0px;" dir="ltr">permit unchecked domestic wiretapping for the dur</div>
<div style="font-size: 16px; font-family: serif; left: 423.92px; top: 186.96px; transform: scale(0.590618, 1); transform-origin: 0% 0% 0px;" dir="ltr">ation of the conflict</div>
<div style="font-size: 16px; font-family: serif; left: 553.68px; top: 186.96px; transform: scale(0.68464, 1); transform-origin: 0% 0% 0px;" dir="ltr">with al Qaeda would</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 205.36px; transform: scale(0.607059, 1); transform-origin: 0% 0% 0px;" dir="ltr">certainly raise serious constitutional questions.</div>
<div style="font-size: 16px; font-family: serif; left: 399.2px; top: 205.36px; transform: scale(0.677354, 1); transform-origin: 0% 0% 0px;" dir="ltr">The Supreme Court has never upheld such a</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 223.76px; transform: scale(0.678556, 1); transform-origin: 0% 0% 0px;" dir="ltr">sweeping power to invade the privacy of Ameri</div>
<div style="font-size: 16px; font-family: serif; left: 401.2px; top: 223.76px; transform: scale(0.648705, 1); transform-origin: 0% 0% 0px;" dir="ltr">cans at home without individualized suspicion or</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 242.16px; transform: scale(0.572285, 1); transform-origin: 0% 0% 0px;" dir="ltr">judicial oversight.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 278.96px; transform: scale(0.628112, 1); transform-origin: 0% 0% 0px;" dir="ltr">The NSA surveillance program permits wire</div>
<div style="font-size: 16px; font-family: serif; left: 428.88px; top: 278.96px; transform: scale(0.641951, 1); transform-origin: 0% 0% 0px;" dir="ltr">tapping within the United States without</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 297.36px; transform: scale(0.622987, 1); transform-origin: 0% 0% 0px;" dir="ltr">either</div>
<div style="font-size: 16px; font-family: serif; left: 133.36px; top: 297.36px; transform: scale(0.64341, 1); transform-origin: 0% 0% 0px;" dir="ltr">of the safeguards presumptively required</div>
<div style="font-size: 16px; font-family: serif; left: 403.52px; top: 297.36px; transform: scale(0.675126, 1); transform-origin: 0% 0% 0px;" dir="ltr">by the Fourth Amendment for electronic</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 315.76px; transform: scale(0.662948, 1); transform-origin: 0% 0% 0px;" dir="ltr">surveillance—individualized probable cause and</div>
<div style="font-size: 16px; font-family: serif; left: 411.44px; top: 315.76px; transform: scale(0.637426, 1); transform-origin: 0% 0% 0px;" dir="ltr">a warrant or other orde</div>
<div style="font-size: 16px; font-family: serif; left: 558.08px; top: 315.76px; transform: scale(0.61488, 1); transform-origin: 0% 0% 0px;" dir="ltr">r issued by a judge or</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 334.16px; transform: scale(0.63865, 1); transform-origin: 0% 0% 0px;" dir="ltr">magistrate. The Court has long held that wire</div>
<div style="font-size: 16px; font-family: serif; left: 389.68px; top: 334.16px; transform: scale(0.619944, 1); transform-origin: 0% 0% 0px;" dir="ltr">taps generally require</div>
<div style="font-size: 16px; font-family: serif; left: 532.24px; top: 334.16px; transform: scale(0.657085, 1); transform-origin: 0% 0% 0px;" dir="ltr">a warrant and probable</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 352.56px; transform: scale(0.59516, 1); transform-origin: 0% 0% 0px;" dir="ltr">cause.</div>
<div style="font-size: 16px; font-family: serif; left: 143.6px; top: 352.56px; transform: scale(0.639322, 1); transform-origin: 0% 0% 0px;" dir="ltr">Katz v. United States</div>
<div style="font-size: 16px; font-family: serif; left: 277.84px; top: 352.56px; transform: scale(0.645176, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 389 U.S. 347 (1967). And the only</div>
<div style="font-size: 16px; font-family: serif; left: 516.48px; top: 352.56px; transform: scale(0.64504, 1); transform-origin: 0% 0% 0px;" dir="ltr">time the Court considered the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 370.96px; transform: scale(0.63082, 1); transform-origin: 0% 0% 0px;" dir="ltr">question of national security wi</div>
<div style="font-size: 16px; font-family: serif; left: 297.76px; top: 370.96px; transform: scale(0.647234, 1); transform-origin: 0% 0% 0px;" dir="ltr">retaps, it held that the Fourth Amendment prohibits domestic</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 389.36px; transform: scale(0.631324, 1); transform-origin: 0% 0% 0px;" dir="ltr">security wiretaps without those safeguards.</div>
<div style="font-size: 16px; font-family: serif; left: 380px; top: 389.36px; transform: scale(0.638327, 1); transform-origin: 0% 0% 0px;" dir="ltr">United States v. Unite</div>
<div style="font-size: 16px; font-family: serif; left: 520.4px; top: 389.36px; transform: scale(0.63056, 1); transform-origin: 0% 0% 0px;" dir="ltr">d States Dist. Court</div>
<div style="font-size: 16px; font-family: serif; left: 646.56px; top: 389.36px; transform: scale(0.621615, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 407 U.S.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 407.76px; transform: scale(0.650469, 1); transform-origin: 0% 0% 0px;" dir="ltr">297 (1972). Although the Court in</div>
<div style="font-size: 16px; font-family: serif; left: 323.52px; top: 407.76px; transform: scale(0.617474, 1); transform-origin: 0% 0% 0px;" dir="ltr">that case left open the ques</div>
<div style="font-size: 16px; font-family: serif; left: 496.32px; top: 407.76px; transform: scale(0.688342, 1); transform-origin: 0% 0% 0px;" dir="ltr">tion of the Fourth Amendment</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 426.16px; transform: scale(0.617084, 1); transform-origin: 0% 0% 0px;" dir="ltr">validity of warrantless wiretaps for foreign inte</div>
<div style="font-size: 16px; font-family: serif; left: 398.08px; top: 426.16px; transform: scale(0.614247, 1); transform-origin: 0% 0% 0px;" dir="ltr">lligence purposes, its precedents raise serious</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 444.56px; transform: scale(0.629314, 1); transform-origin: 0% 0% 0px;" dir="ltr">constitutional questions about th</div>
<div style="font-size: 16px; font-family: serif; left: 303.6px; top: 444.56px; transform: scale(0.647709, 1); transform-origin: 0% 0% 0px;" dir="ltr">e kind of open-ended authority th</div>
<div style="font-size: 16px; font-family: serif; left: 517.28px; top: 444.56px; transform: scale(0.62704, 1); transform-origin: 0% 0% 0px;" dir="ltr">e President has asserted with</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 462.96px; transform: scale(0.659983, 1); transform-origin: 0% 0% 0px;" dir="ltr">respect to the NSA program.</div>
<div style="font-size: 16px; font-family: serif; left: 287.36px; top: 462.96px; transform: scale(0.58432, 1); transform-origin: 0% 0% 0px;" dir="ltr">See id.</div>
<div style="font-size: 16px; font-family: serif; left: 334.08px; top: 462.96px; transform: scale(0.62926, 1); transform-origin: 0% 0% 0px;" dir="ltr">at 316-18 (explaining difficulty</div>
<div style="font-size: 16px; font-family: serif; left: 535.36px; top: 462.96px; transform: scale(0.644813, 1); transform-origin: 0% 0% 0px;" dir="ltr">of guaranteeing Fourth</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 481.36px; transform: scale(0.68712, 1); transform-origin: 0% 0% 0px;" dir="ltr">Amendment freedoms if domestic surveillance can</div>
<div style="font-size: 16px; font-family: serif; left: 425.6px; top: 481.36px; transform: scale(0.641461, 1); transform-origin: 0% 0% 0px;" dir="ltr">be conducted solely in</div>
<div style="font-size: 16px; font-family: serif; left: 573.12px; top: 481.36px; transform: scale(0.598051, 1); transform-origin: 0% 0% 0px;" dir="ltr">the discretion of the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 499.76px; transform: scale(0.620366, 1); transform-origin: 0% 0% 0px;" dir="ltr">executive branch).</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 536.56px; transform: scale(0.628957, 1); transform-origin: 0% 0% 0px;" dir="ltr">Indeed, serious Fourth Amendment ques</div>
<div style="font-size: 16px; font-family: serif; left: 404px; top: 536.56px; transform: scale(0.61144, 1); transform-origin: 0% 0% 0px;" dir="ltr">tions about the vali</div>
<div style="font-size: 16px; font-family: serif; left: 526.16px; top: 536.56px; transform: scale(0.61576, 1); transform-origin: 0% 0% 0px;" dir="ltr">dity of warrantless</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 554.96px; transform: scale(0.667247, 1); transform-origin: 0% 0% 0px;" dir="ltr">wiretapping led Congress to</div>
<div style="font-size: 16px; font-family: serif; left: 276px; top: 554.96px; transform: scale(0.653398, 1); transform-origin: 0% 0% 0px;" dir="ltr">enact FISA, in order to “provide the secure framework by which the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 573.36px; transform: scale(0.641025, 1); transform-origin: 0% 0% 0px;" dir="ltr">executive branch may conduct legitimate electronic surveillance for foreign intelligence purposes</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 591.76px; transform: scale(0.642285, 1); transform-origin: 0% 0% 0px;" dir="ltr">within the context of this nation’s commitment to</div>
<div style="font-size: 16px; font-family: serif; left: 416.88px; top: 591.76px; transform: scale(0.6312, 1); transform-origin: 0% 0% 0px;" dir="ltr">privacy and individual ri</div>
<div style="font-size: 16px; font-family: serif; left: 574.64px; top: 591.76px; transform: scale(0.632021, 1); transform-origin: 0% 0% 0px;" dir="ltr">ghts.” S. Rep. No. 95-</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 610.16px; transform: scale(0.589666, 1); transform-origin: 0% 0% 0px;" dir="ltr">604, pt. 1, at 15 (1977) (citing,</div>
<div style="font-size: 16px; font-family: serif; left: 296.48px; top: 610.16px; transform: scale(0.59264, 1); transform-origin: 0% 0% 0px;" dir="ltr">inter alia</div>
<div style="font-size: 16px; font-family: serif; left: 355.6px; top: 610.16px; transform: scale(0.4, 1); transform-origin: 0% 0% 0px;" dir="ltr">,</div>
<div style="font-size: 16px; font-family: serif; left: 363.6px; top: 610.16px; transform: scale(0.670846, 1); transform-origin: 0% 0% 0px;" dir="ltr">Zweibon v, Mitchell</div>
<div style="font-size: 16px; font-family: serif; left: 491.04px; top: 610.16px; transform: scale(0.629804, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 516 F.2d 594 (D.C. Cir. 1975), in</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 628.56px; transform: scale(0.632393, 1); transform-origin: 0% 0% 0px;" dir="ltr">which “the court of appeals held that a warrant</div>
<div style="font-size: 16px; font-family: serif; left: 399.44px; top: 628.56px; transform: scale(0.659133, 1); transform-origin: 0% 0% 0px;" dir="ltr">must be obtained before</div>
<div style="font-size: 16px; font-family: serif; left: 557.6px; top: 628.56px; transform: scale(0.600862, 1); transform-origin: 0% 0% 0px;" dir="ltr">a wiretap is installed on</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 646.96px; transform: scale(0.62073, 1); transform-origin: 0% 0% 0px;" dir="ltr">a domestic organization that is neither the agent</div>
<div style="font-size: 16px; font-family: serif; left: 406.16px; top: 646.96px; transform: scale(0.60952, 1); transform-origin: 0% 0% 0px;" dir="ltr">of, nor acting in collaboration with, a foreign</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 665.36px; transform: scale(0.672089, 1); transform-origin: 0% 0% 0px;" dir="ltr">power”).</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 702.16px; transform: scale(0.679316, 1); transform-origin: 0% 0% 0px;" dir="ltr">Relying on</div>
<div style="font-size: 16px; font-family: serif; left: 218.72px; top: 702.16px; transform: scale(0.675954, 1); transform-origin: 0% 0% 0px;" dir="ltr">In re Sealed Case No. 02-001</div>
<div style="font-size: 16px; font-family: serif; left: 408px; top: 702.16px; transform: scale(0.654556, 1); transform-origin: 0% 0% 0px;" dir="ltr">, the DOJ argues that the NSA program falls</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 720.56px; transform: scale(0.64655, 1); transform-origin: 0% 0% 0px;" dir="ltr">within an exception to the warra</div>
<div style="font-size: 16px; font-family: serif; left: 302.72px; top: 720.56px; transform: scale(0.67441, 1); transform-origin: 0% 0% 0px;" dir="ltr">nt and probable cause requiremen</div>
<div style="font-size: 16px; font-family: serif; left: 518.4px; top: 720.56px; transform: scale(0.612774, 1); transform-origin: 0% 0% 0px;" dir="ltr">t for reasonable searches that</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 738.96px; transform: scale(0.662176, 1); transform-origin: 0% 0% 0px;" dir="ltr">serve “special needs” above and beyond ordinary la</div>
<div style="font-size: 16px; font-family: serif; left: 427.04px; top: 738.96px; transform: scale(0.640303, 1); transform-origin: 0% 0% 0px;" dir="ltr">w enforcement. But the existence of “special</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 757.36px; transform: scale(0.659605, 1); transform-origin: 0% 0% 0px;" dir="ltr">needs” has never been found to permit warrantless</div>
<div style="font-size: 16px; font-family: serif; left: 418.96px; top: 757.36px; transform: scale(0.638322, 1); transform-origin: 0% 0% 0px;" dir="ltr">wiretapping. “Special needs” generally</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 775.76px; transform: scale(0.659995, 1); transform-origin: 0% 0% 0px;" dir="ltr">excuse the warrant and individu</div>
<div style="font-size: 16px; font-family: serif; left: 300.32px; top: 775.76px; transform: scale(0.653817, 1); transform-origin: 0% 0% 0px;" dir="ltr">alized suspicion requirements only where those requirements are</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 794.16px; transform: scale(0.633443, 1); transform-origin: 0% 0% 0px;" dir="ltr">impracticable and the intrusion on privacy is minimal.</div>
<div style="font-size: 16px; font-family: serif; left: 450.48px; top: 794.16px; transform: scale(0.557862, 1); transform-origin: 0% 0% 0px;" dir="ltr">See, e.g.,</div>
<div style="font-size: 16px; font-family: serif; left: 511.84px; top: 794.16px; transform: scale(0.630994, 1); transform-origin: 0% 0% 0px;" dir="ltr">Griffin v. Wisconsin,</div>
<div style="font-size: 16px; font-family: serif; left: 644.32px; top: 794.16px; transform: scale(0.64304, 1); transform-origin: 0% 0% 0px;" dir="ltr">483 U.S.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 812.56px; transform: scale(0.684533, 1); transform-origin: 0% 0% 0px;" dir="ltr">868, 873 (1987)</div>
<div style="font-size: 16px; font-family: serif; left: 198.72px; top: 812.56px; transform: scale(0.635325, 1); transform-origin: 0% 0% 0px;" dir="ltr">. Wiretapping is not a minimal intrusion</div>
<div style="font-size: 16px; font-family: serif; left: 459.2px; top: 812.56px; transform: scale(0.655926, 1); transform-origin: 0% 0% 0px;" dir="ltr">on privacy, and the experience of FISA</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 830.96px; transform: scale(0.630488, 1); transform-origin: 0% 0% 0px;" dir="ltr">shows that foreign intelligen</div>
<div style="font-size: 16px; font-family: serif; left: 278.72px; top: 830.96px; transform: scale(0.623701, 1); transform-origin: 0% 0% 0px;" dir="ltr">ce surveillance can be carried</div>
<div style="font-size: 16px; font-family: serif; left: 472px; top: 830.96px; transform: scale(0.658827, 1); transform-origin: 0% 0% 0px;" dir="ltr">out through warrants based on</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 849.36px; transform: scale(0.606737, 1); transform-origin: 0% 0% 0px;" dir="ltr">individualized suspicion..</div>
<div style="font-size: 13.36px; font-family: serif; left: 96px; top: 912.88px; transform: scale(0.660244, 1); transform-origin: 0% 0% 0px;" dir="ltr">opinion,</div>
<div style="font-size: 13.36px; font-family: serif; left: 143.44px; top: 912.88px; transform: scale(0.656505, 1); transform-origin: 0% 0% 0px;" dir="ltr">should be left to the intricate balancing performed in the course of the legislative process by Congress and</div>
<div style="font-size: 13.36px; font-family: serif; left: 96px; top: 928.24px; transform: scale(0.679245, 1); transform-origin: 0% 0% 0px;" dir="ltr">the</div>
<div style="font-size: 13.36px; font-family: serif; left: 115.681px; top: 928.24px; transform: scale(0.710622, 1); transform-origin: 0% 0% 0px;" dir="ltr">President</div>
<div style="font-size: 13.36px; font-family: serif; left: 166.8px; top: 928.24px; transform: scale(0.678601, 1); transform-origin: 0% 0% 0px;" dir="ltr">”) (emphasis added).</div>
</div>
</div>
<a name="9"></a>
<div id="pageContainer9" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 404px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">9</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 94.72px; transform: scale(0.633378, 1); transform-origin: 0% 0% 0px;" dir="ltr">The court in</div>
<div style="font-size: 16px; font-family: serif; left: 226.16px; top: 94.72px; transform: scale(0.6888, 1); transform-origin: 0% 0% 0px;" dir="ltr">Sealed Case</div>
<div style="font-size: 16px; font-family: serif; left: 308.8px; top: 94.72px; transform: scale(0.652299, 1); transform-origin: 0% 0% 0px;" dir="ltr">upheld FISA itself, which requi</div>
<div style="font-size: 16px; font-family: serif; left: 510.96px; top: 94.72px; transform: scale(0.627174, 1); transform-origin: 0% 0% 0px;" dir="ltr">res warrants issued by Article</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.12px; transform: scale(0.647185, 1); transform-origin: 0% 0% 0px;" dir="ltr">III federal judges upon an individualized showing of</div>
<div style="font-size: 16px; font-family: serif; left: 432.24px; top: 113.12px; transform: scale(0.618435, 1); transform-origin: 0% 0% 0px;" dir="ltr">probable cause that the subject is an “agent</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.677034, 1); transform-origin: 0% 0% 0px;" dir="ltr">of a foreign power.” The NSA domestic spyi</div>
<div style="font-size: 16px; font-family: serif; left: 387.12px; top: 131.52px; transform: scale(0.643878, 1); transform-origin: 0% 0% 0px;" dir="ltr">ng program, by contrast,</div>
<div style="font-size: 16px; font-family: serif; left: 548px; top: 131.52px; transform: scale(0.637725, 1); transform-origin: 0% 0% 0px;" dir="ltr">includes none of these</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 149.92px; transform: scale(0.61698, 1); transform-origin: 0% 0% 0px;" dir="ltr">safeguards. It does not require</div>
<div style="font-size: 16px; font-family: serif; left: 293.36px; top: 149.92px; transform: scale(0.632206, 1); transform-origin: 0% 0% 0px;" dir="ltr">individualized judicial approv</div>
<div style="font-size: 16px; font-family: serif; left: 489.2px; top: 149.92px; transform: scale(0.5928, 1); transform-origin: 0% 0% 0px;" dir="ltr">al, and it does not require a</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 168.32px; transform: scale(0.617215, 1); transform-origin: 0% 0% 0px;" dir="ltr">showing that the target is an “agent of a fo</div>
<div style="font-size: 16px; font-family: serif; left: 367.36px; top: 168.32px; transform: scale(0.671273, 1); transform-origin: 0% 0% 0px;" dir="ltr">reign power.” Accordi</div>
<div style="font-size: 16px; font-family: serif; left: 515.04px; top: 168.32px; transform: scale(0.66153, 1); transform-origin: 0% 0% 0px;" dir="ltr">ng to Attorney General</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 186.72px; transform: scale(0.702157, 1); transform-origin: 0% 0% 0px;" dir="ltr">Gonzales, the NSA may wiretap a</div>
<div style="font-size: 16px; font-family: serif; left: 313.76px; top: 186.72px; transform: scale(0.633972, 1); transform-origin: 0% 0% 0px;" dir="ltr">ny person in the United States</div>
<div style="font-size: 16px; font-family: serif; left: 510.16px; top: 186.72px; transform: scale(0.670228, 1); transform-origin: 0% 0% 0px;" dir="ltr">who so much as receives a</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 205.12px; transform: scale(0.685474, 1); transform-origin: 0% 0% 0px;" dir="ltr">communication from anyone abroad, if the admini</div>
<div style="font-size: 16px; font-family: serif; left: 418.16px; top: 205.12px; transform: scale(0.605756, 1); transform-origin: 0% 0% 0px;" dir="ltr">stration deems either of the parties to be</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 223.52px; transform: scale(0.64704, 1); transform-origin: 0% 0% 0px;" dir="ltr">affiliated with al Qaeda, a member of an</div>
<div style="font-size: 16px; font-family: serif; left: 358.64px; top: 223.52px; transform: scale(0.666853, 1); transform-origin: 0% 0% 0px;" dir="ltr">organization</div>
<div style="font-size: 16px; font-family: serif; left: 442.64px; top: 223.52px; transform: scale(0.57744, 1); transform-origin: 0% 0% 0px;" dir="ltr">affiliated</div>
<div style="font-size: 16px; font-family: serif; left: 504.32px; top: 223.52px; transform: scale(0.71296, 1); transform-origin: 0% 0% 0px;" dir="ltr">with</div>
<div style="font-size: 16px; font-family: serif; left: 536.8px; top: 223.52px; transform: scale(0.57952, 1); transform-origin: 0% 0% 0px;" dir="ltr">al</div>
<div style="font-size: 16px; font-family: serif; left: 552.4px; top: 223.52px; transform: scale(0.682543, 1); transform-origin: 0% 0% 0px;" dir="ltr">Qaeda, “working in</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 241.92px; transform: scale(0.629391, 1); transform-origin: 0% 0% 0px;" dir="ltr">support of al Qaeda,” or “part of</div>
<div style="font-size: 16px; font-family: serif; left: 303.52px; top: 241.92px; transform: scale(0.62496, 1); transform-origin: 0% 0% 0px;" dir="ltr">” an organization or group “that is</div>
<div style="font-size: 16px; font-family: serif; left: 526.24px; top: 241.92px; transform: scale(0.67504, 1); transform-origin: 0% 0% 0px;" dir="ltr">supportive</div>
<div style="font-size: 16px; font-family: serif; left: 597.76px; top: 241.92px; transform: scale(0.6664, 1); transform-origin: 0% 0% 0px;" dir="ltr">of</div>
<div style="font-size: 16px; font-family: serif; left: 615.04px; top: 241.92px; transform: scale(0.67472, 1); transform-origin: 0% 0% 0px;" dir="ltr">al Qaeda.”</div>
<div style="font-size: 10.64px; font-family: serif; left: 682.48px; top: 239.92px; transform: scale(0.893405, 1); transform-origin: 0% 0% 0px;" dir="ltr">12</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 260.32px; transform: scale(0.62678, 1); transform-origin: 0% 0% 0px;" dir="ltr">Under this reasoning, a U.S. citizen living here</div>
<div style="font-size: 16px; font-family: serif; left: 396.48px; top: 260.32px; transform: scale(0.654841, 1); transform-origin: 0% 0% 0px;" dir="ltr">who received a phone call from another U.S.</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 278.72px; transform: scale(0.650337, 1); transform-origin: 0% 0% 0px;" dir="ltr">citizen who attends a mosque that the administ</div>
<div style="font-size: 16px; font-family: serif; left: 395.04px; top: 278.72px; transform: scale(0.631136, 1); transform-origin: 0% 0% 0px;" dir="ltr">ration believes is “supportive” of al Qaeda could</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 297.12px; transform: scale(0.658031, 1); transform-origin: 0% 0% 0px;" dir="ltr">be wiretapped without a warrant. The absence</div>
<div style="font-size: 16px; font-family: serif; left: 398.64px; top: 297.12px; transform: scale(0.680637, 1); transform-origin: 0% 0% 0px;" dir="ltr">of meaningful safeguards on the NSA program at</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 315.52px; transform: scale(0.65952, 1); transform-origin: 0% 0% 0px;" dir="ltr">a minimum raises serious questions about th</div>
<div style="font-size: 16px; font-family: serif; left: 379.6px; top: 315.52px; transform: scale(0.636793, 1); transform-origin: 0% 0% 0px;" dir="ltr">e validity of the program under the Fourth</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 333.92px; transform: scale(0.676391, 1); transform-origin: 0% 0% 0px;" dir="ltr">Amendment, and therefore supports an interp</div>
<div style="font-size: 16px; font-family: serif; left: 386.64px; top: 333.92px; transform: scale(0.658669, 1); transform-origin: 0% 0% 0px;" dir="ltr">retation of the AUMF that does not undercut</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 352.32px; transform: scale(0.652777, 1); transform-origin: 0% 0% 0px;" dir="ltr">FISA’s regulation of such conduct.</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 389.12px; transform: scale(-0.0333333, 1); transform-origin: 0% 0% 0px;" dir="ltr">* * *</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 425.92px; transform: scale(0.601995, 1); transform-origin: 0% 0% 0px;" dir="ltr">In conclusion, the DOJ letter fails to offer a</div>
<div style="font-size: 16px; font-family: serif; left: 426.56px; top: 425.92px; transform: scale(0.655873, 1); transform-origin: 0% 0% 0px;" dir="ltr">plausible legal defense of the NSA domestic</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 444.32px; transform: scale(0.626664, 1); transform-origin: 0% 0% 0px;" dir="ltr">spying program. If the Administration felt that FI</div>
<div style="font-size: 16px; font-family: serif; left: 415.52px; top: 444.32px; transform: scale(0.640932, 1); transform-origin: 0% 0% 0px;" dir="ltr">SA was insufficient, the proper course was to</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 462.72px; transform: scale(0.652697, 1); transform-origin: 0% 0% 0px;" dir="ltr">seek legislative amendment, as</div>
<div style="font-size: 16px; font-family: serif; left: 298.16px; top: 462.72px; transform: scale(0.615281, 1); transform-origin: 0% 0% 0px;" dir="ltr">it did with other aspects of FISA in the Patriot Act, and as</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 481.12px; transform: scale(0.682235, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress expressly contemplated</div>
<div style="font-size: 16px; font-family: serif; left: 314.16px; top: 481.12px; transform: scale(0.66816, 1); transform-origin: 0% 0% 0px;" dir="ltr">when it enacted the wartime wi</div>
<div style="font-size: 16px; font-family: serif; left: 514.56px; top: 481.12px; transform: scale(0.64704, 1); transform-origin: 0% 0% 0px;" dir="ltr">retap provision in FISA. One</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 499.52px; transform: scale(0.628151, 1); transform-origin: 0% 0% 0px;" dir="ltr">of the crucial features of a constitutional democracy</div>
<div style="font-size: 16px; font-family: serif; left: 428.72px; top: 499.52px; transform: scale(0.61078, 1); transform-origin: 0% 0% 0px;" dir="ltr">is that it is always open to the President—or</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 517.92px; transform: scale(0.6357, 1); transform-origin: 0% 0% 0px;" dir="ltr">anyone else—to seek to change the law. But it is</div>
<div style="font-size: 16px; font-family: serif; left: 410.96px; top: 517.92px; transform: scale(0.63806, 1); transform-origin: 0% 0% 0px;" dir="ltr">also beyond dispute that, in such a democracy,</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 536.32px; transform: scale(0.64493, 1); transform-origin: 0% 0% 0px;" dir="ltr">the President cannot simply viol</div>
<div style="font-size: 16px; font-family: serif; left: 302.24px; top: 536.32px; transform: scale(0.666373, 1); transform-origin: 0% 0% 0px;" dir="ltr">ate criminal laws behind closed doors because he deems them</div>
<div style="font-size: 16px; font-family: serif; left: 96.0001px; top: 554.72px; transform: scale(0.637797, 1); transform-origin: 0% 0% 0px;" dir="ltr">obsolete or impracticable.</div>
<div style="font-size: 10.64px; font-family: serif; left: 261.76px; top: 552.72px; transform: scale(0.893405, 1); transform-origin: 0% 0% 0px;" dir="ltr">13</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 591.44px; transform: scale(0.663254, 1); transform-origin: 0% 0% 0px;" dir="ltr">We hope you find these views helpful to your co</div>
<div style="font-size: 16px; font-family: serif; left: 455.44px; top: 591.44px; transform: scale(0.628176, 1); transform-origin: 0% 0% 0px;" dir="ltr">nsideration of the legality of the NSA</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 609.84px; transform: scale(0.682643, 1); transform-origin: 0% 0% 0px;" dir="ltr">domestic spying program.</div>
<div style="font-size: 8.64px; font-family: serif; left: 96px; top: 758.32px; transform: scale(0.864, 1); transform-origin: 0% 0% 0px;" dir="ltr">12</div>
<div style="font-size: 13.36px; font-family: serif; left: 111.36px; top: 759.6px; transform: scale(0.682571, 1); transform-origin: 0% 0% 0px;" dir="ltr">See</div>
<div style="font-size: 13.36px; font-family: serif; left: 133.2px; top: 759.6px; transform: scale(0.70617, 1); transform-origin: 0% 0% 0px;" dir="ltr">Gonzales/Hayden Press Briefing,</div>
<div style="font-size: 13.36px; font-family: serif; left: 313.919px; top: 759.6px; transform: scale(0.755374, 1); transform-origin: 0% 0% 0px;" dir="ltr">supra</div>
<div style="font-size: 13.36px; font-family: serif; left: 344.159px; top: 759.6px; transform: scale(0.596932, 1); transform-origin: 0% 0% 0px;" dir="ltr">note 4.</div>
<div style="font-size: 8.64px; font-family: serif; left: 96px; top: 788.96px; transform: scale(0.864, 1); transform-origin: 0% 0% 0px;" dir="ltr">13</div>
<div style="font-size: 13.36px; font-family: serif; left: 104.64px; top: 790.24px; transform: scale(0.693658, 1); transform-origin: 0% 0% 0px;" dir="ltr">During consideration of FISA, the House of Represen</div>
<div style="font-size: 13.36px; font-family: serif; left: 398.72px; top: 790.24px; transform: scale(0.633807, 1); transform-origin: 0% 0% 0px;" dir="ltr">tatives noted that “the deci</div>
<div style="font-size: 13.36px; font-family: serif; left: 540.8px; top: 790.24px; transform: scale(0.635061, 1); transform-origin: 0% 0% 0px;" dir="ltr">sion as to the standards</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0001px; top: 805.52px; transform: scale(0.678343, 1); transform-origin: 0% 0% 0px;" dir="ltr">governing when and how foreign intelligence electronic surveillance should be conducted is and should be a</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0001px; top: 820.88px; transform: scale(0.623453, 1); transform-origin: 0% 0% 0px;" dir="ltr">political decision, in the best sense of</div>
<div style="font-size: 13.36px; font-family: serif; left: 295.68px; top: 820.88px; transform: scale(0.643689, 1); transform-origin: 0% 0% 0px;" dir="ltr">the term, because it invo</div>
<div style="font-size: 13.36px; font-family: serif; left: 429.76px; top: 820.88px; transform: scale(0.683829, 1); transform-origin: 0% 0% 0px;" dir="ltr">lves the weighing of im</div>
<div style="font-size: 13.36px; font-family: serif; left: 555.52px; top: 820.88px; transform: scale(0.65086, 1); transform-origin: 0% 0% 0px;" dir="ltr">portant public policy</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0001px; top: 836.24px; transform: scale(0.644898, 1); transform-origin: 0% 0% 0px;" dir="ltr">concerns–civil liberties and national security. Such a political decision is one properly made by the political</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0001px; top: 851.52px; transform: scale(0.683554, 1); transform-origin: 0% 0% 0px;" dir="ltr">branches of Government together, not adopted by one branch on its own and with no regard for the other. Under our</div>
<div style="font-size: 13.36px; font-family: serif; left: 96.0001px; top: 866.88px; transform: scale(0.62542, 1); transform-origin: 0% 0% 0px;" dir="ltr">Constitution legislation is the</div>
<div style="font-size: 13.36px; font-family: serif; left: 255.999px; top: 866.88px; transform: scale(0.679362, 1); transform-origin: 0% 0% 0px;" dir="ltr">embodiment of just such politi</div>
<div style="font-size: 13.36px; font-family: serif; left: 418.959px; top: 866.88px; transform: scale(0.658172, 1); transform-origin: 0% 0% 0px;" dir="ltr">cal decisions.” H. Rep. 95</div>
<div style="font-size: 13.36px; font-family: serif; left: 561.119px; top: 866.88px; transform: scale(0.601434, 1); transform-origin: 0% 0% 0px;" dir="ltr">-1283, pt. I, at 21-22.</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9988px; top: 882.24px; transform: scale(0.679476, 1); transform-origin: 0% 0% 0px;" dir="ltr">Attorney General Griffin Bell supported FISA in part</div>
<div style="font-size: 13.36px; font-family: serif; left: 384.079px; top: 882.24px; transform: scale(0.681512, 1); transform-origin: 0% 0% 0px;" dir="ltr">because “no matter how well intentioned or ingenious the</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9988px; top: 897.519px; transform: scale(0.699598, 1); transform-origin: 0% 0% 0px;" dir="ltr">persons in the Executive branch who formulate these measur</div>
<div style="font-size: 13.36px; font-family: serif; left: 420.318px; top: 897.519px; transform: scale(0.627628, 1); transform-origin: 0% 0% 0px;" dir="ltr">es, the crucible of the legislative process will ensure</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9988px; top: 912.879px; transform: scale(0.665538, 1); transform-origin: 0% 0% 0px;" dir="ltr">that the procedures will be affirmed by that branch of government which is more directly responsible to the</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9988px; top: 928.239px; transform: scale(0.672677, 1); transform-origin: 0% 0% 0px;" dir="ltr">electorate.” Foreign Intelligence Surveillance Act of 1978: Hearings Before the Subcomm. on Intelligence and the</div>
<div style="font-size: 13.36px; font-family: serif; left: 95.9988px; top: 943.519px; transform: scale(0.685298, 1); transform-origin: 0% 0% 0px;" dir="ltr">Rights of Americans of the Senate Select Comm. On Intelligence, 95th Cong., 2d Sess. 12 (1977).</div>
</div>
</div>
<a name="10"></a>
<div id="pageContainer10" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 400px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">10</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 94.72px; transform: scale(0.622589, 1); transform-origin: 0% 0% 0px;" dir="ltr">Sincerely,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.651858, 1); transform-origin: 0% 0% 0px;" dir="ltr">Curtis A. Bradley</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 149.92px; transform: scale(0.7064, 1); transform-origin: 0% 0% 0px;" dir="ltr">Richard and Marcy Horvitz</div>
<div style="font-size: 16px; font-family: serif; left: 280.48px; top: 149.92px; transform: scale(0.683689, 1); transform-origin: 0% 0% 0px;" dir="ltr">Professor of Law, Duke University*</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 168.32px; transform: scale(0.665209, 1); transform-origin: 0% 0% 0px;" dir="ltr">Former Counselor on International Law in the</div>
<div style="font-size: 16px; font-family: serif; left: 395.12px; top: 168.32px; transform: scale(0.656701, 1); transform-origin: 0% 0% 0px;" dir="ltr">State Department Legal Adviser's Office, 2004</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 205.12px; transform: scale(0.703462, 1); transform-origin: 0% 0% 0px;" dir="ltr">David Cole</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 223.52px; transform: scale(0.690199, 1); transform-origin: 0% 0% 0px;" dir="ltr">Professor of Law, Georgetown University Law Center</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 260.32px; transform: scale(0.659379, 1); transform-origin: 0% 0% 0px;" dir="ltr">Walter Dellinger</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 278.72px; transform: scale(0.699995, 1); transform-origin: 0% 0% 0px;" dir="ltr">Douglas Blount Maggs Professor</div>
<div style="font-size: 16px; font-family: serif; left: 312.96px; top: 278.72px; transform: scale(0.68336, 1); transform-origin: 0% 0% 0px;" dir="ltr">of Law, Duke University</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 297.12px; transform: scale(0.690535, 1); transform-origin: 0% 0% 0px;" dir="ltr">Former Assistant Attorney Genera</div>
<div style="font-size: 16px; font-family: serif; left: 316.88px; top: 297.12px; transform: scale(0.661911, 1); transform-origin: 0% 0% 0px;" dir="ltr">l, Office of Legal Counsel,1993-1996</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 315.52px; transform: scale(0.680251, 1); transform-origin: 0% 0% 0px;" dir="ltr">Former Acting Solicitor Genera</div>
<div style="font-size: 16px; font-family: serif; left: 300px; top: 315.52px; transform: scale(0.62651, 1); transform-origin: 0% 0% 0px;" dir="ltr">l of the United States, 1996-97</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 352.32px; transform: scale(0.741333, 1); transform-origin: 0% 0% 0px;" dir="ltr">Ronald Dworkin</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 370.72px; transform: scale(0.706219, 1); transform-origin: 0% 0% 0px;" dir="ltr">Frank Henry Sommer Professor,</div>
<div style="font-size: 16px; font-family: serif; left: 308px; top: 370.72px; transform: scale(0.720872, 1); transform-origin: 0% 0% 0px;" dir="ltr">New York University Law School</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 407.52px; transform: scale(0.6671, 1); transform-origin: 0% 0% 0px;" dir="ltr">Richard Epstein</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 425.92px; transform: scale(0.665935, 1); transform-origin: 0% 0% 0px;" dir="ltr">James Parker Hall Distinguished Service Prof</div>
<div style="font-size: 16px; font-family: serif; left: 388.88px; top: 425.92px; transform: scale(0.663177, 1); transform-origin: 0% 0% 0px;" dir="ltr">essor, University of Chicago Law School</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 444.32px; transform: scale(0.66672, 1); transform-origin: 0% 0% 0px;" dir="ltr">Peter and Kirsten Bedford Seni</div>
<div style="font-size: 16px; font-family: serif; left: 296px; top: 444.32px; transform: scale(0.638827, 1); transform-origin: 0% 0% 0px;" dir="ltr">or Fellow, Hoover Institution</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 481.12px; transform: scale(0.733404, 1); transform-origin: 0% 0% 0px;" dir="ltr">Harold Hongju Koh</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 499.52px; transform: scale(0.686897, 1); transform-origin: 0% 0% 0px;" dir="ltr">Dean and Gerard C. and Bernice Latrobe Smith Pr</div>
<div style="font-size: 16px; font-family: serif; left: 418.96px; top: 499.52px; transform: scale(0.657055, 1); transform-origin: 0% 0% 0px;" dir="ltr">ofessor of International Law, Yale Law School</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 517.92px; transform: scale(0.64432, 1); transform-origin: 0% 0% 0px;" dir="ltr">Former Assistant Secretary of State fo</div>
<div style="font-size: 16px; font-family: serif; left: 340.8px; top: 517.92px; transform: scale(0.718797, 1); transform-origin: 0% 0% 0px;" dir="ltr">r Democracy, Human Rights and Labor 1998-2001</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 536.32px; transform: scale(0.68448, 1); transform-origin: 0% 0% 0px;" dir="ltr">Former Attorney-Adviser, Offi</div>
<div style="font-size: 16px; font-family: serif; left: 294.56px; top: 536.32px; transform: scale(0.679944, 1); transform-origin: 0% 0% 0px;" dir="ltr">ce of Legal Counsel, DOJ, 1983-85</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 573.04px; transform: scale(0.689987, 1); transform-origin: 0% 0% 0px;" dir="ltr">Philip B. Heymann</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 591.44px; transform: scale(0.701294, 1); transform-origin: 0% 0% 0px;" dir="ltr">James Barr Ames Professor, Harvard Law School</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 609.84px; transform: scale(0.697796, 1); transform-origin: 0% 0% 0px;" dir="ltr">Former Deputy Attorney General, 1993-94</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 646.64px; transform: scale(0.68624, 1); transform-origin: 0% 0% 0px;" dir="ltr">Martin S. Lederman</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 665.04px; transform: scale(0.674986, 1); transform-origin: 0% 0% 0px;" dir="ltr">Visiting Professor, Georgetown University Law Center</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 683.44px; transform: scale(0.697516, 1); transform-origin: 0% 0% 0px;" dir="ltr">Former Attorney Advisor, Department</div>
<div style="font-size: 16px; font-family: serif; left: 347.04px; top: 683.44px; transform: scale(0.654957, 1); transform-origin: 0% 0% 0px;" dir="ltr">of Justice Office of Legal Counsel, 1994-2002</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 720.24px; transform: scale(0.703302, 1); transform-origin: 0% 0% 0px;" dir="ltr">Beth Nolan</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 738.64px; transform: scale(0.677283, 1); transform-origin: 0% 0% 0px;" dir="ltr">Former Counsel to the President, 1999-2001; De</div>
<div style="font-size: 16px; font-family: serif; left: 407.44px; top: 738.64px; transform: scale(0.66119, 1); transform-origin: 0% 0% 0px;" dir="ltr">puty Assistant Attorney</div>
<div style="font-size: 16px; font-family: serif; left: 559.44px; top: 738.64px; transform: scale(0.62416, 1); transform-origin: 0% 0% 0px;" dir="ltr">General, Office of</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 757.04px; transform: scale(0.676085, 1); transform-origin: 0% 0% 0px;" dir="ltr">Legal Counsel, 1996-1999; Associate Counsel to</div>
<div style="font-size: 16px; font-family: serif; left: 413.76px; top: 757.04px; transform: scale(0.657578, 1); transform-origin: 0% 0% 0px;" dir="ltr">the President, 1993-1995; Attorney Advisor,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 775.44px; transform: scale(0.667778, 1); transform-origin: 0% 0% 0px;" dir="ltr">Office of Legal Counsel, 1981-1985</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 812.24px; transform: scale(0.66272, 1); transform-origin: 0% 0% 0px;" dir="ltr">William S. Sessions</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 830.64px; transform: scale(0.673387, 1); transform-origin: 0% 0% 0px;" dir="ltr">Former Director, FBI</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 849.04px; transform: scale(0.652306, 1); transform-origin: 0% 0% 0px;" dir="ltr">Former Chief United States District</div>
<div style="font-size: 16px; font-family: serif; left: 324.4px; top: 849.04px; transform: scale(0.680089, 1); transform-origin: 0% 0% 0px;" dir="ltr">Judge, Western Di</div>
<div style="font-size: 16px; font-family: serif; left: 446.96px; top: 849.04px; transform: scale(0.59646, 1); transform-origin: 0% 0% 0px;" dir="ltr">strict of Texas</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 885.84px; transform: scale(0.671627, 1); transform-origin: 0% 0% 0px;" dir="ltr">Geoffrey R. Stone</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 904.24px; transform: scale(0.65296, 1); transform-origin: 0% 0% 0px;" dir="ltr">Harry Kalven, Jr. Distinguished Service Pr</div>
<div style="font-size: 16px; font-family: serif; left: 370.24px; top: 904.24px; transform: scale(0.658198, 1); transform-origin: 0% 0% 0px;" dir="ltr">ofessor of Law, University of Chicago</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 922.64px; transform: scale(0.68539, 1); transform-origin: 0% 0% 0px;" dir="ltr">Former Dean of the University of Chicago Law</div>
<div style="font-size: 16px; font-family: serif; left: 404.32px; top: 922.64px; transform: scale(0.657527, 1); transform-origin: 0% 0% 0px;" dir="ltr">School and Provost of the University of Chicago</div>
<div style="font-size: 16px; font-family: serif; left: 404.32px; top: 922.64px; transform: scale(0.657527, 1); transform-origin: 0% 0% 0px;" dir="ltr">
<div id="outerContainer">
<div id="mainContainer">
<div id="viewerContainer">
<div id="viewer">
<div id="pageContainer11" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.12px; transform: scale(0.673676, 1); transform-origin: 0% 0% 0px;" dir="ltr">Kathleen M. Sullivan</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.674773, 1); transform-origin: 0% 0% 0px;" dir="ltr">Stanley Morrison Professor, Stanford Law School</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 149.92px; transform: scale(0.705673, 1); transform-origin: 0% 0% 0px;" dir="ltr">Former Dean, Stanford Law School</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 186.72px; transform: scale(0.676578, 1); transform-origin: 0% 0% 0px;" dir="ltr">Laurence H. Tribe</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 205.12px; transform: scale(0.660896, 1); transform-origin: 0% 0% 0px;" dir="ltr">Carl M. Loeb University Professor and Professor of Constitutional Law</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 223.52px; transform: scale(0.722451, 1); transform-origin: 0% 0% 0px;" dir="ltr">Harvard Law School</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 260.32px; transform: scale(0.712543, 1); transform-origin: 0% 0% 0px;" dir="ltr">William W. Van Alstyne</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 278.72px; transform: scale(0.696458, 1); transform-origin: 0% 0% 0px;" dir="ltr">Lee Professor, William and Mary Law School</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 297.12px; transform: scale(0.667737, 1); transform-origin: 0% 0% 0px;" dir="ltr">Former Attorney, Department of Justice, 1958</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 333.92px; transform: scale(0.614107, 1); transform-origin: 0% 0% 0px;" dir="ltr">* Affiliations are noted for identification purposes only.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 389.12px; transform: scale(0.74016, 1); transform-origin: 0% 0% 0px;" dir="ltr">Cc:</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 389.12px; transform: scale(0.666913, 1); transform-origin: 0% 0% 0px;" dir="ltr">Judge Colleen Kollar-Kotelly</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 407.52px; transform: scale(0.571382, 1); transform-origin: 0% 0% 0px;" dir="ltr">Chief Judge, Foreign Inte</div>
<div style="font-size: 16px; font-family: serif; left: 307.52px; top: 407.52px; transform: scale(0.64008, 1); transform-origin: 0% 0% 0px;" dir="ltr">lligence Surveillance Court</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 425.92px; transform: scale(0.413242, 1); transform-origin: 0% 0% 0px;" dir="ltr">U.S. Courthouse</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 444.32px; transform: scale(0.683236, 1); transform-origin: 0% 0% 0px;" dir="ltr">333 Constitution Ave., NW</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 462.72px; transform: scale(0.724756, 1); transform-origin: 0% 0% 0px;" dir="ltr">Washington, DC 20001</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<a name="11"></a></div>
</div>
</div>
</div>
application/pdf
utf-8
newspaperArticle
New York Times
Lichtblau
Eric
Risen
James
Shane
Scott
warrantless wiretap
Top Aide Defends Domestic Spying
2006-02-07
http://emoglen.law.columbia.edu/CPC/TopAideDefendsDomesticSpying.htm
2013-11-05 20:50:02
attachment
Top Aide Defends Domestic Spying - New York Times
2013-11-05 20:50:03
http://emoglen.law.columbia.edu/CPC/TopAideDefendsDomesticSpying.htm
text/html
windows-1252
document
Gonzales
Alberto
warrantless wiretap
Response to questions from Chairman Spector
2006-02-06
attachment
Microsoft Word - terror72c.doc.doc - 20060203gonzalez.pdf
2013-11-05 20:52:42
http://emoglen.law.columbia.edu/CPC/20060203gonzalez.pdf
<div id="outerContainer">
<div id="sidebarContainer"></div>
<div id="mainContainer">
<div id="viewerContainer">
<div id="viewer"><a name="1"></a>
<div id="pageContainer1" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 226.64px; top: 94.9599px; transform: scale(1.1552, 1); transform-origin: 0% 0% 0px;" dir="ltr">R</div>
<div style="font-size: 12.64px; font-family: serif; left: 238.16px; top: 98.3199px; transform: scale(0.929777, 1); transform-origin: 0% 0% 0px;" dir="ltr">ESPONSES TO</div>
<div style="font-size: 16px; font-family: serif; left: 327.6px; top: 94.9599px; transform: scale(1.2448, 1); transform-origin: 0% 0% 0px;" dir="ltr">Q</div>
<div style="font-size: 12.64px; font-family: serif; left: 340.08px; top: 98.3199px; transform: scale(0.93206, 1); transform-origin: 0% 0% 0px;" dir="ltr">UESTIONS</div>
<div style="font-size: 16px; font-family: serif; left: 407.28px; top: 94.9599px; transform: scale(0.9776, 1); transform-origin: 0% 0% 0px;" dir="ltr">F</div>
<div style="font-size: 12.64px; font-family: serif; left: 417.04px; top: 98.3199px; transform: scale(1.0635, 1); transform-origin: 0% 0% 0px;" dir="ltr">ROM</div>
<div style="font-size: 16px; font-family: serif; left: 451.12px; top: 94.9599px; transform: scale(1.1552, 1); transform-origin: 0% 0% 0px;" dir="ltr">C</div>
<div style="font-size: 12.64px; font-family: serif; left: 462.72px; top: 98.3199px; transform: scale(1.03763, 1); transform-origin: 0% 0% 0px;" dir="ltr">HAIRMAN</div>
<div style="font-size: 16px; font-family: serif; left: 529.2px; top: 94.9599px; transform: scale(0.8896, 1); transform-origin: 0% 0% 0px;" dir="ltr">S</div>
<div style="font-size: 12.64px; font-family: serif; left: 538.08px; top: 98.3199px; transform: scale(1.06934, 1); transform-origin: 0% 0% 0px;" dir="ltr">PECTER</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.92px; transform: scale(0.623467, 1); transform-origin: 0% 0% 0px;" dir="ltr">(1)</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 131.92px; transform: scale(0.699421, 1); transform-origin: 0% 0% 0px;" dir="ltr">In interpreting whether Congress inte</div>
<div style="font-size: 16px; font-family: serif; left: 388.8px; top: 131.92px; transform: scale(0.695458, 1); transform-origin: 0% 0% 0px;" dir="ltr">nded to amend the Foreign Intelligence</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 150.32px; transform: scale(0.711664, 1); transform-origin: 0% 0% 0px;" dir="ltr">Surveillance Act (FISA) by the September</div>
<div style="font-size: 16px; font-family: serif; left: 421.84px; top: 150.32px; transform: scale(0.676442, 1); transform-origin: 0% 0% 0px;" dir="ltr">14, 2001 Resolution (Resolution) would it</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 168.72px; transform: scale(0.670469, 1); transform-origin: 0% 0% 0px;" dir="ltr">be relevant on the issue of Congressional</div>
<div style="font-size: 16px; font-family: serif; left: 411.6px; top: 168.72px; transform: scale(0.672681, 1); transform-origin: 0% 0% 0px;" dir="ltr">intent that the Administration did not</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 187.12px; transform: scale(0.67642, 1); transform-origin: 0% 0% 0px;" dir="ltr">specifically ask for an expansion for Execu</div>
<div style="font-size: 16px; font-family: serif; left: 420.8px; top: 187.12px; transform: scale(0.71142, 1); transform-origin: 0% 0% 0px;" dir="ltr">tive powers under FISA? Was it because</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 205.52px; transform: scale(0.703996, 1); transform-origin: 0% 0% 0px;" dir="ltr">you thought you couldn’t get such an expa</div>
<div style="font-size: 16px; font-family: serif; left: 418.64px; top: 205.52px; transform: scale(0.699848, 1); transform-origin: 0% 0% 0px;" dir="ltr">nsion as when you said: “That was not</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 224px; transform: scale(0.679922, 1); transform-origin: 0% 0% 0px;" dir="ltr">something that we could likely get?”</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 260.88px; transform: scale(0.591939, 1); transform-origin: 0% 0% 0px;" dir="ltr">I am pleased to respond to this question becau</div>
<div style="font-size: 16px; font-family: serif; left: 439.12px; top: 260.88px; transform: scale(0.649691, 1); transform-origin: 0% 0% 0px;" dir="ltr">se it allows me to address two widespread</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 279.36px; transform: scale(0.686157, 1); transform-origin: 0% 0% 0px;" dir="ltr">misconceptions about the De</div>
<div style="font-size: 16px; font-family: serif; left: 281.28px; top: 279.36px; transform: scale(0.608383, 1); transform-origin: 0% 0% 0px;" dir="ltr">partment’s position.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 316.32px; transform: scale(0.57542, 1); transform-origin: 0% 0% 0px;" dir="ltr">First, our position does not turn on whet</div>
<div style="font-size: 16px; font-family: serif; left: 400.88px; top: 316.32px; transform: scale(0.665053, 1); transform-origin: 0% 0% 0px;" dir="ltr">her Congress intended to</div>
<div style="font-size: 16px; font-family: serif; left: 560.4px; top: 316.32px; transform: scale(0.715352, 1); transform-origin: 0% 0% 0px;" dir="ltr">amend FISA through</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 334.72px; transform: scale(0.653084, 1); transform-origin: 0% 0% 0px;" dir="ltr">the Resolution or on whether th</div>
<div style="font-size: 16px; font-family: serif; left: 298.24px; top: 334.72px; transform: scale(0.650135, 1); transform-origin: 0% 0% 0px;" dir="ltr">e Resolution effected such an</div>
<div style="font-size: 16px; font-family: serif; left: 486.48px; top: 334.72px; transform: scale(0.692406, 1); transform-origin: 0% 0% 0px;" dir="ltr">amendment. Rather, FISA</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 353.12px; transform: scale(0.636862, 1); transform-origin: 0% 0% 0px;" dir="ltr">expressly contemplates that in</div>
<div style="font-size: 16px; font-family: serif; left: 293.36px; top: 353.12px; transform: scale(0.65173, 1); transform-origin: 0% 0% 0px;" dir="ltr">a separate statute Congress may</div>
<div style="font-size: 16px; font-family: serif; left: 501.68px; top: 353.12px; transform: scale(0.623341, 1); transform-origin: 0% 0% 0px;" dir="ltr">authorize electronic surveillance</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 371.52px; transform: scale(0.658252, 1); transform-origin: 0% 0% 0px;" dir="ltr">outside FISA procedures.</div>
<div style="font-size: 16px; font-family: serif; left: 267.12px; top: 371.52px; transform: scale(0.741227, 1); transform-origin: 0% 0% 0px;" dir="ltr">See</div>
<div style="font-size: 16px; font-family: serif; left: 289.36px; top: 371.52px; transform: scale(0.66112, 1); transform-origin: 0% 0% 0px;" dir="ltr">50 U.S.C. § 1809(a)(1) (2000)</div>
<div style="font-size: 16px; font-family: serif; left: 491.52px; top: 371.52px; transform: scale(0.655625, 1); transform-origin: 0% 0% 0px;" dir="ltr">(FISA § 109, prohibiting any</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 389.92px; transform: scale(0.658178, 1); transform-origin: 0% 0% 0px;" dir="ltr">person from intentionally “enga</div>
<div style="font-size: 16px; font-family: serif; left: 300px; top: 389.92px; transform: scale(0.599645, 1); transform-origin: 0% 0% 0px;" dir="ltr">g[ing] . . . in electronic surveillance under color of law</div>
<div style="font-size: 16px; font-family: serif; left: 653.6px; top: 389.92px; transform: scale(0.63184, 1); transform-origin: 0% 0% 0px;" dir="ltr">except as</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 408.32px; transform: scale(0.639642, 1); transform-origin: 0% 0% 0px;" dir="ltr">authorized by statute</div>
<div style="font-size: 16px; font-family: serif; left: 230.32px; top: 408.32px; transform: scale(0.639662, 1); transform-origin: 0% 0% 0px;" dir="ltr">”) (emphasis added). That is what</div>
<div style="font-size: 16px; font-family: serif; left: 454.16px; top: 408.32px; transform: scale(0.64216, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress did in the Resolution. As</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 426.72px; transform: scale(0.719511, 1); transform-origin: 0% 0% 0px;" dir="ltr">Hamdi v. Rumsfeld</div>
<div style="font-size: 16px; font-family: serif; left: 218.24px; top: 426.72px; transform: scale(0.648891, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 542 U.S. 507 (2004), makes clear, a gene</div>
<div style="font-size: 16px; font-family: serif; left: 490.56px; top: 426.72px; transform: scale(0.605586, 1); transform-origin: 0% 0% 0px;" dir="ltr">ral authorization to use military</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 445.12px; transform: scale(0.595214, 1); transform-origin: 0% 0% 0px;" dir="ltr">force carries with it the authorit</div>
<div style="font-size: 16px; font-family: serif; left: 298.24px; top: 445.12px; transform: scale(0.635314, 1); transform-origin: 0% 0% 0px;" dir="ltr">y to employ the traditional and acc</div>
<div style="font-size: 16px; font-family: serif; left: 520.48px; top: 445.12px; transform: scale(0.613387, 1); transform-origin: 0% 0% 0px;" dir="ltr">epted incidents of the use of</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 463.52px; transform: scale(0.62538, 1); transform-origin: 0% 0% 0px;" dir="ltr">force. That is so even if Congress did not spec</div>
<div style="font-size: 16px; font-family: serif; left: 395.92px; top: 463.52px; transform: scale(0.608288, 1); transform-origin: 0% 0% 0px;" dir="ltr">ifically address each of</div>
<div style="font-size: 16px; font-family: serif; left: 547.92px; top: 463.52px; transform: scale(0.599973, 1); transform-origin: 0% 0% 0px;" dir="ltr">the incidents of force;</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 481.92px; transform: scale(0.629086, 1); transform-origin: 0% 0% 0px;" dir="ltr">thus, a majority of the Court concluded that th</div>
<div style="font-size: 16px; font-family: serif; left: 391.52px; top: 481.92px; transform: scale(0.653331, 1); transform-origin: 0% 0% 0px;" dir="ltr">e Resolution authorized the detention of enemy</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 500.32px; transform: scale(0.630362, 1); transform-origin: 0% 0% 0px;" dir="ltr">combatants as a traditional incide</div>
<div style="font-size: 16px; font-family: serif; left: 310.24px; top: 500.32px; transform: scale(0.642583, 1); transform-origin: 0% 0% 0px;" dir="ltr">nt of force and Justice O’Connor st</div>
<div style="font-size: 16px; font-family: serif; left: 535.12px; top: 500.32px; transform: scale(0.623456, 1); transform-origin: 0% 0% 0px;" dir="ltr">ated that “it is of no moment</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 518.72px; transform: scale(0.625211, 1); transform-origin: 0% 0% 0px;" dir="ltr">that the [Resolution] does not use</div>
<div style="font-size: 16px; font-family: serif; left: 314.72px; top: 518.72px; transform: scale(0.622071, 1); transform-origin: 0% 0% 0px;" dir="ltr">specific language of detention.”</div>
<div style="font-size: 16px; font-family: serif; left: 526.16px; top: 518.72px; transform: scale(0.6696, 1); transform-origin: 0% 0% 0px;" dir="ltr">Id</div>
<div style="font-size: 16px; font-family: serif; left: 539.52px; top: 518.72px; transform: scale(0.585089, 1); transform-origin: 0% 0% 0px;" dir="ltr">. at 519 (plurality opinion).</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 537.12px; transform: scale(0.643819, 1); transform-origin: 0% 0% 0px;" dir="ltr">As explained at length in our paper of January</div>
<div style="font-size: 16px; font-family: serif; left: 392px; top: 537.12px; transform: scale(0.61002, 1); transform-origin: 0% 0% 0px;" dir="ltr">19, 2006, signals intelligence</div>
<div style="font-size: 16px; font-family: serif; left: 587.12px; top: 537.12px; transform: scale(0.593503, 1); transform-origin: 0% 0% 0px;" dir="ltr">is another traditional</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 555.52px; transform: scale(0.614814, 1); transform-origin: 0% 0% 0px;" dir="ltr">and accepted incident of the use of military force.</div>
<div style="font-size: 16px; font-family: serif; left: 421.68px; top: 555.52px; transform: scale(0.605016, 1); transform-origin: 0% 0% 0px;" dir="ltr">Consistent with this traditional practice, other</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 573.92px; transform: scale(0.693468, 1); transform-origin: 0% 0% 0px;" dir="ltr">presidents, including Woodrow Wils</div>
<div style="font-size: 16px; font-family: serif; left: 331.52px; top: 573.92px; transform: scale(0.645048, 1); transform-origin: 0% 0% 0px;" dir="ltr">on and Franklin Roosevelt, have interpreted general force-</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 592.32px; transform: scale(0.634489, 1); transform-origin: 0% 0% 0px;" dir="ltr">authorization resolutions to permit warrantle</div>
<div style="font-size: 16px; font-family: serif; left: 381.28px; top: 592.32px; transform: scale(0.638404, 1); transform-origin: 0% 0% 0px;" dir="ltr">ss surveillance to intercept suspected enemy</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 610.8px; transform: scale(0.677013, 1); transform-origin: 0% 0% 0px;" dir="ltr">communications.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 647.76px; transform: scale(0.564098, 1); transform-origin: 0% 0% 0px;" dir="ltr">Second, the decision not to s</div>
<div style="font-size: 16px; font-family: serif; left: 327.12px; top: 647.76px; transform: scale(0.619074, 1); transform-origin: 0% 0% 0px;" dir="ltr">eek further legislation was</div>
<div style="font-size: 16px; font-family: serif; left: 500.4px; top: 647.76px; transform: scale(0.6816, 1); transform-origin: 0% 0% 0px;" dir="ltr">not</div>
<div style="font-size: 16px; font-family: serif; left: 520.88px; top: 647.76px; transform: scale(0.630926, 1); transform-origin: 0% 0% 0px;" dir="ltr">because I either concluded or</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 666.16px; transform: scale(0.67942, 1); transform-origin: 0% 0% 0px;" dir="ltr">was advised that Congress would</div>
<div style="font-size: 16px; font-family: serif; left: 313.28px; top: 666.16px; transform: scale(0.606347, 1); transform-origin: 0% 0% 0px;" dir="ltr">reject such legislation. Rath</div>
<div style="font-size: 16px; font-family: serif; left: 495.04px; top: 666.16px; transform: scale(0.67788, 1); transform-origin: 0% 0% 0px;" dir="ltr">er, members of Congress advised</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 684.56px; transform: scale(0.631375, 1); transform-origin: 0% 0% 0px;" dir="ltr">the Administration that more specific legisl</div>
<div style="font-size: 16px; font-family: serif; left: 373.76px; top: 684.56px; transform: scale(0.639406, 1); transform-origin: 0% 0% 0px;" dir="ltr">ation could not be en</div>
<div style="font-size: 16px; font-family: serif; left: 507.92px; top: 684.56px; transform: scale(0.624465, 1); transform-origin: 0% 0% 0px;" dir="ltr">acted without likely</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 702.96px; transform: scale(0.647952, 1); transform-origin: 0% 0% 0px;" dir="ltr">compromising the terrorist survei</div>
<div style="font-size: 16px; font-family: serif; left: 309.68px; top: 702.96px; transform: scale(0.653677, 1); transform-origin: 0% 0% 0px;" dir="ltr">llance program by disclosing pr</div>
<div style="font-size: 16px; font-family: serif; left: 512.32px; top: 702.96px; transform: scale(0.64648, 1); transform-origin: 0% 0% 0px;" dir="ltr">ogram details and operational</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 721.36px; transform: scale(0.619916, 1); transform-origin: 0% 0% 0px;" dir="ltr">limitations and capabilities to our enemies. Some critics of the terrorist surveillance program</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 739.76px; transform: scale(0.659811, 1); transform-origin: 0% 0% 0px;" dir="ltr">have misinterpreted or misconstrued a statem</div>
<div style="font-size: 16px; font-family: serif; left: 386px; top: 739.76px; transform: scale(0.661252, 1); transform-origin: 0% 0% 0px;" dir="ltr">ent that I made on December 19, 2005, that we</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 758.16px; transform: scale(0.634011, 1); transform-origin: 0% 0% 0px;" dir="ltr">were advised that specific legislation “would be</div>
<div style="font-size: 16px; font-family: serif; left: 406.56px; top: 758.16px; transform: scale(0.606363, 1); transform-origin: 0% 0% 0px;" dir="ltr">difficult, if not impossible” to mean that the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 776.56px; transform: scale(0.65128, 1); transform-origin: 0% 0% 0px;" dir="ltr">Administration declined to seek a specific ame</div>
<div style="font-size: 16px; font-family: serif; left: 395.36px; top: 776.56px; transform: scale(0.692985, 1); transform-origin: 0% 0% 0px;" dir="ltr">ndment to FISA because we believed we could</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 794.96px; transform: scale(0.598821, 1); transform-origin: 0% 0% 0px;" dir="ltr">not get it. As I clarified later in the Decem</div>
<div style="font-size: 16px; font-family: serif; left: 370.88px; top: 794.96px; transform: scale(0.6448, 1); transform-origin: 0% 0% 0px;" dir="ltr">ber 19th briefing and on December 21, 2005, that is</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 813.36px; transform: scale(0.583093, 1); transform-origin: 0% 0% 0px;" dir="ltr">not the case.</div>
<div style="font-size: 16px; font-family: serif; left: 183.52px; top: 813.36px; transform: scale(0.65664, 1); transform-origin: 0% 0% 0px;" dir="ltr">See</div>
<div style="font-size: 16px; font-family: serif; left: 209.76px; top: 813.36px; transform: scale(0.71125, 1); transform-origin: 0% 0% 0px;" dir="ltr">Remarks by Homeland Security Secret</div>
<div style="font-size: 16px; font-family: serif; left: 458.56px; top: 813.36px; transform: scale(0.662664, 1); transform-origin: 0% 0% 0px;" dir="ltr">ary Chertoff and Attorney General</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 831.84px; transform: scale(0.744436, 1); transform-origin: 0% 0% 0px;" dir="ltr">Gonzales on the USA PATRIOT Act,</div>
<div style="font-size: 16px; font-family: serif; left: 341.76px; top: 831.84px; transform: scale(0.633973, 1); transform-origin: 0% 0% 0px;" dir="ltr">available at</div>
<div style="font-size: 16px; font-family: serif; left: 417.76px; top: 831.84px; transform: scale(0.66545, 1); transform-origin: 0% 0% 0px;" dir="ltr">http://www.dhs.gov/dhspublic/</div>
</div>
</div>
<a name="2"></a>
<div id="pageContainer2" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 404px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">2</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 94.7199px; transform: scale(0.675055, 1); transform-origin: 0% 0% 0px;" dir="ltr">display?content=5285. Rather, we</div>
<div style="font-size: 16px; font-family: serif; left: 318.8px; top: 94.7199px; transform: scale(0.695674, 1); transform-origin: 0% 0% 0px;" dir="ltr">were advised by members of</div>
<div style="font-size: 16px; font-family: serif; left: 506.64px; top: 94.7199px; transform: scale(0.635858, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress that it would be</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.12px; transform: scale(0.597565, 1); transform-origin: 0% 0% 0px;" dir="ltr">difficult, if not impossible to pass such legislat</div>
<div style="font-size: 16px; font-family: serif; left: 394.56px; top: 113.12px; transform: scale(0.64053, 1); transform-origin: 0% 0% 0px;" dir="ltr">ion without revealing the nature of the program</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.603172, 1); transform-origin: 0% 0% 0px;" dir="ltr">and the nature of certain intellig</div>
<div style="font-size: 16px; font-family: serif; left: 300.8px; top: 131.52px; transform: scale(0.618749, 1); transform-origin: 0% 0% 0px;" dir="ltr">ence capabilities. That disclosu</div>
<div style="font-size: 16px; font-family: serif; left: 504.72px; top: 131.52px; transform: scale(0.66362, 1); transform-origin: 0% 0% 0px;" dir="ltr">re would likely have harmed our</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 150px; transform: scale(0.638922, 1); transform-origin: 0% 0% 0px;" dir="ltr">national security, and that was an unacceptabl</div>
<div style="font-size: 16px; font-family: serif; left: 389.76px; top: 150px; transform: scale(0.628428, 1); transform-origin: 0% 0% 0px;" dir="ltr">e risk we were not prepared to take.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 187.12px; transform: scale(0.623467, 1); transform-origin: 0% 0% 0px;" dir="ltr">(2)</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 187.12px; transform: scale(0.733292, 1); transform-origin: 0% 0% 0px;" dir="ltr">If Congress had intended to amend FISA by</div>
<div style="font-size: 16px; font-family: serif; left: 430.96px; top: 187.12px; transform: scale(0.704517, 1); transform-origin: 0% 0% 0px;" dir="ltr">the Resolution wouldn’t Congress have</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 205.52px; transform: scale(0.658579, 1); transform-origin: 0% 0% 0px;" dir="ltr">specifically acted to as Congress did in pa</div>
<div style="font-size: 16px; font-family: serif; left: 413.28px; top: 205.52px; transform: scale(0.66304, 1); transform-origin: 0% 0% 0px;" dir="ltr">ssing the Patriot Act giving the Executive</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 224px; transform: scale(0.718946, 1); transform-origin: 0% 0% 0px;" dir="ltr">expanded powers and greater flexib</div>
<div style="font-size: 16px; font-family: serif; left: 374.56px; top: 224px; transform: scale(0.657967, 1); transform-origin: 0% 0% 0px;" dir="ltr">ility in using “roving” wiretaps?</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 260.88px; transform: scale(0.653112, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress could have been more explicit if</div>
<div style="font-size: 16px; font-family: serif; left: 418.16px; top: 260.88px; transform: scale(0.643636, 1); transform-origin: 0% 0% 0px;" dir="ltr">it had intended to amend FISA. But, as</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 279.28px; transform: scale(0.617551, 1); transform-origin: 0% 0% 0px;" dir="ltr">explained above, it is not our position that C</div>
<div style="font-size: 16px; font-family: serif; left: 380px; top: 279.28px; transform: scale(0.681949, 1); transform-origin: 0% 0% 0px;" dir="ltr">ongress amended FISA through the Resolution. Nor</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 297.6px; transform: scale(0.665447, 1); transform-origin: 0% 0% 0px;" dir="ltr">do we believe that Congress needed to be more</div>
<div style="font-size: 16px; font-family: serif; left: 402.08px; top: 297.6px; transform: scale(0.61332, 1); transform-origin: 0% 0% 0px;" dir="ltr">specific in the Resoluti</div>
<div style="font-size: 16px; font-family: serif; left: 549.28px; top: 297.6px; transform: scale(0.574793, 1); transform-origin: 0% 0% 0px;" dir="ltr">on in order for it to</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 316px; transform: scale(0.623769, 1); transform-origin: 0% 0% 0px;" dir="ltr">authorize electronic surveillance in</div>
<div style="font-size: 16px; font-family: serif; left: 320.32px; top: 316px; transform: scale(0.604712, 1); transform-origin: 0% 0% 0px;" dir="ltr">an armed conflict. It is unde</div>
<div style="font-size: 16px; font-family: serif; left: 507.76px; top: 316px; transform: scale(0.659559, 1); transform-origin: 0% 0% 0px;" dir="ltr">rstandable why Congress did not</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 334.4px; transform: scale(0.6188, 1); transform-origin: 0% 0% 0px;" dir="ltr">attempt to catalog every specific aspect of the</div>
<div style="font-size: 16px; font-family: serif; left: 392.8px; top: 334.4px; transform: scale(0.627214, 1); transform-origin: 0% 0% 0px;" dir="ltr">use of the forces it was authorizing and every</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 352.8px; transform: scale(0.59984, 1); transform-origin: 0% 0% 0px;" dir="ltr">potential preexisting statutory li</div>
<div style="font-size: 16px; font-family: serif; left: 300px; top: 352.8px; transform: scale(0.648786, 1); transform-origin: 0% 0% 0px;" dir="ltr">mitation on the Executive Branch.</div>
<div style="font-size: 16px; font-family: serif; left: 526.96px; top: 352.8px; transform: scale(0.637855, 1); transform-origin: 0% 0% 0px;" dir="ltr">Rather than engage in that</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 371.2px; transform: scale(0.630843, 1); transform-origin: 0% 0% 0px;" dir="ltr">difficult and impractical exercise, Congress authori</div>
<div style="font-size: 16px; font-family: serif; left: 423.84px; top: 371.2px; transform: scale(0.61347, 1); transform-origin: 0% 0% 0px;" dir="ltr">zed the President, in general but intentionally</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 389.6px; transform: scale(0.619939, 1); transform-origin: 0% 0% 0px;" dir="ltr">broad terms, to use the traditiona</div>
<div style="font-size: 16px; font-family: serif; left: 306.72px; top: 389.6px; transform: scale(0.658308, 1); transform-origin: 0% 0% 0px;" dir="ltr">l and fundamental incidents of wa</div>
<div style="font-size: 16px; font-family: serif; left: 523.84px; top: 389.6px; transform: scale(0.64161, 1); transform-origin: 0% 0% 0px;" dir="ltr">r and to determine how best to</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 408px; transform: scale(0.656656, 1); transform-origin: 0% 0% 0px;" dir="ltr">identify and engage the enemy in the current arme</div>
<div style="font-size: 16px; font-family: serif; left: 417.6px; top: 408px; transform: scale(0.610368, 1); transform-origin: 0% 0% 0px;" dir="ltr">d conflict. Congress’s j</div>
<div style="font-size: 16px; font-family: serif; left: 570px; top: 408px; transform: scale(0.671593, 1); transform-origin: 0% 0% 0px;" dir="ltr">udgment to proceed in</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 426.4px; transform: scale(0.634908, 1); transform-origin: 0% 0% 0px;" dir="ltr">this manner was unassailable, for, as the Supr</div>
<div style="font-size: 16px; font-family: serif; left: 388px; top: 426.4px; transform: scale(0.66655, 1); transform-origin: 0% 0% 0px;" dir="ltr">eme Court has recognized, even in normal times</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 444.8px; transform: scale(0.648621, 1); transform-origin: 0% 0% 0px;" dir="ltr">involving no major national securi</div>
<div style="font-size: 16px; font-family: serif; left: 316.4px; top: 444.8px; transform: scale(0.613874, 1); transform-origin: 0% 0% 0px;" dir="ltr">ty crisis, “Congress</div>
<div style="font-size: 16px; font-family: serif; left: 445.28px; top: 444.8px; transform: scale(0.631173, 1); transform-origin: 0% 0% 0px;" dir="ltr">cannot anticipate and le</div>
<div style="font-size: 16px; font-family: serif; left: 596.72px; top: 444.8px; transform: scale(0.61576, 1); transform-origin: 0% 0% 0px;" dir="ltr">gislate with regard</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 463.2px; transform: scale(0.633704, 1); transform-origin: 0% 0% 0px;" dir="ltr">to every possible action the Presiden</div>
<div style="font-size: 16px; font-family: serif; left: 330.24px; top: 463.2px; transform: scale(0.603063, 1); transform-origin: 0% 0% 0px;" dir="ltr">t may find it necessary to take.”</div>
<div style="font-size: 16px; font-family: serif; left: 541.36px; top: 463.2px; transform: scale(0.761775, 1); transform-origin: 0% 0% 0px;" dir="ltr">Dames & Moore v. Regan</div>
<div style="font-size: 16px; font-family: serif; left: 708.8px; top: 463.2px; transform: scale(0.4, 1); transform-origin: 0% 0% 0px;" dir="ltr">,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 481.6px; transform: scale(0.658129, 1); transform-origin: 0% 0% 0px;" dir="ltr">453 U.S. 654, 678 (1981). Indeed, Congress often ha</div>
<div style="font-size: 16px; font-family: serif; left: 438.24px; top: 481.6px; transform: scale(0.626126, 1); transform-origin: 0% 0% 0px;" dir="ltr">s enacted authorizati</div>
<div style="font-size: 16px; font-family: serif; left: 569.68px; top: 481.6px; transform: scale(0.61416, 1); transform-origin: 0% 0% 0px;" dir="ltr">ons to use military</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 500px; transform: scale(0.633318, 1); transform-origin: 0% 0% 0px;" dir="ltr">force using general authorizing la</div>
<div style="font-size: 16px; font-family: serif; left: 311.12px; top: 500px; transform: scale(0.644971, 1); transform-origin: 0% 0% 0px;" dir="ltr">nguage that does not purport</div>
<div style="font-size: 16px; font-family: serif; left: 498.16px; top: 500px; transform: scale(0.589487, 1); transform-origin: 0% 0% 0px;" dir="ltr">to catalog in detail the specific</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 518.4px; transform: scale(0.669896, 1); transform-origin: 0% 0% 0px;" dir="ltr">powers the President may employ. The need for</div>
<div style="font-size: 16px; font-family: serif; left: 410.64px; top: 518.4px; transform: scale(0.658987, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress to speak broadly in recognizing and</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 536.8px; transform: scale(0.637098, 1); transform-origin: 0% 0% 0px;" dir="ltr">augmenting the President’s core constitutional powers over foreign affairs and military</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 555.2px; transform: scale(0.634516, 1); transform-origin: 0% 0% 0px;" dir="ltr">campaigns is of course significantly hei</div>
<div style="font-size: 16px; font-family: serif; left: 349.76px; top: 555.2px; transform: scale(0.646123, 1); transform-origin: 0% 0% 0px;" dir="ltr">ghtened in times of national emergency.</div>
<div style="font-size: 16px; font-family: serif; left: 614.56px; top: 555.2px; transform: scale(0.650474, 1); transform-origin: 0% 0% 0px;" dir="ltr">See Zemel v.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 573.6px; transform: scale(0.652053, 1); transform-origin: 0% 0% 0px;" dir="ltr">Rusk,</div>
<div style="font-size: 16px; font-family: serif; left: 135.12px; top: 573.6px; transform: scale(0.657791, 1); transform-origin: 0% 0% 0px;" dir="ltr">381 U.S. 1, 17 (1965) (“[B]ecause of the chang</div>
<div style="font-size: 16px; font-family: serif; left: 437.68px; top: 573.6px; transform: scale(0.661633, 1); transform-origin: 0% 0% 0px;" dir="ltr">eable and explosive nature of contemporary</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 592px; transform: scale(0.598864, 1); transform-origin: 0% 0% 0px;" dir="ltr">international relations . . . . Congress—in givi</div>
<div style="font-size: 16px; font-family: serif; left: 392.96px; top: 592px; transform: scale(0.65264, 1); transform-origin: 0% 0% 0px;" dir="ltr">ng the Executive authority ov</div>
<div style="font-size: 16px; font-family: serif; left: 582.16px; top: 592px; transform: scale(0.61392, 1); transform-origin: 0% 0% 0px;" dir="ltr">er matters of foreign</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 610.4px; transform: scale(0.648682, 1); transform-origin: 0% 0% 0px;" dir="ltr">affairs—must of necessity paint with a brush broade</div>
<div style="font-size: 16px; font-family: serif; left: 430.64px; top: 610.4px; transform: scale(0.620376, 1); transform-origin: 0% 0% 0px;" dir="ltr">r than that it customarily wields in domestic</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 628.88px; transform: scale(0.573888, 1); transform-origin: 0% 0% 0px;" dir="ltr">areas.”).</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 665.84px; transform: scale(0.671784, 1); transform-origin: 0% 0% 0px;" dir="ltr">The Supreme Court rejected a similar argument</div>
<div style="font-size: 16px; font-family: serif; left: 452.8px; top: 665.84px; transform: scale(0.624831, 1); transform-origin: 0% 0% 0px;" dir="ltr">that the Resolution could not be read to</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 684.24px; transform: scale(0.64832, 1); transform-origin: 0% 0% 0px;" dir="ltr">have implicitly authorized the detention of enem</div>
<div style="font-size: 16px; font-family: serif; left: 406.96px; top: 684.24px; transform: scale(0.619173, 1); transform-origin: 0% 0% 0px;" dir="ltr">y combatants as a traditional incident of force</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 702.64px; transform: scale(0.660764, 1); transform-origin: 0% 0% 0px;" dir="ltr">because Congress had specifically authorized</div>
<div style="font-size: 16px; font-family: serif; left: 386.64px; top: 702.64px; transform: scale(0.700505, 1); transform-origin: 0% 0% 0px;" dir="ltr">detention in certain USA PATRIOT Act</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 721.04px; transform: scale(0.625324, 1); transform-origin: 0% 0% 0px;" dir="ltr">provisions. Only Justices S</div>
<div style="font-size: 16px; font-family: serif; left: 277.36px; top: 721.04px; transform: scale(0.655806, 1); transform-origin: 0% 0% 0px;" dir="ltr">outer and Ginsburg subscribed to</div>
<div style="font-size: 16px; font-family: serif; left: 493.76px; top: 721.04px; transform: scale(0.630386, 1); transform-origin: 0% 0% 0px;" dir="ltr">that position, which was rejected</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 739.44px; transform: scale(0.601611, 1); transform-origin: 0% 0% 0px;" dir="ltr">by a majority of Justices.</div>
<div style="font-size: 16px; font-family: serif; left: 264.4px; top: 739.44px; transform: scale(0.774951, 1); transform-origin: 0% 0% 0px;" dir="ltr">See Hamdi</div>
<div style="font-size: 16px; font-family: serif; left: 334.16px; top: 739.44px; transform: scale(0.608005, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 542 U.S. at 551 (Souter, J., concurring in part, dissenting</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 757.92px; transform: scale(0.622474, 1); transform-origin: 0% 0% 0px;" dir="ltr">in part, and concurring in the judgment).</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 795.12px; transform: scale(0.623467, 1); transform-origin: 0% 0% 0px;" dir="ltr">(3)</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 795.12px; transform: scale(0.678236, 1); transform-origin: 0% 0% 0px;" dir="ltr">In interpreting statutory construction on</div>
<div style="font-size: 16px; font-family: serif; left: 408.24px; top: 795.12px; transform: scale(0.738162, 1); transform-origin: 0% 0% 0px;" dir="ltr">whether Congress intended to amend FISA</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 813.52px; transform: scale(0.663993, 1); transform-origin: 0% 0% 0px;" dir="ltr">by the Resolution, what is the impact of the</div>
<div style="font-size: 16px; font-family: serif; left: 428.8px; top: 813.52px; transform: scale(0.656313, 1); transform-origin: 0% 0% 0px;" dir="ltr">rule of statutory construction that repeals</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 832px; transform: scale(0.690103, 1); transform-origin: 0% 0% 0px;" dir="ltr">or changes by implication are disfavored?</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 868.8px; transform: scale(0.613654, 1); transform-origin: 0% 0% 0px;" dir="ltr">As I have explained, FISA contemplates</div>
<div style="font-size: 16px; font-family: serif; left: 402.72px; top: 868.8px; transform: scale(0.631172, 1); transform-origin: 0% 0% 0px;" dir="ltr">that Congress can authorize electronic</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 887.2px; transform: scale(0.657716, 1); transform-origin: 0% 0% 0px;" dir="ltr">surveillance outside FISA wit</div>
<div style="font-size: 16px; font-family: serif; left: 286.64px; top: 887.2px; transform: scale(0.657893, 1); transform-origin: 0% 0% 0px;" dir="ltr">hout specifically amending FISA. Reading the Resolution to</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 905.6px; transform: scale(0.603456, 1); transform-origin: 0% 0% 0px;" dir="ltr">authorize the terrorist survei</div>
<div style="font-size: 16px; font-family: serif; left: 276.88px; top: 905.6px; transform: scale(0.644416, 1); transform-origin: 0% 0% 0px;" dir="ltr">llance program, therefore, doe</div>
<div style="font-size: 16px; font-family: serif; left: 470.16px; top: 905.6px; transform: scale(0.622697, 1); transform-origin: 0% 0% 0px;" dir="ltr">s not require any repeal by</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 924px; transform: scale(0.635922, 1); transform-origin: 0% 0% 0px;" dir="ltr">implication. But even if the text of FISA were</div>
<div style="font-size: 16px; font-family: serif; left: 394.64px; top: 924px; transform: scale(0.644269, 1); transform-origin: 0% 0% 0px;" dir="ltr">clear that nothing other than an amendment to</div>
</div>
</div>
<a name="3"></a>
<div id="pageContainer3" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 404px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">3</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 94.7199px; transform: scale(0.644005, 1); transform-origin: 0% 0% 0px;" dir="ltr">FISA could authorize additional electronic surveillance, the Resolution would impliedly repeal</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.12px; transform: scale(0.67424, 1); transform-origin: 0% 0% 0px;" dir="ltr">as much of FISA as would prevent the Presid</div>
<div style="font-size: 16px; font-family: serif; left: 385.84px; top: 113.12px; transform: scale(0.64031, 1); transform-origin: 0% 0% 0px;" dir="ltr">ent from using “all necessary and appropriate</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.614518, 1); transform-origin: 0% 0% 0px;" dir="ltr">force” in order to prevent al Qaeda and its allies</div>
<div style="font-size: 16px; font-family: serif; left: 403.12px; top: 131.52px; transform: scale(0.621793, 1); transform-origin: 0% 0% 0px;" dir="ltr">from launching another terrorist attack against</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 149.92px; transform: scale(0.62499, 1); transform-origin: 0% 0% 0px;" dir="ltr">the United States. To be sure, repeals by impli</div>
<div style="font-size: 16px; font-family: serif; left: 395.92px; top: 149.92px; transform: scale(0.632167, 1); transform-origin: 0% 0% 0px;" dir="ltr">cation are disfavored a</div>
<div style="font-size: 16px; font-family: serif; left: 541.28px; top: 149.92px; transform: scale(0.640178, 1); transform-origin: 0% 0% 0px;" dir="ltr">nd are generally not found</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 168.32px; transform: scale(0.657554, 1); transform-origin: 0% 0% 0px;" dir="ltr">whenever two statutes are “c</div>
<div style="font-size: 16px; font-family: serif; left: 279.92px; top: 168.32px; transform: scale(0.623852, 1); transform-origin: 0% 0% 0px;" dir="ltr">apable of co-existence.”</div>
<div style="font-size: 16px; font-family: serif; left: 442.08px; top: 168.32px; transform: scale(0.681931, 1); transform-origin: 0% 0% 0px;" dir="ltr">Ruckelshaus v. Monsanto Co.,</div>
<div style="font-size: 16px; font-family: serif; left: 639.84px; top: 168.32px; transform: scale(0.671004, 1); transform-origin: 0% 0% 0px;" dir="ltr">467 U.S.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 186.72px; transform: scale(0.662619, 1); transform-origin: 0% 0% 0px;" dir="ltr">986, 1018 (1984). Under this standard, however, an implied repeal may be found where one</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 205.12px; transform: scale(0.645967, 1); transform-origin: 0% 0% 0px;" dir="ltr">statute would “unduly interfere wi</div>
<div style="font-size: 16px; font-family: serif; left: 315.52px; top: 205.12px; transform: scale(0.616, 1); transform-origin: 0% 0% 0px;" dir="ltr">th” the operation of another.</div>
<div style="font-size: 16px; font-family: serif; left: 500.32px; top: 205.12px; transform: scale(0.708206, 1); transform-origin: 0% 0% 0px;" dir="ltr">Radzanower v.</div>
<div style="font-size: 16px; font-family: serif; left: 603.44px; top: 205.12px; transform: scale(0.710747, 1); transform-origin: 0% 0% 0px;" dir="ltr">Touche Ross</div>
<div style="font-size: 16px; font-family: serif; left: 688.72px; top: 205.12px; transform: scale(0.740965, 1); transform-origin: 0% 0% 0px;" dir="ltr">&</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 223.6px; transform: scale(0.6128, 1); transform-origin: 0% 0% 0px;" dir="ltr">Co.,</div>
<div style="font-size: 16px; font-family: serif; left: 126.64px; top: 223.6px; transform: scale(0.639977, 1); transform-origin: 0% 0% 0px;" dir="ltr">426 U.S. 148, 156 (1976).</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 260.56px; transform: scale(0.574609, 1); transform-origin: 0% 0% 0px;" dir="ltr">In keeping with historical practice, the Re</div>
<div style="font-size: 16px; font-family: serif; left: 411.92px; top: 260.56px; transform: scale(0.646862, 1); transform-origin: 0% 0% 0px;" dir="ltr">solution, to use Justice O’Connor’s language</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 278.96px; transform: scale(0.700704, 1); transform-origin: 0% 0% 0px;" dir="ltr">from</div>
<div style="font-size: 16px; font-family: serif; left: 131.04px; top: 278.96px; transform: scale(0.870464, 1); transform-origin: 0% 0% 0px;" dir="ltr">Hamdi</div>
<div style="font-size: 16px; font-family: serif; left: 174.64px; top: 278.96px; transform: scale(0.642312, 1); transform-origin: 0% 0% 0px;" dir="ltr">, “clearly and unmistakably” authorizes</div>
<div style="font-size: 16px; font-family: serif; left: 431.52px; top: 278.96px; transform: scale(0.648731, 1); transform-origin: 0% 0% 0px;" dir="ltr">the President to use fundamental and</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 297.36px; transform: scale(0.618807, 1); transform-origin: 0% 0% 0px;" dir="ltr">accepted incidents of the use of military force,</div>
<div style="font-size: 16px; font-family: serif; left: 392.88px; top: 297.36px; transform: scale(0.614822, 1); transform-origin: 0% 0% 0px;" dir="ltr">including signals intelligence (without prior</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 315.76px; transform: scale(0.602494, 1); transform-origin: 0% 0% 0px;" dir="ltr">judicial approval). Interpreting</div>
<div style="font-size: 16px; font-family: serif; left: 300.8px; top: 315.76px; transform: scale(0.66576, 1); transform-origin: 0% 0% 0px;" dir="ltr">FISA to prohibit what the Resolu</div>
<div style="font-size: 16px; font-family: serif; left: 513.76px; top: 315.76px; transform: scale(0.64995, 1); transform-origin: 0% 0% 0px;" dir="ltr">tion “clearly and unmistakably”</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 334.16px; transform: scale(0.637816, 1); transform-origin: 0% 0% 0px;" dir="ltr">authorizes would create a clear conflict between</div>
<div style="font-size: 16px; font-family: serif; left: 408.32px; top: 334.16px; transform: scale(0.641883, 1); transform-origin: 0% 0% 0px;" dir="ltr">the Resolution and FISA. In that case, FISA’s</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 352.56px; transform: scale(0.59898, 1); transform-origin: 0% 0% 0px;" dir="ltr">restrictions on the use of elect</div>
<div style="font-size: 16px; font-family: serif; left: 287.6px; top: 352.56px; transform: scale(0.651304, 1); transform-origin: 0% 0% 0px;" dir="ltr">ronic surveillance would preclude</div>
<div style="font-size: 16px; font-family: serif; left: 508.8px; top: 352.56px; transform: scale(0.659755, 1); transform-origin: 0% 0% 0px;" dir="ltr">the President from doing what</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 370.96px; transform: scale(0.656974, 1); transform-origin: 0% 0% 0px;" dir="ltr">the Resolution “clearly and unmistakably” aut</div>
<div style="font-size: 16px; font-family: serif; left: 391.52px; top: 370.96px; transform: scale(0.620136, 1); transform-origin: 0% 0% 0px;" dir="ltr">horizes him to do:</div>
<div style="font-size: 16px; font-family: serif; left: 515.52px; top: 370.96px; transform: scale(0.633711, 1); transform-origin: 0% 0% 0px;" dir="ltr">use all “necessary and</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 389.36px; transform: scale(0.644826, 1); transform-origin: 0% 0% 0px;" dir="ltr">appropriate force” to prevent al Qaeda from carryi</div>
<div style="font-size: 16px; font-family: serif; left: 418.08px; top: 389.36px; transform: scale(0.611798, 1); transform-origin: 0% 0% 0px;" dir="ltr">ng out future attacks against the United States.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 407.76px; transform: scale(0.62662, 1); transform-origin: 0% 0% 0px;" dir="ltr">And in that event, the ordinary</div>
<div style="font-size: 16px; font-family: serif; left: 296.48px; top: 407.76px; transform: scale(0.62888, 1); transform-origin: 0% 0% 0px;" dir="ltr">restrictions in FISA could not c</div>
<div style="font-size: 16px; font-family: serif; left: 497.68px; top: 407.76px; transform: scale(0.625257, 1); transform-origin: 0% 0% 0px;" dir="ltr">ontinue to apply if the Resolution</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 426.16px; transform: scale(0.579812, 1); transform-origin: 0% 0% 0px;" dir="ltr">is to have its full effect; those constraints</div>
<div style="font-size: 16px; font-family: serif; left: 362.64px; top: 426.16px; transform: scale(0.678302, 1); transform-origin: 0% 0% 0px;" dir="ltr">would “unduly interfere” w</div>
<div style="font-size: 16px; font-family: serif; left: 538.96px; top: 426.16px; transform: scale(0.59968, 1); transform-origin: 0% 0% 0px;" dir="ltr">ith the operation of the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 444.64px; transform: scale(0.645493, 1); transform-origin: 0% 0% 0px;" dir="ltr">Resolution.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 481.6px; transform: scale(0.581086, 1); transform-origin: 0% 0% 0px;" dir="ltr">Like other canons of statutory construction,</div>
<div style="font-size: 16px; font-family: serif; left: 427.04px; top: 481.6px; transform: scale(0.632031, 1); transform-origin: 0% 0% 0px;" dir="ltr">the canon against implied repeals is simply a</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 500px; transform: scale(0.666912, 1); transform-origin: 0% 0% 0px;" dir="ltr">presumption that may be rebutted by othe</div>
<div style="font-size: 16px; font-family: serif; left: 362.64px; top: 500px; transform: scale(0.585227, 1); transform-origin: 0% 0% 0px;" dir="ltr">r factors, includi</div>
<div style="font-size: 16px; font-family: serif; left: 467.92px; top: 500px; transform: scale(0.62416, 1); transform-origin: 0% 0% 0px;" dir="ltr">ng conflicting canons.</div>
<div style="font-size: 16px; font-family: serif; left: 617.6px; top: 500px; transform: scale(0.678213, 1); transform-origin: 0% 0% 0px;" dir="ltr">Connecticut</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 518.4px; transform: scale(0.67532, 1); transform-origin: 0% 0% 0px;" dir="ltr">National Bank v.</div>
<div style="font-size: 16px; font-family: serif; left: 208px; top: 518.4px; transform: scale(0.720889, 1); transform-origin: 0% 0% 0px;" dir="ltr">Germain,</div>
<div style="font-size: 16px; font-family: serif; left: 272.88px; top: 518.4px; transform: scale(0.660135, 1); transform-origin: 0% 0% 0px;" dir="ltr">503 U.S. 249, 253 (1992);</div>
<div style="font-size: 16px; font-family: serif; left: 444.48px; top: 518.4px; transform: scale(0.671554, 1); transform-origin: 0% 0% 0px;" dir="ltr">see also Chickasaw Nation v.</div>
<div style="font-size: 16px; font-family: serif; left: 636.48px; top: 518.4px; transform: scale(0.680114, 1); transform-origin: 0% 0% 0px;" dir="ltr">United</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 536.8px; transform: scale(0.57908, 1); transform-origin: 0% 0% 0px;" dir="ltr">States,</div>
<div style="font-size: 16px; font-family: serif; left: 142.32px; top: 536.8px; transform: scale(0.648453, 1); transform-origin: 0% 0% 0px;" dir="ltr">534 U.S. 84, 94 (2001);</div>
<div style="font-size: 16px; font-family: serif; left: 297.84px; top: 536.8px; transform: scale(0.59888, 1); transform-origin: 0% 0% 0px;" dir="ltr">Circuit City Stores, Inc. v.</div>
<div style="font-size: 16px; font-family: serif; left: 469.44px; top: 536.8px; transform: scale(0.868288, 1); transform-origin: 0% 0% 0px;" dir="ltr">Adams</div>
<div style="font-size: 16px; font-family: serif; left: 512.88px; top: 536.8px; transform: scale(0.631713, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 532 U.S. 105, 115 (2001).</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 555.2px; transform: scale(0.659647, 1); transform-origin: 0% 0% 0px;" dir="ltr">Indeed, the Supreme Court has declined to a</div>
<div style="font-size: 16px; font-family: serif; left: 379.44px; top: 555.2px; transform: scale(0.653471, 1); transform-origin: 0% 0% 0px;" dir="ltr">pply the ordinary presumption against implied</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 573.6px; transform: scale(0.659016, 1); transform-origin: 0% 0% 0px;" dir="ltr">repeals where other canons apply</div>
<div style="font-size: 16px; font-family: serif; left: 313.28px; top: 573.6px; transform: scale(0.613035, 1); transform-origin: 0% 0% 0px;" dir="ltr">and suggest the opposite result.</div>
<div style="font-size: 16px; font-family: serif; left: 521.68px; top: 573.6px; transform: scale(0.741227, 1); transform-origin: 0% 0% 0px;" dir="ltr">See</div>
<div style="font-size: 16px; font-family: serif; left: 547.84px; top: 573.6px; transform: scale(0.72912, 1); transform-origin: 0% 0% 0px;" dir="ltr">Montana v.</div>
<div style="font-size: 16px; font-family: serif; left: 624.72px; top: 573.6px; transform: scale(0.635856, 1); transform-origin: 0% 0% 0px;" dir="ltr">Blackfeet</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 592px; transform: scale(0.617493, 1); transform-origin: 0% 0% 0px;" dir="ltr">Tribe of Indians,</div>
<div style="font-size: 16px; font-family: serif; left: 207.12px; top: 592px; transform: scale(0.66896, 1); transform-origin: 0% 0% 0px;" dir="ltr">471 U.S. 759, 765-66 (1985). Moreover,</div>
<div style="font-size: 16px; font-family: serif; left: 474.72px; top: 592px; transform: scale(0.635552, 1); transform-origin: 0% 0% 0px;" dir="ltr">Blackfeet</div>
<div style="font-size: 16px; font-family: serif; left: 538.24px; top: 592px; transform: scale(0.637013, 1); transform-origin: 0% 0% 0px;" dir="ltr">suggests that where the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 610.4px; transform: scale(0.660687, 1); transform-origin: 0% 0% 0px;" dir="ltr">presumption against implied repeals would confli</div>
<div style="font-size: 16px; font-family: serif; left: 412.8px; top: 610.4px; transform: scale(0.635469, 1); transform-origin: 0% 0% 0px;" dir="ltr">ct with other, more compelling interpretive</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 628.8px; transform: scale(0.604623, 1); transform-origin: 0% 0% 0px;" dir="ltr">imperatives, it simply does not apply at all.</div>
<div style="font-size: 16px; font-family: serif; left: 380px; top: 628.8px; transform: scale(0.65664, 1); transform-origin: 0% 0% 0px;" dir="ltr">See</div>
<div style="font-size: 16px; font-family: serif; left: 406.24px; top: 628.8px; transform: scale(0.60456, 1); transform-origin: 0% 0% 0px;" dir="ltr">471 U.S. at 766. Here, in light of the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 647.2px; transform: scale(0.662797, 1); transform-origin: 0% 0% 0px;" dir="ltr">constitutional avoidance canon, which imposes th</div>
<div style="font-size: 16px; font-family: serif; left: 414.08px; top: 647.2px; transform: scale(0.618764, 1); transform-origin: 0% 0% 0px;" dir="ltr">e overriding imperative to use the tools of</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 665.6px; transform: scale(0.613126, 1); transform-origin: 0% 0% 0px;" dir="ltr">statutory interpretation to avoid constitutional co</div>
<div style="font-size: 16px; font-family: serif; left: 408.4px; top: 665.6px; transform: scale(0.627082, 1); transform-origin: 0% 0% 0px;" dir="ltr">nflicts, the presumption against implied repeals</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 684px; transform: scale(0.61612, 1); transform-origin: 0% 0% 0px;" dir="ltr">either would not apply at all or</div>
<div style="font-size: 16px; font-family: serif; left: 293.28px; top: 684px; transform: scale(0.636405, 1); transform-origin: 0% 0% 0px;" dir="ltr">would apply with significantly re</div>
<div style="font-size: 16px; font-family: serif; left: 509.68px; top: 684px; transform: scale(0.63824, 1); transform-origin: 0% 0% 0px;" dir="ltr">duced force. We explain this</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 702.4px; transform: scale(0.616597, 1); transform-origin: 0% 0% 0px;" dir="ltr">point in more detail in the pa</div>
<div style="font-size: 16px; font-family: serif; left: 280.88px; top: 702.4px; transform: scale(0.631515, 1); transform-origin: 0% 0% 0px;" dir="ltr">per of January 19, 2006. In addi</div>
<div style="font-size: 16px; font-family: serif; left: 489.2px; top: 702.4px; transform: scale(0.641498, 1); transform-origin: 0% 0% 0px;" dir="ltr">tion, the Resolution was enacted</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 720.8px; transform: scale(0.66137, 1); transform-origin: 0% 0% 0px;" dir="ltr">during an acute national emergency, where the type</div>
<div style="font-size: 16px; font-family: serif; left: 426.48px; top: 720.8px; transform: scale(0.625238, 1); transform-origin: 0% 0% 0px;" dir="ltr">of deliberation and detail normally required</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 739.2px; transform: scale(0.62746, 1); transform-origin: 0% 0% 0px;" dir="ltr">for application of the canon against implied repeals</div>
<div style="font-size: 16px; font-family: serif; left: 428.4px; top: 739.2px; transform: scale(0.626852, 1); transform-origin: 0% 0% 0px;" dir="ltr">was neither practical nor warranted. In such</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 757.6px; transform: scale(0.663659, 1); transform-origin: 0% 0% 0px;" dir="ltr">circumstances, Congress cannot be expected to</div>
<div style="font-size: 16px; font-family: serif; left: 401.28px; top: 757.6px; transform: scale(0.64181, 1); transform-origin: 0% 0% 0px;" dir="ltr">work through every potential implication of the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 776px; transform: scale(0.637127, 1); transform-origin: 0% 0% 0px;" dir="ltr">U.S. Code and to define with particularity each</div>
<div style="font-size: 16px; font-family: serif; left: 401.76px; top: 776px; transform: scale(0.597682, 1); transform-origin: 0% 0% 0px;" dir="ltr">of the traditional incidents of the use of force</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 794.48px; transform: scale(0.605497, 1); transform-origin: 0% 0% 0px;" dir="ltr">available to the President.</div>
</div>
</div>
<a name="4"></a><a name="5"></a>
<div id="pageContainer5" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 404px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">5</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 94.7199px; transform: scale(0.64909, 1); transform-origin: 0% 0% 0px;" dir="ltr">cannot be expanded by the ‘consent’ of the</div>
<div style="font-size: 16px; font-family: serif; left: 375.04px; top: 94.7199px; transform: scale(0.690373, 1); transform-origin: 0% 0% 0px;" dir="ltr">governmental unit whose</div>
<div style="font-size: 16px; font-family: serif; left: 540.72px; top: 94.7199px; transform: scale(0.6592, 1); transform-origin: 0% 0% 0px;" dir="ltr">domain is thereby</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.12px; transform: scale(0.649271, 1); transform-origin: 0% 0% 0px;" dir="ltr">narrowed, whether that unit is the Executive Branch</div>
<div style="font-size: 16px; font-family: serif; left: 433.28px; top: 113.12px; transform: scale(0.596747, 1); transform-origin: 0% 0% 0px;" dir="ltr">or the States.”) (collec</div>
<div style="font-size: 16px; font-family: serif; left: 576.32px; top: 113.12px; transform: scale(0.59488, 1); transform-origin: 0% 0% 0px;" dir="ltr">ting authorities). Nor</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.637705, 1); transform-origin: 0% 0% 0px;" dir="ltr">do we believe that President Carter attempted to do so. President Carter’s Attorney General</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 149.92px; transform: scale(0.624824, 1); transform-origin: 0% 0% 0px;" dir="ltr">testified at a hearing on FISA as</div>
<div style="font-size: 16px; font-family: serif; left: 302.16px; top: 149.92px; transform: scale(0.610579, 1); transform-origin: 0% 0% 0px;" dir="ltr">follows: “[T]he current bill rec</div>
<div style="font-size: 16px; font-family: serif; left: 503.52px; top: 149.92px; transform: scale(0.649018, 1); transform-origin: 0% 0% 0px;" dir="ltr">ognizes no inherent power of the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 168.32px; transform: scale(0.63568, 1); transform-origin: 0% 0% 0px;" dir="ltr">President to conduct electronic su</div>
<div style="font-size: 16px; font-family: serif; left: 312px; top: 168.32px; transform: scale(0.612731, 1); transform-origin: 0% 0% 0px;" dir="ltr">rveillance, and I want to in</div>
<div style="font-size: 16px; font-family: serif; left: 483.44px; top: 168.32px; transform: scale(0.597553, 1); transform-origin: 0% 0% 0px;" dir="ltr">terpolate here to say that</div>
<div style="font-size: 16px; font-family: serif; left: 644.72px; top: 168.32px; transform: scale(0.60496, 1); transform-origin: 0% 0% 0px;" dir="ltr">this does</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 186.72px; transform: scale(0.653688, 1); transform-origin: 0% 0% 0px;" dir="ltr">not take away the power of th</div>
<div style="font-size: 16px; font-family: serif; left: 285.36px; top: 186.72px; transform: scale(0.648838, 1); transform-origin: 0% 0% 0px;" dir="ltr">e President under the Constitution</div>
<div style="font-size: 16px; font-family: serif; left: 505.68px; top: 186.72px; transform: scale(0.595433, 1); transform-origin: 0% 0% 0px;" dir="ltr">. It simply, in my view, is not</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 205.12px; transform: scale(0.61635, 1); transform-origin: 0% 0% 0px;" dir="ltr">necessary to state that power, so there is no reason</div>
<div style="font-size: 16px; font-family: serif; left: 422.56px; top: 205.12px; transform: scale(0.545375, 1); transform-origin: 0% 0% 0px;" dir="ltr">to reiterate or iterate it</div>
<div style="font-size: 16px; font-family: serif; left: 569.6px; top: 205.12px; transform: scale(0.603533, 1); transform-origin: 0% 0% 0px;" dir="ltr">as the case may be. It</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 223.52px; transform: scale(0.606413, 1); transform-origin: 0% 0% 0px;" dir="ltr">is in the Constitution, whatever it is. The Presid</div>
<div style="font-size: 16px; font-family: serif; left: 404.96px; top: 223.52px; transform: scale(0.590566, 1); transform-origin: 0% 0% 0px;" dir="ltr">ent, by offering this legislation, is agreeing to</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 241.92px; transform: scale(0.625026, 1); transform-origin: 0% 0% 0px;" dir="ltr">follow the statutory procedure.”</div>
<div style="font-size: 16px; font-family: serif; left: 308.48px; top: 241.92px; transform: scale(0.637594, 1); transform-origin: 0% 0% 0px;" dir="ltr">Foreign Intelligence Surveill</div>
<div style="font-size: 16px; font-family: serif; left: 493.28px; top: 241.92px; transform: scale(0.666363, 1); transform-origin: 0% 0% 0px;" dir="ltr">ance: Hearings Before the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 260.32px; transform: scale(0.678819, 1); transform-origin: 0% 0% 0px;" dir="ltr">Subcomm. on Legislation of the House</div>
<div style="font-size: 16px; font-family: serif; left: 347.12px; top: 260.32px; transform: scale(0.688598, 1); transform-origin: 0% 0% 0px;" dir="ltr">Permanent Select Comm. on Intelligence</div>
<div style="font-size: 16px; font-family: serif; left: 608.8px; top: 260.32px; transform: scale(0.64402, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 95th Cong. 15</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 278.72px; transform: scale(0.64512, 1); transform-origin: 0% 0% 0px;" dir="ltr">(Jan. 10, 1978) (emphasis added). Thus, in saying</div>
<div style="font-size: 16px; font-family: serif; left: 418.64px; top: 278.72px; transform: scale(0.618233, 1); transform-origin: 0% 0% 0px;" dir="ltr">that President Carter agreed to follow the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 297.12px; transform: scale(0.682539, 1); transform-origin: 0% 0% 0px;" dir="ltr">procedures, Attorney General Be</div>
<div style="font-size: 16px; font-family: serif; left: 307.44px; top: 297.12px; transform: scale(0.64304, 1); transform-origin: 0% 0% 0px;" dir="ltr">ll made clear that FISA could</div>
<div style="font-size: 16px; font-family: serif; left: 500.24px; top: 297.12px; transform: scale(0.638949, 1); transform-origin: 0% 0% 0px;" dir="ltr">not take away the President’s</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 315.6px; transform: scale(0.570427, 1); transform-origin: 0% 0% 0px;" dir="ltr">Article II authority.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 352.72px; transform: scale(0.623467, 1); transform-origin: 0% 0% 0px;" dir="ltr">(7)</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 352.72px; transform: scale(0.692025, 1); transform-origin: 0% 0% 0px;" dir="ltr">Why didn’t the President seek a warrant from the Foreign Intelligence Surveillance</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 371.12px; transform: scale(0.685418, 1); transform-origin: 0% 0% 0px;" dir="ltr">Court authorizing in advance the electronic</div>
<div style="font-size: 16px; font-family: serif; left: 431.6px; top: 371.12px; transform: scale(0.6836, 1); transform-origin: 0% 0% 0px;" dir="ltr">surveillance in issue? (The FISA Court</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 389.52px; transform: scale(0.670057, 1); transform-origin: 0% 0% 0px;" dir="ltr">has the experience and authority to issue</div>
<div style="font-size: 16px; font-family: serif; left: 411.6px; top: 389.52px; transform: scale(0.710846, 1); transform-origin: 0% 0% 0px;" dir="ltr">such a warrant. The FISA Court has a</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 407.92px; transform: scale(0.634023, 1); transform-origin: 0% 0% 0px;" dir="ltr">record establishing its reliability for no</div>
<div style="font-size: 16px; font-family: serif; left: 396.32px; top: 407.92px; transform: scale(0.674552, 1); transform-origin: 0% 0% 0px;" dir="ltr">n-disclosure or leaking contrasted with</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 426.32px; transform: scale(0.67954, 1); transform-origin: 0% 0% 0px;" dir="ltr">concerns that disclosures to members of Congress involved a high risk of disclosure or</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 444.72px; transform: scale(0.655453, 1); transform-origin: 0% 0% 0px;" dir="ltr">leaking. The FISA Court is at least as rel</div>
<div style="font-size: 16px; font-family: serif; left: 411.92px; top: 444.72px; transform: scale(0.652541, 1); transform-origin: 0% 0% 0px;" dir="ltr">iable, if not more so, than the Executive</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 463.2px; transform: scale(0.67806, 1); transform-origin: 0% 0% 0px;" dir="ltr">Branch on avoiding disclosure or leaks.)</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 500px; transform: scale(0.594077, 1); transform-origin: 0% 0% 0px;" dir="ltr">Let me stress that the FISA Court has been</div>
<div style="font-size: 16px; font-family: serif; left: 422.64px; top: 500px; transform: scale(0.662705, 1); transform-origin: 0% 0% 0px;" dir="ltr">enormously valuable.</div>
<div style="font-size: 16px; font-family: serif; left: 568.4px; top: 500px; transform: scale(0.645837, 1); transform-origin: 0% 0% 0px;" dir="ltr">And we routinely trust</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 518.4px; transform: scale(0.670492, 1); transform-origin: 0% 0% 0px;" dir="ltr">the FISA judges with many of the Nation’s most</div>
<div style="font-size: 16px; font-family: serif; left: 411.04px; top: 518.4px; transform: scale(0.602211, 1); transform-origin: 0% 0% 0px;" dir="ltr">closely held secrets.</div>
<div style="font-size: 16px; font-family: serif; left: 543.52px; top: 518.4px; transform: scale(0.645173, 1); transform-origin: 0% 0% 0px;" dir="ltr">As I have explained</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 536.8px; transform: scale(0.617942, 1); transform-origin: 0% 0% 0px;" dir="ltr">elsewhere, the President authorized the terrorist</div>
<div style="font-size: 16px; font-family: serif; left: 404.88px; top: 536.8px; transform: scale(0.64256, 1); transform-origin: 0% 0% 0px;" dir="ltr">surveillance program stric</div>
<div style="font-size: 16px; font-family: serif; left: 571.84px; top: 536.8px; transform: scale(0.624413, 1); transform-origin: 0% 0% 0px;" dir="ltr">tly as an early warning</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 555.2px; transform: scale(0.650434, 1); transform-origin: 0% 0% 0px;" dir="ltr">system in our armed conflict with al Qaeda. Th</div>
<div style="font-size: 16px; font-family: serif; left: 401.68px; top: 555.2px; transform: scale(0.65582, 1); transform-origin: 0% 0% 0px;" dir="ltr">e optimal way to achieve the necessary speed and</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 573.6px; transform: scale(0.623642, 1); transform-origin: 0% 0% 0px;" dir="ltr">agility to protect the Nation from</div>
<div style="font-size: 16px; font-family: serif; left: 307.84px; top: 573.6px; transform: scale(0.634933, 1); transform-origin: 0% 0% 0px;" dir="ltr">another catastrophic al Qaeda at</div>
<div style="font-size: 16px; font-family: serif; left: 517.28px; top: 573.6px; transform: scale(0.602385, 1); transform-origin: 0% 0% 0px;" dir="ltr">tack is to leave the decisions</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 592px; transform: scale(0.617813, 1); transform-origin: 0% 0% 0px;" dir="ltr">about intercepting particular</div>
<div style="font-size: 16px; font-family: serif; left: 281.28px; top: 592px; transform: scale(0.668237, 1); transform-origin: 0% 0% 0px;" dir="ltr">international communications to</div>
<div style="font-size: 16px; font-family: serif; left: 488.4px; top: 592px; transform: scale(0.638965, 1); transform-origin: 0% 0% 0px;" dir="ltr">the judgment of professional</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 610.4px; transform: scale(0.610608, 1); transform-origin: 0% 0% 0px;" dir="ltr">intelligence officers, based on the best available in</div>
<div style="font-size: 16px; font-family: serif; left: 419.44px; top: 610.4px; transform: scale(0.626492, 1); transform-origin: 0% 0% 0px;" dir="ltr">telligence information. The delay inherent in</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 628.8px; transform: scale(0.648459, 1); transform-origin: 0% 0% 0px;" dir="ltr">the FISA process is incompatible with the narr</div>
<div style="font-size: 16px; font-family: serif; left: 394.16px; top: 628.8px; transform: scale(0.651449, 1); transform-origin: 0% 0% 0px;" dir="ltr">ow purpose of this early warning system. As</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 647.2px; transform: scale(0.640062, 1); transform-origin: 0% 0% 0px;" dir="ltr">explained in response to the next qu</div>
<div style="font-size: 16px; font-family: serif; left: 326.16px; top: 647.2px; transform: scale(0.60901, 1); transform-origin: 0% 0% 0px;" dir="ltr">estion, it takes considerable time</div>
<div style="font-size: 16px; font-family: serif; left: 539.28px; top: 647.2px; transform: scale(0.65128, 1); transform-origin: 0% 0% 0px;" dir="ltr">to begin</div>
<div style="font-size: 16px; font-family: serif; left: 591.36px; top: 647.2px; transform: scale(0.66376, 1); transform-origin: 0% 0% 0px;" dir="ltr">coverage under</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 665.6px; transform: scale(0.68559, 1); transform-origin: 0% 0% 0px;" dir="ltr">FISA, even making full use of FISA’s emergency</div>
<div style="font-size: 16px; font-family: serif; left: 418.24px; top: 665.6px; transform: scale(0.656028, 1); transform-origin: 0% 0% 0px;" dir="ltr">authorization procedures. Let me emphasize,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 684px; transform: scale(0.620143, 1); transform-origin: 0% 0% 0px;" dir="ltr">however, that under the terrorist surveillance</div>
<div style="font-size: 16px; font-family: serif; left: 387.12px; top: 684px; transform: scale(0.629781, 1); transform-origin: 0% 0% 0px;" dir="ltr">program, these intelligence officers, who are</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 702.4px; transform: scale(0.62549, 1); transform-origin: 0% 0% 0px;" dir="ltr">experts on al Qaeda and its tact</div>
<div style="font-size: 16px; font-family: serif; left: 296px; top: 702.4px; transform: scale(0.647806, 1); transform-origin: 0% 0% 0px;" dir="ltr">ics (including its use of communi</div>
<div style="font-size: 16px; font-family: serif; left: 509.68px; top: 702.4px; transform: scale(0.647486, 1); transform-origin: 0% 0% 0px;" dir="ltr">cation systems) apply a probable</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 720.8px; transform: scale(0.631411, 1); transform-origin: 0% 0% 0px;" dir="ltr">cause standard (specifically, “reasonable gr</div>
<div style="font-size: 16px; font-family: serif; left: 373.76px; top: 720.8px; transform: scale(0.63686, 1); transform-origin: 0% 0% 0px;" dir="ltr">ounds to believe”) before intercepting any</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 739.2px; transform: scale(0.6548, 1); transform-origin: 0% 0% 0px;" dir="ltr">communications. The critical advantage offered</div>
<div style="font-size: 16px; font-family: serif; left: 410.16px; top: 739.2px; transform: scale(0.590185, 1); transform-origin: 0% 0% 0px;" dir="ltr">by the terrorist surveilla</div>
<div style="font-size: 16px; font-family: serif; left: 563.44px; top: 739.2px; transform: scale(0.721432, 1); transform-origin: 0% 0% 0px;" dir="ltr">nce program compared</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 757.6px; transform: scale(0.635113, 1); transform-origin: 0% 0% 0px;" dir="ltr">to FISA is</div>
<div style="font-size: 16px; font-family: serif; left: 165.84px; top: 757.6px; transform: scale(0.887467, 1); transform-origin: 0% 0% 0px;" dir="ltr">who</div>
<div style="font-size: 16px; font-family: serif; left: 192.48px; top: 757.6px; transform: scale(0.662392, 1); transform-origin: 0% 0% 0px;" dir="ltr">makes the probable cause determination</div>
<div style="font-size: 16px; font-family: serif; left: 457.28px; top: 757.6px; transform: scale(0.686199, 1); transform-origin: 0% 0% 0px;" dir="ltr">and how many layers of review must</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 776px; transform: scale(0.660693, 1); transform-origin: 0% 0% 0px;" dir="ltr">occur</div>
<div style="font-size: 16px; font-family: serif; left: 135.6px; top: 776px; transform: scale(0.681333, 1); transform-origin: 0% 0% 0px;" dir="ltr">before</div>
<div style="font-size: 16px; font-family: serif; left: 176.4px; top: 776px; transform: scale(0.621743, 1); transform-origin: 0% 0% 0px;" dir="ltr">surveillance begins. In the narrow c</div>
<div style="font-size: 16px; font-family: serif; left: 412.72px; top: 776px; transform: scale(0.62608, 1); transform-origin: 0% 0% 0px;" dir="ltr">ontext of defending the Nation in this</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 794.4px; transform: scale(0.666351, 1); transform-origin: 0% 0% 0px;" dir="ltr">congressionally authorized armed</div>
<div style="font-size: 16px; font-family: serif; left: 315.84px; top: 794.4px; transform: scale(0.656676, 1); transform-origin: 0% 0% 0px;" dir="ltr">conflict with al Qaeda, we must</div>
<div style="font-size: 16px; font-family: serif; left: 519.36px; top: 794.4px; transform: scale(0.617867, 1); transform-origin: 0% 0% 0px;" dir="ltr">allow these professionals to</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 812.88px; transform: scale(0.61943, 1); transform-origin: 0% 0% 0px;" dir="ltr">use their skills and knowledge to protect us.</div>
</div>
</div>
<a name="6"></a><a name="7"></a><a name="8"></a>
<div id="pageContainer8" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 404px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">8</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 94.7199px; transform: scale(0.634476, 1); transform-origin: 0% 0% 0px;" dir="ltr">(1) keep the congressional intelligence co</div>
<div style="font-size: 16px; font-family: serif; left: 458.16px; top: 94.7199px; transform: scale(0.648242, 1); transform-origin: 0% 0% 0px;" dir="ltr">mmittees fully and currently informed of</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 113.12px; transform: scale(0.57368, 1); transform-origin: 0% 0% 0px;" dir="ltr">all intelligence activities,</div>
<div style="font-size: 16px; font-family: serif; left: 352.32px; top: 113.12px; transform: scale(0.604051, 1); transform-origin: 0% 0% 0px;" dir="ltr">other than a covert action (as defined in</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 131.52px; transform: scale(0.592693, 1); transform-origin: 0% 0% 0px;" dir="ltr">section 413b(e) of this title)</div>
<div style="font-size: 16px; font-family: serif; left: 369.76px; top: 131.52px; transform: scale(0.618187, 1); transform-origin: 0% 0% 0px;" dir="ltr">, which are the responsibility</div>
<div style="font-size: 16px; font-family: serif; left: 555.04px; top: 131.52px; transform: scale(0.60723, 1); transform-origin: 0% 0% 0px;" dir="ltr">of, are engaged in by, or</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 149.92px; transform: scale(0.61405, 1); transform-origin: 0% 0% 0px;" dir="ltr">are carried out for or on behalf of, any de</div>
<div style="font-size: 16px; font-family: serif; left: 455.84px; top: 149.92px; transform: scale(0.629272, 1); transform-origin: 0% 0% 0px;" dir="ltr">partment, agency, or entity of the United</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 168.32px; transform: scale(0.633114, 1); transform-origin: 0% 0% 0px;" dir="ltr">States Government, including any significant anticipated intelligence activity and</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 186.8px; transform: scale(0.606827, 1); transform-origin: 0% 0% 0px;" dir="ltr">any significant intelligence failure; and</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 223.76px; transform: scale(0.625707, 1); transform-origin: 0% 0% 0px;" dir="ltr">(2) furnish the congressional</div>
<div style="font-size: 16px; font-family: serif; left: 379.52px; top: 223.76px; transform: scale(0.647905, 1); transform-origin: 0% 0% 0px;" dir="ltr">intelligence committees any information or material</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 242.16px; transform: scale(0.617732, 1); transform-origin: 0% 0% 0px;" dir="ltr">concerning intelligence activities, other than</div>
<div style="font-size: 16px; font-family: serif; left: 476px; top: 242.16px; transform: scale(0.608349, 1); transform-origin: 0% 0% 0px;" dir="ltr">covert actions, which is within their</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 260.56px; transform: scale(0.642711, 1); transform-origin: 0% 0% 0px;" dir="ltr">custody or control, and which is requ</div>
<div style="font-size: 16px; font-family: serif; left: 429.76px; top: 260.56px; transform: scale(0.622417, 1); transform-origin: 0% 0% 0px;" dir="ltr">ested by either of the congressional</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 279.04px; transform: scale(0.629189, 1); transform-origin: 0% 0% 0px;" dir="ltr">intelligence committees in order to carry</div>
<div style="font-size: 16px; font-family: serif; left: 456px; top: 279.04px; transform: scale(0.606131, 1); transform-origin: 0% 0% 0px;" dir="ltr">out its authorized</div>
<div style="font-size: 16px; font-family: serif; left: 571.04px; top: 279.04px; transform: scale(0.582756, 1); transform-origin: 0% 0% 0px;" dir="ltr">responsibilities.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 316.08px; transform: scale(0.437709, 1); transform-origin: 0% 0% 0px;" dir="ltr">(Emphasis added.)</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 353.12px; transform: scale(0.654353, 1); transform-origin: 0% 0% 0px;" dir="ltr">Section 413b(b):</div>
<div style="font-size: 16px; font-family: serif; left: 255.2px; top: 353.12px; transform: scale(0.63227, 1); transform-origin: 0% 0% 0px;" dir="ltr">To the extent consistent with du</div>
<div style="font-size: 16px; font-family: serif; left: 457.28px; top: 353.12px; transform: scale(0.63345, 1); transform-origin: 0% 0% 0px;" dir="ltr">e regard for the protection from</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 371.6px; transform: scale(0.646926, 1); transform-origin: 0% 0% 0px;" dir="ltr">unauthorized disclosure of clas</div>
<div style="font-size: 16px; font-family: serif; left: 344.56px; top: 371.6px; transform: scale(0.617543, 1); transform-origin: 0% 0% 0px;" dir="ltr">sified information relating</div>
<div style="font-size: 16px; font-family: serif; left: 517.36px; top: 371.6px; transform: scale(0.593428, 1); transform-origin: 0% 0% 0px;" dir="ltr">to sensitive intelligence</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 389.92px; transform: scale(0.67279, 1); transform-origin: 0% 0% 0px;" dir="ltr">sources and methods or other ex</div>
<div style="font-size: 16px; font-family: serif; left: 352.4px; top: 389.92px; transform: scale(0.628623, 1); transform-origin: 0% 0% 0px;" dir="ltr">ceptionally sensitive matters</div>
<div style="font-size: 16px; font-family: serif; left: 534.64px; top: 389.92px; transform: scale(0.612207, 1); transform-origin: 0% 0% 0px;" dir="ltr">, the Director of National</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 408.32px; transform: scale(0.621489, 1); transform-origin: 0% 0% 0px;" dir="ltr">Intelligence and the heads of all departments, agencies, and entities of the United States</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 426.8px; transform: scale(0.657249, 1); transform-origin: 0% 0% 0px;" dir="ltr">Government involved in a covert action--</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 463.76px; transform: scale(0.614634, 1); transform-origin: 0% 0% 0px;" dir="ltr">(1) shall keep the congressional intell</div>
<div style="font-size: 16px; font-family: serif; left: 431.44px; top: 463.76px; transform: scale(0.649175, 1); transform-origin: 0% 0% 0px;" dir="ltr">igence committees fully and currently</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 482.16px; transform: scale(0.634782, 1); transform-origin: 0% 0% 0px;" dir="ltr">informed of all covert actions which are</div>
<div style="font-size: 16px; font-family: serif; left: 452px; top: 482.16px; transform: scale(0.61293, 1); transform-origin: 0% 0% 0px;" dir="ltr">the responsibility of, are engaged in by,</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 500.56px; transform: scale(0.600632, 1); transform-origin: 0% 0% 0px;" dir="ltr">or are carried out for or on behalf of, a</div>
<div style="font-size: 16px; font-family: serif; left: 438.08px; top: 500.56px; transform: scale(0.629768, 1); transform-origin: 0% 0% 0px;" dir="ltr">ny department, agency, or entity of the</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 519.04px; transform: scale(0.672299, 1); transform-origin: 0% 0% 0px;" dir="ltr">United States Government, incl</div>
<div style="font-size: 16px; font-family: serif; left: 393.76px; top: 519.04px; transform: scale(0.61121, 1); transform-origin: 0% 0% 0px;" dir="ltr">uding significant failures; and</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 556px; transform: scale(0.611688, 1); transform-origin: 0% 0% 0px;" dir="ltr">(2) shall furnish to the congressional in</div>
<div style="font-size: 16px; font-family: serif; left: 442.64px; top: 556px; transform: scale(0.653885, 1); transform-origin: 0% 0% 0px;" dir="ltr">telligence committees any information or</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 574.4px; transform: scale(0.653854, 1); transform-origin: 0% 0% 0px;" dir="ltr">material concerning covert actions which</div>
<div style="font-size: 16px; font-family: serif; left: 459.92px; top: 574.4px; transform: scale(0.604693, 1); transform-origin: 0% 0% 0px;" dir="ltr">is in the possession,</div>
<div style="font-size: 16px; font-family: serif; left: 586.96px; top: 574.4px; transform: scale(0.612061, 1); transform-origin: 0% 0% 0px;" dir="ltr">custody, or control</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 592.8px; transform: scale(0.63776, 1); transform-origin: 0% 0% 0px;" dir="ltr">of any department, agency, or entity of</div>
<div style="font-size: 16px; font-family: serif; left: 440.72px; top: 592.8px; transform: scale(0.679144, 1); transform-origin: 0% 0% 0px;" dir="ltr">the United States Government and which</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 611.2px; transform: scale(0.630712, 1); transform-origin: 0% 0% 0px;" dir="ltr">is requested by either of the congressiona</div>
<div style="font-size: 16px; font-family: serif; left: 456.88px; top: 611.2px; transform: scale(0.657288, 1); transform-origin: 0% 0% 0px;" dir="ltr">l intelligence commi</div>
<div style="font-size: 16px; font-family: serif; left: 588.32px; top: 611.2px; transform: scale(0.578009, 1); transform-origin: 0% 0% 0px;" dir="ltr">ttees in order to</div>
<div style="font-size: 16px; font-family: serif; left: 192px; top: 629.68px; transform: scale(0.597838, 1); transform-origin: 0% 0% 0px;" dir="ltr">carry out its authorized responsibilities.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 666.8px; transform: scale(0.437709, 1); transform-origin: 0% 0% 0px;" dir="ltr">(Emphasis added.)</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 703.76px; transform: scale(0.557307, 1); transform-origin: 0% 0% 0px;" dir="ltr">Each of these notification re</div>
<div style="font-size: 16px; font-family: serif; left: 324.4px; top: 703.76px; transform: scale(0.637516, 1); transform-origin: 0% 0% 0px;" dir="ltr">quirements, in turn, requires that the Executive Branch keep</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 722.16px; transform: scale(0.633417, 1); transform-origin: 0% 0% 0px;" dir="ltr">the intelligence committees “fully and currently</div>
<div style="font-size: 16px; font-family: serif; left: 406.16px; top: 722.16px; transform: scale(0.604945, 1); transform-origin: 0% 0% 0px;" dir="ltr">informed of all intell</div>
<div style="font-size: 16px; font-family: serif; left: 538.96px; top: 722.16px; transform: scale(0.596413, 1); transform-origin: 0% 0% 0px;" dir="ltr">igence activities,” but</div>
<div style="font-size: 16px; font-family: serif; left: 682px; top: 722.16px; transform: scale(0.68976, 1); transform-origin: 0% 0% 0px;" dir="ltr">only</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 740.56px; transform: scale(0.620494, 1); transform-origin: 0% 0% 0px;" dir="ltr">“to the extent consistent with due regard for</div>
<div style="font-size: 16px; font-family: serif; left: 381.28px; top: 740.56px; transform: scale(0.652192, 1); transform-origin: 0% 0% 0px;" dir="ltr">the protection from unaut</div>
<div style="font-size: 16px; font-family: serif; left: 544.32px; top: 740.56px; transform: scale(0.628145, 1); transform-origin: 0% 0% 0px;" dir="ltr">horized disclosure of</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 758.96px; transform: scale(0.62501, 1); transform-origin: 0% 0% 0px;" dir="ltr">classified information relating to sensitive intelligence sources and methods or other</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 777.36px; transform: scale(0.62716, 1); transform-origin: 0% 0% 0px;" dir="ltr">exceptionally sensitive matters.” This express</div>
<div style="font-size: 16px; font-family: serif; left: 396.88px; top: 777.36px; transform: scale(0.638906, 1); transform-origin: 0% 0% 0px;" dir="ltr">exception gives the Executive Branch flexibility</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 795.76px; transform: scale(0.654367, 1); transform-origin: 0% 0% 0px;" dir="ltr">to brief only certain members of the intelligence committees where more widespread briefings</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 814.16px; transform: scale(0.641035, 1); transform-origin: 0% 0% 0px;" dir="ltr">would pose an unacceptable risk to the national s</div>
<div style="font-size: 16px; font-family: serif; left: 409.68px; top: 814.16px; transform: scale(0.615474, 1); transform-origin: 0% 0% 0px;" dir="ltr">ecurity. Section 501(a)(1) of the National</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 832.56px; transform: scale(0.625147, 1); transform-origin: 0% 0% 0px;" dir="ltr">Security Act, quoted in the question, requires</div>
<div style="font-size: 16px; font-family: serif; left: 389.68px; top: 832.56px; transform: scale(0.632431, 1); transform-origin: 0% 0% 0px;" dir="ltr">the President to ensure</div>
<div style="font-size: 16px; font-family: serif; left: 534.96px; top: 832.56px; transform: scale(0.584674, 1); transform-origin: 0% 0% 0px;" dir="ltr">that the relevant</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 850.96px; transform: scale(0.632326, 1); transform-origin: 0% 0% 0px;" dir="ltr">intelligence officials comply with the appropriate</div>
<div style="font-size: 16px; font-family: serif; left: 411.92px; top: 850.96px; transform: scale(0.630616, 1); transform-origin: 0% 0% 0px;" dir="ltr">notification requirements, sections 413a(a) and</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 869.44px; transform: scale(0.652373, 1); transform-origin: 0% 0% 0px;" dir="ltr">413b(b).</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 906.4px; transform: scale(0.571753, 1); transform-origin: 0% 0% 0px;" dir="ltr">Consistent with the statutory language, it</div>
<div style="font-size: 16px; font-family: serif; left: 410.24px; top: 906.4px; transform: scale(0.630316, 1); transform-origin: 0% 0% 0px;" dir="ltr">has for decades been the practice of both</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 924.8px; transform: scale(0.670428, 1); transform-origin: 0% 0% 0px;" dir="ltr">Democratic and Republican administrations to</div>
<div style="font-size: 16px; font-family: serif; left: 397.68px; top: 924.8px; transform: scale(0.689408, 1); transform-origin: 0% 0% 0px;" dir="ltr">inform only the Chair and Ranking Members of</div>
</div>
</div>
<a name="9"></a>
<div id="pageContainer9" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 404px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">9</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 94.7199px; transform: scale(0.641495, 1); transform-origin: 0% 0% 0px;" dir="ltr">the intelligence committees about certain ex</div>
<div style="font-size: 16px; font-family: serif; left: 378.16px; top: 94.7199px; transform: scale(0.621272, 1); transform-origin: 0% 0% 0px;" dir="ltr">ceptionally sensitive matters. Even the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.12px; transform: scale(0.69558, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congressional Research Service has acknowledg</div>
<div style="font-size: 16px; font-family: serif; left: 408.72px; top: 113.12px; transform: scale(0.60112, 1); transform-origin: 0% 0% 0px;" dir="ltr">ed that the leaders</div>
<div style="font-size: 16px; font-family: serif; left: 528.8px; top: 113.12px; transform: scale(0.59728, 1); transform-origin: 0% 0% 0px;" dir="ltr">of the intelligence</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.671223, 1); transform-origin: 0% 0% 0px;" dir="ltr">committees “over time have accepted the executive</div>
<div style="font-size: 16px; font-family: serif; left: 424.8px; top: 131.52px; transform: scale(0.607445, 1); transform-origin: 0% 0% 0px;" dir="ltr">branch practice of limiting notification of</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 149.92px; transform: scale(0.604429, 1); transform-origin: 0% 0% 0px;" dir="ltr">intelligence activities in some cases to either th</div>
<div style="font-size: 16px; font-family: serif; left: 397.84px; top: 149.92px; transform: scale(0.647813, 1); transform-origin: 0% 0% 0px;" dir="ltr">e Gang of Eight, or to the chairmen and ranking</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 168.32px; transform: scale(0.655192, 1); transform-origin: 0% 0% 0px;" dir="ltr">members of the intelligence committees.”</div>
<div style="font-size: 16px; font-family: serif; left: 371.12px; top: 168.32px; transform: scale(0.741227, 1); transform-origin: 0% 0% 0px;" dir="ltr">See</div>
<div style="font-size: 16px; font-family: serif; left: 393.36px; top: 168.32px; transform: scale(0.699896, 1); transform-origin: 0% 0% 0px;" dir="ltr">Alfred Cumming, Congressional Research</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 186.72px; transform: scale(0.623324, 1); transform-origin: 0% 0% 0px;" dir="ltr">Service,</div>
<div style="font-size: 16px; font-family: serif; left: 152.08px; top: 186.72px; transform: scale(0.707751, 1); transform-origin: 0% 0% 0px;" dir="ltr">Re: Statutory Procedures Under Which Congre</div>
<div style="font-size: 16px; font-family: serif; left: 456.32px; top: 186.72px; transform: scale(0.621393, 1); transform-origin: 0% 0% 0px;" dir="ltr">ss in to be Informed of U.S Intelligence</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 205.12px; transform: scale(0.634853, 1); transform-origin: 0% 0% 0px;" dir="ltr">Activities, Including Covert Actions</div>
<div style="font-size: 16px; font-family: serif; left: 324.48px; top: 205.12px; transform: scale(0.637584, 1); transform-origin: 0% 0% 0px;" dir="ltr">10 (Jan. 18, 2006). The Administration followed this well-</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 223.52px; transform: scale(0.623924, 1); transform-origin: 0% 0% 0px;" dir="ltr">established practice by briefing only</div>
<div style="font-size: 16px; font-family: serif; left: 332.88px; top: 223.52px; transform: scale(0.602027, 1); transform-origin: 0% 0% 0px;" dir="ltr">the leadership of the Intellig</div>
<div style="font-size: 16px; font-family: serif; left: 513.36px; top: 223.52px; transform: scale(0.674921, 1); transform-origin: 0% 0% 0px;" dir="ltr">ence Committees and, at a more</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 242px; transform: scale(0.620282, 1); transform-origin: 0% 0% 0px;" dir="ltr">general level, the leaders of both houses</div>
<div style="font-size: 16px; font-family: serif; left: 356.4px; top: 242px; transform: scale(0.6344, 1); transform-origin: 0% 0% 0px;" dir="ltr">of Congress about the NSA activities.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 279.12px; transform: scale(0.6672, 1); transform-origin: 0% 0% 0px;" dir="ltr">(12)</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 279.12px; transform: scale(0.6404, 1); transform-origin: 0% 0% 0px;" dir="ltr">To the extent that it can be disclosed in a</div>
<div style="font-size: 16px; font-family: serif; left: 411.92px; top: 279.12px; transform: scale(0.663826, 1); transform-origin: 0% 0% 0px;" dir="ltr">public hearing (or to be provided in a closed</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 297.52px; transform: scale(0.677899, 1); transform-origin: 0% 0% 0px;" dir="ltr">executive session), what are the facts upon wh</div>
<div style="font-size: 16px; font-family: serif; left: 442px; top: 297.52px; transform: scale(0.636138, 1); transform-origin: 0% 0% 0px;" dir="ltr">ich the Executive relies to assert Article</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 315.92px; transform: scale(0.689302, 1); transform-origin: 0% 0% 0px;" dir="ltr">II wartime authority over Congress’ Article</div>
<div style="font-size: 16px; font-family: serif; left: 433.28px; top: 315.92px; transform: scale(0.646507, 1); transform-origin: 0% 0% 0px;" dir="ltr">I authority to establish public policy on</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 334.32px; transform: scale(0.63984, 1); transform-origin: 0% 0% 0px;" dir="ltr">these issues especially where legislation is</div>
<div style="font-size: 16px; font-family: serif; left: 411.52px; top: 334.32px; transform: scale(0.687996, 1); transform-origin: 0% 0% 0px;" dir="ltr">approved by the President as contrasted</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 352.8px; transform: scale(0.673644, 1); transform-origin: 0% 0% 0px;" dir="ltr">with being enacted over a Presidential veto</div>
<div style="font-size: 16px; font-family: serif; left: 426.64px; top: 352.8px; transform: scale(0.707653, 1); transform-origin: 0% 0% 0px;" dir="ltr">as was the case with the War Powers Act?</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 389.6px; transform: scale(0.582486, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress itself expressly recognized in the</div>
<div style="font-size: 16px; font-family: serif; left: 422.16px; top: 389.6px; transform: scale(0.634957, 1); transform-origin: 0% 0% 0px;" dir="ltr">Resolution that “the Pr</div>
<div style="font-size: 16px; font-family: serif; left: 568.24px; top: 389.6px; transform: scale(0.619985, 1); transform-origin: 0% 0% 0px;" dir="ltr">esident has authority</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 408px; transform: scale(0.621644, 1); transform-origin: 0% 0% 0px;" dir="ltr">under the Constitution to take action to deter and</div>
<div style="font-size: 16px; font-family: serif; left: 412.8px; top: 408px; transform: scale(0.613287, 1); transform-origin: 0% 0% 0px;" dir="ltr">prevent acts of internat</div>
<div style="font-size: 16px; font-family: serif; left: 559.92px; top: 408px; transform: scale(0.6172, 1); transform-origin: 0% 0% 0px;" dir="ltr">ional terrorism against</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 426.4px; transform: scale(0.660994, 1); transform-origin: 0% 0% 0px;" dir="ltr">the United States.” The Supreme Court has</div>
<div style="font-size: 16px; font-family: serif; left: 379.92px; top: 426.4px; transform: scale(0.649947, 1); transform-origin: 0% 0% 0px;" dir="ltr">repeatedly reached the same conclusion.</div>
<div style="font-size: 16px; font-family: serif; left: 646.08px; top: 426.4px; transform: scale(0.592996, 1); transform-origin: 0% 0% 0px;" dir="ltr">See, e.g.</div>
<div style="font-size: 16px; font-family: serif; left: 699.44px; top: 426.4px; transform: scale(0.4, 1); transform-origin: 0% 0% 0px;" dir="ltr">,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 444.8px; transform: scale(0.659624, 1); transform-origin: 0% 0% 0px;" dir="ltr">The Prize Cases,</div>
<div style="font-size: 16px; font-family: serif; left: 208.08px; top: 444.8px; transform: scale(0.652838, 1); transform-origin: 0% 0% 0px;" dir="ltr">67 U.S. (2 Black) 635, 668-70 (1863). As</div>
<div style="font-size: 16px; font-family: serif; left: 482.24px; top: 444.8px; transform: scale(0.65848, 1); transform-origin: 0% 0% 0px;" dir="ltr">explained in the Department’s paper</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 463.2px; transform: scale(0.638438, 1); transform-origin: 0% 0% 0px;" dir="ltr">of January 19, 2006, the Framers of the Constituti</div>
<div style="font-size: 16px; font-family: serif; left: 415.12px; top: 463.2px; transform: scale(0.609693, 1); transform-origin: 0% 0% 0px;" dir="ltr">on intended to place this authority in the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 481.68px; transform: scale(0.581735, 1); transform-origin: 0% 0% 0px;" dir="ltr">President.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 518.72px; transform: scale(0.586269, 1); transform-origin: 0% 0% 0px;" dir="ltr">Our legal analysis, however, doe</div>
<div style="font-size: 16px; font-family: serif; left: 353.76px; top: 518.72px; transform: scale(0.604337, 1); transform-origin: 0% 0% 0px;" dir="ltr">s not require that we assert</div>
<div style="font-size: 16px; font-family: serif; left: 528.8px; top: 518.72px; transform: scale(0.614347, 1); transform-origin: 0% 0% 0px;" dir="ltr">any Article II authority over</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 537.12px; transform: scale(0.63024, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress’s Article I authority. Ra</div>
<div style="font-size: 16px; font-family: serif; left: 316.4px; top: 537.12px; transform: scale(0.636994, 1); transform-origin: 0% 0% 0px;" dir="ltr">ther, Congress, in passing the Re</div>
<div style="font-size: 16px; font-family: serif; left: 526.56px; top: 537.12px; transform: scale(0.59887, 1); transform-origin: 0% 0% 0px;" dir="ltr">solution, exercised its Article</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 555.52px; transform: scale(0.593747, 1); transform-origin: 0% 0% 0px;" dir="ltr">I authority</div>
<div style="font-size: 16px; font-family: serif; left: 167.12px; top: 555.52px; transform: scale(0.636672, 1); transform-origin: 0% 0% 0px;" dir="ltr">consistent with</div>
<div style="font-size: 16px; font-family: serif; left: 262.64px; top: 555.52px; transform: scale(0.652189, 1); transform-origin: 0% 0% 0px;" dir="ltr">the Executive Branch’s authority</div>
<div style="font-size: 16px; font-family: serif; left: 477.76px; top: 555.52px; transform: scale(0.608941, 1); transform-origin: 0% 0% 0px;" dir="ltr">under Article II</div>
<div style="font-size: 16px; font-family: serif; left: 581.2px; top: 555.52px; transform: scale(0.599726, 1); transform-origin: 0% 0% 0px;" dir="ltr">to authorize</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 573.92px; transform: scale(0.614682, 1); transform-origin: 0% 0% 0px;" dir="ltr">electronic surveillance as an inci</div>
<div style="font-size: 16px; font-family: serif; left: 304.88px; top: 573.92px; transform: scale(0.617765, 1); transform-origin: 0% 0% 0px;" dir="ltr">dent of using military force to</div>
<div style="font-size: 16px; font-family: serif; left: 496.24px; top: 573.92px; transform: scale(0.635015, 1); transform-origin: 0% 0% 0px;" dir="ltr">protect the Nation in an armed</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 592.32px; transform: scale(0.620285, 1); transform-origin: 0% 0% 0px;" dir="ltr">conflict. As explained in more detail in</div>
<div style="font-size: 16px; font-family: serif; left: 350.24px; top: 592.32px; transform: scale(0.646968, 1); transform-origin: 0% 0% 0px;" dir="ltr">the Department’s paper of January 19, 2006, the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 610.72px; transform: scale(0.629537, 1); transform-origin: 0% 0% 0px;" dir="ltr">Resolution thus places the President’s authority to</div>
<div style="font-size: 16px; font-family: serif; left: 416.8px; top: 610.72px; transform: scale(0.60657, 1); transform-origin: 0% 0% 0px;" dir="ltr">use military force and the traditional incidents</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 629.04px; transform: scale(0.628088, 1); transform-origin: 0% 0% 0px;" dir="ltr">of the use of such force agains</div>
<div style="font-size: 16px; font-family: serif; left: 290.64px; top: 629.04px; transform: scale(0.676364, 1); transform-origin: 0% 0% 0px;" dir="ltr">t al Qaeda at its maximum because</div>
<div style="font-size: 16px; font-family: serif; left: 513.6px; top: 629.04px; transform: scale(0.609755, 1); transform-origin: 0% 0% 0px;" dir="ltr">he is acting with the express</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 647.44px; transform: scale(0.651095, 1); transform-origin: 0% 0% 0px;" dir="ltr">authorization of Congress. U</div>
<div style="font-size: 16px; font-family: serif; left: 284.8px; top: 647.44px; transform: scale(0.65537, 1); transform-origin: 0% 0% 0px;" dir="ltr">nder the three-part framework of</div>
<div style="font-size: 16px; font-family: serif; left: 494.4px; top: 647.44px; transform: scale(0.637707, 1); transform-origin: 0% 0% 0px;" dir="ltr">Justice Jackson’s concurring</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 665.84px; transform: scale(0.63152, 1); transform-origin: 0% 0% 0px;" dir="ltr">opinion in</div>
<div style="font-size: 16px; font-family: serif; left: 165.44px; top: 665.84px; transform: scale(0.708757, 1); transform-origin: 0% 0% 0px;" dir="ltr">Youngstown Sheet & Tube Co. v. Sawyer</div>
<div style="font-size: 16px; font-family: serif; left: 427.6px; top: 665.84px; transform: scale(0.633273, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 343 U.S. 579, 635-38 (1952) (Jackson, J.,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 684.24px; transform: scale(0.618648, 1); transform-origin: 0% 0% 0px;" dir="ltr">concurring), the President’s authority falls within</div>
<div style="font-size: 16px; font-family: serif; left: 411.44px; top: 684.24px; transform: scale(0.619494, 1); transform-origin: 0% 0% 0px;" dir="ltr">Category I. He is acting “pursuant to an</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 702.64px; transform: scale(0.640229, 1); transform-origin: 0% 0% 0px;" dir="ltr">express or implied authorization of</div>
<div style="font-size: 16px; font-family: serif; left: 320px; top: 702.64px; transform: scale(0.645967, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress,” and the President’s au</div>
<div style="font-size: 16px; font-family: serif; left: 539.44px; top: 702.64px; transform: scale(0.594507, 1); transform-origin: 0% 0% 0px;" dir="ltr">thority “includes all that he</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 721.04px; transform: scale(0.6354, 1); transform-origin: 0% 0% 0px;" dir="ltr">possesses in his own right [under th</div>
<div style="font-size: 16px; font-family: serif; left: 324.48px; top: 721.04px; transform: scale(0.628427, 1); transform-origin: 0% 0% 0px;" dir="ltr">e Constitution] plus all that Congress can” confer on him.</div>
<div style="font-size: 16px; font-family: serif; left: 701.12px; top: 721.04px; transform: scale(0.5792, 1); transform-origin: 0% 0% 0px;" dir="ltr">Id.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 739.52px; transform: scale(0.59504, 1); transform-origin: 0% 0% 0px;" dir="ltr">at 635.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 776.56px; transform: scale(0.539009, 1); transform-origin: 0% 0% 0px;" dir="ltr">In any event, it is not at all clear that our</div>
<div style="font-size: 16px; font-family: serif; left: 402.96px; top: 776.56px; transform: scale(0.640249, 1); transform-origin: 0% 0% 0px;" dir="ltr">conclusions would be contrary to the policy</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 794.96px; transform: scale(0.64314, 1); transform-origin: 0% 0% 0px;" dir="ltr">choices made by Congress in 1978. First, as</div>
<div style="font-size: 16px; font-family: serif; left: 385.36px; top: 794.96px; transform: scale(0.65811, 1); transform-origin: 0% 0% 0px;" dir="ltr">already explained, FISA contemplates that</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 813.36px; transform: scale(0.630385, 1); transform-origin: 0% 0% 0px;" dir="ltr">subsequent legislation, such as the Resoluti</div>
<div style="font-size: 16px; font-family: serif; left: 373.28px; top: 813.36px; transform: scale(0.629102, 1); transform-origin: 0% 0% 0px;" dir="ltr">on, can authorize electroni</div>
<div style="font-size: 16px; font-family: serif; left: 542.96px; top: 813.36px; transform: scale(0.620494, 1); transform-origin: 0% 0% 0px;" dir="ltr">c surveillance outside</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 831.76px; transform: scale(0.647781, 1); transform-origin: 0% 0% 0px;" dir="ltr">FISA procedures. Second, it is notable that FISA</div>
<div style="font-size: 16px; font-family: serif; left: 413.28px; top: 831.76px; transform: scale(0.620904, 1); transform-origin: 0% 0% 0px;" dir="ltr">defines “electronic su</div>
<div style="font-size: 16px; font-family: serif; left: 555.92px; top: 831.76px; transform: scale(0.624172, 1); transform-origin: 0% 0% 0px;" dir="ltr">rveillance” carefully and</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 850.16px; transform: scale(0.652527, 1); transform-origin: 0% 0% 0px;" dir="ltr">precisely. 50 U.S.C. § 1801(f) (2000 & S</div>
<div style="font-size: 16px; font-family: serif; left: 363.52px; top: 850.16px; transform: scale(0.650071, 1); transform-origin: 0% 0% 0px;" dir="ltr">upp. 2002). And, as confirmed by another provision,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 868.56px; transform: scale(0.641945, 1); transform-origin: 0% 0% 0px;" dir="ltr">18 U.S.C. § 2511(2)(f) (Supp. II 2002) (carving out</div>
<div style="font-size: 16px; font-family: serif; left: 429.76px; top: 868.56px; transform: scale(0.643596, 1); transform-origin: 0% 0% 0px;" dir="ltr">from statutory regula</div>
<div style="font-size: 16px; font-family: serif; left: 564.8px; top: 868.56px; transform: scale(0.60016, 1); transform-origin: 0% 0% 0px;" dir="ltr">tion the acquisition of</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 886.96px; transform: scale(0.634524, 1); transform-origin: 0% 0% 0px;" dir="ltr">intelligence information from “international</div>
<div style="font-size: 16px; font-family: serif; left: 381.28px; top: 886.96px; transform: scale(0.67216, 1); transform-origin: 0% 0% 0px;" dir="ltr">or foreign communications” and “foreign</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 905.36px; transform: scale(0.587369, 1); transform-origin: 0% 0% 0px;" dir="ltr">intelligence activities . . . involving a foreign elec</div>
<div style="font-size: 16px; font-family: serif; left: 412.8px; top: 905.36px; transform: scale(0.664052, 1); transform-origin: 0% 0% 0px;" dir="ltr">tronic communications system” as long as they</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 923.76px; transform: scale(0.664169, 1); transform-origin: 0% 0% 0px;" dir="ltr">are accomplished “utilizing a mean</div>
<div style="font-size: 16px; font-family: serif; left: 321.68px; top: 923.76px; transform: scale(0.605785, 1); transform-origin: 0% 0% 0px;" dir="ltr">s other than electronic surveill</div>
<div style="font-size: 16px; font-family: serif; left: 515.44px; top: 923.76px; transform: scale(0.660748, 1); transform-origin: 0% 0% 0px;" dir="ltr">ance as defined” by FISA), and</div>
</div>
</div>
<a name="10"></a>
<div id="pageContainer10" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 400px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">10</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 94.7199px; transform: scale(0.637542, 1); transform-origin: 0% 0% 0px;" dir="ltr">by FISA’s legislative history, Congress did</div>
<div style="font-size: 16px; font-family: serif; left: 376.48px; top: 94.7199px; transform: scale(0.6816, 1); transform-origin: 0% 0% 0px;" dir="ltr">not</div>
<div style="font-size: 16px; font-family: serif; left: 396.96px; top: 94.7199px; transform: scale(0.634464, 1); transform-origin: 0% 0% 0px;" dir="ltr">intend FISA to regulate</div>
<div style="font-size: 16px; font-family: serif; left: 555.52px; top: 94.7199px; transform: scale(0.683729, 1); transform-origin: 0% 0% 0px;" dir="ltr">certain communications</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.12px; transform: scale(0.620134, 1); transform-origin: 0% 0% 0px;" dir="ltr">intelligence activities of the NSA, including cert</div>
<div style="font-size: 16px; font-family: serif; left: 405.76px; top: 113.12px; transform: scale(0.6628, 1); transform-origin: 0% 0% 0px;" dir="ltr">ain communications involving persons in the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.6111, 1); transform-origin: 0% 0% 0px;" dir="ltr">United States.</div>
<div style="font-size: 16px; font-family: serif; left: 193.76px; top: 131.52px; transform: scale(0.592996, 1); transform-origin: 0% 0% 0px;" dir="ltr">See, e.g.</div>
<div style="font-size: 16px; font-family: serif; left: 247.12px; top: 131.52px; transform: scale(0.627111, 1); transform-origin: 0% 0% 0px;" dir="ltr">, S. Rep. No. 95-604, at 64 (1978).</div>
<div style="font-size: 16px; font-family: serif; left: 472.88px; top: 131.52px; transform: scale(0.666298, 1); transform-origin: 0% 0% 0px;" dir="ltr">Since FISA’s enactment in 1978,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 149.92px; transform: scale(0.686139, 1); transform-origin: 0% 0% 0px;" dir="ltr">however, the means of transmitting communications</div>
<div style="font-size: 16px; font-family: serif; left: 432px; top: 149.92px; transform: scale(0.641984, 1); transform-origin: 0% 0% 0px;" dir="ltr">has undergone extensive transformation. In</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 168.32px; transform: scale(0.664093, 1); transform-origin: 0% 0% 0px;" dir="ltr">particular, many communications that would have been carried by wire are now transmitted</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 186.72px; transform: scale(0.666991, 1); transform-origin: 0% 0% 0px;" dir="ltr">through the air, and many communications that</div>
<div style="font-size: 16px; font-family: serif; left: 402.64px; top: 186.72px; transform: scale(0.649046, 1); transform-origin: 0% 0% 0px;" dir="ltr">would have been carried by radio signals</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 205.12px; transform: scale(0.611809, 1); transform-origin: 0% 0% 0px;" dir="ltr">(including by satellite transmissions) are now transmitted by fiber optic cables. It is such</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 223.52px; transform: scale(0.672086, 1); transform-origin: 0% 0% 0px;" dir="ltr">technological advancements that have broa</div>
<div style="font-size: 16px; font-family: serif; left: 371.52px; top: 223.52px; transform: scale(0.676334, 1); transform-origin: 0% 0% 0px;" dir="ltr">dened FISA’s reach, not</div>
<div style="font-size: 16px; font-family: serif; left: 527.04px; top: 223.52px; transform: scale(0.61488, 1); transform-origin: 0% 0% 0px;" dir="ltr">any particularized</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 241.92px; transform: scale(0.671958, 1); transform-origin: 0% 0% 0px;" dir="ltr">congressional judgment that the NS</div>
<div style="font-size: 16px; font-family: serif; left: 324.4px; top: 241.92px; transform: scale(0.58642, 1); transform-origin: 0% 0% 0px;" dir="ltr">A’s traditional activities in in</div>
<div style="font-size: 16px; font-family: serif; left: 511.92px; top: 241.92px; transform: scale(0.6208, 1); transform-origin: 0% 0% 0px;" dir="ltr">tercepting such international</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 260.32px; transform: scale(0.678508, 1); transform-origin: 0% 0% 0px;" dir="ltr">communications should be subject to FISA’s</div>
<div style="font-size: 16px; font-family: serif; left: 387.6px; top: 260.32px; transform: scale(0.626419, 1); transform-origin: 0% 0% 0px;" dir="ltr">procedures. A full explanation of these</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 278.8px; transform: scale(0.657012, 1); transform-origin: 0% 0% 0px;" dir="ltr">technological changes would require a di</div>
<div style="font-size: 16px; font-family: serif; left: 358.64px; top: 278.8px; transform: scale(0.609444, 1); transform-origin: 0% 0% 0px;" dir="ltr">scussion of classified information.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 315.76px; transform: scale(0.584452, 1); transform-origin: 0% 0% 0px;" dir="ltr">Given the President’s constitutional authority</div>
<div style="font-size: 16px; font-family: serif; left: 434.72px; top: 315.76px; transform: scale(0.63213, 1); transform-origin: 0% 0% 0px;" dir="ltr">to protect the Nation from armed attack,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 334.16px; transform: scale(0.66496, 1); transform-origin: 0% 0% 0px;" dir="ltr">whether and to what extent FISA may interfere</div>
<div style="font-size: 16px; font-family: serif; left: 401.76px; top: 334.16px; transform: scale(0.596089, 1); transform-origin: 0% 0% 0px;" dir="ltr">with that authority is a difficult and serious</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 352.56px; transform: scale(0.629259, 1); transform-origin: 0% 0% 0px;" dir="ltr">constitutional question. The S</div>
<div style="font-size: 16px; font-family: serif; left: 291.04px; top: 352.56px; transform: scale(0.684427, 1); transform-origin: 0% 0% 0px;" dir="ltr">upreme Court, however, has rep</div>
<div style="font-size: 16px; font-family: serif; left: 496.32px; top: 352.56px; transform: scale(0.641303, 1); transform-origin: 0% 0% 0px;" dir="ltr">eatedly counseled that such</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 370.96px; transform: scale(0.65312, 1); transform-origin: 0% 0% 0px;" dir="ltr">questions must be avoided “where an alternative in</div>
<div style="font-size: 16px; font-family: serif; left: 422.56px; top: 370.96px; transform: scale(0.58736, 1); transform-origin: 0% 0% 0px;" dir="ltr">terpretation of the statute</div>
<div style="font-size: 16px; font-family: serif; left: 586.88px; top: 370.96px; transform: scale(0.564733, 1); transform-origin: 0% 0% 0px;" dir="ltr">is ‘fairly possible.’”</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 389.36px; transform: scale(0.59704, 1); transform-origin: 0% 0% 0px;" dir="ltr">INS v. St. Cyr,</div>
<div style="font-size: 16px; font-family: serif; left: 191.52px; top: 389.36px; transform: scale(0.645533, 1); transform-origin: 0% 0% 0px;" dir="ltr">533 U.S. 289, 299-300 (2001) (citations omitted);</div>
<div style="font-size: 16px; font-family: serif; left: 514.24px; top: 389.36px; transform: scale(0.725547, 1); transform-origin: 0% 0% 0px;" dir="ltr">Ashwander v.</div>
<div style="font-size: 16px; font-family: serif; left: 605.28px; top: 389.36px; transform: scale(0.72784, 1); transform-origin: 0% 0% 0px;" dir="ltr">TVA,</div>
<div style="font-size: 16px; font-family: serif; left: 641.68px; top: 389.36px; transform: scale(0.671004, 1); transform-origin: 0% 0% 0px;" dir="ltr">297 U.S.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 407.76px; transform: scale(0.647713, 1); transform-origin: 0% 0% 0px;" dir="ltr">288, 345-48 (1936) (Brandeis, J., concurring). Becau</div>
<div style="font-size: 16px; font-family: serif; left: 439.12px; top: 407.76px; transform: scale(0.637025, 1); transform-origin: 0% 0% 0px;" dir="ltr">se FISA can be interpreted, together with</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 426.16px; transform: scale(0.625882, 1); transform-origin: 0% 0% 0px;" dir="ltr">the Resolution, to allow the President to authoriz</div>
<div style="font-size: 16px; font-family: serif; left: 408.8px; top: 426.16px; transform: scale(0.634091, 1); transform-origin: 0% 0% 0px;" dir="ltr">e this necessary early warning system in the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 444.56px; transform: scale(0.666279, 1); transform-origin: 0% 0% 0px;" dir="ltr">congressionally authorized armed</div>
<div style="font-size: 16px; font-family: serif; left: 315.84px; top: 444.56px; transform: scale(0.638047, 1); transform-origin: 0% 0% 0px;" dir="ltr">conflict with al Qaeda, and b</div>
<div style="font-size: 16px; font-family: serif; left: 500.64px; top: 444.56px; transform: scale(0.676843, 1); transform-origin: 0% 0% 0px;" dir="ltr">ecause much of FISA’s current</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 462.96px; transform: scale(0.616131, 1); transform-origin: 0% 0% 0px;" dir="ltr">reach is a result of technologica</div>
<div style="font-size: 16px; font-family: serif; left: 299.04px; top: 462.96px; transform: scale(0.648729, 1); transform-origin: 0% 0% 0px;" dir="ltr">l changes rather than congressiona</div>
<div style="font-size: 16px; font-family: serif; left: 519.44px; top: 462.96px; transform: scale(0.620971, 1); transform-origin: 0% 0% 0px;" dir="ltr">l intent, we need not address</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 481.44px; transform: scale(0.601547, 1); transform-origin: 0% 0% 0px;" dir="ltr">this constitutional question.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 518.56px; transform: scale(0.6672, 1); transform-origin: 0% 0% 0px;" dir="ltr">(13)</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 518.56px; transform: scale(0.705514, 1); transform-origin: 0% 0% 0px;" dir="ltr">What case law does the Executive rely upo</div>
<div style="font-size: 16px; font-family: serif; left: 419.52px; top: 518.56px; transform: scale(0.662633, 1); transform-origin: 0% 0% 0px;" dir="ltr">n in asserting Article II powers to conduct</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 537.04px; transform: scale(0.642295, 1); transform-origin: 0% 0% 0px;" dir="ltr">the electronic surveillance at issue?</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 573.92px; transform: scale(0.605401, 1); transform-origin: 0% 0% 0px;" dir="ltr">The case law is set forth in</div>
<div style="font-size: 16px; font-family: serif; left: 319.52px; top: 573.92px; transform: scale(0.640579, 1); transform-origin: 0% 0% 0px;" dir="ltr">detail in the Department’s pa</div>
<div style="font-size: 16px; font-family: serif; left: 505.12px; top: 573.92px; transform: scale(0.643468, 1); transform-origin: 0% 0% 0px;" dir="ltr">per of January 19, 2006. With</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 592.32px; transform: scale(0.628536, 1); transform-origin: 0% 0% 0px;" dir="ltr">respect to the Presiden</div>
<div style="font-size: 16px; font-family: serif; left: 240.4px; top: 592.32px; transform: scale(0.595137, 1); transform-origin: 0% 0% 0px;" dir="ltr">t’s constitutional authority to c</div>
<div style="font-size: 16px; font-family: serif; left: 436.8px; top: 592.32px; transform: scale(0.63384, 1); transform-origin: 0% 0% 0px;" dir="ltr">onduct warrantless foreign intelligence</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 610.72px; transform: scale(0.629231, 1); transform-origin: 0% 0% 0px;" dir="ltr">surveillance, we rely on cases such as</div>
<div style="font-size: 16px; font-family: serif; left: 341.2px; top: 610.72px; transform: scale(0.638324, 1); transform-origin: 0% 0% 0px;" dir="ltr">In re Sealed Case,</div>
<div style="font-size: 16px; font-family: serif; left: 462.48px; top: 610.72px; transform: scale(0.632492, 1); transform-origin: 0% 0% 0px;" dir="ltr">310 F.3d 717 (Foreign Intel. Surv. Ct.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 629.04px; transform: scale(0.650509, 1); transform-origin: 0% 0% 0px;" dir="ltr">of Rev. 2002), and</div>
<div style="font-size: 16px; font-family: serif; left: 219.6px; top: 629.04px; transform: scale(0.63066, 1); transform-origin: 0% 0% 0px;" dir="ltr">United States v.</div>
<div style="font-size: 16px; font-family: serif; left: 324.4px; top: 629.04px; transform: scale(0.725796, 1); transform-origin: 0% 0% 0px;" dir="ltr">Truong Dinh Hung,</div>
<div style="font-size: 16px; font-family: serif; left: 455.04px; top: 629.04px; transform: scale(0.633863, 1); transform-origin: 0% 0% 0px;" dir="ltr">629 F.2d 908 (4th Cir. 1980).</div>
<div style="font-size: 16px; font-family: serif; left: 651.52px; top: 629.04px; transform: scale(0.57888, 1); transform-origin: 0% 0% 0px;" dir="ltr">In re</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 647.44px; transform: scale(0.715695, 1); transform-origin: 0% 0% 0px;" dir="ltr">Sealed Case</div>
<div style="font-size: 16px; font-family: serif; left: 174.64px; top: 647.44px; transform: scale(0.58816, 1); transform-origin: 0% 0% 0px;" dir="ltr">notes that “all the other c</div>
<div style="font-size: 16px; font-family: serif; left: 339.04px; top: 647.44px; transform: scale(0.619067, 1); transform-origin: 0% 0% 0px;" dir="ltr">ourts to have decided the issue [have] held that the</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 665.84px; transform: scale(0.626338, 1); transform-origin: 0% 0% 0px;" dir="ltr">President did have inherent authority to</div>
<div style="font-size: 16px; font-family: serif; left: 352.8px; top: 665.84px; transform: scale(0.664295, 1); transform-origin: 0% 0% 0px;" dir="ltr">conduct warrantless search</div>
<div style="font-size: 16px; font-family: serif; left: 525.2px; top: 665.84px; transform: scale(0.609288, 1); transform-origin: 0% 0% 0px;" dir="ltr">es to obtain foreign</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 684.24px; transform: scale(0.63571, 1); transform-origin: 0% 0% 0px;" dir="ltr">intelligence information.” 310 F.3d at 742. The cour</div>
<div style="font-size: 16px; font-family: serif; left: 439.04px; top: 684.24px; transform: scale(0.609043, 1); transform-origin: 0% 0% 0px;" dir="ltr">t then “t[ook] for granted that the President</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 702.64px; transform: scale(0.640451, 1); transform-origin: 0% 0% 0px;" dir="ltr">does have that authority” and explained that</div>
<div style="font-size: 16px; font-family: serif; left: 377.76px; top: 702.64px; transform: scale(0.654222, 1); transform-origin: 0% 0% 0px;" dir="ltr">“FISA could not encroach on the President’s</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 721.12px; transform: scale(0.626187, 1); transform-origin: 0% 0% 0px;" dir="ltr">constitutional power.”</div>
<div style="font-size: 16px; font-family: serif; left: 246.16px; top: 721.12px; transform: scale(0.6616, 1); transform-origin: 0% 0% 0px;" dir="ltr">Id</div>
<div style="font-size: 16px; font-family: serif; left: 259.44px; top: 721.12px; transform: scale(0.4, 1); transform-origin: 0% 0% 0px;" dir="ltr">.</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 758.16px; transform: scale(0.670542, 1); transform-origin: 0% 0% 0px;" dir="ltr">We also rely on the Supreme Court’s</div>
<div style="font-size: 16px; font-family: serif; left: 385.28px; top: 758.16px; transform: scale(0.614111, 1); transform-origin: 0% 0% 0px;" dir="ltr">interpretation of the Resolution in</div>
<div style="font-size: 16px; font-family: serif; left: 606.08px; top: 758.16px; transform: scale(0.696498, 1); transform-origin: 0% 0% 0px;" dir="ltr">Hamdi v.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 776.56px; transform: scale(0.74552, 1); transform-origin: 0% 0% 0px;" dir="ltr">Rumsfeld</div>
<div style="font-size: 16px; font-family: serif; left: 155.6px; top: 776.56px; transform: scale(0.658138, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 542 U.S. 507 (2004), which confirms that C</div>
<div style="font-size: 16px; font-family: serif; left: 445.28px; top: 776.56px; transform: scale(0.631799, 1); transform-origin: 0% 0% 0px;" dir="ltr">ongress in the Resolution gave its express</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 794.96px; transform: scale(0.624388, 1); transform-origin: 0% 0% 0px;" dir="ltr">approval to the military conflict against al Qaeda a</div>
<div style="font-size: 16px; font-family: serif; left: 420.32px; top: 794.96px; transform: scale(0.605303, 1); transform-origin: 0% 0% 0px;" dir="ltr">nd its allies and thereby to the President’s use</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 813.36px; transform: scale(0.635327, 1); transform-origin: 0% 0% 0px;" dir="ltr">of all fundamental and accepted incidents of the</div>
<div style="font-size: 16px; font-family: serif; left: 407.04px; top: 813.36px; transform: scale(0.611707, 1); transform-origin: 0% 0% 0px;" dir="ltr">use of military force in</div>
<div style="font-size: 16px; font-family: serif; left: 553.76px; top: 813.36px; transform: scale(0.588243, 1); transform-origin: 0% 0% 0px;" dir="ltr">this current military</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 831.76px; transform: scale(0.622229, 1); transform-origin: 0% 0% 0px;" dir="ltr">conflict. Because the use of</div>
<div style="font-size: 16px; font-family: serif; left: 276.32px; top: 831.76px; transform: scale(0.637492, 1); transform-origin: 0% 0% 0px;" dir="ltr">warrantless electronic surveillance aimed at the enemy’s</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 850.16px; transform: scale(0.6569, 1); transform-origin: 0% 0% 0px;" dir="ltr">communications is, as explained in the pape</div>
<div style="font-size: 16px; font-family: serif; left: 378.24px; top: 850.16px; transform: scale(0.606051, 1); transform-origin: 0% 0% 0px;" dir="ltr">r of January 19th, a f</div>
<div style="font-size: 16px; font-family: serif; left: 511.44px; top: 850.16px; transform: scale(0.69078, 1); transform-origin: 0% 0% 0px;" dir="ltr">undamental and accepted</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 868.56px; transform: scale(0.606021, 1); transform-origin: 0% 0% 0px;" dir="ltr">incident of the use of militar</div>
<div style="font-size: 16px; font-family: serif; left: 277.76px; top: 868.56px; transform: scale(0.62684, 1); transform-origin: 0% 0% 0px;" dir="ltr">y force, under the reasoning of</div>
<div style="font-size: 16px; font-family: serif; left: 478.08px; top: 868.56px; transform: scale(0.86928, 1); transform-origin: 0% 0% 0px;" dir="ltr">Hamdi</div>
<div style="font-size: 16px; font-family: serif; left: 521.6px; top: 868.56px; transform: scale(0.622869, 1); transform-origin: 0% 0% 0px;" dir="ltr">, the Resolution “clearly and</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 887.04px; transform: scale(0.649801, 1); transform-origin: 0% 0% 0px;" dir="ltr">unmistakably authorize[s]” the</div>
<div style="font-size: 16px; font-family: serif; left: 297.36px; top: 887.04px; transform: scale(0.58652, 1); transform-origin: 0% 0% 0px;" dir="ltr">terrorist survei</div>
<div style="font-size: 16px; font-family: serif; left: 391.12px; top: 887.04px; transform: scale(0.637901, 1); transform-origin: 0% 0% 0px;" dir="ltr">llance program.</div>
<div style="font-size: 16px; font-family: serif; left: 499.52px; top: 887.04px; transform: scale(0.6696, 1); transform-origin: 0% 0% 0px;" dir="ltr">Id</div>
<div style="font-size: 16px; font-family: serif; left: 512.88px; top: 887.04px; transform: scale(0.574201, 1); transform-origin: 0% 0% 0px;" dir="ltr">. at 519 (plurality opinion).</div>
</div>
</div>
<a name="11"></a>
<div id="pageContainer11" class="page" style="width: 816px; height: 1056px;">
<div class="textLayer" style="width: 816px; height: 1056px;">
<div style="font-size: 16px; font-family: serif; left: 400px; top: 988.4px; transform: scale(0.8, 1); transform-origin: 0% 0% 0px;" dir="ltr">11</div>
<div style="font-size: 16px; font-family: serif; left: 144px; top: 94.7199px; transform: scale(0.625569, 1); transform-origin: 0% 0% 0px;" dir="ltr">More basically, a line of cases</div>
<div style="font-size: 16px; font-family: serif; left: 337.76px; top: 94.7199px; transform: scale(0.628679, 1); transform-origin: 0% 0% 0px;" dir="ltr">strongly supports the Presid</div>
<div style="font-size: 16px; font-family: serif; left: 520px; top: 94.7199px; transform: scale(0.606126, 1); transform-origin: 0% 0% 0px;" dir="ltr">ent’s inherent authority to</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 113.12px; transform: scale(0.6188, 1); transform-origin: 0% 0% 0px;" dir="ltr">protect the Nation,</div>
<div style="font-size: 16px; font-family: serif; left: 219.6px; top: 113.12px; transform: scale(0.573742, 1); transform-origin: 0% 0% 0px;" dir="ltr">see, e.g.</div>
<div style="font-size: 16px; font-family: serif; left: 271.12px; top: 113.12px; transform: scale(0.4, 1); transform-origin: 0% 0% 0px;" dir="ltr">,</div>
<div style="font-size: 16px; font-family: serif; left: 279.12px; top: 113.12px; transform: scale(0.659144, 1); transform-origin: 0% 0% 0px;" dir="ltr">The Prize Cases,</div>
<div style="font-size: 16px; font-family: serif; left: 391.12px; top: 113.12px; transform: scale(0.668591, 1); transform-origin: 0% 0% 0px;" dir="ltr">67 U.S. (2 Black) 635, 668 (1863), and Americans</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 131.52px; transform: scale(0.64516, 1); transform-origin: 0% 0% 0px;" dir="ltr">abroad,</div>
<div style="font-size: 16px; font-family: serif; left: 147.6px; top: 131.52px; transform: scale(0.678667, 1); transform-origin: 0% 0% 0px;" dir="ltr">see</div>
<div style="font-size: 16px; font-family: serif; left: 171.92px; top: 131.52px; transform: scale(0.653112, 1); transform-origin: 0% 0% 0px;" dir="ltr">Durand v. Hollins,</div>
<div style="font-size: 16px; font-family: serif; left: 296px; top: 131.52px; transform: scale(0.680552, 1); transform-origin: 0% 0% 0px;" dir="ltr">8 F. Cas. 111, 112 (C.C.S.D.N.Y</div>
<div style="font-size: 16px; font-family: serif; left: 506.96px; top: 131.52px; transform: scale(0.628612, 1); transform-origin: 0% 0% 0px;" dir="ltr">. 1860) (No. 4186). Other cases,</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 149.92px; transform: scale(0.64496, 1); transform-origin: 0% 0% 0px;" dir="ltr">including</div>
<div style="font-size: 16px; font-family: serif; left: 160.48px; top: 149.92px; transform: scale(0.630463, 1); transform-origin: 0% 0% 0px;" dir="ltr">United States v. Curtis</div>
<div style="font-size: 16px; font-family: serif; left: 305.44px; top: 149.92px; transform: scale(0.662017, 1); transform-origin: 0% 0% 0px;" dir="ltr">s-Wright Export Corp.,</div>
<div style="font-size: 16px; font-family: serif; left: 457.76px; top: 149.92px; transform: scale(0.662231, 1); transform-origin: 0% 0% 0px;" dir="ltr">299 U.S. 304, 319 (1936), make clear</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 168.4px; transform: scale(0.648817, 1); transform-origin: 0% 0% 0px;" dir="ltr">the President’s preeminent ro</div>
<div style="font-size: 16px; font-family: serif; left: 284px; top: 168.4px; transform: scale(0.6412, 1); transform-origin: 0% 0% 0px;" dir="ltr">le in conducting the Nation’</div>
<div style="font-size: 16px; font-family: serif; left: 463.52px; top: 168.4px; transform: scale(0.49856, 1); transform-origin: 0% 0% 0px;" dir="ltr">s foreign affairs.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 205.52px; transform: scale(0.6672, 1); transform-origin: 0% 0% 0px;" dir="ltr">(14)</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 205.52px; transform: scale(0.71792, 1); transform-origin: 0% 0% 0px;" dir="ltr">What academic or expert opinions does th</div>
<div style="font-size: 16px; font-family: serif; left: 417.28px; top: 205.52px; transform: scale(0.655478, 1); transform-origin: 0% 0% 0px;" dir="ltr">e Executive rely upon in asserting Article II</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 224px; transform: scale(0.66556, 1); transform-origin: 0% 0% 0px;" dir="ltr">powers to conduct the electronic surveillance at issue?</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 260.88px; transform: scale(0.5954, 1); transform-origin: 0% 0% 0px;" dir="ltr">As explained above, our analysis does not re</div>
<div style="font-size: 16px; font-family: serif; left: 429.36px; top: 260.88px; transform: scale(0.609371, 1); transform-origin: 0% 0% 0px;" dir="ltr">quire that we assert</div>
<div style="font-size: 16px; font-family: serif; left: 557.28px; top: 260.88px; transform: scale(0.64096, 1); transform-origin: 0% 0% 0px;" dir="ltr">any Article II power over</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 279.28px; transform: scale(0.645474, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congress’s Article I powers. As</div>
<div style="font-size: 16px; font-family: serif; left: 308.88px; top: 279.28px; transform: scale(0.64621, 1); transform-origin: 0% 0% 0px;" dir="ltr">to whether the Presid</div>
<div style="font-size: 16px; font-family: serif; left: 444.4px; top: 279.28px; transform: scale(0.620182, 1); transform-origin: 0% 0% 0px;" dir="ltr">ent has constitutional authority to conduct</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 297.6px; transform: scale(0.618255, 1); transform-origin: 0% 0% 0px;" dir="ltr">foreign intelligence surveillance, we rely</div>
<div style="font-size: 16px; font-family: serif; left: 361.76px; top: 297.6px; transform: scale(0.678778, 1); transform-origin: 0% 0% 0px;" dir="ltr">primarily upon the uniform case law summarized by</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 316px; transform: scale(0.669926, 1); transform-origin: 0% 0% 0px;" dir="ltr">the FISA Court of Review.</div>
<div style="font-size: 16px; font-family: serif; left: 276.8px; top: 316px; transform: scale(0.664061, 1); transform-origin: 0% 0% 0px;" dir="ltr">See In re Sealed Case</div>
<div style="font-size: 16px; font-family: serif; left: 416.32px; top: 316px; transform: scale(0.617773, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 310 F.3d at 742. We do not believe that this</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 334.4px; transform: scale(0.670596, 1); transform-origin: 0% 0% 0px;" dir="ltr">point, which has generally been conceded even</div>
<div style="font-size: 16px; font-family: serif; left: 397.76px; top: 334.4px; transform: scale(0.608021, 1); transform-origin: 0% 0% 0px;" dir="ltr">by those academics criticizing the terrorist</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 352.8px; transform: scale(0.642933, 1); transform-origin: 0% 0% 0px;" dir="ltr">surveillance program, is</div>
<div style="font-size: 16px; font-family: serif; left: 250.16px; top: 352.8px; transform: scale(0.585506, 1); transform-origin: 0% 0% 0px;" dir="ltr">controversial.</div>
<div style="font-size: 16px; font-family: serif; left: 349.68px; top: 352.8px; transform: scale(0.741227, 1); transform-origin: 0% 0% 0px;" dir="ltr">See</div>
<div style="font-size: 16px; font-family: serif; left: 371.92px; top: 352.8px; transform: scale(0.602797, 1); transform-origin: 0% 0% 0px;" dir="ltr">Letter to the Hon. Bill Fris</div>
<div style="font-size: 16px; font-family: serif; left: 546.56px; top: 352.8px; transform: scale(0.629139, 1); transform-origin: 0% 0% 0px;" dir="ltr">t, Majority Leader, U.S.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 371.28px; transform: scale(0.652808, 1); transform-origin: 0% 0% 0px;" dir="ltr">Senate, from Professor Curtis A. Bradley</div>
<div style="font-size: 16px; font-family: serif; left: 363.6px; top: 371.28px; transform: scale(0.53376, 1); transform-origin: 0% 0% 0px;" dir="ltr">et al.</div>
<div style="font-size: 16px; font-family: serif; left: 395.6px; top: 371.28px; transform: scale(0.579709, 1); transform-origin: 0% 0% 0px;" dir="ltr">at 6 (Jan. 9, 2006).</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 408.32px; transform: scale(0.586637, 1); transform-origin: 0% 0% 0px;" dir="ltr">Our analysis of the Resolution is supported</div>
<div style="font-size: 16px; font-family: serif; left: 424.4px; top: 408.32px; transform: scale(0.65176, 1); transform-origin: 0% 0% 0px;" dir="ltr">by several law review ar</div>
<div style="font-size: 16px; font-family: serif; left: 580.72px; top: 408.32px; transform: scale(0.613002, 1); transform-origin: 0% 0% 0px;" dir="ltr">ticles, notably one by</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 426.72px; transform: scale(0.650845, 1); transform-origin: 0% 0% 0px;" dir="ltr">Curtis Bradley and Jack Goldsmith.</div>
<div style="font-size: 16px; font-family: serif; left: 336.8px; top: 426.72px; transform: scale(0.65664, 1); transform-origin: 0% 0% 0px;" dir="ltr">See</div>
<div style="font-size: 16px; font-family: serif; left: 363.04px; top: 426.72px; transform: scale(0.665822, 1); transform-origin: 0% 0% 0px;" dir="ltr">Curtis A. Bradley & Jack L. Goldsmith,</div>
<div style="font-size: 16px; font-family: serif; left: 622.56px; top: 426.72px; transform: scale(0.695634, 1); transform-origin: 0% 0% 0px;" dir="ltr">Congressional</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 445.12px; transform: scale(0.684413, 1); transform-origin: 0% 0% 0px;" dir="ltr">Authorization and the War on Terrorism</div>
<div style="font-size: 16px; font-family: serif; left: 356px; top: 445.12px; transform: scale(0.4, 1); transform-origin: 0% 0% 0px;" dir="ltr">,</div>
<div style="font-size: 16px; font-family: serif; left: 364px; top: 445.12px; transform: scale(0.655013, 1); transform-origin: 0% 0% 0px;" dir="ltr">118 Harv. L. Rev. 2047, 2091 (2005) (explaining that</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 463.52px; transform: scale(0.637898, 1); transform-origin: 0% 0% 0px;" dir="ltr">“Congress intended to authorize the President to ta</div>
<div style="font-size: 16px; font-family: serif; left: 420.88px; top: 463.52px; transform: scale(0.620017, 1); transform-origin: 0% 0% 0px;" dir="ltr">ke at least those actions permitted by the laws</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 481.92px; transform: scale(0.62256, 1); transform-origin: 0% 0% 0px;" dir="ltr">of war”);</div>
<div style="font-size: 16px; font-family: serif; left: 158.24px; top: 481.92px; transform: scale(0.63944, 1); transform-origin: 0% 0% 0px;" dir="ltr">see also</div>
<div style="font-size: 16px; font-family: serif; left: 209.36px; top: 481.92px; transform: scale(0.696107, 1); transform-origin: 0% 0% 0px;" dir="ltr">Michael Stokes Paulsen, Youngstown</div>
<div style="font-size: 16px; font-family: serif; left: 459.92px; top: 481.92px; transform: scale(0.735913, 1); transform-origin: 0% 0% 0px;" dir="ltr">Goes to War</div>
<div style="font-size: 16px; font-family: serif; left: 540.88px; top: 481.92px; transform: scale(0.689376, 1); transform-origin: 0% 0% 0px;" dir="ltr">, 19 Const. Comment. 215</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 500.4px; transform: scale(0.634, 1); transform-origin: 0% 0% 0px;" dir="ltr">(2002).</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 537.36px; transform: scale(0.57293, 1); transform-origin: 0% 0% 0px;" dir="ltr">Most importantly, our analysis is fully s</div>
<div style="font-size: 16px; font-family: serif; left: 399.52px; top: 537.36px; transform: scale(0.656684, 1); transform-origin: 0% 0% 0px;" dir="ltr">upported by those who best know this technical</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 555.76px; transform: scale(0.666856, 1); transform-origin: 0% 0% 0px;" dir="ltr">area of the law and who have acce</div>
<div style="font-size: 16px; font-family: serif; left: 315.84px; top: 555.76px; transform: scale(0.576738, 1); transform-origin: 0% 0% 0px;" dir="ltr">ss to all of the pertinent fact</div>
<div style="font-size: 16px; font-family: serif; left: 494.4px; top: 555.76px; transform: scale(0.663655, 1); transform-origin: 0% 0% 0px;" dir="ltr">s—career attorneys at the NSA</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 574.24px; transform: scale(0.642276, 1); transform-origin: 0% 0% 0px;" dir="ltr">and the Department of Justice.</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 611.36px; transform: scale(0.6672, 1); transform-origin: 0% 0% 0px;" dir="ltr">(15)</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 611.36px; transform: scale(0.709242, 1); transform-origin: 0% 0% 0px;" dir="ltr">When foreign calls (whether between the ca</div>
<div style="font-size: 16px; font-family: serif; left: 427.92px; top: 611.36px; transform: scale(0.659343, 1); transform-origin: 0% 0% 0px;" dir="ltr">ller and the recipient both being on</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 629.76px; transform: scale(0.625951, 1); transform-origin: 0% 0% 0px;" dir="ltr">foreign soil or one of the call</div>
<div style="font-size: 16px; font-family: serif; left: 323.92px; top: 629.76px; transform: scale(0.658452, 1); transform-origin: 0% 0% 0px;" dir="ltr">ers or recipients being on fore</div>
<div style="font-size: 16px; font-family: serif; left: 527.84px; top: 629.76px; transform: scale(0.636069, 1); transform-origin: 0% 0% 0px;" dir="ltr">ign soil and the other in the</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 648.16px; transform: scale(0.715185, 1); transform-origin: 0% 0% 0px;" dir="ltr">U.S.) were routed through switches which w</div>
<div style="font-size: 16px; font-family: serif; left: 430.56px; top: 648.16px; transform: scale(0.653466, 1); transform-origin: 0% 0% 0px;" dir="ltr">ere physically located on U.S. soil, would</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 666.56px; transform: scale(0.637499, 1); transform-origin: 0% 0% 0px;" dir="ltr">that constitute a violation of law or</div>
<div style="font-size: 16px; font-family: serif; left: 372.4px; top: 666.56px; transform: scale(0.703654, 1); transform-origin: 0% 0% 0px;" dir="ltr">regulation restricting NSA from conducting</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 684.96px; transform: scale(0.652176, 1); transform-origin: 0% 0% 0px;" dir="ltr">surveillance inside the United States,</div>
<div style="font-size: 16px; font-family: serif; left: 384.4px; top: 684.96px; transform: scale(0.666099, 1); transform-origin: 0% 0% 0px;" dir="ltr">absent a claim of unconstitutionality on</div>
<div style="font-size: 16px; font-family: serif; left: 130.16px; top: 703.44px; transform: scale(0.698404, 1); transform-origin: 0% 0% 0px;" dir="ltr">encroaching the powers under Article II?</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 740.24px; transform: scale(0.590045, 1); transform-origin: 0% 0% 0px;" dir="ltr">As explained above, none of the intercepts</div>
<div style="font-size: 16px; font-family: serif; left: 420.48px; top: 740.24px; transform: scale(0.599122, 1); transform-origin: 0% 0% 0px;" dir="ltr">at issue constitutes a violation of law or</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 758.64px; transform: scale(0.645134, 1); transform-origin: 0% 0% 0px;" dir="ltr">regulation. I cannot give a more complete an</div>
<div style="font-size: 16px; font-family: serif; left: 386.16px; top: 758.64px; transform: scale(0.643395, 1); transform-origin: 0% 0% 0px;" dir="ltr">swer here, because I ca</div>
<div style="font-size: 16px; font-family: serif; left: 534.08px; top: 758.64px; transform: scale(0.629472, 1); transform-origin: 0% 0% 0px;" dir="ltr">nnot go into operational</div>
<div style="font-size: 16px; font-family: serif; left: 96px; top: 777.12px; transform: scale(0.554027, 1); transform-origin: 0% 0% 0px;" dir="ltr">details.</div>
</div>
</div>
</div>
</div>
</div>
</div>
application/pdf
utf-8
hearing
Washington DC
Washington Post
Specter
Arlen
Hatch
Orrin G.
Grassley
Charley E.
Kyl
Jon
Dewine
Mike
Sessions
Jeff
Graham
Lindsey O.
Cornyn
John
Brownback
Sam
Coburn
Tom
Leahy
Patrick J.
Kennedy
Edward M.
Biden Jr.
Joseph R.
Kohl
Herbert
Feinstein
Dianne
Feingold
Russell D.
Schumer
Charles E.
Durbin
Richard J.
Gonzales
Alberto
warrantless wiretap
U.S. Senate Judiciary Committee Holds a Hearing on Wartime Executive Power and the NSA's Surveillance Authority
Judiciary
Senate
2006-02-06
http://emoglen.law.columbia.edu/CPC/NSAHearingTranscript_02062006_PartI.htm
2013-11-05 20:54:17
attachment
U.S. Senate Judiciary Committee Holds a Hearing on Wartime Executive Power and the National Security Agency's Surveillance Authority
2013-11-05 20:56:21
http://emoglen.law.columbia.edu/CPC/NSAHearingTranscript_02062006_PartII.htm
text/html
windows-1252
attachment
U.S. Senate Judiciary Committee Holds a Hearing on Wartime Executive Power and the National Security Agency's Surveillance Authority
2013-11-05 20:56:26
http://emoglen.law.columbia.edu/CPC/NSAHearingTranscript_02062006_PartIII.htm
text/html
windows-1252
attachment
U.S. Senate Judiciary Committee Holds a Hearing on Wartime Executive Power and the National Security Agency's Surveillance Authority
2013-11-05 20:56:32
http://emoglen.law.columbia.edu/CPC/NSAHearingTranscript_02062006_PartIV.htm
text/html
windows-1252
attachment
U.S. Senate Judiciary Committee Holds a Hearing on Wartime Executive Power and the NSA's Surveillance Authority
2013-11-05 20:54:18
http://emoglen.law.columbia.edu/CPC/NSAHearingTranscript_02062006_PartI.htm
text/html
windows-1252
newspaperArticle
Technology
New York Times
Wayner
Peter
Online Anti-Virus Software is Legal Conundrum for U.S.
1997-01-30
http://www.nytimes.com/library/cyber/week/013097virus.html
2013-11-05 21:14:32
attachment
Online Anti-Virus Software is Legal Conundrum for U.S.
2013-11-05 21:14:33
http://www.nytimes.com/library/cyber/week/013097virus.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Clausing
Jeri
Head of Cyber-Terrorism Panel Says Encryption Rules May Be Needed
1997-11-06
http://www.nytimes.com/library/cyber/week/110697encrypt.html
2013-11-05 21:15:26
attachment
Head of Cyber-Terrorism Panel Says Encryption Rules May Be Needed
2013-11-05 21:15:27
http://www.nytimes.com/library/cyber/week/110697encrypt.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Markoff
John
White House May Tighten Data Exports
1997-11-24
http://www.nytimes.com/library/cyber/week/112497encrypt.html
2013-11-05 21:16:15
attachment
White House May Tighten Data Exports
2013-11-05 21:16:16
http://www.nytimes.com/library/cyber/week/112497encrypt.html
text/html
windows-1252
newspaperArticle
New York Times
Clausing
Jeri
Congress Faces List of Internet Issues
1998-01-28
http://www.nytimes.com/library/cyber/week/012898congress.html
2013-11-05 21:16:49
attachment
Congress Faces List of Internet Issues
2013-11-05 21:16:50
http://www.nytimes.com/library/cyber/week/012898congress.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Clausing
Jeri
New Encryption Legislation Billed as a Compromise
1998-05-13
http://www.nytimes.com/library/tech/98/05/cyber/articles/13encrypt.html
2013-11-05 21:17:17
attachment
New Encryption Legislation Billed as a Compromise
2013-11-05 21:17:18
http://www.nytimes.com/library/tech/98/05/cyber/articles/13encrypt.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Clausing
Jeri
Encryption Debate Heats Up in Washington
1998-06-09
http://www.nytimes.com/library/tech/98/06/cyber/articles/09encrypt.html
2013-11-05 21:17:44
attachment
Encryption Debate Heats Up in Washington
2013-11-05 21:17:45
http://www.nytimes.com/library/tech/98/06/cyber/articles/09encrypt.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Kaplan
Carl S.
Is Software Like a Can Opener or a Recipe?
1998-07-17
http://www.nytimes.com/library/tech/98/07/cyber/cyberlaw/17law.html
2013-11-05 21:18:16
attachment
Is Software Like a Can Opener or a Recipe?
2013-11-05 21:18:17
http://www.nytimes.com/library/tech/98/07/cyber/cyberlaw/17law.html
text/html
windows-1252
webpage
EFF
Bernstein v. US Department of Justice
1993-2008
https://www.eff.org/cases/bernstein-v-us-dept-justice
2013-11-05 21:19:11
attachment
1993-07-22 Dan Bernstein and Charles Ray Transcript
2013-11-05 21:20:18
https://www.eff.org/files/filenode/bernstein/930326_ray.transcript.html
text/html
windows-1252
attachment
1995-10-20 Reporter's transcript of proceedings
2013-11-05 21:21:39
https://www.eff.org/files/filenode/bernstein/951020_hearing.transcript.html
text/html
windows-1252
attachment
Bernstein v. US Department of Justice | Electronic Frontier Foundation
2013-11-05 21:19:12
https://www.eff.org/cases/bernstein-v-us-dept-justice
text/html
utf-8
newspaperArticle
Technology
New York Times
Clausing
Jeri
Lawmakers Renew Encryption Battle
1999-02-26
http://www.nytimes.com/library/tech/99/02/cyber/articles/26encrypt.html
2013-11-05 21:23:18
attachment
Lawmakers Renew Encryption Battle
2013-11-05 21:23:19
http://www.nytimes.com/library/tech/99/02/cyber/articles/26encrypt.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Clausing
Jeri
Senator Ends Opposition to Encryption Software Exports
1999-04-02
http://www.nytimes.com/library/tech/99/04/biztech/articles/02encrypt.html
2013-11-05 21:23:53
attachment
Senator Ends Opposition to Encryption Software Exports
2013-11-05 21:23:54
http://www.nytimes.com/library/tech/99/04/biztech/articles/02encrypt.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Clausing
Jeri
Former Allies May Back Different Encryption Bills
1999-04-06
http://www.nytimes.com/library/tech/99/04/cyber/articles/06capital.html
2013-11-05 21:24:35
attachment
Former Allies May Back Different Encryption Bills
2013-11-05 21:24:36
http://www.nytimes.com/library/tech/99/04/cyber/articles/06capital.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Wayner
Peter
Court Calls Encryption Rules Unconstitutional
1999-05-07
http://www.nytimes.com/library/tech/99/05/cyber/articles/07encrypt.html
2013-11-05 21:25:06
attachment
Court Calls Encryption Rules Unconstitutional
2013-11-05 21:25:07
http://www.nytimes.com/library/tech/99/05/cyber/articles/07encrypt.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Clausing
Jeri
White House Eases Export Controls on Encryption
1999-09-17
http://emoglen.law.columbia.edu/LIS/archive/itar-death/surrender-announced.html
2013-11-05 21:25:41
attachment
White House Eases Export Controls on Encryption
2013-11-05 21:25:42
http://emoglen.law.columbia.edu/LIS/archive/itar-death/surrender-announced.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Markoff
John
_NSAKEY
A Mysterious Component Roils Microsoft
1999-09-04
http://www.nytimes.com/library/tech/99/09/biztech/articles/04soft.html
2013-11-05 21:26:09
attachment
A Mysterious Component Roils Microsoft
2013-11-05 21:26:10
http://www.nytimes.com/library/tech/99/09/biztech/articles/04soft.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Wayner
Peter
_NSAKEY
Why a Small Software Label Raised Eyebrows
1999-09-04
http://www.nytimes.com/library/tech/99/09/cyber/articles/04soft-side.html
2013-11-05 21:37:11
attachment
Why a Small Software Label Raised Eyebrows
2013-11-05 21:37:12
http://www.nytimes.com/library/tech/99/09/cyber/articles/04soft-side.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Robinson
Sara
Internet Code-Cracking Project Shows Need for Stronger Locks
1999-09-06
http://www.nytimes.com/1999/09/06/business/internet-code-cracking-project-shows-need-for-stronger-locks.html
2013-11-05 21:38:14
attachment
Internet Code-Cracking Project Shows Need for Stronger Locks - New York Times
2013-11-05 21:38:15
http://www.nytimes.com/1999/09/06/business/internet-code-cracking-project-shows-need-for-stronger-locks.html
text/html
utf-8
newspaperArticle
Technology
New York Times
Clausing
Jeri
Administration Plans to Loosen Encryption Restrictions
1999-09-14
http://partners.nytimes.com/library/tech/99/09/cyber/capital/14capital.html
2013-11-05 21:38:55
attachment
Administration Plans to Loosen Encryption Restrictions
2013-11-05 21:38:56
http://partners.nytimes.com/library/tech/99/09/cyber/capital/14capital.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Schwartz
John
U.S. Selects a New Encryption Technique
2000-10-03
http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html
2013-11-05 21:40:18
attachment
TECHNOLOGY; U.S. Selects a New Encryption Technique - New York Times
2013-11-05 21:40:19
http://www.nytimes.com/2000/10/03/business/technology-us-selects-a-new-encryption-technique.html
text/html
utf-8
newspaperArticle
Technology
New York Times
Clausing
Jeri
New Fight Over Encryption Rules
1999-09-21
http://emoglen.law.columbia.edu/cyber-archive/after-itars-what.html
2013-11-05 21:41:00
attachment
New Fight Over Encryption Rules
2013-11-05 21:41:01
http://emoglen.law.columbia.edu/cyber-archive/after-itars-what.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Giussani
Bruno
Dutch Law Goes Beyond Enabling Wiretapping To Make It a Requirement
1998-04-14
http://www.nytimes.com/library/tech/98/04/cyber/eurobytes/14euro.html
2013-11-05 21:41:30
attachment
Dutch Law Goes Beyond Enabling Wiretapping To Make It a Requirement
2013-11-05 21:41:31
http://www.nytimes.com/library/tech/98/04/cyber/eurobytes/14euro.html
text/html
windows-1252
newspaperArticle
Reuters
Reuters
Tracking of Swiss mobile phone users starts row
1997-12-28
http://emoglen.law.columbia.edu/LIS/archive/listen-intl/swissphone.html
2013-11-05 21:42:23
attachment
Full Story
2013-11-05 21:42:24
http://emoglen.law.columbia.edu/LIS/archive/listen-intl/swissphone.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Labaton
Stephen
New Rules Expand Ability of Police to Monitor Talk on Cell Phones
1999-08-28
http://partners.nytimes.com/library/tech/99/08/biztech/articles/28phone.html
2013-11-05 21:43:59
attachment
New Rules Expand Ability of Police to Monitor Talk on Cell Phones
2013-11-05 21:44:00
http://partners.nytimes.com/library/tech/99/08/biztech/articles/28phone.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Markoff
John
U.S. Drafting Plan for Computer Monitoring System
1999-07-28
http://www.nytimes.com/library/tech/99/07/biztech/articles/28compute.html
2013-11-05 21:44:55
attachment
U.S. Drafting Plan for Computer Monitoring System
2013-11-05 21:44:56
http://www.nytimes.com/library/tech/99/07/biztech/articles/28compute.html
text/html
windows-1252
newspaperArticle
Technology
New York Times
Weiner
Tim
Author of Computer Surveillance Plan Tries to Ease Fears - New York Times
1999-08-16
http://www.nytimes.com/1999/08/16/us/author-of-computer-surveillance-plan-tries-to-ease-fears.html
2013-11-05 21:51:13
attachment
Author of Computer Surveillance Plan Tries to Ease Fears - New York Times
2013-11-05 21:51:14
http://www.nytimes.com/1999/08/16/us/author-of-computer-surveillance-plan-tries-to-ease-fears.html
text/html
utf-8
magazineArticle
WIRED
McCullagh
Declan
Cell Phone Crypto Penetrated
1999-12-06
http://www.wired.com/politics/law/news/1999/12/32900?currentPage=all
2013-11-05 21:53:21
attachment
Cell Phone Crypto Penetrated
2013-11-05 21:53:22
http://www.wired.com/politics/law/news/1999/12/32900?currentPage=all
text/html
utf-8
blogPost
Bits - New York Times
Hansell
Saul
Phorm’s All-Seeing Parasite Cookie
2008-04-07
http://bits.blogs.nytimes.com/2008/04/07/phorms-all-seeing-parasite-cookie/
2013-11-05 21:54:13
attachment
Phorm’s All-Seeing Parasite Cookie - NYTimes.com
2013-11-05 21:54:14
http://bits.blogs.nytimes.com/2008/04/07/phorms-all-seeing-parasite-cookie/
text/html
utf-8
newspaperArticle
The Local
Sweden
Sweden sets sights on new snoop law
2008-06-11
English
http://www.thelocal.se/20080611/12370
2013-11-05 21:55:17
attachment
Sweden sets sights on new snoop law - The Local
2013-11-05 21:55:18
http://www.thelocal.se/20080611/12370
text/html
utf-8
magazineArticle
New Scientist
Margottini
Laura
Snoop software makes surveillance a cinch
2008-08-23
http://www.newscientist.com/article/dn14591-snoop-software-makes-surveillance-a-cinch.html?full=true#.UnlphVQQDTY
2013-11-05 21:56:27
attachment
Snoop software makes surveillance a cinch - tech - 23 August 2008 - New Scientist
2013-11-05 21:56:28
http://www.newscientist.com/article/dn14591-snoop-software-makes-surveillance-a-cinch.html?full=true#.UnlphVQQDTY
text/html
utf-8
magazineArticle
Ars Technica
Anderson
Nate
“Anonymized” data really isn’t—and here’s why not
2009-09-08
http://arstechnica.com/tech-policy/2009/09/your-secrets-live-online-in-databases-of-ruin/
2013-11-05 21:59:50
attachment
“Anonymized” data really isn’t—and here’s why not | Ars Technica
2013-11-05 21:59:51
http://arstechnica.com/tech-policy/2009/09/your-secrets-live-online-in-databases-of-ruin/
text/html
utf-8
journalArticle
UCLA Law REview
57
2010
Ohm
Paul
Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization by Paul Ohm :: SSRN
1701
2009-08-13
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006
2013-11-05 22:00:47
attachment
Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization by Paul Ohm :: SSRN
2013-11-05 22:00:48
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006
text/html
utf-8
attachment
SSRN-id1450006.pdf
application/pdf
blogPost
Tow Center for Digital Journalism - Columbia Journalism School
Center
Tow
The Effects of Mass Surveillance on Journalism | Tow Center for Digital Journalism
2013-10-10
http://towcenter.org/blog/the-effects-of-mass-surveillance-on-journalism/
2013-11-06 16:47:03
attachment
Effect of mass surveillance on journalism - Letter-Effect-of-mass-surveillance-on-journalism.pdf
2013-11-06 16:48:12
http://towcenter.org/wp-content/uploads/2013/10/Letter-Effect-of-mass-surveillance-on-journalism.pdf
application/pdf
utf-8
attachment
The Effects of Mass Surveillance on Journalism | Tow Center for Digital Journalism
2013-11-06 16:47:04
http://towcenter.org/blog/the-effects-of-mass-surveillance-on-journalism/
text/html
utf-8
newspaperArticle
US
New York Times
Schmitt
Eric
C.I.A. Warning on Snowden in ’09 Said to Slip Through the Cracks
2013-10-10
http://www.nytimes.com/2013/10/11/us/cia-warning-on-snowden-in-09-said-to-slip-through-the-cracks.html?partner=rss&emc=rss&smid=tw-nytimes&pagewanted=all
2013-11-06 16:49:31
attachment
C.I.A. Warning on Snowden in ’09 Said to Slip Through the Cracks - NYTimes.com
2013-11-06 16:49:32
http://www.nytimes.com/2013/10/11/us/cia-warning-on-snowden-in-09-said-to-slip-through-the-cracks.html?partner=rss&emc=rss&smid=tw-nytimes&pagewanted=all
text/html
utf-8
newspaperArticle
US
New York Times
Schmitt
Eric
C.I.A. Disputes Early Suspicions on Snowden
2013-10-11
http://www.nytimes.com/2013/10/12/us/cia-disputes-early-suspicions-on-snowden.html?partner=rss&emc=rss&smid=tw-thecaucus
2013-11-06 16:53:14
attachment
C.I.A. Disputes Early Suspicions on Snowden - NYTimes.com
2013-11-06 16:53:15
http://www.nytimes.com/2013/10/12/us/cia-disputes-early-suspicions-on-snowden.html?partner=rss&emc=rss&smid=tw-thecaucus
text/html
utf-8
webpage
Exhibit A - Procedures Used by the National Security Agency for Targeting Non-United States Persons Reasonably Believed to be Located Outside the United States to Acquire Foreign Intelligence Information Pursuant to Section 702 of the Foreign Intelligence Surveillance Act og 1978, as Amended
2009-07-22
https://www.documentcloud.org/documents/716633-exhibit-a.html#document/
2013-11-06 16:54:54
attachment
Exhibit A
2013-11-06 16:54:55
https://www.documentcloud.org/documents/716633-exhibit-a.html#document/
text/html
utf-8
newspaperArticle
National Security
Washington Post
Miller
Greg
Tate
Julie
Gellman
Barton
Documents reveal NSA’s extensive involvement in targeted killing program
2013-10-16
http://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html
2013-11-06 16:55:46
attachment
Documents reveal NSA’s extensive involvement in targeted killing program - The Washington Post
2013-11-06 16:55:47
http://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html
text/html
utf-8
attachment
Documents reveal NSA’s extensive involvement in targeted killing program - The Washington Post
2013-11-06 16:57:46
http://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story_1.html
text/html
utf-8
attachment
Documents reveal NSA’s extensive involvement in targeted killing program - The Washington Post
2013-11-06 16:58:00
http://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story_2.html
text/html
utf-8
attachment
Documents reveal NSA’s extensive involvement in targeted killing program - The Washington Post
2013-11-06 16:58:08
http://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story_3.html
text/html
utf-8
blogPost
Future Tense - Slate
Gallagher
Ryan
Martin Scheinin: U.S., U.K. surveillance programs violate ICCPR.
2013-10-17
http://www.slate.com/articles/technology/future_tense/2013/10/martin_scheinin_u_s_u_k_surveillance_programs_violate_iccpr.html
2013-11-06 16:58:37
attachment
Martin Scheinin: U.S., U.K. surveillance programs violate ICCPR.
2013-11-06 16:58:38
http://www.slate.com/articles/technology/future_tense/2013/10/martin_scheinin_u_s_u_k_surveillance_programs_violate_iccpr.html
text/html
utf-8
magazineArticle
The Nation
Radack
Jesselyn
My Visit With Edward Snowden
2013-10-17
http://www.thenation.com/article/176717/my-visit-edward-snowden#
2013-11-06 16:59:58
attachment
My Visit With Edward Snowden | The Nation
2013-11-06 16:59:59
http://www.thenation.com/article/176717/my-visit-edward-snowden#
text/html
utf-8
blogPost
CNNMoney
Pagliery
Jose
Online privacy is dead
2013-10-17
http://money.cnn.com/2013/10/17/technology/online-privacy/index.html?iid=HP_LN
2013-11-06 17:02:20
attachment
Online privacy is dead - Oct. 17, 2013
2013-11-06 17:02:21
http://money.cnn.com/2013/10/17/technology/online-privacy/index.html?iid=HP_LN
text/html
utf-8
blogPost
Ars Technica
Goodin
Dan
Contrary to public claims, Apple can read your iMessages | Ars Technica
2013-10-17
http://arstechnica.com/security/2013/10/contrary-to-public-claims-apple-can-read-your-imessages/
2013-11-06 17:03:24
attachment
Contrary to public claims, Apple can read your iMessages | Ars Technica
2013-11-06 17:03:25
http://arstechnica.com/security/2013/10/contrary-to-public-claims-apple-can-read-your-imessages/
text/html
utf-8
webpage
NSA leaks on Canadian surveillance coming, Greenwald says - World - CBC News
http://www.cbc.ca/news/world/nsa-leaks-on-canadian-surveillance-coming-greenwald-says-1.2421405
2013-11-11 17:35:54
attachment
NSA leaks on Canadian surveillance coming, Greenwald says - World - CBC News
2013-11-11 17:35:55
http://www.cbc.ca/news/world/nsa-leaks-on-canadian-surveillance-coming-greenwald-says-1.2421405
text/html
utf-8
webpage
Lessons in a Surveillance Drama Redux - NYTimes.com
http://www.nytimes.com/2013/11/10/public-editor/sullivan-lessons-in-a-surveillance-drama-redux.html?pagewanted=2&smid=tw-share&pagewanted=all
2013-11-11 17:36:35
attachment
Lessons in a Surveillance Drama Redux - NYTimes.com
2013-11-11 17:36:36
http://www.nytimes.com/2013/11/10/public-editor/sullivan-lessons-in-a-surveillance-drama-redux.html?pagewanted=2&smid=tw-share&pagewanted=all
text/html
utf-8
webpage
CNET
Matyszczyk
Chris
Street lights to spy on everything that happens in Vegas? | Technically Incorrect - CNET News
2013-11-09
http://news.cnet.com/8301-17852_3-57611630-71/street-lights-to-spy-on-everything-that-happens-in-vegas/
2013-11-11 17:36:46
attachment
Street lights to spy on everything that happens in Vegas? | Technically Incorrect - CNET News
2013-11-11 17:36:47
http://news.cnet.com/8301-17852_3-57611630-71/street-lights-to-spy-on-everything-that-happens-in-vegas/
text/html
utf-8
webpage
Mark Zuckerberg Buys 4 homes for privacy - Business Insider
http://www.businessinsider.com/mark-zuckerberg-buys-4-homes-for-privacy-2013-10
2013-11-11 17:37:02
attachment
Mark Zuckerberg Buys 4 homes for privacy - Business Insider
2013-11-11 17:37:03
http://www.businessinsider.com/mark-zuckerberg-buys-4-homes-for-privacy-2013-10
text/html
utf-8
webpage
Ars Technica
Farivar
Cyrus
UK spies continue “quantum insert” attack via LinkedIn, Slashdot pages | Ars Technica
2013-11-10
http://arstechnica.com/tech-policy/2013/11/uk-spies-continue-quantum-insert-attack-via-linkedin-slashdot-pages/
2013-11-11 17:37:42
attachment
UK spies continue “quantum insert” attack via LinkedIn, Slashdot pages | Ars Technica
2013-11-11 17:37:43
http://arstechnica.com/tech-policy/2013/11/uk-spies-continue-quantum-insert-attack-via-linkedin-slashdot-pages/
text/html
utf-8
webpage
Guardian faces fresh criticism over Edward Snowden revelations | Media | theguardian.com
http://www.theguardian.com/media/2013/nov/10/guardian-nsa-revelations-edward-snowden?CMP=twt_gu
2013-11-11 17:37:56
attachment
Guardian faces fresh criticism over Edward Snowden revelations | Media | theguardian.com
2013-11-11 17:37:57
http://www.theguardian.com/media/2013/nov/10/guardian-nsa-revelations-edward-snowden?CMP=twt_gu
text/html
utf-8
webpage
GCHQ data snooping has "destroyed trust in British tech" | News | PC Pro
http://www.pcpro.co.uk/news/385285/gchq-data-snooping-has-destroyed-trust-in-british-tech#ixzz2k57W3yld
2013-11-11 17:39:05
attachment
GCHQ data snooping has "destroyed trust in British tech" | News | PC Pro
2013-11-11 17:39:06
http://www.pcpro.co.uk/news/385285/gchq-data-snooping-has-destroyed-trust-in-british-tech#ixzz2k57W3yld
text/html
utf-8
webpage
the stranger
Fikse-Verkerk
Matt
Kiley
Brendan
You Are a Rogue Device by Matt Fikse-Verkerk and Brendan Kiley - Seattle Features - The Stranger, Seattle's Only Newspaper
2013-11-06
http://www.thestranger.com/seattle/you-are-a-rogue-device/Content?oid=18143845
2013-11-11 17:39:50
attachment
You Are a Rogue Device by Matt Fikse-Verkerk and Brendan Kiley - Seattle Features - The Stranger, Seattle's Only Newspaper
2013-11-11 17:39:51
http://www.thestranger.com/seattle/you-are-a-rogue-device/Content?oid=18143845
text/html
utf-8
webpage
Sottek
T. C.
British intelligence reportedly intercepted LinkedIn and Slashdot traffic to plant malware | The Verge
2013-11-10
http://www.theverge.com/2013/11/10/5088048/british-intelligence-gchq-linkedin-slashdot-quantum-insert
2013-11-11 17:40:34
attachment
British intelligence reportedly intercepted LinkedIn and Slashdot traffic to plant malware | The Verge
2013-11-11 17:40:35
http://www.theverge.com/2013/11/10/5088048/british-intelligence-gchq-linkedin-slashdot-quantum-insert
text/html
utf-8
newspaperArticle
US
Wall Street Journal
Gorman
Siobhan
Barrett
Delvin
Valentino-Devries
Jennifer
CIA's Financial Spying Bags Data on Americans
2013-11-14
http://online.wsj.com/news/article_email/SB10001424052702303559504579198370113163530-lMyQjAxMTAzMDEwNTExNDUyWj
2013-11-15 16:49:04
attachment
CIA's Financial Spying Bags Data on Americans - WSJ.com
2013-11-15 16:49:05
http://online.wsj.com/news/article_email/SB10001424052702303559504579198370113163530-lMyQjAxMTAzMDEwNTExNDUyWj
text/html
utf-8
magazineArticle
Wired
Weaver
Nicolas
Our Government Has Weaponized the Internet. Here's How They Did It | Wired Opinion | Wired.com
2013-11-13
http://www.wired.com/opinion/2013/11/this-is-how-the-internet-backbone-has-been-turned-into-a-weapon/
2013-11-15 16:51:12
attachment
Our Government Has Weaponized the Internet. Here's How They Did It | Wired Opinion | Wired.com
2013-11-15 16:51:13
http://www.wired.com/opinion/2013/11/this-is-how-the-internet-backbone-has-been-turned-into-a-weapon/
text/html
utf-8
webpage
Jeremy Hammond's Sentencing Statement
http://www.sparrowmedia.net/2013/11/jeremy-hammond-sentence/
2013-11-15 22:11:25
attachment
Jeremy Hammond's Sentencing Statement
2013-11-15 22:11:26
http://www.sparrowmedia.net/2013/11/jeremy-hammond-sentence/
text/html
utf-8
webpage
NSA surveillance programs face challenges in court
http://www.usatoday.com/story/news/politics/2013/11/16/supreme-federal-court-surveillance-verizon/3581325/
2013-11-16 20:14:11
attachment
NSA surveillance programs face challenges in court
2013-11-16 20:14:12
http://www.usatoday.com/story/news/politics/2013/11/16/supreme-federal-court-surveillance-verizon/3581325/
text/html
utf-8
blogPost
Emptywheel
Wheeler
Marcy
The Era of Big Pen Register: The Flaw in Jeffrey Miller’s Moalin Decision | emptywheel
2013-11-16
http://www.emptywheel.net/2013/11/16/the-era-of-big-pen-register-the-flaw-in-jeffrey-millers-moalin-decision/
2013-11-16 20:15:01
attachment
The Era of Big Pen Register: The Flaw in Jeffrey Miller’s Moalin Decision | emptywheel
2013-11-16 20:15:02
http://www.emptywheel.net/2013/11/16/the-era-of-big-pen-register-the-flaw-in-jeffrey-millers-moalin-decision/
text/html
utf-8
webpage
Justice is reviewing criminal cases that used surveillance evidence gathered under FISA - The Washington Post
http://m.washingtonpost.com/world/national-security/justice-reviewing-criminal-cases-that-used-evidence-gathered-under-fisa-act/2013/11/15/0aea6420-4e0d-11e3-9890-a1e0997fb0c0_story.html
2013-11-16 20:15:11
attachment
Justice is reviewing criminal cases that used surveillance evidence gathered under FISA - The Washington Post
2013-11-16 20:15:12
http://m.washingtonpost.com/world/national-security/justice-reviewing-criminal-cases-that-used-evidence-gathered-under-fisa-act/2013/11/15/0aea6420-4e0d-11e3-9890-a1e0997fb0c0_story.html
text/html
utf-8
webpage
Schofield
Matthew
BERLIN: News report charges U.S. with conducting illegal operations from German soil | Europe | McClatchy DC
2013-11-15
http://www.mcclatchydc.com/2013/11/15/208731/news-report-charges-us-with-conducting.html
2013-11-16 20:15:30
attachment
BERLIN: News report charges U.S. with conducting illegal operations from German soil | Europe | McClatchy DC
2013-11-16 20:15:31
http://www.mcclatchydc.com/2013/11/15/208731/news-report-charges-us-with-conducting.html
text/html
utf-8
webpage
NSA’s Hardware Snooping Highlights Difficulty of Detection or Defense | MIT Technology Review
http://www.technologyreview.com/news/519661/nsas-own-hardware-backdoors-may-still-be-a-problem-from-hell/?utm_campaign=socialsync&utm_medium=social-post&utm_source=twitter
2013-11-16 20:52:34
attachment
NSA’s Hardware Snooping Highlights Difficulty of Detection or Defense | MIT Technology Review
2013-11-16 20:52:35
http://www.technologyreview.com/news/519661/nsas-own-hardware-backdoors-may-still-be-a-problem-from-hell/?utm_campaign=socialsync&utm_medium=social-post&utm_source=twitter
text/html
utf-8
webpage
N.S.A. Plan to Log Calls Is Renewed by Court - NYTimes.com
http://www.nytimes.com/2013/10/19/us/nsa-plan-to-log-calls-is-renewed-by-court.html?_r=2&
2013-11-16 20:52:52
attachment
N.S.A. Plan to Log Calls Is Renewed by Court - NYTimes.com
2013-11-16 20:52:53
http://www.nytimes.com/2013/10/19/us/nsa-plan-to-log-calls-is-renewed-by-court.html?_r=2&
text/html
utf-8
webpage
The Guardian
Editorial Board
The Snowden dossier: balancing acts | Editorial | Comment is free | The Guardian
2013-10-17
http://www.theguardian.com/commentisfree/2013/oct/17/snowden-dossier-surveillance-press-regulation
2013-11-16 20:53:01
attachment
The Snowden dossier: balancing acts | Editorial | Comment is free | The Guardian
2013-11-16 20:53:02
http://www.theguardian.com/commentisfree/2013/oct/17/snowden-dossier-surveillance-press-regulation
text/html
utf-8
webpage
Davis
Jack
Snowden to NYT - 'Zero Percent Chance' Russia or China Got Documents: Daily Whistleblower News - Government Accountability Project
2013-10-18
http://www.whistleblower.org/blog/44-2013/3050-snowden-to-nyt-zero-percent-chance-russia-or-china-got-documents-daily-whistleblower-news
2013-11-16 20:53:27
attachment
Snowden to NYT - 'Zero Percent Chance' Russia or China Got Documents: Daily Whistleblower News - Government Accountability Project
2013-11-16 20:53:28
http://www.whistleblower.org/blog/44-2013/3050-snowden-to-nyt-zero-percent-chance-russia-or-china-got-documents-daily-whistleblower-news
text/html
utf-8
webpage
NSA Hacked Email Account of Mexican President - SPIEGEL ONLINE
http://www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html
2013-11-16 20:53:40
attachment
NSA Hacked Email Account of Mexican President - SPIEGEL ONLINE
2013-11-16 20:53:41
http://www.spiegel.de/international/world/nsa-hacked-email-account-of-mexican-president-a-928817.html
text/html
windows-1252
webpage
PC World
Gross
Grant
Supreme Court shouldn't review NSA spying case, U.S. gov't says | PCWorld
2013-10-15
http://www.pcworld.com/article/2054900/supreme-court-shouldnt-review-nsa-spying-case-us-govt-says.html
2013-11-16 20:54:13
attachment
Supreme Court shouldn't review NSA spying case, U.S. gov't says | PCWorld
2013-11-16 20:54:14
http://www.pcworld.com/article/2054900/supreme-court-shouldnt-review-nsa-spying-case-us-govt-says.html
text/html
utf-8
webpage
France summons US ambassador over 'spying' - ESPIONAGE - FRANCE 24
http://www.france24.com/en/20131021-usa-spy-agency-nsa-recorded-millions-french-phone-calls
2013-11-16 20:54:23
attachment
France summons US ambassador over 'spying' - ESPIONAGE - FRANCE 24
2013-11-16 20:54:24
http://www.france24.com/en/20131021-usa-spy-agency-nsa-recorded-millions-french-phone-calls
text/html
utf-8
webpage
France in the NSA's crosshair : phone networks under surveillance
http://www.lemonde.fr/technologies/article/2013/10/21/france-in-the-nsa-s-crosshair-phone-networks-under-surveillance_3499741_651865.html
2013-11-16 20:54:29
attachment
France in the NSA's crosshair : phone networks under surveillance
2013-11-16 20:54:30
http://www.lemonde.fr/technologies/article/2013/10/21/france-in-the-nsa-s-crosshair-phone-networks-under-surveillance_3499741_651865.html
text/html
utf-8
webpage
European webmail privacy: Even worse than I thought | The Volokh ConspiracyThe Volokh Conspiracy
http://www.volokh.com/2013/10/19/european-e-mail-privacy-even-worse-thought/
2013-11-16 20:54:38
attachment
European webmail privacy: Even worse than I thought | The Volokh ConspiracyThe Volokh Conspiracy
2013-11-16 20:54:39
http://www.volokh.com/2013/10/19/european-e-mail-privacy-even-worse-thought/
text/html
utf-8
webpage
Howell
Kellan
ATF’s prescription for leaking secrets: A firing squad? - Washington Times
2013-10-15
http://www.washingtontimes.com/news/2013/oct/15/atfs-prescription-leaking-secrets-firing-squad/
2013-11-16 20:54:43
attachment
ATF’s prescription for leaking secrets: A firing squad? - Washington Times
2013-11-16 20:54:44
http://www.washingtontimes.com/news/2013/oct/15/atfs-prescription-leaking-secrets-firing-squad/
text/html
utf-8
webpage
Chrisafis
Angelique
Jones
Sam
Snowden leaks: France summons US envoy over NSA surveillance claims | World news | The Guardian
2013-10-21
http://www.theguardian.com/world/2013/oct/21/snowden-leaks-france-us-envoy-nsa-surveillance
2013-11-16 20:54:49
attachment
Snowden leaks: France summons US envoy over NSA surveillance claims | World news | The Guardian
2013-11-16 20:54:50
http://www.theguardian.com/world/2013/oct/21/snowden-leaks-france-us-envoy-nsa-surveillance
text/html
utf-8
webpage
Schneier on Security: The Trajectories of Government and Corporate Surveillance
https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html?utm_source=twitterfeed&utm_medium=twitter
2013-11-16 20:55:04
attachment
Schneier on Security: The Trajectories of Government and Corporate Surveillance
2013-11-16 20:55:05
https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html?utm_source=twitterfeed&utm_medium=twitter
text/html
utf-8
webpage
Sen. Dianne Feinstein: Continue NSA call-records program
http://www.usatoday.com/story/opinion/2013/10/20/nsa-call-records-program-sen-dianne-feinstein-editorials-debates/3112715/
2013-11-16 20:55:11
attachment
Sen. Dianne Feinstein: Continue NSA call-records program
2013-11-16 20:55:12
http://www.usatoday.com/story/opinion/2013/10/20/nsa-call-records-program-sen-dianne-feinstein-editorials-debates/3112715/
text/html
utf-8
webpage
Espionnage de la NSA : tous les documents publiés par "Le Monde"
http://www.lemonde.fr/technologies/article/2013/10/21/espionnage-de-la-nsa-tous-les-documents-publies-par-le-monde_3499986_651865.html
2013-11-16 20:55:32
attachment
Espionnage de la NSA : tous les documents publiés par "Le Monde"
2013-11-16 20:55:33
http://www.lemonde.fr/technologies/article/2013/10/21/espionnage-de-la-nsa-tous-les-documents-publies-par-le-monde_3499986_651865.html
text/html
utf-8
webpage
Feds spending billions to implement face recognition technology that failed to identify Boston Marathon suspects | Privacy SOS
http://www.privacysos.org/node/1213
2013-11-16 20:55:49
attachment
Feds spending billions to implement face recognition technology that failed to identify Boston Marathon suspects | Privacy SOS
2013-11-16 20:55:50
http://www.privacysos.org/node/1213
text/html
utf-8
webpage
Experian Sold Consumer Data to ID Theft Service — Krebs on Security
http://krebsonsecurity.com/2013/10/experian-sold-consumer-data-to-id-theft-service/
2013-11-16 20:55:55
attachment
Experian Sold Consumer Data to ID Theft Service — Krebs on Security
2013-11-16 20:55:56
http://krebsonsecurity.com/2013/10/experian-sold-consumer-data-to-id-theft-service/
text/html
utf-8
webpage
Is Your Country Despotic? A 1940s Guide to Freedom - Paul Rosenfeld - The Atlantic
http://www.theatlantic.com/video/archive/2013/10/is-your-country-despotic-a-1940s-guide-to-freedom/280695/
2013-11-16 20:56:22
attachment
Is Your Country Despotic? A 1940s Guide to Freedom - Paul Rosenfeld - The Atlantic
2013-11-16 20:56:23
http://www.theatlantic.com/video/archive/2013/10/is-your-country-despotic-a-1940s-guide-to-freedom/280695/
text/html
utf-8
webpage
Wheeler
Marcy
After General Alexander, Obama should split the NSA to make us all safer | Marcy Wheeler | Comment is free | theguardian.com
2013-10-31
http://www.theguardian.com/commentisfree/2013/oct/21/general-alexander-obama-split-nsa?CMP=twt_gu
2013-11-16 20:56:32
attachment
After General Alexander, Obama should split the NSA to make us all safer | Marcy Wheeler | Comment is free | theguardian.com
2013-11-16 20:56:33
http://www.theguardian.com/commentisfree/2013/oct/21/general-alexander-obama-split-nsa?CMP=twt_gu
text/html
utf-8
webpage
NSA must prove value of phone program: Our view
http://www.usatoday.com/story/opinion/2013/10/20/nsa-surveillance-privacy-editorials-debates/3115167/
2013-11-16 20:56:43
attachment
NSA must prove value of phone program: Our view
2013-11-16 20:56:44
http://www.usatoday.com/story/opinion/2013/10/20/nsa-surveillance-privacy-editorials-debates/3115167/
text/html
utf-8
webpage
EDITORIAL: Reining in the snoops - Washington Times
http://www.washingtontimes.com/news/2013/oct/20/editorial-reining-in-the-snoops/#ixzz2iNWZ8v5D
2013-11-16 20:57:06
attachment
EDITORIAL: Reining in the snoops - Washington Times
2013-11-16 20:57:07
http://www.washingtontimes.com/news/2013/oct/20/editorial-reining-in-the-snoops/#ixzz2iNWZ8v5D
text/html
utf-8
webpage
Life in the 21st Century State Department | We Meant Well - Peter Van Buren
http://wemeantwell.com/blog/2013/10/19/life-in-the-21st-century-state-department/
2013-11-16 20:57:12
attachment
Life in the 21st Century State Department | We Meant Well - Peter Van Buren
2013-11-16 20:57:13
http://wemeantwell.com/blog/2013/10/19/life-in-the-21st-century-state-department/
text/html
utf-8
webpage
Judge Says Whistleblower Protections Don’t Apply Abroad - Risk & Compliance - WSJ
http://blogs.wsj.com/riskandcompliance/2013/10/21/judge-says-whistleblower-protections-dont-apply-abroad/?mod=wsj_rchome_rcreport
2013-11-16 20:57:19
attachment
Judge Says Whistleblower Protections Don’t Apply Abroad - Risk & Compliance - WSJ
2013-11-16 20:57:20
http://blogs.wsj.com/riskandcompliance/2013/10/21/judge-says-whistleblower-protections-dont-apply-abroad/?mod=wsj_rchome_rcreport
text/html
utf-8
webpage
My name is US Bandwith, king of kings: | emptywheel
http://www.emptywheel.net/2013/10/19/my-name-is-us-bandwith-king-of-kings/
2013-11-16 20:57:37
attachment
My name is US Bandwith, king of kings: | emptywheel
2013-11-16 20:57:38
http://www.emptywheel.net/2013/10/19/my-name-is-us-bandwith-king-of-kings/
text/html
utf-8
webpage
Ensign
Rachel Louise
Another Court Rules in Favor of Internal Whistleblower - Risk & Compliance - WSJ
2013-10-18
http://blogs.wsj.com/riskandcompliance/2013/10/18/another-court-rules-in-favor-of-internal-whistleblower/
2013-11-16 20:58:57
attachment
Another Court Rules in Favor of Internal Whistleblower - Risk & Compliance - WSJ
2013-11-16 20:58:58
http://blogs.wsj.com/riskandcompliance/2013/10/18/another-court-rules-in-favor-of-internal-whistleblower/
text/html
utf-8
webpage
Richard Cohen: Edward Snowden is no traitor - The Washington Post
http://www.washingtonpost.com/opinions/richard-cohen-edward-snowden-is-no-traitor/2013/10/21/f9d2ae5a-3a74-11e3-a94f-b58017bfee6c_story.html
2013-11-16 20:59:27
attachment
Richard Cohen: Edward Snowden is no traitor - The Washington Post
2013-11-16 20:59:28
http://www.washingtonpost.com/opinions/richard-cohen-edward-snowden-is-no-traitor/2013/10/21/f9d2ae5a-3a74-11e3-a94f-b58017bfee6c_story.html
text/html
utf-8
webpage
NSA Busted Conducting Industrial Espionage In France, Mexico, Brazil, China and All Around the World Washington's Blog
http://www.washingtonsblog.com/2013/10/nsa-busted-conducting-industrial-espionage-in-france-mexico-brazil-and-other-countries.html
2013-11-16 20:59:35
attachment
NSA Busted Conducting Industrial Espionage In France, Mexico, Brazil, China and All Around the World Washington's Blog
2013-11-16 20:59:36
http://www.washingtonsblog.com/2013/10/nsa-busted-conducting-industrial-espionage-in-france-mexico-brazil-and-other-countries.html
text/html
utf-8
webpage
NSA Whistleblower Thomas Drake Discusses Meeting Snowden & Most Critical Revelations from Him (So Far) | The Dissenter
http://dissenter.firedoglake.com/2013/10/21/nsa-whistleblower-thomas-drake-discusses-meeting-snowden-most-critical-revelations-from-him-so-far/
2013-11-16 20:59:50
attachment
NSA Whistleblower Thomas Drake Discusses Meeting Snowden & Most Critical Revelations from Him (So Far) | The Dissenter
2013-11-16 20:59:51
http://dissenter.firedoglake.com/2013/10/21/nsa-whistleblower-thomas-drake-discusses-meeting-snowden-most-critical-revelations-from-him-so-far/
text/html
utf-8
webpage
Even Spy-Crazy France Is Surprised By America's Giant Surveillance Net | The Cable
http://thecable.foreignpolicy.com/posts/2013/10/21/even_spy_crazy_france_is_surprised_by_our_surveillance_net
2013-11-16 21:00:02
attachment
Even Spy-Crazy France Is Surprised By America's Giant Surveillance Net | The Cable
2013-11-16 21:00:03
http://thecable.foreignpolicy.com/posts/2013/10/21/even_spy_crazy_france_is_surprised_by_our_surveillance_net
text/html
utf-8
webpage
Google's uProxy: A Peer-to-Peer Gateway to Internet Freedom
http://mashable.com/2013/10/21/google-uproxy-internet-freedom/
2013-11-16 21:00:34
attachment
Google's uProxy: A Peer-to-Peer Gateway to Internet Freedom
2013-11-16 21:00:35
http://mashable.com/2013/10/21/google-uproxy-internet-freedom/
text/html
utf-8
webpage
Peterson
DAle
Call Yourself A Hacker, Lose Your 4th Amendment Rights
2013-10-22
http://www.digitalbond.com/blog/2013/10/22/call-yourself-a-hacker-lose-your-4th-amendment-rights/
2013-11-16 21:00:43
attachment
Call Yourself A Hacker, Lose Your 4th Amendment Rights
2013-11-16 21:00:44
http://www.digitalbond.com/blog/2013/10/22/call-yourself-a-hacker-lose-your-4th-amendment-rights/
text/html
utf-8
webpage
Huffington Post
Lohman
Niels Gerson
Why I Will Never, Ever, Go Back to the United States | Niels Gerson Lohman
2013-10-14
http://www.huffingtonpost.com/niels-gerson-lohman/us-border-crossing_b_4098130.html?utm_hp_ref=tw
2013-11-16 21:02:19
attachment
Why I Will Never, Ever, Go Back to the United States | Niels Gerson Lohman
2013-11-16 21:02:20
http://www.huffingtonpost.com/niels-gerson-lohman/us-border-crossing_b_4098130.html?utm_hp_ref=tw
text/html
utf-8
webpage
NSA: Merkel beschwert sich bei Obama - SPIEGEL ONLINE
http://www.spiegel.de/politik/deutschland/nsa-merkel-beschwert-sich-bei-obama-a-929636.html
2013-11-16 21:02:34
attachment
NSA: Merkel beschwert sich bei Obama - SPIEGEL ONLINE
2013-11-16 21:02:35
http://www.spiegel.de/politik/deutschland/nsa-merkel-beschwert-sich-bei-obama-a-929636.html
text/html
windows-1252
newspaperArticle
Opinion
The New York Times
ISSN 0362-4331
The Editorial Board
Editorials
France
Le Monde
National Security Agency
Obama, Barack
Snowden, Edward J
Surveillance of Citizens by Government
United States International Relations
Wiretapping and Other Eavesdropping Devices and Methods
New Leaks, New Repercussions
The vast scale of eavesdropping abroad by the N.S.A. angers allies and undercuts America's influence.
2013-10-22
http://www.nytimes.com/2013/10/23/opinion/new-leaks-new-repercussions.html
2013-11-16 21:02:55
NYTimes.com
attachment
New York Times Snapshot
2013-11-16 21:02:55
http://www.nytimes.com/2013/10/23/opinion/new-leaks-new-repercussions.html?adxnnl=1&adxnnlx=1384635715-MjfAJmgqlEo2lz3ESbwS0w
text/html
utf-8
webpage
Washington Post
Wilson
Scott
Birnbaum
Michael
Angela Merkel
Germany
NSA
NSA spying
Obama
President Obama
Surveillance
Merkel calls Obama about alleged U.S. monitoring of her phone
The White House said Wednesday that President Obama had assured German Chancellor Angela Merkel that the United States was not listening in on her calls.
2013-10-23
http://www.washingtonpost.com/blogs/post-politics/wp/2013/10/23/obama-assures-merkel-u-s-is-not-eavesdropping-on-her-calls/
2013-11-16 21:03:25
attachment
Snapshot
2013-11-16 21:03:25
http://www.washingtonpost.com/blogs/post-politics/wp/2013/10/23/obama-assures-merkel-u-s-is-not-eavesdropping-on-her-calls/
text/html
utf-8
webpage
Corriere della Sera
English
America Snoops on Italian Emails, Text Messages and Conversations
COPASIR parliamentary defence committee seeks clarification. from junior minister for intelligence services Minniti at hearing tomorrow
2013-10-22
http://www.corriere.it/13_ottobre_22/america-snoops-on-italian-emails-text-messages-and-conversations-93018016-3b0a-11e3-95f2-9a7a296f615f.shtml
2013-11-16 21:03:59
attachment
Snapshot
2013-11-16 21:03:59
http://www.corriere.it/13_ottobre_22/america-snoops-on-italian-emails-text-messages-and-conversations-93018016-3b0a-11e3-95f2-9a7a296f615f.shtml
text/html
windows-1252
webpage
NPR.org
Totenberg
Nina
Government Takes A U-Turn On Warrantless Wiretaps
The Obama administration has discovered that it unintentionally misled the Supreme Court last year.
2013-10-23
http://www.npr.org/2013/10/23/240163063/government-changes-policy-on-warrantless-wiretap-defendants
2013-11-16 21:04:08
attachment
Snapshot
2013-11-16 21:04:08
http://www.npr.org/2013/10/23/240163063/government-changes-policy-on-warrantless-wiretap-defendants
text/html
utf-8
newspaperArticle
U.S. / Politics
The New York Times
ISSN 0362-4331
Savage
Charlie
Espionage and Intelligence Services
Feinstein, Dianne
Foreign Intelligence Surveillance Act (FISA)
Justice Department
Obama, Barack
Supreme Court (US)
Surveillance of Citizens by Government
Verrilli, Donald B Jr
Wiretapping and Other Eavesdropping Devices and Methods
Door May Open for Challenge to Secret Wiretaps
Prosecutors for the first time are telling a defendant that evidence came from eavesdropping, setting up a legal test of the government's sweeping warrantless surveillance program.
2013-10-16
http://www.nytimes.com/2013/10/17/us/politics/us-legal-shift-may-open-door-for-challenge-to-secret-wiretaps.html
2013-11-16 21:04:14
NYTimes.com
attachment
New York Times Snapshot
2013-11-16 21:04:14
http://www.nytimes.com/2013/10/17/us/politics/us-legal-shift-may-open-door-for-challenge-to-secret-wiretaps.html?_r=0
text/html
utf-8
webpage
Henry Farrell and Martha Finnemore | Hypocrisy and U.S. Foreign Policy | Foreign Affairs
http://www.foreignaffairs.com/articles/140155/henry-farrell-and-martha-finnemore/the-end-of-hypocrisy
2013-11-16 21:04:29
attachment
Henry Farrell and Martha Finnemore | Hypocrisy and U.S. Foreign Policy | Foreign Affairs
2013-11-16 21:04:30
http://www.foreignaffairs.com/articles/140155/henry-farrell-and-martha-finnemore/the-end-of-hypocrisy
text/html
utf-8
newspaperArticle
World / Europe
The New York Times
ISSN 0362-4331
Smale
Alison
Der Spiegel
Germany
Merkel, Angela
National Security Agency
Snowden, Edward J
Surveillance of Citizens by Government
United States International Relations
Wiretapping and Other Eavesdropping Devices and Methods
Anger Growing Among Allies on U.S. Spying
Germany became the latest ally to confront the United States over reports that it was the target of N.S.A. surveillance, with its leader angrily calling President Obama
2013-10-23
http://www.nytimes.com/2013/10/24/world/europe/united-states-disputes-reports-of-wiretapping-in-Europe.html
2013-11-16 21:04:35
NYTimes.com
attachment
New York Times Snapshot
2013-11-16 21:04:35
http://www.nytimes.com/2013/10/24/world/europe/united-states-disputes-reports-of-wiretapping-in-Europe.html
text/html
utf-8
webpage
Freedom to Tinker
Arnbak
Axel
When an Ethnographer met Edward Snowden
2013-10-18
https://freedom-to-tinker.com/blog/axel/when-an-ethnographer-met-edward-snowden/
2013-11-16 21:04:57
attachment
When an Ethnographer met Edward Snowden
2013-11-16 21:04:58
https://freedom-to-tinker.com/blog/axel/when-an-ethnographer-met-edward-snowden/
text/html
utf-8
newspaperArticle
Reuters
Rome
O'Leary
Naomi
Angela Merkel
Barack Obama
Edward Snowden
Enrico Letta
Germany
Giacomo Stucchi
Glenn Greenwald
Italy
john kerry
United Kingdom
United States
Italian PM says spying by allies unacceptable
ROME (Reuters) - Alleged monitoring of Italian telecommunications by U.S. and British intelligence is inconceivable and unacceptable, Prime Minister Enrico Letta said on Thursday.He was speaking after
Thu Oct 24 16:35:57 UTC 2013
http://www.reuters.com/article/2013/10/24/us-italy-usa-spying-idUSBRE99N0Q420131024
2013-11-16 21:05:21
Reuters
attachment
Snapshot
2013-11-16 21:05:21
http://www.reuters.com/article/2013/10/24/us-italy-usa-spying-idUSBRE99N0Q420131024?feedType=RSS&feedName=topNews
text/html
utf-8
webpage
The Atlantic
Schneier
Bruce
The Battle for Power on the Internet
Distributed citizen groups and nimble hackers once had the edge. Now governments and corporations are catching up. Who will dominate in the decades ahead?
Oct 24 2013, 7:07 AM ET
http://www.theatlantic.com/technology/archive/2013/10/the-battle-for-power-on-the-internet/280824/
2013-11-16 21:05:41
attachment
The Atlantic Print View
2013-11-16 21:05:50
http://www.theatlantic.com/technology/print/2013/10/the-battle-for-power-on-the-internet/280824/
text/html
utf-8
webpage
Nelson
Steven
Collections: Political
Collections: US
Nelson, Steven
NSA
Pulse
Snowden, Edward
Edward Snowden Endorses D.C. Protest Against NSA in Rare Public Statement
Surveillance whistle-blower: 'Join us in sending the message: Stop Watching Us.'
2013-10-24
http://www.usnews.com/news/articles/2013/10/24/edward-snowden-endorses-dc-protest-against-nsa-in-rare-public-statement
2013-11-16 21:05:47
attachment
Snapshot
2013-11-16 21:05:47
http://www.usnews.com/news/articles/2013/10/24/edward-snowden-endorses-dc-protest-against-nsa-in-rare-public-statement
text/html
utf-8
webpage
The Guardian
O'Hagan
Sean
Spies like us: Donovan Wylie captures the impact of surveillance | Art and design | theguardian.com
2013-10-24
http://www.theguardian.com/artanddesign/2013/oct/24/donovan-wylie-vision-as-power-exhibition
2013-11-16 21:06:04
attachment
Spies like us: Donovan Wylie captures the impact of surveillance | Art and design | theguardian.com
2013-11-16 21:06:05
http://www.theguardian.com/artanddesign/2013/oct/24/donovan-wylie-vision-as-power-exhibition
text/html
utf-8
webpage
Yahoo News
NSA spied on 124.8 billion phone calls in just one month: watchdog
The National Security Agency monitored nearly 125 billion phone calls in just one month, according to a number of new reports.
NSA spied on 124.8 billion phone calls in just one month
http://news.yahoo.com/nsa-spied-on-124-8-billion-phone-calls-in-just-one-month--watchdog-group-claims-213633988.html
2013-11-16 21:06:28
attachment
Snapshot
2013-11-16 21:06:28
http://news.yahoo.com/nsa-spied-on-124-8-billion-phone-calls-in-just-one-month--watchdog-group-claims-213633988.html
text/html
utf-8
newspaperArticle
World
Nakashima
Ellen
Officials alert foreign services that Snowden has documents on their cooperation with U.S.
Documents contain material about operations that involve countries not publicly allied with the United States.
2013-10-25
en-US
http://www.washingtonpost.com/world/national-security/officials-alert-foreign-services-that-snowden-has-documents-on-their-cooperation-with-us/2013/10/24/930ea85c-3b3e-11e3-a94f-b58017bfee6c_story.html
2013-11-16 21:06:41
washingtonpost.com
The Washington Post
ISSN 0190-8286
attachment
Washington Post Snapshot
2013-11-16 21:06:43
http://www.washingtonpost.com/world/national-security/officials-alert-foreign-services-that-snowden-has-documents-on-their-cooperation-with-us/2013/10/24/930ea85c-3b3e-11e3-a94f-b58017bfee6c_print.html
blogPost
WSJ Blogs - Washington Wire
The Perils of Texting While President
October 25, 2013, 9:06 AM
http://blogs.wsj.com/washwire/2013/10/25/the-perils-of-texting-while-president/
2013-11-16 21:07:15
attachment
WSJ-Blogs Snapshot
2013-11-16 21:07:37
http://blogs.wsj.com/washwire/2013/10/25/the-perils-of-texting-while-president/
text/html
utf-8
webpage
Rolling Stone
albums
all access
culture
jann wenner
Meet the Private Companies Helping Cops Spy on Protesters | Politics News | Rolling Stone
movies
music
news
NYPD
photos
politics
pop culture
random notes
reviews
Rolling Stone
songs
videos
Meet the Private Companies Helping Cops Spy on Protesters | Politics News
Promotional materials for private spy companies show that mass surveillance technology is being sold to police departments as a way to monitor dissent
http://www.rollingstone.com/politics/news/meet-the-private-companies-helping-cops-spy-on-protesters-20131024
2013-11-16 21:07:58
attachment
Snapshot
2013-11-16 21:07:58
http://www.rollingstone.com/politics/news/meet-the-private-companies-helping-cops-spy-on-protesters-20131024
text/html
utf-8
webpage
NSA monitored calls of 35 world leaders after US official handed over contacts | World news | The Guardian
http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls?CMP=twt_gu
2013-11-16 21:08:12
attachment
NSA monitored calls of 35 world leaders after US official handed over contacts | World news | The Guardian
2013-11-16 21:08:13
http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls?CMP=twt_gu
text/html
utf-8
newspaperArticle
Reuters
London
Britain's Cameron says may act against newspapers over spy leaks
LONDON, Oct 28 (Reuters) - British Prime Minister DavidCameron said on Monday his government was likely to act to stopnewspapers publishing what he called damaging leaks from formerU.S. intelligence
Mon Oct 28 16:33:14 UTC 2013
http://www.reuters.com/article/2013/10/28/usa-spying-cameron-idUSL5N0II2WQ20131028
2013-11-16 21:09:42
Reuters
attachment
Snapshot
2013-11-16 21:09:42
http://www.reuters.com/article/2013/10/28/usa-spying-cameron-idUSL5N0II2WQ20131028
text/html
utf-8
newspaperArticle
World / Europe
The New York Times
ISSN 0362-4331
Landler
Mark
Sanger
David E.
Espionage and Intelligence Services
Feinstein, Dianne
Germany
Merkel, Angela
National Security Agency
Surveillance of Citizens by Government
United States International Relations
Wiretapping and Other Eavesdropping Devices and Methods
Obama May Ban Spying on Heads of Allied States
President Obama was poised to order the ban in response to a deepening diplomatic crisis over reports that the National Security Agency had for years targeted the cellphone of Chancellor Angela Merkel of Germany.
2013-10-28
http://www.nytimes.com/2013/10/29/world/europe/obama-may-ban-spying-on-heads-of-allied-states.html
2013-11-16 21:10:42
NYTimes.com
attachment
New York Times Snapshot
2013-11-16 21:10:42
http://www.nytimes.com/2013/10/29/world/europe/obama-may-ban-spying-on-heads-of-allied-states.html?nl=todaysheadlines&emc=edit_th_20131029&_r=1&
text/html
utf-8
newspaperArticle
Opinions
The Washington Post
ISSN 0190-8286
Robinson
Eugene
The out-of-control NSA
The agency alienates U.S. allies in its attempt to know all.
2013-10-29
en-US
http://www.washingtonpost.com/opinions/eugene-robinson-the-out-of-control-nsa/2013/10/28/49645872-4008-11e3-a624-41d661b0bb78_story.html
2013-11-16 21:10:55
washingtonpost.com
attachment
Washington Post Snapshot
2013-11-16 21:10:57
http://www.washingtonpost.com/opinions/eugene-robinson-the-out-of-control-nsa/2013/10/28/49645872-4008-11e3-a624-41d661b0bb78_print.html
newspaperArticle
Opinion
The New York Times
ISSN 0362-4331
The Editorial Board
Bush, George W
Editorials
Espionage and Intelligence Services
Foreign Intelligence Surveillance Act (FISA)
Germany
Leahy, Patrick J
Merkel, Angela
Obama, Barack
Sensenbrenner, F James Jr
Surveillance of Citizens by Government
USA PATRIOT Act
The White House on Spying
The Obama administration offers platitudes about security and vague talk of inconclusive inquiries.
2013-10-28
http://www.nytimes.com/2013/10/29/opinion/the-white-house-on-spying.html
2013-11-16 21:11:07
NYTimes.com
attachment
New York Times Snapshot
2013-11-16 21:11:07
http://www.nytimes.com/2013/10/29/opinion/the-white-house-on-spying.html?hp&rref=opinion&_r=0
text/html
utf-8
webpage
christiane amanpour
journalism
latest episode
NSA spying has nothing to do with terrorism, Greenwald tells Amanpour
By Mick Krever, CNN
Spying by America’s National Security Agency does not have “anything to do with terrorism,” Glenn Greenwald, the activist journalist who broke the story, told CNN’s Christiane Amanpour on Monday.
http://amanpour.blogs.cnn.com/2013/10/28/nsa-spying-has-nothing-to-do-with-terrorism-greenwald-tells-amanpour/
2013-11-16 21:11:16
attachment
Snapshot
2013-11-16 21:11:16
http://amanpour.blogs.cnn.com/2013/10/28/nsa-spying-has-nothing-to-do-with-terrorism-greenwald-tells-amanpour/
text/html
utf-8
webpage
LA Times - White House OKd spying on allies, U.S. intelligence officials say
http://touch.latimes.com/#section/-1/article/p2p-77965005/
2013-11-16 21:11:44
attachment
LA Times - White House OKd spying on allies, U.S. intelligence officials say
2013-11-16 21:11:45
http://touch.latimes.com/#section/-1/article/p2p-77965005/
text/html
utf-8
webpage
Obama didn’t know about surveillance of U.S.-allied world leaders until summer, officials say - The Washington Post
http://www.washingtonpost.com/politics/obama-didnt-know-about-surveillance-of-us-allied-world-leaders-until-summer-officials-say/2013/10/28/0cbacefa-4009-11e3-a751-f032898f2dbc_story.html
2013-11-16 21:11:51
attachment
Obama didn’t know about surveillance of U.S.-allied world leaders until summer, officials say - The Washington Post
2013-11-16 21:11:52
http://www.washingtonpost.com/politics/obama-didnt-know-about-surveillance-of-us-allied-world-leaders-until-summer-officials-say/2013/10/28/0cbacefa-4009-11e3-a751-f032898f2dbc_story.html
text/html
utf-8
webpage
the Guardian
Berr
Jonathan
Guardian sustainable business
technology
Ranking the guardians of digital privacy: who protects your rights?
A new project aims to grade tech companies on their protection of users' privacy rights from data collectors
2013-10-28
Ranking the guardians of digital privacy
http://www.theguardian.com/sustainable-business/who-protects-digital-privacy-rankings
2013-11-16 21:13:21
attachment
Snapshot
2013-11-16 21:13:21
http://www.theguardian.com/sustainable-business/who-protects-digital-privacy-rankings
text/html
utf-8
webpage
the Guardian
Barack Obama
Data protection
Internet
NSA
Obama administration
Privacy
The NSA files
United States
Boundless Informant: NSA explainer – full document text
View the three-page explanation document, which showed the NSA collected almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March
2013-06-08
Boundless Informant
http://www.theguardian.com/world/interactive/2013/jun/08/boundless-informant-nsa-full-text
2013-11-16 21:14:02
attachment
Snapshot
2013-11-16 21:14:02
http://www.theguardian.com/world/interactive/2013/jun/08/boundless-informant-nsa-full-text
text/html
utf-8
blogPost
Foreign Policy Blogs
NSA
Intel Vets: Of Course Obama Knew About NSA Spying
Tuesday, October 29, 2013
http://thecable.foreignpolicy.com/posts/2013/10/29/intelligence_vets_of_course_obama_knew_about_nsa_spying
2013-11-16 21:14:31
Intel Vets
attachment
Foreign Policy Snapshot
2013-11-16 21:14:44
http://thecable.foreignpolicy.com/posts/2013/10/29/intelligence_vets_of_course_obama_knew_about_nsa_spying?page=full
text/html
utf-8
webpage
Wired Opinion
Our Government Has Weaponized the Internet. Here's How They Did It | Wired Opinion | Wired.com
The internet backbone -- the infrastructure of networks upon which internet traffic travels -- went from being a passive infrastructure for communication to an active weapon for attacks. Absent Snowdens of their own, other countries may do the same and then say, 'It wasn't us. And even if it was, you started it.'
http://www.wired.com/opinion/2013/11/this-is-how-the-internet-backbone-has-been-turned-into-a-weapon/
2013-11-16 21:17:13
attachment
Snapshot
2013-11-16 21:17:13
http://www.wired.com/opinion/2013/11/this-is-how-the-internet-backbone-has-been-turned-into-a-weapon/?utm_source=hootsuite&utm_campaign=hootsuite
text/html
utf-8
webpage
Gmail is boiling the frog – and we are the frog | ZDNet
http://www.zdnet.com/gmail-is-boiling-the-frog-and-we-are-the-frog-7000023256/
2013-11-16 23:10:15
attachment
Gmail is boiling the frog – and we are the frog | ZDNet
2013-11-16 23:10:16
http://www.zdnet.com/gmail-is-boiling-the-frog-and-we-are-the-frog-7000023256/
text/html
utf-8
webpage
Judge Could Torpedo NSA Surveillance Programs Monday - US News and World Report
http://www.usnews.com/news/articles/2013/11/13/judge-could-torpedo-nsa-surveillance-programs-monday
2013-11-16 23:10:28
attachment
Judge Could Torpedo NSA Surveillance Programs Monday - US News and World Report
2013-11-16 23:10:29
http://www.usnews.com/news/articles/2013/11/13/judge-could-torpedo-nsa-surveillance-programs-monday
text/html
utf-8
webpage
the Guardian
Extradition
Hacking
Law
LulzSec
technology
UK criminal justice
UK news
United States
US constitution and civil liberties
World news
The US can lock up hackers, but it can't crush their spirit
Laurie Penny: Jeremy Hammond is just the the latest to be targeted in a global witchhunt against the brightest minds of a generation
2013-11-14
http://www.theguardian.com/commentisfree/2013/nov/14/us-lock-up-hackers-jeremy-hammond
2013-11-16 23:10:47
attachment
Snapshot
2013-11-16 23:10:47
http://www.theguardian.com/commentisfree/2013/nov/14/us-lock-up-hackers-jeremy-hammond
text/html
utf-8
webpage
McClatchy
Taylor
Marisa
CIA
data
Edward Snowden
IRS
lie detector
NSA
polygraph
Privacy
WASHINGTON: Americans’ personal data shared with CIA, IRS, others in security probe | National Security & Defense | McClatchy DC
U.S. agencies collected and shared the personal information of thousands of Americans in an attempt to root out untrustworthy federal workers that ended up scrutinizing people who had no direct ties to the U.S. government and simply had purchased certain books.
2013-11-14
WASHINGTON
http://www.mcclatchydc.com/2013/11/14/208438/americans-personal-data-shared.html
2013-11-16 23:11:12
attachment
Snapshot
2013-11-16 23:11:12
http://www.mcclatchydc.com/2013/11/14/208438/americans-personal-data-shared.html
text/html
utf-8
webpage
EUROPA - PRESS RELEASES - Press release - Speech - A cloud for Europe
http://europa.eu/rapid/press-release_SPEECH-13-922_en.htm
2013-11-16 23:11:46
attachment
EUROPA - PRESS RELEASES - Press release - Speech - A cloud for Europe
2013-11-16 23:11:47
http://europa.eu/rapid/press-release_SPEECH-13-922_en.htm
text/html
utf-8
newspaperArticle
Reuters
Washington
Hosenball
Mark
Afghanistan
Angela Merkel
Barack Obama
Edward Snowden
Germany
Iraq
Keith Alexander
Matt Olsen
russia
United States
NSA chief says Snowden leaked up to 200,000 secret documents
WASHINGTON (Reuters) - Former U.S. National Security Agency contractor Edward Snowden leaked as many as 200,000 classified U.S. documents to the media, according to little-noticed public remarks by the
Thu Nov 14 21:04:43 UTC 2013
http://www.reuters.com/article/2013/11/14/us-usa-security-nsa-idUSBRE9AD19B20131114
2013-11-16 23:11:57
Reuters
attachment
Snapshot
2013-11-16 23:11:57
http://www.reuters.com/article/2013/11/14/us-usa-security-nsa-idUSBRE9AD19B20131114?feedType=RSS&feedName=topNews
text/html
utf-8
newspaperArticle
U.S.
The New York Times
ISSN 0362-4331
Savage
Charlie
Mazzetti
Mark
Banking and Financial Institutions
Central Intelligence Agency
Foreign Intelligence Surveillance Court
National Security Agency
Surveillance of Citizens by Government
USA PATRIOT Act
C.I.A. Collects Global Data on Transfers of Money
The agency is secretly collecting bulk records of international money transfers, under the same law that the National Security Agency uses for its phone record database, according to government officials.
2013-11-14
http://www.nytimes.com/2013/11/15/us/cia-collecting-data-on-international-money-transfers-officials-say.html
2013-11-16 23:12:05
NYTimes.com
attachment
New York Times Snapshot
2013-11-16 23:12:05
http://www.nytimes.com/2013/11/15/us/cia-collecting-data-on-international-money-transfers-officials-say.html?_r=0
text/html
utf-8
newspaperArticle
Opinion
The New York Times
ISSN 0362-4331
The Editorial Board
Classified Information and State Secrets
Editorials
Freedom of the Press
Great Britain
Guardian (British Newspaper)
Rusbridger, Alan
Snowden, Edward J
Surveillance of Citizens by Government
British Press Freedom Under Threat
A chilling inquisition aimed at The Guardian over publishing leaks highlights how, unlike the United States, Britain has no constitutional guarantee of a free press.
2013-11-14
http://www.nytimes.com/2013/11/15/opinion/british-press-freedom-under-threat.html
2013-11-16 23:12:14
NYTimes.com
attachment
New York Times Snapshot
2013-11-16 23:12:14
http://www.nytimes.com/2013/11/15/opinion/british-press-freedom-under-threat.html?_r=2&
text/html
utf-8
blogPost
Foreign Policy Blogs
Harris
Shane
NSA
The FBI is Helping the NSA Spy, but Senators Don't Want to Know About It
Thursday, November 14, 2013
http://killerapps.foreignpolicy.com/posts/2013/11/14/the_fbi_is_helping_the_nsa_spy_but_senators_don_t_want_to_know_about_it
2013-11-16 23:12:21
attachment
Foreign Policy Snapshot
2013-11-16 23:12:30
http://killerapps.foreignpolicy.com/posts/2013/11/14/the_fbi_is_helping_the_nsa_spy_but_senators_don_t_want_to_know_about_it?page=full
text/html
utf-8
webpage
American Civil Liberties Union
Government Refusing To Say Whether Phone Tracking Evidence Came From Mass Surveillance
In criminal cases, defendants have a right to know what evidence the government plans to use against them and how the government gathered that evidence. This basic due process principle is essential: it allows defendants to test in court whether law enforcement officers obtained evidence...
https://www.aclu.org/blog/technology-and-liberty-national-security/government-refusing-say-whether-phone-tracking
2013-11-16 23:12:40
attachment
Snapshot
2013-11-16 23:12:40
https://www.aclu.org/blog/technology-and-liberty-national-security/government-refusing-say-whether-phone-tracking
text/html
utf-8
webpage
the Guardian
Washington
Spencer Ackerman in
Dianne Feinstein
NSA
US Congress
US Senate
World news
Feinstein promotes bill to strengthen NSA's hand on warrantless searches
Fisa Improvements Act, advanced as surveillance reform, would make permanent loophole known as 'backdoor search provision'
2013-11-15
http://www.theguardian.com/world/2013/nov/15/feinstein-bill-nsa-warrantless-searches-surveillance
2013-11-16 23:13:12
attachment
Snapshot
2013-11-16 23:13:12
http://www.theguardian.com/world/2013/nov/15/feinstein-bill-nsa-warrantless-searches-surveillance
text/html
utf-8
webpage
Gorman
Siobhan
Barrett
Delvin
Valentino-Devries
Jennifer
armed forces
banking/credit
content types
corporate/industrial news
domestic politics
espionage
factiva filters
fc&e industry news filter
financial services
independent agencies/regulatory bodies
national security
political/general news
politics/international relations
regulation/government policy
western union
wu
CIA's Financial Spying Bags Data on Americans
The Central Intelligence Agency is building a vast database of international money transfers that includes millions of Americans' financial and personal data, such as Social Security numbers, officials familiar with the program say.
2013-11-14
http://online.wsj.com/news/article_email/SB10001424052702303559504579198370113163530-lMyQjAxMTAzMDEwNTExNDUyWj
2013-11-16 23:13:18
attachment
Snapshot
2013-11-16 23:13:18
http://online.wsj.com/news/article_email/SB10001424052702303559504579198370113163530-lMyQjAxMTAzMDEwNTExNDUyWj
text/html
utf-8
webpage
The Economist
today
Stay informed
Day
Every
Besieged
SECURITY guards (at least the good ones) are paid to be paranoid. Computer-security researchers are the same. Many had long suspected that governments use the...
2013-11-09
http://www.economist.com/news/science-and-technology/21589383-stung-revelations-ubiquitous-surveillance-and-compromised-software
2013-11-16 23:13:31
attachment
Snapshot
2013-11-16 23:13:31
http://www.economist.com/news/science-and-technology/21589383-stung-revelations-ubiquitous-surveillance-and-compromised-software
text/html
utf-8
webpage
Google Online Security Blog: A roster of TLS cipher suites weaknesses
http://googleonlinesecurity.blogspot.co.uk/2013/11/a-roster-of-tls-cipher-suites-weaknesses.html
2013-11-17 03:44:07
attachment
Google Online Security Blog: A roster of TLS cipher suites weaknesses
2013-11-17 03:44:08
http://googleonlinesecurity.blogspot.co.uk/2013/11/a-roster-of-tls-cipher-suites-weaknesses.html
text/html
utf-8
webpage
MIT Technology Review
Kopytoff
Verne
Indoor Location Technology Uses Wi-Fi to Track Shoppers
Indoor location technology brings Internet-style tracking to physical spaces.
2013-11-12
http://www.technologyreview.com/news/520811/stores-sniff-out-smartphones-to-follow-shoppers/
2013-11-17 03:44:35
attachment
Snapshot
2013-11-17 03:44:35
http://www.technologyreview.com/news/520811/stores-sniff-out-smartphones-to-follow-shoppers/
text/html
utf-8
webpage
Network World
US intelligence wants to radically advance facial recognition software
National Intelligence agency wants to cull facial IDs from massive amounts of video, images
2013-11-13T13:40-05:00
http://www.networkworld.com/community/blog/us-intelligence-wants-radically-advance-facial-recognition-software
2013-11-17 03:45:24
attachment
Snapshot
2013-11-17 03:45:24
http://www.networkworld.com/community/blog/us-intelligence-wants-radically-advance-facial-recognition-software
text/html
utf-8
webpage
Greenwald
Glenn
The real criminals in the Tarek Mehanna case
An American Muslim punished for his political views delivers an extraordinary statement in court
2012-04-13
http://www.salon.com/2012/04/13/the_real_criminals_in_the_tarek_mehanna_case/
2013-11-17 03:45:32
attachment
Snapshot
2013-11-17 03:45:32
http://www.salon.com/2012/04/13/the_real_criminals_in_the_tarek_mehanna_case/
text/html
utf-8
webpage
Mother Jones
Does Posting Jihadist Material Make Tarek Mehanna a Terrorist?
How the outcome of Mehanna's trial could rewrite the line between speech and crime.
http://www.motherjones.com/politics/2011/12/tarek-mehanna-terrorist
2013-11-17 03:45:41
attachment
Snapshot
2013-11-17 03:45:41
http://www.motherjones.com/politics/2011/12/tarek-mehanna-terrorist
text/html
utf-8
webpage
BostonGlobe.com
Anderson
Travis
13
ersen | Globe Staff November
2013
Al Qaeda
appeals
court
Federal Bureau of Prisons
Mehanna
Ortiz
Osama Bin Laden
Supreme Court
Tarek
terror
Tarek Mehanna terror convictions upheld by federal appeals court - The Boston Globe
Calling terrorism “the modern-day equivalent of the bubonic plague,” a federal appeals court in Boston upheld Wednesday the conviction and 17½-year prison term handed down to a Sudbury man on charges that he helped Al Qaeda, plotted to kill Americans, and lied to the FBI. “We do not pretend to understand why the defendant chose to go down such a treacherous path,” Circuit Judge Bruce M. Selya wrote for a three-judge panel of the US Court of Appeals for the First Circuit, of Tarek Mehanna, now 31. “Nevertheless, the jury found that he knowingly and intentionally made that choice,” a finding backed by the “clear weight of the evidence,” Selya wrote.
2013-11-13
http://www.bostonglobe.com/metro/2013/11/13/tarek-mehanna-terror-convictions-upheld-federal-appeals-court/4PlBQdkihh6yQkUV1ETldN/story.html
2013-11-17 03:45:51
attachment
Snapshot
2013-11-17 03:45:51
http://www.bostonglobe.com/metro/2013/11/13/tarek-mehanna-terror-convictions-upheld-federal-appeals-court/4PlBQdkihh6yQkUV1ETldN/story.html
text/html
utf-8
webpage
Center for Democracy and Technology
Rubinstein
Ira
Nojeim
Greg
Lee
Ronald
Systematic Government Access to Personal Data: A Comparative Analysis | Center for Democracy & Technology
2013-11-13
https://www.cdt.org/systematic-access
2013-11-17 03:46:18
attachment
comms-content-chart-national-security-chart-4.xlsx
application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
attachment
communications-framework-chart-1.xlsx
application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
attachment
Government-Access-to-Data-Comparative-Analysis - government-access-to-data-comparative-analysis.pdf
2014-01-28 22:25:47
https://www.cdt.org/files/pdfs/govaccess2013/government-access-to-data-comparative-analysis.pdf
application/pdf
utf-8
attachment
other-business-records-chart-2.xlsx
application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
attachment
Systematic Government Access to Personal Data: A Comparative Analysis | Center for Democracy & Technology
2013-11-17 03:46:19
https://www.cdt.org/systematic-access
text/html
utf-8
blogPost
Huffington Post
Kuttner
Robert
Time to Thank Edward Snowden
What Edward Snowden has done is to force a long repressed debate about how much liberty, if any, we need to sacrifice in order to protect our security. Before his leaks, that urgent conversation was a non-debate because the violations of liberty were being done entirely in secret, beyond the reach of democratic deliberation. Even Republican Congressman Jim Sensenbrenner, a key author of the Patriot Act, was appalled. He wrote to Attorney General Eric Holder: "I am extremely troubled by the FBI's interpretation of this legislation ... Seizing phone records of millions of innocent people is excessive and un-American."
10 Nov 2013 21:56:38 -0500
http://www.huffingtonpost.com/robert-kuttner/time-to-thank-snowden_b_4252208.html
2013-11-17 03:46:25
attachment
Huffington Post
2013-11-17 03:46:34
http://www.huffingtonpost.com/robert-kuttner/time-to-thank-snowden_b_4252208.html?view=print&comm_ref=false
text/html
utf-8
webpage
» Senators challenge head of Dodd-Frank agency on financial snooping
http://www.pogowasright.org/senators-challenge-head-of-dodd-frank-agency-on-financial-snooping/
2013-11-17 03:51:21
attachment
» Senators challenge head of Dodd-Frank agency on financial snooping
2013-11-17 03:51:22
http://www.pogowasright.org/senators-challenge-head-of-dodd-frank-agency-on-financial-snooping/
text/html
utf-8
webpage
Moving forward on improving HTTP's security from Mark Nottingham on 2013-11-13 (ietf-http-wg@w3.org from October to December 2013)
http://lists.w3.org/Archives/Public/ietf-http-wg/2013OctDec/0625.html
2013-11-17 03:51:28
attachment
Moving forward on improving HTTP's security from Mark Nottingham on 2013-11-13 (ietf-http-wg@w3.org from October to December 2013)
2013-11-17 03:51:29
http://lists.w3.org/Archives/Public/ietf-http-wg/2013OctDec/0625.html
text/html
windows-1252
webpage
Hullabaloo
http://digbysblog.blogspot.com.br/2013/11/i-would-have-made-different-decision.html
2013-11-17 03:51:46
attachment
Hullabaloo
2013-11-17 03:51:47
http://digbysblog.blogspot.com.br/2013/11/i-would-have-made-different-decision.html
text/html
utf-8
webpage
Gawker
Chen
Adrian
Gawker
Glenn Greenwald
NSA
perry fellwock
ramparts
whistleblowers
wikileaks
winslow peck
After 30 Years of Silence, the Original NSA Whistleblower Looks Back
The four-story brownstone at 141 East 37th Street in Manhattan has no remarkable features: a plain building on a quiet tree-lined street in the shadow of the Empire State Building. In the summer of 1920, Herbert O. Yardley, a government codebreaker, moved in with a gang of math geniuses and began deciphering intercepted Japanese diplomatic telegrams. This was the Black Chamber, America's first civilian code-breaking agency. From this was born the American surveillance state, and eventually the sprawling National Security Agency, which you may have heard about recently.
2013-10-17
http://gawker.com/after-30-years-of-silence-the-original-nsa-whistleblow-1454865018
2013-11-17 03:52:38
attachment
Snapshot
2013-11-17 03:52:38
http://gawker.com/after-30-years-of-silence-the-original-nsa-whistleblow-1454865018
text/html
utf-8
webpage
Canada Free Press
Kincaid
Cliff
The Case for Arresting Glenn Greenwald
2013-11-12
http://canadafreepress.com/index.php/article/59204
2013-11-17 03:54:34
attachment
The Case for Arresting Glenn Greenwald
2013-11-17 03:54:35
http://canadafreepress.com/index.php/article/59204
text/html
utf-8
webpage
The PJ Tatler
Patriot Act Author Tells EU Parliament That U.S. Needs to Reform Surveillance
The House Republican who became the legislative face of the Patriot Act after the 9/11 terrorist attacks was in Europe today telling the EU parliament that they need to rebuild trust and cooperation a
http://pjmedia.com/tatler/2013/11/11/patriot-act-author-tells-eu-parliament-that-u-s-needs-to-reform-surveillance/
2013-11-17 03:54:47
attachment
Snapshot
2013-11-17 03:54:47
http://pjmedia.com/tatler/2013/11/11/patriot-act-author-tells-eu-parliament-that-u-s-needs-to-reform-surveillance/
text/html
utf-8
webpage
"Authorities must give assurances to Sarah Harrison that she can return to her country safely" - Reporters Without Borders
2013-11-12
http://en.rsf.org/united-kingdom-the-authorities-must-give-12-11-2013,45447.html
2013-11-17 03:55:02
attachment
"Authorities must give assurances to Sarah Harrison that she can return to her country safely" - Reporters Without Borders
2013-11-17 03:55:03
http://en.rsf.org/united-kingdom-the-authorities-must-give-12-11-2013,45447.html
text/html
utf-8
webpage
SC Magazine UK
Microsoft may ramp up encryption of customer data postSnowden
Microsoft has confirmed to SCMagazineUK.com that it is considering encrypting customers personal data which it sends over the internet, in the wake of the allegations of mass electronic surveillance by the NSA.
http://www.scmagazineuk.com/microsoft-may-ramp-up-encryption-of-customer-data-post-snowden/article/320613/
2013-11-17 03:55:29
attachment
Snapshot
2013-11-17 03:55:29
http://www.scmagazineuk.com/microsoft-may-ramp-up-encryption-of-customer-data-post-snowden/article/320613/
text/html
utf-8
webpage
the Guardian
Washington
Spencer Ackerman in
Keith Alexander
NSA
Privacy
Surveillance
The NSA files
United States
US politics
World news
White House considers appointing civilian NSA chief amid calls for reform
Administration also pondering plan to disaggregate embattled agency from new military command created around it
2013-11-11
http://www.theguardian.com/world/2013/nov/11/white-house-nsa-civilian-director-reform
2013-11-17 03:55:37
attachment
Snapshot
2013-11-17 03:55:37
http://www.theguardian.com/world/2013/nov/11/white-house-nsa-civilian-director-reform
text/html
utf-8
blogPost
The n-Category Café
Leinster
Tom
Severing Ties with the NSA
2013-11-10
http://golem.ph.utexas.edu/category/2013/11/severing_ties_with_the_nsa.html
2013-11-17 03:56:00
attachment
Snapshot
2013-11-17 03:56:00
http://golem.ph.utexas.edu/category/2013/11/severing_ties_with_the_nsa.html
application/xhtml+xml
windows-1252
webpage
Gosztola
Kevin
china
conspiracy theory
Edward Snowden
espionage
greenwald
Kurt Eichenwald
Laura Poitras
Media Criticism
NSA
Salon.com
spies
Vanity Fair
Vanity Fair editor’s crazy conspiracy theory
Former NYT scribe Kurt Eichenwald just knows Edward Snowden's a Chinese spy -- no matter what logic says
2013-11-11
http://www.salon.com/2013/11/11/vanity_fair_editor_is_a_loony_conspiracy_theorist/
2013-11-17 03:56:10
attachment
Snapshot
2013-11-17 03:56:10
http://www.salon.com/2013/11/11/vanity_fair_editor_is_a_loony_conspiracy_theorist/
text/html
utf-8
webpage
The Sydney Morning Herald
Dorling
Philip
Australian spy agency helped BHP negotiate trade deals
BHP was among the companies helped by Australian spy agencies as they negotiated trade deals with Japan, a former Australian Secret Intelligence Service officer says.
2013-11-07
http://www.smh.com.au/national/australian-spy-agency-helped-bhp-negotiate-trade-deals-20131106-2x1sw.html
2013-11-17 04:04:07
attachment
Snapshot
2013-11-17 04:04:07
http://www.smh.com.au/national/australian-spy-agency-helped-bhp-negotiate-trade-deals-20131106-2x1sw.html
text/html
utf-8
webpage
digi.no
Sveinbjørnsson
tirsdag 12 november 2013 kl 07:26 Av Sigvald
Telenor stoppet nettsky-flytting
Etter Snowden-avsløring.
2013-11-12
http://www.digi.no/924563/telenor-stoppet-nettsky-flytting
2013-11-17 04:04:18
Norwegian
attachment
Snapshot
2013-11-17 04:04:18
http://www.digi.no/924563/telenor-stoppet-nettsky-flytting
text/html
iso-8859-15
newspaperArticle
Spiegel Online
German Warns of Possible Threat to US Facilities in Spying Scandal
Germany's domestic intelligence agency has warned American sites in the country could be at risk of attack from people angry about the NSA spying scandal. The message has worried officials in Rhineland-Palatinate, where the Ramstein air base is located.
11.11.2013
http://www.spiegel.de/international/germany/german-warns-of-possible-threat-to-us-facilities-in-spying-scandal-a-932928.html
2013-11-17 04:04:26
Spiegel Online
attachment
German Warns of Possible Threat to US Facilities in Spying Scandal - SPIEGEL ONLINE
2013-11-17 04:04:32
http://www.spiegel.de/international/germany/german-warns-of-possible-threat-to-us-facilities-in-spying-scandal-a-932928.html
text/html
windows-1252
newspaperArticle
Spiegel Online
Amann
Melanie
Gude
Hubert
Schindler
Jörg
Schmid
Fidelius
Edward Snowden
United States
US Declines No Spy Pact with Germany But Might Reveal Snowden Secrets
Senior German intelligence officials met with their NSA and CIA counterparts in the US last week to start trust-rebuilding efforts between the estranged allies. While a "no-spy" agreement seems unlikely, Merkel might learn what Snowden could still reveal.
12.11.2013
http://www.spiegel.de/international/germany/us-declines-no-spy-pact-with-germany-but-might-reveal-snowden-secrets-a-933006.html
2013-11-17 04:04:30
Spiegel Online
attachment
US Declines No Spy Pact with Germany But Might Reveal Snowden Secrets - SPIEGEL ONLINE
2013-11-17 04:04:42
http://www.spiegel.de/international/germany/us-declines-no-spy-pact-with-germany-but-might-reveal-snowden-secrets-a-933006.html
text/html
windows-1252
webpage
Centre for Internet and Society
Xynou
Maria
Spy Files 3: WikiLeaks Sheds More Light On The Global Surveillance Industry
In this article, Maria Xynou looks at WikiLeaks' latest Spy Files and examines the legality of India's surveillance technologies, as well as their potential connection with India's Central Monitoring System (CMS) and implications on human rights.
2013-10-25
Spy Files 3
http://cis-india.org/internet-governance/blog/spy-files-three
2013-11-17 04:04:55
attachment
Snapshot
2013-11-17 04:04:55
http://cis-india.org/internet-governance/blog/spy-files-three
text/html
utf-8
webpage
Electronic Frontier Foundation
NSA spying
NSA's Vast Surveillance Powers Extend Far Beyond Counterterrorism, Despite Misleading Government Claims
Time and again we’ve seen the National Security Agency (NSA) defend its vast surveillance apparatus by invoking the spectre of terrorism, discussing its spying powers as a method to keep America safe. Yet, the truth is that counterterrorism is only a fraction of their far broader authority to seek “foreign intelligence information,” a menacing sounding term that actually encapsulates all sorts of innocuous, everyday conversation.
https://www.eff.org/deeplinks/2013/11/nsas-surveillance-powers-extend-far-beyond-terrorism-despite-governments
2013-11-17 04:05:04
attachment
Snapshot
2013-11-17 04:05:04
https://www.eff.org/deeplinks/2013/11/nsas-surveillance-powers-extend-far-beyond-terrorism-despite-governments
text/html
utf-8
newspaperArticle
World
The New York Times
ISSN 0362-4331
Shane
Scott
Espionage and Intelligence Services
National Security Agency
Snowden, Edward J
Surveillance of Citizens by Government
Wiretapping and Other Eavesdropping Devices and Methods
No Morsel Too Minuscule for All-Consuming N.S.A.
The National Security Agency finds itself under intense pressure after disclosures of spying on allies and rivals alike, but it defends the wide net it casts.
2013-11-02
http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html
2013-11-17 04:05:45
NYTimes.com
attachment
New York Times Snapshot
2013-11-17 04:05:45
http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html?pagewanted=2&hp&_r=1&&pagewanted=all
text/html
utf-8
blogPost
Foreign Policy Blogs
Harris
Shane
NSA
Senate to Start Sweeping Intel Review This Month
Tuesday, November 12, 2013
http://thecable.foreignpolicy.com/posts/2013/11/12/senate_to_start_sweeping_intel_review_this_month
2013-11-17 04:05:53
attachment
Foreign Policy Snapshot
2013-11-17 04:06:07
http://thecable.foreignpolicy.com/posts/2013/11/12/senate_to_start_sweeping_intel_review_this_month?page=full
text/html
utf-8
blogPost
Mgx
Queally
John
UK Claim That 'Journalism Equals Terrorism' Sparks Outrage - MGx - Musings, Essays & Ballads | MGx – Musings, Essays & Ballads
2013-11-02
http://mgx.com/blogs/2013/11/02/uk-claim-journalism-equals-terrorism-sparks-outrage/
2013-11-17 04:06:04
attachment
UK Claim That 'Journalism Equals Terrorism' Sparks Outrage - MGx - Musings, Essays & Ballads | MGx – Musings, Essays & Ballads
2013-11-17 04:06:05
http://mgx.com/blogs/2013/11/02/uk-claim-journalism-equals-terrorism-sparks-outrage/
text/html
utf-8
blogPost
ER - Sound, Surveillance, History
Razlogova
Elena
Surveillance: A Correlative History | ER
2012-09-28
http://elenarazlogova.org/?p=82
2013-11-17 04:09:37
attachment
Surveillance: A Correlative History | ER
2013-11-17 04:09:38
http://elenarazlogova.org/?p=82
text/html
utf-8
webpage
How Data Determines Your Fate At The Airport | The Kojo Nnamdi Show
http://thekojonnamdishow.org/shows/2013-10-29/how-data-determines-your-fate-airport
2013-11-17 04:17:45
attachment
How Data Determines Your Fate At The Airport | The Kojo Nnamdi Show
2013-11-17 04:17:46
http://thekojonnamdishow.org/shows/2013-10-29/how-data-determines-your-fate-airport
text/html
utf-8
webpage
WCVB
International
Defying the KGB: How a movement won freedom
Driven by desperation, Marina and Lev Furman stepped out of their home in Leningrad and took a 20-minute walk into uncertainty. Trailed by KGB agents, they bundled up and set out in the weak winter light for Palace Square, site of the 1917 Bolshevik ...
Defying the KGB
http://www.wcvb.com/news/national/Defying-the-KGB-How-a-movement-won-freedom/-/9848944/17949586/-/fkkudiz/-/index.html
2013-11-17 04:19:29
attachment
Snapshot
2013-11-17 04:19:29
http://www.wcvb.com/news/national/Defying-the-KGB-How-a-movement-won-freedom/-/9848944/17949586/-/fkkudiz/-/index.html
text/html
utf-8
webpage
Internet Engineering Task Force
http://www.ietf.org/media/2013-11-07-internet-privacy-and-security.html
2013-11-17 04:23:45
attachment
Internet Engineering Task Force
2013-11-17 04:23:46
http://www.ietf.org/media/2013-11-07-internet-privacy-and-security.html
text/html
utf-8
webpage
SFGate
agent
attention
Brown faces
federal
federal agents
federal investigation
information
investigation
kitchen cabinet
laptops
laptops belonging
mother
search warrant
sentencing
special agents
stolen information
widespread attention
writer
Mother of Anonymous-linked writer to be sentenced
DALLAS (AP) â" The mother of a writer and activist connected to the hacking collective Anonymous is set for sentencing for helping hide laptops from federal agents.
http://www.sfgate.com/news/texas/article/Mother-of-Anonymous-linked-writer-to-be-sentenced-4965831.php#src=fb
2013-11-17 04:24:23
attachment
Snapshot
2013-11-17 04:24:23
http://www.sfgate.com/news/texas/article/Mother-of-Anonymous-linked-writer-to-be-sentenced-4965831.php
text/html
utf-8
webpage
The Atlantic
Friedersdorf
Conor
The Surveillance State Puts U.S. Elections at Risk of Manipulation
Imagine what Edward Snowden could have accomplished if he had a different agenda.
Nov 7 2013, 6:00 AM ET
http://www.theatlantic.com/politics/archive/2013/11/the-surveillance-state-puts-us-elections-at-risk-of-manipulation/281232/
2013-11-17 13:05:23
attachment
The Atlantic Print View
2013-11-17 13:05:25
http://www.theatlantic.com/politics/print/2013/11/the-surveillance-state-puts-us-elections-at-risk-of-manipulation/281232/
text/html
utf-8
webpage
MIT Technology Review
Talbot
David
Bruce Schneier Discusses the NSA Documents
The security researcher Bruce Schneier, who is now helping the Guardian newspaper review Snowden documents, suggests that more revelations are on the way.
2013-09-23
http://www.technologyreview.com/news/519336/bruce-schneier-nsa-spying-is-making-us-less-safe/
2013-11-17 13:06:00
attachment
Snapshot
2013-11-17 13:06:00
http://www.technologyreview.com/news/519336/bruce-schneier-nsa-spying-is-making-us-less-safe/
text/html
utf-8
webpage
the Guardian
Davies
Nick
Media
UK news
Phone-hacking trial told NoW safe held intimate details of David Blunkett affair
Court hears that lawyer's safe held recordings of 330 voicemail messages from then home secretary to Kimberly Quinn
2013-11-07
http://www.theguardian.com/uk-news/2013/nov/07/david-blunkett-taped-by-news-of-the-world
2013-11-17 13:06:09
attachment
Snapshot
2013-11-17 13:06:09
http://www.theguardian.com/uk-news/2013/nov/07/david-blunkett-taped-by-news-of-the-world
text/html
utf-8
webpage
POLITICO
Kopan
Tal
National Security Agency
Patrick Leahy
Tal Kopan
Patrick Leahy: NSA ‘can’t keep our secrets’ - Tal Kopan
Sen. Patrick Leahy said Monday that the NSA shouldn’t be trusted with Americans’ secrets when it can’t even keep them safe from “a 29-year-old subcontractor.” “I got the response when we criticized them, ‘Well we’re going to be careful. We’re going to protect these records.’ Baloney. This...
2013-11-04
Patrick Leahy
http://www.politico.com/story/2013/11/patrick-leahy-nsa-cant-keep-our-secrets-99322.html
2013-11-17 13:06:14
attachment
Snapshot
2013-11-17 13:06:14
http://www.politico.com/story/2013/11/patrick-leahy-nsa-cant-keep-our-secrets-99322.html?hp=f3
text/html
utf-8
newspaperArticle
Reuters
Washington
Hosenball
Mark
Strobel
Warren
Edward Snowden
Glenn Greenwald
hong kong
Laura Poitras
Nicolas Maduro
United States
Venezuela
Exclusive: Snowden persuaded other NSA workers to give up passwords - sources
WASHINGTON (Reuters) - Former U.S. National Security Agency contractor Edward Snowden used login credentials and passwords provided unwittingly by colleagues at a spy base in Hawaii to access some of the
Fri Nov 08 03:07:17 UTC 2013
Exclusive
http://www.reuters.com/article/2013/11/08/net-us-usa-security-snowden-idUSBRE9A703020131108
2013-11-17 13:06:27
Reuters
attachment
Snapshot
2013-11-17 13:06:27
http://www.reuters.com/article/2013/11/08/net-us-usa-security-snowden-idUSBRE9A703020131108
text/html
utf-8
webpage
Folha online
análise
apple
auditoria
Brasil
cobertura
cultura
economia
esporte
fotografia
geral
imagem
informação
internacional
jornalismo
linux
loteria
loterias
manchetes
microsoft
noticiário
opinião
polícia
política
resultados
tecnologia
windows
Folha de S.Paulo - Mercado - Governo vai barrar compra de software que impeça auditoria - 05/11/2013
A partir do ano que vem, o governo não comprará mais computadores ou softwares que não permitam auditoria pelo próprio poder público. A nova norma deve ser publicada hoje no "Diário Oficial da União"., A partir do ano que vem, o governo não comprará mais computadores ou softwares que não permitam auditoria pelo próprio poder público. A nova norma deve ser publicada hoje no "Diário Oficial da União".
http://www1.folha.uol.com.br/mercado/2013/11/1366863-governo-vai-barrar-compra-de-software-que-impeca-auditoria.shtml
2013-11-17 13:07:10
attachment
Snapshot
2013-11-17 13:07:10
http://www1.folha.uol.com.br/mercado/2013/11/1366863-governo-vai-barrar-compra-de-software-que-impeca-auditoria.shtml
text/html
windows-1252
newspaperArticle
uknews
Telegraph.co.uk
Barrett
David
david miranda
Edward Snowden
Glenn Greenwald
guardian
MI5
national security
news
paedophile
terrorism
Terrorism in the UK
UK news
Edward Snowden leaks could help paedophiles escape police, says government
Paedophiles and other criminals could benefit from the Guardian newspaper's stories based on leaks by Edward Snowden, the High Court hears
2013-11-06
http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10431337/Edward-Snowden-leaks-could-help-paedophiles-escape-police-says-government.html
2013-11-17 13:07:34
www.telegraph.co.uk
10431337
attachment
Snapshot
2013-11-17 13:07:34
http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/10431337/Edward-Snowden-leaks-could-help-paedophiles-escape-police-says-government.html
text/html
utf-8
webpage
Washington Post
news
Sarah Harrison, the woman from WikiLeaks
LONDON — He didn’t have the space for it, but Gavin MacFadyen needed more bodies. The American running a British think tank for investigative journalism had eight staffers crammed into an...
http://articles.washingtonpost.com/2013-07-05/world/40391729_1_julian-assange-wikileaks-spokesman-meeting-assange
2013-11-17 13:08:27
attachment
Snapshot
2013-11-17 13:08:27
http://articles.washingtonpost.com/2013-07-05/world/40391729_1_julian-assange-wikileaks-spokesman-meeting-assange
text/html
utf-8
webpage
Washington Post
Lee
Timothy B.
NSA
Privacy
Surveillance
Here’s how people are changing their Internet habits to avoid NSA snooping
Users say they spend less time on Gmail, use more encryption software, and much more.
2013-11-07
http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/07/heres-how-people-are-changing-their-internet-habits-to-avoid-nsa-snooping/
2013-11-17 13:08:48
attachment
Snapshot
2013-11-17 13:08:48
http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/07/heres-how-people-are-changing-their-internet-habits-to-avoid-nsa-snooping/
text/html
utf-8
webpage
the Guardian
Pilkington
Ed
Cybercrime
Edward Snowden
GCHQ
Internet
NSA
Surveillance
technology
Tim Berners-Lee
UK news
UK security and counter-terrorism
United States
US national security
World news
Tim Berners-Lee: encryption cracking by spy agencies 'appalling and foolish'
Inventor of world wide web condemns 'dysfunctional and unaccountable' oversight as intelligence chiefs face MPs
2013-11-06
Tim Berners-Lee
http://www.theguardian.com/world/2013/nov/06/tim-berners-lee-encryption-spy-agencies
2013-11-17 13:08:55
attachment
Snapshot
2013-11-17 13:08:55
http://www.theguardian.com/world/2013/nov/06/tim-berners-lee-encryption-spy-agencies
text/html
utf-8
webpage
the Guardian
Washington
Spencer Ackerman in
FBI
Internet
Surveillance
United States
US military
World news
FBI monitored anti-war website in error for six years, documents show
Monitoring began after antiwar.com editor passed along to the bureau a threat he received against his own website • FBI monitoring of antiwar.com – read the documents
2013-11-06
http://www.theguardian.com/world/2013/nov/06/fbi-monitored-anti-war-website-in-error-documents
2013-11-17 13:10:01
attachment
Snapshot
2013-11-17 13:10:01
http://www.theguardian.com/world/2013/nov/06/fbi-monitored-anti-war-website-in-error-documents?CMP=twt_fd&CMP=SOCxx2I2
text/html
utf-8
webpage
the Guardian
York
Adam Gabbatt in New
Al Gore
Canada
Edward Snowden
NSA
The NSA files
United States
US constitution and civil liberties
US politics
Al Gore: Snowden 'revealed evidence' of crimes against US constitution
Speaking at McGill University in Montreal, Gore said the NSA's efforts to monitor communications had gone to 'absurd' lengths
2013-11-06
Al Gore
http://www.theguardian.com/world/2013/nov/06/al-gore-snowden-revealed-evidence-crimes-nsa
2013-11-17 13:10:33
attachment
Snapshot
2013-11-17 13:10:33
http://www.theguardian.com/world/2013/nov/06/al-gore-snowden-revealed-evidence-crimes-nsa
text/html
utf-8
webpage
Washington Post
Gellman
Barton
Soltani
Ashkan
Peterson
rea
Edward Snowden
Keith Alexander
NSA Leaks
How we know the NSA had access to internal Google and Yahoo cloud data
New documents reveal exactly how the Post was able to determine that the NSA was peeking inside the Google and Yahoo's cloud network.
2013-11-04
http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/how-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data/
2013-11-17 13:11:45
attachment
Snapshot
2013-11-17 13:11:45
http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/how-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data/
text/html
utf-8
webpage
50% Think Feds Likely to Have Looked at Internet Activity of Someone in Their Family - Rasmussen Reports™
2013-11-05
http://www.rasmussenreports.com/public_content/lifestyle/general_lifestyle/november_2013/50_think_feds_likely_to_have_looked_at_internet_activity_of_someone_in_their_family
2013-11-17 13:11:54
attachment
50% Think Feds Likely to Have Looked at Internet Activity of Someone in Their Family - Rasmussen Reports™
2013-11-17 13:11:55
http://www.rasmussenreports.com/public_content/lifestyle/general_lifestyle/november_2013/50_think_feds_likely_to_have_looked_at_internet_activity_of_someone_in_their_family
text/html
utf-8
webpage
Wikileaks
Harrison
Sarah
Statement by Sarah Harrison
2013-11-06
http://wikileaks.org/Statement-by-Sarah-Harrison-on.html
2013-11-17 13:12:04
attachment
Statement by Sarah Harrison
2013-11-17 13:12:05
http://wikileaks.org/Statement-by-Sarah-Harrison-on.html
text/html
utf-8
webpage
AllThingsD
Paczkowski
John
apple. fisa
atd facebook
featured post
Foreign Intelligence Surveillance Court
general
government
news
NSA
Privacy
Apple: “Our Business Does Not Depend on Collecting Personal Data”
Apple publishes its first formal report on federal government data requests.
2013-11-05
Apple
http://allthingsd.com/20131105/apple-our-business-does-not-depend-on-collecting-personal-data/
2013-11-17 13:12:30
attachment
Snapshot
2013-11-17 13:12:30
http://allthingsd.com/20131105/apple-our-business-does-not-depend-on-collecting-personal-data/?mod=atd_homepage_carousel
text/html
utf-8
webpage
the Guardian
Watt
Nicholas
Correspondent
Chief Political
Data protection
david miranda
GCHQ
Liam Fox
MI5
MI6
NSA
politics
The NSA files
UK news
UK security and counter-terrorism
United States
World news
Threat from NSA leaks may have been overstated by UK, says Lord Falconer
Ex-lord chancellor defends Guardian reporting of Snowden files and says he's sceptical of warnings from spy agency chiefs
2013-11-17
http://www.theguardian.com/world/2013/nov/17/threat-nsa-leaks-snowden-files
2013-11-17 21:02:26
attachment
Snapshot
2013-11-17 21:02:26
http://www.theguardian.com/world/2013/nov/17/threat-nsa-leaks-snowden-files
text/html
utf-8
webpage
Acohido
Byron
Snowden effect: young people now care about privacy
Snowden's whistleblowing prompts consumers to heed privacy settings
2013-11-13
Snowden effect
http://www.usatoday.com/story/cybertruth/2013/11/13/snowden-effect-young-people-now-care-about-privacy/3517919/
2013-11-17 21:02:53
attachment
Snapshot
2013-11-17 21:02:53
http://www.usatoday.com/story/cybertruth/2013/11/13/snowden-effect-young-people-now-care-about-privacy/3517919/
text/html
utf-8
newspaperArticle
Spiegel Online
Poitras
Laura
Rosenbach
Marcel
Stark
Holger
GCHQ Monitors Hotel Reservations to Track Diplomats
Britain's GCHQ intelligence service monitors diplomats' travels using a sophisticated automated system that tracks hotel bookings. Once a room has been identified, it opens the door to a variety of spying options.
17.11.2013
http://www.spiegel.de/international/europe/gchq-monitors-hotel-reservations-to-track-diplomats-a-933914.html
2013-11-17 21:03:45
Spiegel Online
attachment
GCHQ Monitors Hotel Reservations to Track Diplomats - SPIEGEL ONLINE
2013-11-17 21:03:49
http://www.spiegel.de/international/europe/gchq-monitors-hotel-reservations-to-track-diplomats-a-933914.html
text/html
windows-1252
webpage
Washington Post
Fisher
Max
director of national intelligence
DNC
electronic surveillance
FISA
Fisa court
Foreign Intelligence Surveillance Act
intelligence
james clapper
National Security Agency
NSA
section 501
Surveillance
Declassified FISA court documents on intelligence collection
Director of National Intelligence James Clapper declassified documents about intelligence collection under Section 501 of the Foreign Intelligence Surveillance Act on Sept. 10, 2013.
2013-09-10
http://apps.washingtonpost.com/g/page/world/declassified-fisa-court-documents-on-intelligence-collection/447/
2013-11-17 21:06:06
attachment
Snapshot
2013-11-17 21:06:06
http://apps.washingtonpost.com/g/page/world/declassified-fisa-court-documents-on-intelligence-collection/447/
text/html
utf-8
magazineArticle
Rusbridger
Alan
The Snowden Leaks and the Public
November 21, 2013
http://www.nybooks.com/articles/archives/2013/nov/21/snowden-leaks-and-public/
2013-11-17 21:08:11
The New York Review of Books
The New York Review of Books
ISSN 0028-7504
attachment
NYRB Snapshot
2013-11-17 21:08:31
http://www.nybooks.com/articles/archives/2013/nov/21/snowden-leaks-and-public/?pagination=false
text/html
utf-8
newspaperArticle
Dilanian
Ken
Stobart
Janet
White House OKd spying on allies, U.S. intelligence officials say
NSA and other U.S. intelligence agency staff members are said to be angry at President Obama for denying knowledge of the spying.
2013-10-28
en-US
http://www.latimes.com/world/la-fg-spying-phones-20131029,0,3235295.story#axzz2j8kFh15q
2013-11-17 21:08:16
LA Times
Los Angeles Times
ISSN 0458-3035
attachment
LA Times Snapshot
2013-11-17 21:08:42
http://www.latimes.com/world/la-fg-spying-phones-20131029,0,3235295.story#axzz2j8kFh15q
text/html
utf-8
blogPost
Foreign Policy Blogs
NSA
Intel Vets: Of Course Obama Knew About NSA Spying
Tuesday, October 29, 2013
http://thecable.foreignpolicy.com/posts/2013/10/29/intelligence_vets_of_course_obama_knew_about_nsa_spying
2013-11-17 21:08:19
Intel Vets
attachment
Foreign Policy Snapshot
2013-11-17 21:08:51
http://thecable.foreignpolicy.com/posts/2013/10/29/intelligence_vets_of_course_obama_knew_about_nsa_spying?page=full
text/html
utf-8
webpage
ELMUNDO
cooperación
documento
España
Estados Unidos
información
Inteligencia Central
El CNI facilitó el espionaje masivo de EEUU a España
La intrusión del Servicio de Inteligencia estadounidense en la vida cotidiana de millones de españoles fue más fruto de la cooperación entre ambos países que de un abuso de poder n
2013-10-30T06:55:33+01:00
http://www.elmundo.es/espana/2013/10/30/5270985d63fd3d7d778b4576.html
2013-11-17 21:09:36
attachment
Snapshot
2013-11-17 21:09:36
http://www.elmundo.es/espana/2013/10/30/5270985d63fd3d7d778b4576.html
text/html
iso-8859-15
webpage
Civil Rights
NSA Leaks
politics
Sept. 11 terrorist attacks
U.S.
Revealed: NSA pushed 9/11 as key 'sound bite' to justify surveillance | Al Jazeera America
An internal document recommended that officials use fear of attack when pressed to explain agency's programs
Revealed
http://america.aljazeera.com/articles/2013/10/30/revealed-nsa-pushed911askeysoundbitetojustifysurveillance.html
2013-11-17 21:16:37
attachment
Snapshot
2013-11-17 21:16:37
http://america.aljazeera.com/articles/2013/10/30/revealed-nsa-pushed911askeysoundbitetojustifysurveillance.html
text/html
utf-8
webpage
the Guardian
Hern
Alex
Computing
Edward Snowden
Email
GCHQ
Gmail
Google
Internet
microsoft
Surveillance
technology
The NSA files
UK news
United States
World news
Yahoo
Darkmail opens: New email encryption standard aims to keep government agencies out
Silent Circle and Lavabit hope to respond to Snowden leaks with service stopping 'state snoopers' accessing email metadata
2013-10-30
Darkmail opens
http://www.theguardian.com/technology/2013/oct/30/darkmail-encryption-inbox-silent-circle-lavabit
2013-11-17 21:17:05
attachment
Snapshot
2013-11-17 21:17:05
http://www.theguardian.com/technology/2013/oct/30/darkmail-encryption-inbox-silent-circle-lavabit
text/html
utf-8
blogPost
Foreign Policy Blogs
NSA
NSA Bombshell Shocks Former Spooks: "Why in The World Would We Burn Google?"
Wednesday, October 30, 2013
http://thecable.foreignpolicy.com/posts/2013/10/30/nsa_bombshell_shocks_former_spooks_why_in_the_world_would_we_burn_google
2013-11-17 21:17:15
NSA Bombshell Shocks Former Spooks
attachment
Foreign Policy Snapshot
2013-11-17 21:17:46
http://thecable.foreignpolicy.com/posts/2013/10/30/nsa_bombshell_shocks_former_spooks_why_in_the_world_would_we_burn_google?page=full
text/html
utf-8
newspaperArticle
worldnews
Telegraph.co.uk
Squires
Nick
conclave
Europe
Italy
news
NSA
Pope Francis
US spying
Vatican
World news
US 'spied on future Pope Francis during Vatican conclave'
NSA spied on the future Pope Francis before and during the Vatican conclave at which he was chosen to succeed Benedict XVI
2013-10-30
http://www.telegraph.co.uk/news/worldnews/europe/vaticancityandholysee/10415228/US-spied-on-future-Pope-Francis-during-Vatican-conclave.html
2013-11-17 21:17:28
www.telegraph.co.uk
10415228
attachment
Snapshot
2013-11-17 21:17:28
http://www.telegraph.co.uk/news/worldnews/europe/italy/10415228/US-spied-on-future-Pope-Francis-during-Vatican-conclave.html
text/html
utf-8
webpage
Yahoo News
Report: Snowden gets tech support job in Russia
MOSCOW (AP) — Anatoly Kucherena, a lawyer for former NSA systems analyst Edward Snowden, says his client has found a technical support job at a Russian website.
Report
http://news.yahoo.com/report-snowden-gets-tech-support-job-russia-111107200--finance.html
2013-11-17 21:17:36
attachment
Snapshot
2013-11-17 21:17:36
http://news.yahoo.com/report-snowden-gets-tech-support-job-russia-111107200--finance.html
text/html
utf-8
webpage
Talking Points Memo
Thompson
Catherine
NSA Chief: 'To My Knowledge' Agency Didn't Tap Google, Yahoo Data Centers
National Security Agency Director Keith Alexander on Wednesday denied knowledge of an agency program that reportedly tapped Google and Yahoo data centers around the world without the companies' knowledge.
2013-11-17
NSA Chief
http://talkingpointsmemo.com/livewire/nsa-chief-to-my-knowledge-agency-didn-t-tap-google-yahoo-data-centers
2013-11-17 21:18:09
attachment
Snapshot
2013-11-17 21:18:09
http://talkingpointsmemo.com/livewire/nsa-chief-to-my-knowledge-agency-didn-t-tap-google-yahoo-data-centers
text/html
utf-8
newspaperArticle
World
The New York Times
ISSN 0362-4331
Landler
Mark
Schmidt
Michael S.
Alexander, Keith B
Clapper, James R Jr
Espionage and Intelligence Services
National Security Agency
Obama, Barack
Spying Known at Top Levels, Officials Say
The White House has long been aware in general terms of the National Security Agency's overseas eavesdropping, the nation's top spymaster told a House hearing on Tuesday.
2013-10-29
http://www.nytimes.com/2013/10/30/world/officials-say-white-house-knew-of-spying.html
2013-11-17 21:18:52
NYTimes.com
attachment
New York Times Snapshot
2013-11-17 21:18:52
http://www.nytimes.com/2013/10/30/world/officials-say-white-house-knew-of-spying.html?partner=rss&emc=rss&smid=tw-nytimesworld&_r=1&
text/html
utf-8
blogPost
Foreign Policy Blogs
Groll
Elias
intelligence
national security
NSA
russia
Bugged Bears, Spy Irons, and the Pope: Global Spying Went Nuts Today
Wednesday, October 30, 2013
http://blog.foreignpolicy.com/posts/2013/10/30/this_is_the_day_spying_allegations_went_totally_insane
2013-11-17 21:18:57
Bugged Bears, Spy Irons, and the Pope
attachment
Foreign Policy Snapshot
2013-11-17 21:19:16
http://blog.foreignpolicy.com/posts/2013/10/30/this_is_the_day_spying_allegations_went_totally_insane?page=full
text/html
utf-8
webpage
MSNBC
NSA chief responds to bombshell hacking allegations
NSA director Keith Alexander responds to a new report that the NSA has hacked into Google and Yahoo's data centers.
http://www.msnbc.com/msnbc/thats-never-happened
2013-11-17 21:19:01
attachment
Snapshot
2013-11-17 21:19:01
http://www.msnbc.com/msnbc/thats-never-happened
text/html
utf-8
newspaperArticle
Technology
The New York Times
ISSN 0362-4331
Miller
Charlie Savage, Claire Cain
Perlroth
Nicole
Computers and the Internet
Espionage and Intelligence Services
Google Inc
Government Communications Headquarters (Great Britain)
National Security Agency
Snowden, Edward J
Surveillance of Citizens by Government
Yahoo! Inc
N.S.A. Said to Tap Google and Yahoo Abroad
Unbeknown to Google and Yahoo, the National Security Agency and its British counterpart have tapped into the search engines abroad, where data collection faces less oversight.
2013-10-30
http://www.nytimes.com/2013/10/31/technology/nsa-is-mining-google-and-yahoo-abroad.html
2013-11-17 21:19:11
NYTimes.com
attachment
New York Times Snapshot
2013-11-17 21:19:11
http://www.nytimes.com/2013/10/31/technology/nsa-is-mining-google-and-yahoo-abroad.html?hp&_r=0&pagewanted=all
text/html
utf-8
webpage
The Wall Street Journal
Dwoskin
Elizabeth
aapl
acxiom
acxm
advertising
advertising/marketing/public relations
apple
business/consumer services
cellular/mobile phones
computers/electronics
Computing
consumer electronics
consumer goods
content types
corporate/industrial news
digital marketing
durable household products
electronic consumer goods
facebook
factiva filters
fb
fc&e industry news filter
goog
Google
handheld electronic devices
home electronics/appliances
internet/online
internet search engines
marketing
mark naples
media/entertainment
michael schoen
microsoft
mobile communications equipment
msft
ryan calo
scott meyer
scott shapiro
smart phones
social media
software
steve sullivan
systems software
technology
telecommunications equipment
zach coelius
The end could be near for online cookie tracking, if Google and Microsoft have their way
Microsoft and Google have said they are developing systems to plug into and control the river of Web data in ways that bypass the more than a thousand software companies that place cookies on websites.
2013-10-28
http://m.us.wsj.com/articles/SB10001424052702304682504579157780178992984?mobile=y
2013-11-17 21:19:48
attachment
Snapshot
2013-11-17 21:19:48
http://m.us.wsj.com/articles/SB10001424052702304682504579157780178992984?mobile=y
text/html
utf-8
magazineArticle
Gallagher
Ryan
Meet the “Dark Mail Alliance” Planning to Keep the NSA Out of Your Inbox
Oct. 30 2013
en-US
http://www.slate.com/blogs/future_tense/2013/10/30/dark_mail_alliance_lavabit_silent_circle_team_up_to_create_surveillance.html
2013-11-17 21:20:32
Slate
SlateISSN 1091-2339
attachment
Slate Snapshot
2013-11-17 21:20:36
http://www.slate.com/blogs/future_tense/2013/10/30/dark_mail_alliance_lavabit_silent_circle_team_up_to_create_surveillance.single.html
text/html
utf-8
webpage
Reason.com
Napolitano
Andrew
Barack Obama
Civil Liberties
HomePage
NSA
Policy
Surveillance
Spying on the President
The latest outrage from the NSA.
2013-10-31
http://reason.com/archives/2013/10/31/spying-on-the-president
2013-11-17 21:21:08
attachment
Snapshot
2013-11-17 21:21:08
http://reason.com/archives/2013/10/31/spying-on-the-president
text/html
utf-8
webpage
Washington Post
Peterson
Andrea
Google
NSA Leaks
Prism
Yahoo
PRISM already gave the NSA access to tech giants. Here’s why it wanted more.
The NSA already legally compelled tech companies to give it data via PRISM. So why did it hack into data links?
2013-10-30
http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/30/prism-already-gave-the-nsa-access-to-tech-giants-heres-why-it-wanted-more/
2013-11-17 21:21:19
attachment
Snapshot
2013-11-17 21:21:19
http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/30/prism-already-gave-the-nsa-access-to-tech-giants-heres-why-it-wanted-more/
text/html
utf-8
newspaperArticle
Le Monde Diplomatique
Follorou
Jacques
Surveillance : la DGSE a transmis des données à la NSA américaine
"Le Monde" révèle que les services secrets français et américain ont un protocole d'échange systématique des données depuis 2011.
2013-10-30
fr
Surveillance
http://www.lemonde.fr/international/article/2013/10/30/surveillance-la-dgse-a-transmis-des-donnees-a-la-nsa-americaine_3505266_3210.html
2013-11-17 21:21:27
attachment
Snapshot
2013-11-17 21:21:27
http://www.lemonde.fr/international/article/2013/10/30/surveillance-la-dgse-a-transmis-des-donnees-a-la-nsa-americaine_3505266_3210.html
text/html
utf-8
newspaperArticle
World / Europe
The New York Times
ISSN 0362-4331
Mazzetti
Mark
Sanger
David E.
Clapper, James R Jr
Espionage and Intelligence Services
Germany
Merkel, Angela
National Security Agency
Wiretapping and Other Eavesdropping Devices and Methods
Tap on Merkel Provides Peek at Vast Spy Net
The National Security Agency's monitoring is not limited to politicians like Chancellor Angela Merkel of Germany -- it also includes party leaders and aides, and it's all part of efforts to gain an edge over other nations.
2013-10-30
http://www.nytimes.com/2013/10/31/world/europe/tap-on-merkel-provides-peek-at-vast-spy-net.html
2013-11-17 21:21:33
NYTimes.com
attachment
New York Times Snapshot
2013-11-17 21:21:33
http://www.nytimes.com/2013/10/31/world/europe/tap-on-merkel-provides-peek-at-vast-spy-net.html?_r=0&pagewanted=all
text/html
utf-8
webpage
NPR.org
Memmott
Mark
Edward Snowden Has Job At Russian Website, Lawyer Says
The "NSA leaker" will start working Friday, his attorney claims. He's been given asylum in Russia.
2013-10-31
http://www.npr.org/blogs/thetwo-way/2013/10/31/242067739/edward-snowden-has-job-at-russian-website-lawyer-says
2013-11-17 21:21:57
attachment
Snapshot
2013-11-17 21:21:57
http://www.npr.org/blogs/thetwo-way/2013/10/31/242067739/edward-snowden-has-job-at-russian-website-lawyer-says?ft=1&f=103943429&utm_content=socialflow&utm_campaign=nprnews&utm_source=npr&utm_medium=twitter
text/html
utf-8
newspaperArticle
Los Angeles Times
ISSN 0458-3035
Schiff
Adam B.
An NSA fix
The NSA metadata program as it's now structured must end -- but it could be reconfigured.
2013-10-31
en-US
http://www.latimes.com/opinion/commentary/la-oe-schiff-nsa-surveillance-phone-metadata--20131031,0,4107687.story#axzz2kwMCa7LM
2013-11-17 21:23:12
LA Times
attachment
LA Times Snapshot
2013-11-17 21:23:23
http://www.latimes.com/opinion/commentary/la-oe-schiff-nsa-surveillance-phone-metadata--20131031,0,4107687.story#axzz2kwMCa7LM
text/html
utf-8
webpage
Ashkan Soltani
Soltani
Ashkan
TLS - A simple step to improve cloud email security
The Washington Post published a new piece by Barton Gellman and myself on Wednesday that revealed new insights into how the NSA conducts surveillance on US technology companies. Specifically, we de...
2013-11-01
http://ashkansoltani.org/2013/11/01/tls-a-simple-step-to-improve-cloud-email-security/
2013-11-17 21:23:28
attachment
Snapshot
2013-11-17 21:23:28
http://ashkansoltani.org/2013/11/01/tls-a-simple-step-to-improve-cloud-email-security/
text/html
utf-8
webpage
Ars Technica
Mullin
Joe
Feinstein debuts NSA “reform” bill that’s really about the status quo
A battle is brewing in Congress between surveillance reformers and hawks.
2013-10-31
http://arstechnica.com/tech-policy/2013/10/feinstein-shows-off-nsa-reform-bill-thats-really-about-the-status-quo/
2013-11-17 21:23:38
attachment
Snapshot
2013-11-17 21:23:38
http://arstechnica.com/tech-policy/2013/10/feinstein-shows-off-nsa-reform-bill-thats-really-about-the-status-quo/
text/html
utf-8
webpage
the Guardian
Halliday
Josh
Extradition
Gary McKinnon
Hacking
Law
Nasa
Richard O'Dwyer
technology
UK criminal justice
UK news
United States
US military
US national security
World news
Nasa hacking case: mothers accuse US of targeting British 'geeks'
Parents of Gary McKinnon and Richard O'Dwyer back Lauri Love, who is accused of breaking into US military networks
2013-10-29
Nasa hacking case
http://www.theguardian.com/technology/2013/oct/29/nasa-hacking-case
2013-11-17 21:23:46
attachment
Snapshot
2013-11-17 21:23:46
http://www.theguardian.com/technology/2013/oct/29/nasa-hacking-case?CMP=twt_gu
text/html
utf-8
webpage
RP ONLINE
berlin.interview
Deutschland
FDP
Hans-Peter Friedrich
Kanzlerin-Handy
Sachverhalt
Untersuchungsausschuss
USA
Interview mit Hans-Peter Friedrich: 'Notfalls müssen wir Diplomaten ausweisen'
Der Bundesinnenminister Hans-Peter Friedrich spricht im Interview mit unserer Redaktion über das abgehörte Kanzlerin-Handy, über einen möglichen Untersuchungsausschuss zur NSA-Affäre - und über die Kooperation mit der SPD.
Interview mit Hans-Peter Friedrich
http://www.rp-online.de/politik/deutschland/notfalls-muessen-wir-diplomaten-ausweisen-aid-1.3781710
2013-11-17 21:24:01
attachment
Snapshot
2013-11-17 21:24:01
http://www.rp-online.de/politik/deutschland/notfalls-muessen-wir-diplomaten-ausweisen-aid-1.3781710
text/html
utf-8
webpage
the Guardian
Roberts
Dan
Washington
Spencer Ackerman in
Baltimore
Paul Lewis in
Data protection
Germany
john kerry
NSA
Privacy
Surveillance
technology
United States
US foreign policy
World news
US surveillance has gone too far, John Kerry admits
Kerry says certain practices occurred 'on autopilot' and vows to meet allies to repair damage caused by NSA spying revelations
2013-10-31
http://www.theguardian.com/world/2013/oct/31/john-kerry-some-surveillance-gone-too-far
2013-11-17 21:24:13
attachment
Snapshot
2013-11-17 21:24:13
http://www.theguardian.com/world/2013/oct/31/john-kerry-some-surveillance-gone-too-far
text/html
utf-8
webpage
the Guardian
Washington
Spencer Ackerman in
NSA
Surveillance
United States
World news
NSA giving 'a lot of thought' to privacy rights of overseas citizens – top lawyer
Robert Litt's acknowledgment comes a day after NSA chief says agency is open to scaling back surveillance on foreign leaders
2013-10-31
http://www.theguardian.com/world/2013/oct/31/nsa-giving-a-lot-of-thought-to-privacy-rights-of-overseas-citizens-top-lawyer
2013-11-17 21:24:21
attachment
Snapshot
2013-11-17 21:24:21
http://www.theguardian.com/world/2013/oct/31/nsa-giving-a-lot-of-thought-to-privacy-rights-of-overseas-citizens-top-lawyer
text/html
utf-8
newspaperArticle
Spiegel Online
Fischer
Sebastian
Schmitz
Gregor Peter
NSA Scandal: Germany Seeks Spying Concessions at White House
German diplomats have traveled to Washington to express anger over surveillance of Chancellor Angela Merkel's phone -- but they have yet to make headway. The Obama administration seems "almost helpless" in the face of continued leaks, says one diplomat.
31.10.2013
NSA Scandal
http://www.spiegel.de/international/germany/nsa-scandal-germany-seeks-spying-concessions-at-white-house-a-930975.html
2013-11-17 21:24:42
Spiegel Online
attachment
NSA Scandal: Germany Seeks Spying Concessions at White House - SPIEGEL ONLINE
2013-11-17 21:24:45
http://www.spiegel.de/international/germany/nsa-scandal-germany-seeks-spying-concessions-at-white-house-a-930975.html
text/html
windows-1252
newspaperArticle
Reuters
Washington
Hosenball
Mark
Angela Merkel
Barack Obama
Edward Snowden
Germany
Greece
Italy
Leon Panetta
Loch K. Johnson
Paul Pillar
Spain
United States
Obama halted NSA spying on IMF and World Bank headquarters
WASHINGTON (Reuters) - President Barack Obama has ordered the National Security Agency to stop eavesdropping on the headquarters of the International Monetary Fund and World Bank as part of a review of
Thu Oct 31 22:49:33 UTC 2013
http://www.reuters.com/article/2013/10/31/us-usa-security-imf-idUSBRE99U1EQ20131031
2013-11-17 21:24:51
Reuters
attachment
Snapshot
2013-11-17 21:24:51
http://www.reuters.com/article/2013/10/31/us-usa-security-imf-idUSBRE99U1EQ20131031
text/html
utf-8
webpage
Troianovski
Anton
acquisitions
acquisitions/mergers/takeovers
at&t
content types
corporate actions
corporate crime/legal/judicial
corporate/industrial news
deutsche telekom
dte.xe
factiva filters
fc&e executive news filter
fc&e industry news filter
ownership changes
political/general news
privacy issues
t
telecommunications
verizon communications
vod
vodafone group
vod.ln
vz
wireless telecommunications services
AT&T's plan to expand in Europe hits problems amid the outcry over surveillance by the National Security Agency
AT&T's plan to expand in Europe has run into problems amid the outcry across the region over surveillance by the National Security Agency.
2013-10-30
http://online.wsj.com/news/articles/SB10001424052702304073204579167873091999730
2013-11-17 21:26:49
attachment
Snapshot
2013-11-17 21:26:49
http://online.wsj.com/news/articles/SB10001424052702304073204579167873091999730
text/html
utf-8
webpage
armed forces
commentary/opinion
content types
domestic politics
espionage
factiva filters
fc&e executive news filter
national security
political/general news
politics/international relations
R. James Woolsey: Why Spying on Angela Merkel Is So Damaging
In The Wall Street Journal, former CIA chief R. James Woolsey writes that the White House leadership vacuum has made Europeans wary, and the surveillance scandal strengthens their doubts.
R. James Woolsey
http://online.wsj.com/news/articles/SB10001424052702303471004579165293684348658?mod=WSJ_Opinion_LEADTop
2013-11-17 21:26:59
attachment
Snapshot
2013-11-17 21:26:59
http://online.wsj.com/news/articles/SB10001424052702303471004579165293684348658?mod=WSJ_Opinion_LEADTop
text/html
utf-8
webpage
the Guardian
team
Guardian US interactive
MacAskill
Ewen
NSA
Privacy
Surveillance
The NSA files
United States
US national security
World news
NSA files decoded: Edward Snowden's surveillance revelations explained
In the last five months, the NSA's surveillance practices have been revealed to be a massive international operation, staggering in scope. But how do all of the NSA's programmes fit together – and what does it mean for you?
2013-11-01
NSA files decoded
http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded
2013-11-17 21:27:25
attachment
Snapshot
2013-11-17 21:27:25
http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/2
text/html
utf-8
webpage
The Atlantic
'Let Me Stress How Shocking These NSA Revelations Are': A View From Inside the Defense World
"At some point it is wise to ascribe adult levels of understanding to the principal actors in this drama, no matter how impenetrable their deeper motives."
Oct 31 2013, 4:35 PM ET
'Let Me Stress How Shocking These NSA Revelations Are'
http://www.theatlantic.com/politics/archive/2013/10/let-me-stress-how-shocking-these-nsa-revelations-are-a-view-from-inside-the-defense-world/281052/
2013-11-17 21:28:45
attachment
The Atlantic Print View
2013-11-17 21:28:49
http://www.theatlantic.com/politics/print/2013/10/let-me-stress-how-shocking-these-nsa-revelations-are-a-view-from-inside-the-defense-world/281052/
text/html
utf-8
newspaperArticle
World / Americas
The New York Times
ISSN 0362-4331
Romero
Simon
Brazil
Brazilian Intelligence Agency
Espionage and Intelligence Services
National Security Agency
Rousseff, Dilma
Surveillance of Citizens by Government
Brazil Says It Spied on U.S. and Others Inside Its Borders
The government said its top intelligence agency had spied on diplomatic targets from countries including the United States, putting officials on the defensive.
2013-11-04
http://www.nytimes.com/2013/11/05/world/americas/brazil-acknowledges-spying-on-diplomats-from-us.html
2013-11-17 21:28:59
NYTimes.com
attachment
New York Times Snapshot
2013-11-17 21:28:59
http://www.nytimes.com/2013/11/05/world/americas/brazil-acknowledges-spying-on-diplomats-from-us.html
text/html
utf-8
newspaperArticle
World
The New York Times
ISSN 0362-4331
Shane
Scott
Espionage and Intelligence Services
National Security Agency
Snowden, Edward J
Surveillance of Citizens by Government
Wiretapping and Other Eavesdropping Devices and Methods
No Morsel Too Minuscule for All-Consuming N.S.A.
The National Security Agency finds itself under intense pressure after disclosures of spying on allies and rivals alike, but it defends the wide net it casts.
2013-11-02
http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html
2013-11-17 21:29:03
NYTimes.com
attachment
New York Times Snapshot
2013-11-17 21:29:03
http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consuming-nsa.html?pagewanted=1&_r=0&partner=rss&emc=rss
text/html
utf-8
webpage
Pareene
Alex
Bob Schieffer
Edward Snowden
Leaks
NSA
nsa leak
Opening Shot
Salon.com
Video
Schieffer on Snowden: This kid is a jerk because Dr. King and 9/11
Old man does not care for young whistle-blowing "narcissist" VIDEO
2013-06-17
Schieffer on Snowden
http://www.salon.com/2013/06/17/schieffer_on_snowden_this_kid_is_a_jerk_because_dr_king_and_911/
2013-11-17 21:29:13
attachment
Snapshot
2013-11-17 21:29:13
http://www.salon.com/2013/06/17/schieffer_on_snowden_this_kid_is_a_jerk_because_dr_king_and_911/
text/html
utf-8
webpage
The Independent
Williams
Holly
Agent provocateur: Inside the secret archives of East Germany's secret police
While the recent leaking of government-surveillance information hasn't exactly been welcomed by the secret services behind it, an exception comes in the form of the documents obtained by the spies of the Stasi, the Ministry for State Security run by the former German Democratic Republic (GDR).
2013-11-03
Agent provocateur
http://www.independent.co.uk/news/world/europe/agent-provocateur-inside-the-secret-archives-of-east-germanys-secret-police-8914056.html
2013-11-17 21:29:20
attachment
Snapshot
2013-11-17 21:29:20
http://www.independent.co.uk/news/world/europe/agent-provocateur-inside-the-secret-archives-of-east-germanys-secret-police-8914056.html
text/html
utf-8
webpage
the Guardian
Hopkins
Nick
Taylor
Matthew
David Blunkett
espionage
GCHQ
Labour
MI5
MI6
NSA
politics
Surveillance
UK news
UK security and counter-terrorism
United States
US national security
World news
David Blunkett calls for urgent review of laws governing security services
Former home secretary urges update of safeguards over spy agencies, saying 'we have to protect ourselves from ourselves'
2013-11-04
http://www.theguardian.com/world/2013/nov/04/david-blunkett-review-laws-security-services
2013-11-17 21:31:21
attachment
Snapshot
2013-11-17 21:31:21
http://www.theguardian.com/world/2013/nov/04/david-blunkett-review-laws-security-services
text/html
utf-8
newspaperArticle
Spiegel Online
Edward Snowden
National Security Agency
Trans-Atlantic Free Trade
Trans-Atlantic Relations
United States
whistleblowers
NSA Scandal: Berlin Restricted By Close Relationship with US Intelligence
Chancellor Merkel might be furious about the NSA's unscrupulous surveillance activities, but reluctance to anger her partners in Washington prevents her from imposing sanctions. Trade issues aside, Germany itself depends heavily on intelligence gathered by the US agency. By SPIEGEL Staff
04.11.2013
NSA Scandal
http://www.spiegel.de/international/world/nsa-scandal-berlin-restricted-by-close-relationship-with-us-intelligence-a-931503.html
2013-11-17 21:31:42
Spiegel Online
attachment
NSA Scandal: Berlin Restricted By Close Relationship with US Intelligence - SPIEGEL ONLINE
2013-11-17 21:31:46
http://www.spiegel.de/international/world/nsa-scandal-berlin-restricted-by-close-relationship-with-us-intelligence-a-931503.html
text/html
windows-1252
webpage
McClatchy
Watkins
Ali
database
metadata
NSA
Patrick Kelley
Privacy and Civil Liberites Oversight Board
Rajesh De
search
telephone
terrorist plots
WASHINGTON: NSA official cites ‘stop and frisk’ in effort to explain searches of phone records | National Security & Defense | McClatchy DC
The general counsel of the National Security Agency on Monday compared the agency’s telephone metadata collection program to the highly controversial “stop-and-frisk” practice used by law enforcement officers, saying the agency uses that same standard to choose which phone numbers to query in its database.
2013-11-04
WASHINGTON
http://www.mcclatchydc.com/2013/11/04/207478/nsa-official-cites-stop-and-frisk.html
2013-11-17 21:32:07
attachment
Snapshot
2013-11-17 21:32:07
http://www.mcclatchydc.com/2013/11/04/207478/nsa-official-cites-stop-and-frisk.html
text/html
utf-8
webpage
The American Conservative
Vlahos
Kelley
Snowden Shakes Up Washington
NSA revelations are challenging preconceptions of whistleblowing and journalism.
2013-11-05
http://www.theamericanconservative.com/articles/snowden-shakes-up-washington/
2013-11-17 21:32:38
attachment
Snapshot
2013-11-17 21:32:38
http://www.theamericanconservative.com/articles/snowden-shakes-up-washington/
text/html
utf-8
webpage
New York Times
Wayner
Peter
Traveling the Web Invisibly, Through a One-Way Mirror
1997-11-05
http://www.nytimes.com/library/cyber/under/110597under-wayner.html
2013-11-17 21:36:13
attachment
Traveling the Web Invisibly, Through a One-Way Mirror
2013-11-17 21:36:14
http://www.nytimes.com/library/cyber/under/110597under-wayner.html
text/html
windows-1252
webpage
Schwartz
John
Corporate Case in Ohio Raises Questions on Internet Anonymity
2000-10-17
http://emoglen.law.columbia.edu/LIS/archive/anonymity/17ONLI.html
2013-11-17 21:36:31
attachment
Corporate Case in Ohio Raises Questions on Internet Anonymity
2013-11-17 21:36:32
http://emoglen.law.columbia.edu/LIS/archive/anonymity/17ONLI.html
text/html
windows-1252
webpage
The Verge
New York state lawmakers challenge anonymous online speech with proposed bill
New York state lawmakers Dean Murray (R) and Thomas O'Mara (R) have proposed bills that would either unmask anonymous commenters by public request, or force website administrators to delete...
http://www.theverge.com/2012/5/22/3037585/new-york-state-legislators-anonymous-speech
2013-11-17 21:36:48
attachment
Snapshot
2013-11-17 21:36:48
http://www.theverge.com/2012/5/22/3037585/new-york-state-legislators-anonymous-speech
text/html
utf-8
webpage
Moglen
Eben
So Much for Savages: Navajo 1, Government 0 in Final Moments of Play
1999-03
http://old.law.columbia.edu/my_pubs/yu-encrypt.html
2013-11-17 21:37:21
attachment
So Much for Savages: Navajo 1, Government 0 in Final Moments of Play
2013-11-17 21:37:22
http://old.law.columbia.edu/my_pubs/yu-encrypt.html
text/html
windows-1252
newspaperArticle
Los Angeles Times
ISSN 0458-3035
board
The Times editorial
NSA's metadata program: End it, don't mend it
The NSA's bulk metadata collection program intrudes on the privacy of virtually every American; Congress must set stricter limits.
2013-11-05
en-US
NSA's metadata program
http://www.latimes.com/opinion/editorials/la-ed-nsa-feinstein-lahey-sensenbrenner-20131105,0,3426125.story#axzz2joDGB6Up
2013-11-17 21:44:33
LA Times
attachment
LA Times Snapshot
2013-11-17 21:44:43
http://www.latimes.com/opinion/editorials/la-ed-nsa-feinstein-lahey-sensenbrenner-20131105,0,3426125.story#axzz2joDGB6Up
text/html
utf-8
magazineArticle
Foreign Policy
Rosapepe
Jim
national security
North America
Scenes from the Revolution
Does Listening to Angela Merkel's Phone Calls Make America Safer?
Why mutually assured espionage doesn't work.
November 5, 2013
http://www.foreignpolicy.com/articles/2013/11/05/keith_alexander_s_illogical_rationale_for_total_eyes_and_ears
2013-11-17 21:55:12
Foreign Policy
attachment
Foreign Policy Snapshot
2013-11-17 21:55:33
http://www.foreignpolicy.com/articles/2013/11/05/keith_alexander_s_illogical_rationale_for_total_eyes_and_ears?page=full
text/html
utf-8
webpage
http://o.canada.com
Reserved
All Rights
Al Gore
Central Intelligence Agency
Domestic Policy
Domestic Security Policy
Edward Snowden
Espionage Act
Espionage and Intelligence
Government and Politics
Montreal
National Security Agency
snooping
United States
Whistleblowing
White House National Security Council
Al Gore predicts lawmakers will rein in surveillance after Snowden leaks – canada.com
MONTREAL - Former U.S. vice-president Al Gore predicted Tuesday that lawmakers in his country would rein in intelligence agencies in the wake of leaks by whistleblower Edward Snowden, who revealed massive secret government surveillance programs.,
Text
2013-11-06
http://o.canada.com/news/al-gore-predicts-lawmakers-will-rein-in-surveillance-after-snowden-leaks/
2013-11-17 21:55:43
en
2013. All Rights Reserved.
attachment
Snapshot
2013-11-17 21:55:43
http://o.canada.com/news/al-gore-predicts-lawmakers-will-rein-in-surveillance-after-snowden-leaks/
text/html
utf-8
newspaperArticle
World / Americas
The New York Times
ISSN 0362-4331
Sanger
David E.
Cyberwarfare
Espionage and Intelligence Services
National Commission for the Review of the Research and Development Programs of the United States Intelligence Community
Research
United States Defense and Military Forces
U.S. Is Losing Advantage in Spying, Report Says
A congressional panel charged that the United States intelligence agencies' research-and-development efforts were disorganized and unfocused.
2013-11-05
http://www.nytimes.com/2013/11/06/world/americas/us-is-losing-advantage-in-spying-report-says.html
2013-11-17 21:56:46
NYTimes.com
attachment
New York Times Snapshot
2013-11-17 21:56:46
http://www.nytimes.com/2013/11/06/world/americas/us-is-losing-advantage-in-spying-report-says.html?_r=2&
text/html
utf-8
webpage
ProPublica
ProPublica
Jeff Larson
4
Nov
2013
P.m
3:05
NIST to Review Standards After Cryptographers Cry Foul Over NSA Meddling
The federal institute that sets national standards for data encryption has announced it is reviewing all of its previous recommendations.
2013-11-04
http://www.propublica.org/article/nist-to-review-standards-after-cryptographers-cry-foul-over-nsa-meddling
2013-11-17 21:56:53
attachment
Snapshot
2013-11-17 21:56:53
http://www.propublica.org/article/nist-to-review-standards-after-cryptographers-cry-foul-over-nsa-meddling
text/html
utf-8
webpage
Mike Hearn - Google+ - The packet capture shown in these new NSA slides shows…
https://plus.google.com/+MikeHearn/posts/LW1DXJ2BK8k
2013-11-17 21:57:15
attachment
Mike Hearn - Google+ - The packet capture shown in these new NSA slides shows…
2013-11-17 21:57:16
https://plus.google.com/+MikeHearn/posts/LW1DXJ2BK8k
text/html
utf-8
webpage
Ars Technica
Goodin
Dan
Hoping to avert “collision” with disaster, Microsoft retires SHA1
After 2016, Microsoft will stop accepting the collision-prone crypto algorithm.
2013-11-12
http://arstechnica.com/security/2013/11/hoping-to-avert-collision-with-disaster-microsoft-retires-sha1/
2013-11-17 22:11:15
attachment
Snapshot
2013-11-17 22:11:15
http://arstechnica.com/security/2013/11/hoping-to-avert-collision-with-disaster-microsoft-retires-sha1/
text/html
utf-8
webpage
the Guardian
Taylor
Matthew
Hopkins
Nick
Maynard
Phil
Edward Snowden
Freedom of speech
GCHQ
Media
National newspapers
Newspapers
Newspapers & magazines
NSA
politics
Press freedom
The Guardian
UK news
United Nations
United States
World news
UK's reputation is damaged by reaction to Edward Snowden, says UN official
Special rapporteur on freedom of expression says he is alarmed at political response to revelations of mass surveillance
2013-11-15
http://www.theguardian.com/world/2013/nov/15/uk-reputation-edward-snowden-un
2013-11-17 22:13:03
attachment
Snapshot
2013-11-17 22:13:03
http://www.theguardian.com/world/2013/nov/15/uk-reputation-edward-snowden-un
text/html
utf-8
webpage
Grilling of spy chiefs ‘a total pantomime’ | The Sunday Times
http://www.thesundaytimes.co.uk/sto/news/uk_news/National/article1341644.ece
2013-11-17 22:13:13
attachment
Grilling of spy chiefs ‘a total pantomime’ | The Sunday Times
2013-11-17 22:13:14
http://www.thesundaytimes.co.uk/sto/news/uk_news/National/article1341644.ece
text/html
utf-8
webpage
the Guardian
York
Ewen MacAskill in New
Canberra
Lenore Taylor in
Asia Pacific
Australia
Indonesia
The NSA files
Australia's spy agencies targeted Indonesian president's mobile phone
Secret documents show Australian spies targeted the mobile calls of Susilo Bambang Yudhoyono and his wife
2013-11-18
http://www.theguardian.com/world/2013/nov/18/australia-tried-to-monitor-indonesian-presidents-phone
2013-11-18 13:00:12
attachment
Snapshot
2013-11-18 13:00:12
http://www.theguardian.com/world/2013/nov/18/australia-tried-to-monitor-indonesian-presidents-phone
text/html
utf-8
webpage
Ars Technica
Geuss
Megan
Gov’t will notify some defendants caught by warrantless wiretaps
In a interview, Attorney General Holder says criminal cases will be reviewed.
2013-11-16
http://arstechnica.com/tech-policy/2013/11/govt-will-notify-some-defendants-caught-by-warrantless-wiretaps/
2013-11-18 17:04:00
attachment
Snapshot
2013-11-18 17:04:00
http://arstechnica.com/tech-policy/2013/11/govt-will-notify-some-defendants-caught-by-warrantless-wiretaps/
text/html
utf-8
webpage
Ars Technica
Gallagher
Sean
Schneier tells Washington NSA broke Internet’s security for everyone
And techies can only fix it if government stays out of way.
2013-11-18
http://arstechnica.com/tech-policy/2013/11/schneier-tells-washington-nsa-broke-internets-security-for-everyone/
2013-11-18 18:07:31
attachment
Snapshot
2013-11-18 18:07:31
http://arstechnica.com/tech-policy/2013/11/schneier-tells-washington-nsa-broke-internets-security-for-everyone/
text/html
utf-8
webpage
the Guardian
Hern
Alex
David Cameron
GCHQ
Google
Internet safety
ISPs
microsoft
politics
Search engines
technology
UK news
United States
David Cameron: GCHQ will be brought in to tackle child abuse images
UK and US intelligence agencies will fight child abuse images on the 'dark net', prime minister reveals after meeting with ISPs. By Alex Hern
2013-11-18
David Cameron
http://www.theguardian.com/technology/2013/nov/18/david-cameron-gchq-child-abuse-images
2013-11-18 18:08:05
attachment
Snapshot
2013-11-18 18:08:05
http://www.theguardian.com/technology/2013/nov/18/david-cameron-gchq-child-abuse-images
text/html
utf-8
blogPost
NYRblog
Roth
Kenneth
The NSA’s Global Threat to Free Speech
November 18, 2013, 10:48 a.m.
http://www.nybooks.com/blogs/nyrblog/2013/nov/18/nsas-global-threat-free-speech/
2013-11-18 18:08:58
attachment
NYRB Snapshot
2013-11-18 18:09:06
http://www.nybooks.com/blogs/nyrblog/2013/nov/18/nsas-global-threat-free-speech/?pagination=false
text/html
utf-8
newspaperArticle
Opinion
The New York Times
ISSN 0362-4331
Spitz
Malte
Ströbele
Hans-christian
Asylum, Right of
Germany
Snowden, Edward J
Surveillance of Citizens by Government
United States International Relations
Give Snowden Asylum in Germany
We are indebted to him and should grant him permanent residence.
2013-11-17
http://www.nytimes.com/2013/11/18/opinion/give-snowden-asylum-in-germany.html
2013-11-18 18:09:11
NYTimes.com
attachment
New York Times Snapshot
2013-11-18 18:09:11
http://www.nytimes.com/2013/11/18/opinion/give-snowden-asylum-in-germany.html?smid=tw-share
text/html
utf-8
webpage
Privacy International
Surveillance Industry Index
2012
https://www.privacyinternational.org/sii/
2013-11-18 18:54:03
attachment
Snapshot
2013-11-18 18:54:03
https://www.privacyinternational.org/sii/
text/html
utf-8
webpage
Acohido
Byron
Snowden effect: young people now care about privacy
Snowden's whistleblowing prompts consumers to heed privacy settings
2013-11-18
Snowden effect
http://www.usatoday.com/story/cybertruth/2013/11/13/snowden-effect-young-people-now-care-about-privacy/3517919/
2013-11-18 21:07:27
attachment
Snapshot
2013-11-18 21:07:27
http://www.usatoday.com/story/cybertruth/2013/11/13/snowden-effect-young-people-now-care-about-privacy/3517919/
text/html
utf-8
webpage
Popular Mechanics
auto industry news
auto news
car news
latest car industry info
How License-Plate Scanners Are Eroding Our Privacy
Police officers don't respond kindly to being videotaped, yet law enforcement agencies on every level are tracking out comings and going via cameras that ID our license plate numbers. Here, PopMech contributor and Instapundit blogger Glenn Reynolds takes
http://www.popularmechanics.com/cars/news/industry/how-license-plate-scanners-are-eroding-our-privacy-16172152
2013-11-19 17:21:19
attachment
Snapshot
2013-11-19 17:21:19
http://www.popularmechanics.com/cars/news/industry/how-license-plate-scanners-are-eroding-our-privacy-16172152
text/html
windows-1252
webpage
Ars Technica
Farivar
Cyrus
Boston policemen complain about new plan to watch their movements
Anon officer: “No one likes it. Who wants to be followed all over the place?”
2013-11-18
http://arstechnica.com/tech-policy/2013/11/boston-police-set-to-track-its-own-patrol-cars-via-gps-to-improve-dispatching/
2013-11-19 17:24:54
attachment
Snapshot
2013-11-19 17:24:54
http://arstechnica.com/tech-policy/2013/11/boston-police-set-to-track-its-own-patrol-cars-via-gps-to-improve-dispatching/
text/html
utf-8
webpage
Ars Technica
Gallagher
Sean
Yahoo will encrypt between data centers, use SSL for all sites
CEO Marissa Mayer promises Yahoo will be locked down by March 2014.
2013-11-18
http://arstechnica.com/information-technology/2013/11/yahoo-will-encrypt-between-data-centers-use-ssl-for-all-sites/
2013-11-19 17:28:35
attachment
Snapshot
2013-11-19 17:28:35
http://arstechnica.com/information-technology/2013/11/yahoo-will-encrypt-between-data-centers-use-ssl-for-all-sites/
text/html
utf-8
webpage
Wikileaks
Assange
Julian
AFFIDAVIT OF Julian Paul Assange
2013-09-02
http://wikileaks.org/IMG/html/Affidavit_of_Julian_Assange.html
2013-11-19 17:53:05
attachment
2013-11-19 17:53:06
http://wikileaks.org/IMG/html/Affidavit_of_Julian_Assange.html
text/html
utf-8
attachment
Press Release: WikiLeaks Launches Criminal Investigation ahead of Wednesday’s Obama Visit to Sweden
2013-11-19 17:54:02
http://wikileaks.org/Press-Release-WikiLeaks-Launches.html
text/html
utf-8
attachment
Swedish_Unlawful_Seizure_Complaint2013.pdf
2013-11-19 17:54:12
http://wikileaks.org/IMG/pdf/Swedish_Unlawful_Seizure_Complaint2013.pdf
application/pdf
utf-8
webpage
the Guardian
York
Spencer Ackerman in New
Email
Fisa court
Internet
Law
NSA
Obama administration
Privacy
Surveillance
United States
US national security
World news
Fisa court documents reveal extent of NSA disregard for privacy restrictions
Incensed Fisa court judges questioned NSA's truthfulness after repeated breaches of rules meant to protect Americans' privacy
2013-11-19
http://www.theguardian.com/world/2013/nov/19/fisa-court-documents-nsa-violations-privacy
2013-11-19 19:04:03
attachment
Snapshot
2013-11-19 19:04:03
http://www.theguardian.com/world/2013/nov/19/fisa-court-documents-nsa-violations-privacy?CMP=twt_fd&CMP=SOCxx2I2
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Wheeler
Marcy
Barack Obama
Edward Snowden
George Bush
NSA
The NSA files
United States
The NSA review panel didn't answer the real question: was any of this legal?
President Obama's NSA review is cast as a set of 'policy recommendations' as if this is all just a political debate
2013-12-19T12:16EST
en-GB
The NSA review panel didn't answer the real question
http://www.theguardian.com/commentisfree/2013/dec/19/nsa-review-panel-report-legal-questions
2013-12-20 20:49:13
The Guardian
blogPost
Errata Security
Graham
Robert
Errata Security: How to disable webcam light on Windows
2013-12-19
http://blog.erratasec.com/2013/12/how-to-disable-webcam-light-on-windows.html
2013-12-21 02:13:07
attachment
Errata Security: How to disable webcam light on Windows
2013-12-21 02:13:08
http://blog.erratasec.com/2013/12/how-to-disable-webcam-light-on-windows.html
text/html
utf-8
webpage
DNI Clapper Declassifies Additional Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act
http://www.odni.gov/index.php/newsroom/press-releases/191-press-releases-2013/964-dni-clapper-declassifies-additional-intelligence-community-documents-regarding-collection-under-section-501-of-the-foreign-intelligence-surveillance-act-nov
2013-11-19 19:07:40
attachment
CLEANED004. Cover Memo-Sealed.pdf
2013-11-19 19:12:37
http://www.odni.gov/files/documents/1118/CLEANED004.%20Cover%20Memo-Sealed.pdf
application/pdf
utf-8
attachment
CLEANED007. CongNotificationInfoMemoSSCI 10 Apr 09-Sealedpdf.pdf
2013-11-19 19:12:33
http://www.odni.gov/files/documents/1118/CLEANED007.%20CongNotificationInfoMemoSSCI%2010%20Apr%2009-Sealedpdf.pdf
application/pdf
utf-8
attachment
CLEANED010. RFI Response_SSCI Gottte...es 1 December 2010-Sealed.pdf
2013-11-19 19:12:40
http://www.odni.gov/files/documents/1118/CLEANED010.%20RFI%20Response_SSCI%20Gottte...es%201%20December%202010-Sealed.pdf
application/pdf
utf-8
attachment
CLEANED016. REDACTED BR 06-05 Exhibits C (Memo of Law) and D-Sealed.pdf
2013-11-19 19:12:46
http://www.odni.gov/files/documents/1118/CLEANED016.%20REDACTED%20BR%2006-05%20Exhibits%20C%20(Memo%20of%20Law)%20and%20D-Sealed.pdf
application/pdf
utf-8
attachment
CLEANED019. NSA OGC Training Materia...d to OI on 2-20-09.pdf
2013-11-19 19:23:18
http://www.odni.gov/files/documents/1118/CLEANED019.%20NSA%20OGC%20Training%20Materia...d%20to%20OI%20on%202-20-09.pdf
application/pdf
utf-8
attachment
CLEANED020. Verification Requirement.pdf
2013-11-19 19:22:03
http://www.odni.gov/files/documents/1118/CLEANED020.%20Verification%20Requirement.pdf
application/pdf
utf-8
attachment
CLEANED021.extracts. Minimization Pr...cted from file 021-Sealed.pdf
2013-11-19 19:26:06
http://www.odni.gov/files/documents/1118/CLEANED021.extracts.%20Minimization%20Pr...cted%20from%20file%20021-Sealed.pdf
application/pdf
utf-8
attachment
CLEANED022. NSA Core Intelligence Oversight Training.pdf
2013-11-19 19:26:13
http://www.odni.gov/files/documents/1118/CLEANED022.%20NSA%20Core%20Intelligence%20Oversight%20Training.pdf
application/pdf
utf-8
attachment
CLEANED031. August 2006 Report.pdf
2013-11-19 19:15:45
http://www.odni.gov/files/documents/1118/CLEANED031.%20August%202006%20Report.pdf
application/pdf
utf-8
attachment
CLEANED032. Basket 2 - NSA training.log.pdf
2013-11-19 19:22:09
http://www.odni.gov/files/documents/1118/CLEANED032.%20Basket%202%20-%20NSA%20training.log.pdf
application/pdf
utf-8
attachment
CLEANED034. BR 09-01 10(c) Notice Filed 5-8-09)-Sealed.pdf
2013-11-19 19:15:53
http://www.odni.gov/files/documents/1118/CLEANED034.%20BR%2009-01%2010(c)%20Notice%20Filed%205-8-09)-Sealed.pdf
application/pdf
utf-8
attachment
CLEANED042. FISC briefing on BR (1 Sept 2009)-Sealed.pdf
2013-11-19 19:15:47
http://www.odni.gov/files/documents/1118/CLEANED042.%20%20FISC%20briefing%20on%20BR%20(1%20Sept%202009)-Sealed.pdf
application/pdf
utf-8
attachment
CLEANED044. Interim Competency Test ...s to BR FISA Data..pdf
2013-11-19 19:22:12
http://www.odni.gov/files/documents/1118/CLEANED044.%20Interim%20Competency%20Test%20...s%20to%20BR%20FISA%20Data..pdf
application/pdf
utf-8
attachment
CLEANED045. NSA 45-Day Report.pdf
2013-11-19 19:15:41
http://www.odni.gov/files/documents/1118/CLEANED045.%20NSA%2045-Day%20Report.pdf
application/pdf
utf-8
attachment
CLEANED049. OVSC1204 v1OGCAprl15.pdf
2013-11-19 19:22:15
http://www.odni.gov/files/documents/1118/CLEANED049.%20%20OVSC1204%20v1OGCAprl15.pdf
application/pdf
utf-8
attachment
CLEANED085. Report to Congress April 06.pdf
2013-11-19 19:08:39
http://www.odni.gov/files/documents/1118/CLEANED085.%20Report%20to%20Congress%20April%2006.pdf
application/pdf
utf-8
attachment
CLEANED086. Report to Congress April 07.pdf
2013-11-19 19:08:48
http://www.odni.gov/files/documents/1118/CLEANED086.%20Report%20to%20Congress%20April%2007.pdf
application/pdf
utf-8
attachment
CLEANED087. Report to Congress April 08.pdf
2013-11-19 19:08:54
http://www.odni.gov/files/documents/1118/CLEANED087.%20Report%20to%20Congress%20April%2008.pdf
application/pdf
utf-8
attachment
CLEANED088. Report to Congress Pursu...hority May 09) - Redacted.pdf
2013-11-19 19:11:51
http://www.odni.gov/files/documents/1118/CLEANED088.%20Report%20to%20Congress%20Pursu...hority%20May%2009)%20-%20Redacted.pdf
application/pdf
utf-8
attachment
CLEANED089. Report to Congress April 10.pdf
2013-11-19 19:11:56
http://www.odni.gov/files/documents/1118/CLEANED089.%20Report%20to%20Congress%20April%2010.pdf
application/pdf
utf-8
attachment
CLEANED089.T.BR 06-05 Motions and Or...Unseal 16AUGU-1-17-Sealed.pdf
2013-11-19 19:16:02
http://www.odni.gov/files/documents/1118/CLEANED089.T.BR%2006-05%20Motions%20and%20Or...Unseal%2016AUGU-1-17-Sealed.pdf
application/pdf
utf-8
attachment
CLEANED090. Report to Congress Pursu...thority April 11 Redacted.pdf
2013-11-19 19:12:01
http://www.odni.gov/files/documents/1118/CLEANED090.%20Report%20to%20Congress%20Pursu...thority%20April%2011%20Redacted.pdf
application/pdf
utf-8
attachment
CLEANED091. Report to Congress April 12.pdf
2013-11-19 19:12:06
http://www.odni.gov/files/documents/1118/CLEANED091.%20Report%20to%20Congress%20April%2012.pdf
application/pdf
utf-8
attachment
CLEANED096. NSA summary of BR requirements (maybe Feb 2009)-.pdf
2013-11-19 19:22:06
http://www.odni.gov/files/documents/1118/CLEANED096.%20NSA%20summary%20of%20BR%20requirements%20(maybe%20Feb%202009)-.pdf
application/pdf
utf-8
attachment
CLEANED101. Order and Supplemental Order (6-22-09)-sealed.pdf
2013-11-19 19:15:38
http://www.odni.gov/files/documents/1118/CLEANED101.%20Order%20and%20Supplemental%20Order%20(6-22-09)-sealed.pdf
application/pdf
utf-8
attachment
CLEANED116 AG Guidelines.pdf
2013-11-19 19:26:10
http://www.odni.gov/files/documents/1118/CLEANED116%20AG%20Guidelines.pdf
application/pdf
utf-8
attachment
CLEANED86M FBI and AG Testimony.pdf
2013-11-19 19:12:50
http://www.odni.gov/files/documents/1118/CLEANED86M%20FBI%20and%20AG%20Testimony.pdf
application/pdf
utf-8
attachment
CLEANED95.pdf
2013-11-19 19:15:50
http://www.odni.gov/files/documents/1118/CLEANED95.pdf
application/pdf
utf-8
attachment
CLEANEDFinal USSID SP0018 Annex J.pdf
2013-11-19 19:21:56
http://www.dni.gov/files/documents/1118/CLEANEDFinal%20USSID%20SP0018%20Annex%20J.pdf
application/pdf
utf-8
attachment
CLEANEDFinal USSID SP0018.pdf
2013-11-19 19:22:00
http://www.odni.gov/files/documents/1118/CLEANEDFinal%20USSID%20SP0018.pdf
application/pdf
utf-8
attachment
CLEANEDOVSC1205_1206_L0_storyboard_v13_Final.pdf
2013-11-19 19:26:51
http://www.odni.gov/files/documents/1118/CLEANEDOVSC1205_1206_L0_storyboard_v13_Final.pdf
application/pdf
utf-8
attachment
CLEANEDOVSC1205_L1_storyboard_v17_Final.pdf
2013-11-19 19:26:54
http://www.odni.gov/files/documents/1118/CLEANEDOVSC1205_L1_storyboard_v17_Final.pdf
application/pdf
utf-8
attachment
CLEANEDOVSC1205_L2_storyboard_v16_Final.pdf
2013-11-19 19:26:57
http://www.odni.gov/files/documents/1118/CLEANEDOVSC1205_L2_storyboard_v16_Final.pdf
application/pdf
utf-8
attachment
CLEANEDOVSC1205_L3_storyboard_v22_Final.pdf
2013-11-19 19:27:00
http://www.odni.gov/files/documents/1118/CLEANEDOVSC1205_L3_storyboard_v22_Final.pdf
application/pdf
utf-8
attachment
CLEANEDOVSC1205_L4_storyboard_v28_Final.pdf
2013-11-19 19:27:02
http://www.odni.gov/files/documents/1118/CLEANEDOVSC1205_L4_storyboard_v28_Final.pdf
application/pdf
utf-8
attachment
CLEANEDOVSC1205_L5_storyboard_v24_Final.pdf
2013-11-19 19:27:05
http://www.odni.gov/files/documents/1118/CLEANEDOVSC1205_L5_storyboard_v24_Final.pdf
application/pdf
utf-8
attachment
CLEANEDOVSC1205_L6A_storyboard_v18_Final-Sealed.pdf
2013-11-19 19:27:08
http://www.odni.gov/files/documents/1118/CLEANEDOVSC1205_L6A_storyboard_v18_Final-Sealed.pdf
application/pdf
utf-8
attachment
CLEANEDOVSC1206_M6T_storyboard_v25_Final.pdf
2013-11-19 19:27:12
http://www.odni.gov/files/documents/1118/CLEANEDOVSC1206_M6T_storyboard_v25_Final.pdf
application/pdf
utf-8
attachment
CLEANEDPRTT 1.pdf
2013-11-19 19:15:28
http://www.odni.gov/files/documents/1118/CLEANEDPRTT%201.pdf
application/pdf
utf-8
attachment
CLEANEDPRTT 2.pdf
2013-11-19 19:15:31
http://www.odni.gov/files/documents/1118/CLEANEDPRTT%202.pdf
application/pdf
utf-8
attachment
DNI Clapper Declassifies Additional Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act
2013-11-19 19:07:41
http://www.odni.gov/index.php/newsroom/press-releases/191-press-releases-2013/964-dni-clapper-declassifies-additional-intelligence-community-documents-regarding-collection-under-section-501-of-the-foreign-intelligence-surveillance-act-nov
text/html
utf-8
webpage
Ars Technica
Mullin
Joe
Former CIA chief: Snowden should be “hanged by the neck until dead”
A very tentative suggestion of amnesty on a CBS program leads to a threat.
2013-12-19
Former CIA chief
http://arstechnica.com/tech-policy/2013/12/former-cia-chief-snowden-should-be-hanged-by-the-neck-until-dead/
2013-12-20 22:00:02
attachment
Snapshot
2013-12-20 22:00:02
http://arstechnica.com/tech-policy/2013/12/former-cia-chief-snowden-should-be-hanged-by-the-neck-until-dead/
text/html
utf-8
webpage
Ars Technica
Farivar
Cyrus
Judge: “NSA exceeded the scope of authorized acquisition continuously”
New declassifed documents show legal arguments over bulk metadata collection.
2013-11-19
Judge
http://arstechnica.com/tech-policy/2013/11/judge-nsa-exceeded-the-scope-of-authorized-acquisition-continuously/
2013-11-19 19:23:00
attachment
Snapshot
2013-11-19 19:23:00
http://arstechnica.com/tech-policy/2013/11/judge-nsa-exceeded-the-scope-of-authorized-acquisition-continuously/
text/html
utf-8
webpage
Electronic Frontier Foundation
Rumold
Mark
Transparency
Victory: Government to Release More NSA Documents and FISA Court Opinions in Response to EFF Lawsuit
On Monday, the US Department of Justice will release to the public hundreds of additional pages of government documents concerning its use of Section 215 of the Patriot Act, the provision of law the NSA relies on to collect the call records of millions of Americans.
2013-11-15
Victory
https://www.eff.org/deeplinks/2013/11/victory-government-release-more-nsa-documents-and-fisa-court-opinions-response-eff
2013-11-19 19:28:09
attachment
Snapshot
2013-11-19 19:28:09
https://www.eff.org/deeplinks/2013/11/victory-government-release-more-nsa-documents-and-fisa-court-opinions-response-eff
text/html
utf-8
webpage
Section 215 of the USA PATRIOT Act | Electronic Frontier Foundation
https://www.eff.org/foia/section-215-usa-patriot-act
2013-11-19 19:28:59
attachment
Section 215 of the USA PATRIOT Act | Electronic Frontier Foundation
2013-11-19 19:29:00
https://www.eff.org/foia/section-215-usa-patriot-act
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Horwitz
Sari
Assange not under sealed indictment, U.S. officials say
Wikileaks founder Julian Assange is not under indictment, officials say, but organization says it’s skeptical.
2013-11-19
en-US
http://www.washingtonpost.com/world/national-security/assange-not-under-sealed-indictment-us-officials-say/2013/11/18/8a3cb2da-506c-11e3-a7f0-b790929232e1_story.html
2013-11-19 19:56:37
washingtonpost.com
attachment
.@WashingtonPost changes quote from anonymous "law enfor... on Twitpic
2013-11-19 19:56:44
https://twitpic.com/dls99j
text/html
utf-8
attachment
Washington Post Snapshot
2013-11-19 19:56:39
http://www.washingtonpost.com/world/national-security/assange-not-under-sealed-indictment-us-officials-say/2013/11/18/8a3cb2da-506c-11e3-a7f0-b790929232e1_print.html
webpage
the Guardian
York
Spencer Ackerman in New
Fisa court
Law
NSA
Surveillance
technology
United States
US politics
World news
Fisa court order that allowed NSA surveillance is revealed for first time
Fisa court judge who authorised massive tapping of metadata was hesitant but felt she could not stand in the way
2013-11-19
http://www.theguardian.com/world/2013/nov/19/court-order-that-allowed-nsa-surveillance-is-revealed-for-first-time
2013-11-19 20:49:41
attachment
Snapshot
2013-11-19 20:49:41
http://www.theguardian.com/world/2013/nov/19/court-order-that-allowed-nsa-surveillance-is-revealed-for-first-time
text/html
utf-8
magazineArticle
Foreign Policy
Langner
Ralph
intelligence
Internet
Iran
Nukes
Science & Technology
Security
South Asia
U.s. Foreign Policy
Stuxnet's Secret Twin
The real program to sabotage Iran's nuclear facilities was far more sophisticated than anyone realized.
November 19, 2013
http://www.foreignpolicy.com/articles/2013/11/19/stuxnets_secret_twin_iran_nukes_cyber_attack?page=full
2013-11-20 21:28:44
Foreign Policy
attachment
Foreign Policy Snapshot
2013-11-20 21:28:46
http://www.foreignpolicy.com/articles/2013/11/19/stuxnets_secret_twin_iran_nukes_cyber_attack?page=full
text/html
utf-8
newspaperArticle
Reuters
San Francisco
Menn
Joseph
Edward Snowden
Elizabeth Goitein
John Bates
United States
Secret U.S. court approved wider NSA spying even after finding excesses
SAN FRANCISCO (Reuters) - A secret U.S. intelligence court let the National Security Agency collect an expanded amount of data about Americans' email even after finding that the agency systematically exceeded
Tue Nov 19 19:37:58 UTC 2013
http://www.reuters.com/article/2013/11/19/us-usa-nsa-spying-idUSBRE9AI11Y20131119
2013-11-20 21:29:07
Reuters
attachment
Snapshot
2013-11-20 21:29:07
http://www.reuters.com/article/2013/11/19/us-usa-nsa-spying-idUSBRE9AI11Y20131119
text/html
utf-8
magazineArticle
Foreign Policy
Aid
Matthew M.
Barack Obama
china
Diplomacy
East Asia
intelligence
national security
North America
NSA
Obama administration
Security
Spy Copters, Lasers, and Break-In Teams
How the FBI keeps watch on foreign diplomats.
November 19, 2013
http://www.foreignpolicy.com/articles/2013/11/19/spy_copters_lasers_and_break_in_teams_fbi_spies_on_diplomats
2013-11-20 21:29:15
Foreign Policy
attachment
Foreign Policy Snapshot
2013-11-20 21:29:17
http://www.foreignpolicy.com/articles/2013/11/19/spy_copters_lasers_and_break_in_teams_fbi_spies_on_diplomats?page=full
text/html
utf-8
webpage
the Guardian
Ball
James
Australia
Canada
Data protection
New Zealand
NSA
Privacy
Surveillance
technology
The NSA files
UK news
United States
US foreign policy
World news
US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data
• 2007 deal allows NSA to store previously restricted material • UK citizens not suspected of wrongdoing caught up in dragnet • Separate draft memo proposes US spying on 'Five-Eyes' allies
2013-11-20
http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-personal-data
2013-11-20 21:30:24
attachment
Snapshot
2013-11-20 21:30:24
http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-personal-data
text/html
utf-8
magazineArticle
Brown
Sophie
surveillance,
Norway Spy Chief: We Helped the U.S. Do Its Snooping
Oslo monitored millions of phone records overseas and shared data with Washington and other allies
2013-11-20
Norway Spy Chief
http://world.time.com/2013/11/20/norway-spy-chief-we-helped-the-u-s-do-its-snooping/
2013-11-20 21:32:33
world.time.com
TimeISSN 0040-718X
attachment
Snapshot
2013-11-20 21:32:33
http://world.time.com/2013/11/20/norway-spy-chief-we-helped-the-u-s-do-its-snooping/
text/html
utf-8
newspaperArticle
Los Angeles Times
ISSN 0458-3035
Pfeifer
Stuart
Corporations increasingly spying on nonprofits, group says
2013-11-20
en-US
http://www.latimes.com/business/money/la-fi-mo-corporations-increasingly-spying-on-nonprofits-group-says-20131120,0,3211134.story#axzz2lGjJviFY
2013-11-21 21:22:26
LA Times
attachment
LA Times Snapshot
2013-11-21 21:22:31
http://www.latimes.com/business/money/la-fi-mo-corporations-increasingly-spying-on-nonprofits-group-says-20131120,0,3211134.story#axzz2lGjJviFY
text/html
utf-8
webpage
journalism
United States
Reporters as ‘co-conspirators’ in Obama’s war on journalism –
The Obama administration is engaged in a war on investigative journalism, backed by national security laws. The internet may free up information, but it also aids government surveillance.
http://www.crikey.com.au/2013/05/21/reporters-as-co-conspirators-in-obamas-war-on-journalism/
2013-11-21 21:22:53
attachment
Snapshot
2013-11-21 21:22:53
http://www.crikey.com.au/2013/05/21/reporters-as-co-conspirators-in-obamas-war-on-journalism/
text/html
utf-8
webpage
Yahoo News
Google to pay $17 million to settle states' Safari probe
By Alexei Oreskovic SAN FRANCISCO (Reuters) - Google Inc will pay $17 million to settle allegations by 37 states and the District of Colombia that it secretly tracked Web users by placing special digital files on the Web browsers of their smartphones. The deal, announced Monday morning, ends a nearly two-year probe by the states into allegations that Google bypassed the privacy settings of customers using Apple Inc's Safari Web browser by placing "cookies" into the browser. The Safari Web browser used on iPhones and iPads automatically blocks third-party cookies, but Google altered the computer code of its cookies and was able to circumvent the blocks between June 2011 and February 2012, according to the states' allegations. Google, which did not admit wrongdoing in the settlement, said on Monday that it has "taken steps to remove the ad cookies, which collected no personal information, from Apple's browsers." The company agreed to pay $22 million in August 2012 to settle a probe by the U.S. Federal Trade Commission relating to the same matter.
http://news.yahoo.com/google-pay-17-million-settle-states-safari-probe-195526846--sector.html
2013-11-21 21:32:46
attachment
Snapshot
2013-11-21 21:32:46
http://news.yahoo.com/google-pay-17-million-settle-states-safari-probe-195526846--sector.html
text/html
utf-8
webpage
Green Left Weekly
Pearson
Linda
WikiLeaks shows how US threatened Ecuador | Green Left Weekly
2013-11-19
https://www.greenleft.org.au/node/55410
2013-11-21 21:33:24
attachment
WikiLeaks shows how US threatened Ecuador | Green Left Weekly
2013-11-21 21:33:25
https://www.greenleft.org.au/node/55410
text/html
utf-8
webpage
the Guardian
Australia
Australian politics
Edward Snowden
Indonesia
Labor party
Liberal party
NSA
Surveillance
The NSA files
The NSA scandal has detonated in Australia - we can no longer look away
Scott Ludlam: We grant intelligence agencies extraordinary powers to go after violent extremists. But since when did the president of Indonesia, or Germany's chancellor, join this company?
2013-11-19
http://www.theguardian.com/commentisfree/2013/nov/19/the-nsa-scandal-has-detonated-in-australia-we-can-no-longer-look-away
2013-11-21 21:34:08
attachment
Snapshot
2013-11-21 21:34:08
http://www.theguardian.com/commentisfree/2013/nov/19/the-nsa-scandal-has-detonated-in-australia-we-can-no-longer-look-away
text/html
utf-8
webpage
German politicians to get encrypted phones - The Local
Germany's two main parties have agreed on measures to keep their internal communications safe – including all politicians using encrypted mobile phones, it em
http://www.thelocal.de/20131121/german-politicians-to-get-encrypted-phones
2013-11-21 21:35:26
attachment
Snapshot
2013-11-21 21:35:26
http://www.thelocal.de/20131121/german-politicians-to-get-encrypted-phones
text/html
utf-8
newspaperArticle
google
Telegraph.co.uk
Dixon
Hayley
child abuse
child pornography
Google
illegal images
internet security
microsoft
porn
technology
Google vows to block child pornography
David Cameron has welcomed Google promises to tackle illegal images as a “significant step forward”. Microsoft is expected to follow suit
2013-11-18
http://www.telegraph.co.uk/technology/google/10456445/Google-vows-to-block-child-pornography.html
2013-11-21 21:38:29
www.telegraph.co.uk
10456445
attachment
Snapshot
2013-11-21 21:38:29
http://www.telegraph.co.uk/technology/google/10456445/Google-vows-to-block-child-pornography.html
text/html
utf-8
newspaperArticle
Britain’s GCHQ ‘the brains,’ America’s NSA ‘the money’ behind spy alliance
The activities of GCHQ, Britain's secret eavesdropping agency, have come under intense scrutiny since former U.S. analyst Edward Snowden said it was one of
Nov 18, 2013
en-US
http://www.japantimes.co.jp/news/2013/11/18/world/britains-gchq-the-brains-americas-nsa-the-money-behind-spy-alliance/#.Uo5Ba1QQDTa
2013-11-21 21:42:49
Japan Times Online
The Japan Times Online
ISSN 0447-5763
attachment
Japan Times Snapshot
2013-11-21 21:42:55
http://www.japantimes.co.jp/news/2013/11/18/world/britains-gchq-the-brains-americas-nsa-the-money-behind-spy-alliance/#.Uo5Ba1QQDTa
text/html
utf-8
newspaperArticle
Spiegel Online
Stöcker
Christian
Declassifed Documents: NSA Sought To Collect Mobile Location Data
The White House had to declassify NSA documents once again this week. The papers show that the NSA also wanted to collect and save mobile phone location information domestically and may already be doing so.
19.11.2013
Declassifed Documents
http://www.spiegel.de/international/world/declassifed-documents-nsa-sought-to-collect-mobile-location-data-a-934514.html
2013-11-21 21:43:00
Spiegel Online
attachment
Declassifed Documents: NSA Sought To Collect Mobile Location Data - SPIEGEL ONLINE
2013-11-21 21:43:04
http://www.spiegel.de/international/world/declassifed-documents-nsa-sought-to-collect-mobile-location-data-a-934514.html
text/html
windows-1252
webpage
Mashable
Daileda
Colin
U.S. Army to Track Employees' Web Activity to Thwart Future Snowdens
2013-11-19
http://mashable.com/2013/11/19/us-army-snowden/
2013-11-21 21:50:44
attachment
U.S. Army to Track Employees' Web Activity to Thwart Future Snowdens
2013-11-21 21:50:45
http://mashable.com/2013/11/19/us-army-snowden/
text/html
utf-8
newspaperArticle
Spiegel Online
Internetrecht
Suchmaschinen
Google: Deutsche Verbraucherschützer klagen erfolgreich gegen AGB
Auch für Google gelten deutsche Verbraucherschutzvorschriften: Das Landgericht Berlin hat 25 Vertragsklauseln des Konzerns für rechtswidrig erklärt, weil sie zu unbestimmt sind oder die Rechte der Verbraucher unzulässig einschränken. Das Unternehmen will das Urteil anfechten.
19.11.2013
German
Google
http://www.spiegel.de/netzwelt/netzpolitik/google-deutsche-verbraucherschuetzer-klagen-erfolgreich-gegen-agb-a-934553.html
2013-11-21 21:50:51
Spiegel Online
attachment
Google: Deutsche Verbraucherschützer klagen erfolgreich gegen AGB - SPIEGEL ONLINE
2013-11-21 21:50:53
http://www.spiegel.de/netzwelt/netzpolitik/google-deutsche-verbraucherschuetzer-klagen-erfolgreich-gegen-agb-a-934553.html
text/html
windows-1252
webpage
Ars Technica
Farivar
Cyrus
US senators say there’s “no evidence” bulk metadata surveillance is useful
Sen. Mark Udall (D-CO) and others join as amici to lawsuit filed against NSA.
2013-11-19
http://arstechnica.com/tech-policy/2013/11/us-senators-say-theres-no-evidence-bulk-metadata-surveillance-is-useful/
2013-11-21 21:51:17
attachment
Snapshot
2013-11-21 21:51:17
http://arstechnica.com/tech-policy/2013/11/us-senators-say-theres-no-evidence-bulk-metadata-surveillance-is-useful/
text/html
utf-8
webpage
New York Times
Xuecun
Murong
The Transparent Chinese - 纽约时报中文网 国际纵览
2013-11-20
http://cn.nytimes.com/opinion/20131120/c20murong/en-us/
2013-11-21 21:54:21
attachment
The Transparent Chinese - 纽约时报中文网 国际纵览
2013-11-21 21:54:22
http://cn.nytimes.com/opinion/20131120/c20murong/en-us/
text/html
utf-8
webpage
CNN
Schneier
Bruce
'Stalker economy' here to stay
Bruce Schneier says the "Do Not Track" law serves as a sterling example of how bad things are
2013-11-20
http://www.cnn.com/2013/11/20/opinion/schneier-stalker-economy/index.html
2013-11-21 22:32:23
attachment
Snapshot
2013-11-21 22:32:23
http://edition.cnn.com/2013/11/20/opinion/schneier-stalker-economy/index.html
text/html
utf-8
webpage
The Blaze
Scarry
Eddie
a
bob
call
come
had
hero
him
NSA
scoop
snowden
still
wishes
with
wont
woodward
Bob Woodward won’t call Snowden ‘a hero,’ still wishes Snowden had come to him with NSA scoop
Veteran Washington Post reporter Bob Woodward says in a new interview with Larry King that NSA leaker Edward Snowden "broke the law" and isn't "a hero." But Woodward still wishes Snowden had come to him with the NSA scoop. "I wish he had come to me...
2013-11-20
http://www.theblaze.com/blog/2013/11/20/bob-woodward-wont-call-snowden-a-hero-still-wishes-snowden-had-come-to-him-with-nsa-scoop/
2013-11-21 22:32:34
attachment
Snapshot
2013-11-21 22:32:34
http://www.theblaze.com/blog/2013/11/20/bob-woodward-wont-call-snowden-a-hero-still-wishes-snowden-had-come-to-him-with-nsa-scoop/#
text/html
utf-8
webpage
Motherboard
Finding Snowden
Dodging the surveillance state to visit its most wanted man.
http://motherboard.vice.com/blog/finding-snowden
2013-11-21 22:37:27
attachment
Snapshot
2013-11-21 22:37:27
http://motherboard.vice.com/blog/finding-snowden
text/html
utf-8
webpage
Electronic Frontier Foundation
NSA Primary Sources
https://www.eff.org/nsa-spying/nsadocs
2013-11-21 22:42:19
attachment
Snapshot
2013-11-21 22:42:19
https://www.eff.org/nsa-spying/nsadocs
text/html
utf-8
blogPost
Emptywheel
Wheeler
Marcy
The Five Year Parade of Internet Dragnet Violations | emptywheel
2013-11-20
http://www.emptywheel.net/2013/11/20/the-five-year-parade-of-internet-dragnet-violations/
2013-11-21 22:42:30
attachment
The Five Year Parade of Internet Dragnet Violations | emptywheel
2013-11-21 22:42:31
http://www.emptywheel.net/2013/11/20/the-five-year-parade-of-internet-dragnet-violations/
text/html
utf-8
newspaperArticle
U.S.
The New York Times
ISSN 0362-4331
Savage
Charlie
Heinrich, Martin
Justice Department
Mohamud, Mohamed Osman
National Security Agency
Portland (Ore)
Senate
Snowden, Edward J
Surveillance of Citizens by Government
terrorism
Udall, Mark
Verrilli, Donald B Jr
Wiretapping and Other Eavesdropping Devices and Methods
Wyden, Ron
Warrantless Surveillance Continues to Cause Fallout
A terrorism case in Oregon involving warrantless wiretapping and a letter from three United States senators to the solicitor general cause a stir.
2013-11-20
http://www.nytimes.com/2013/11/21/us/warrantless-surveillance-continues-to-cause-fallout.html
2013-11-21 22:42:39
NYTimes.com
attachment
New York Times Snapshot
2013-11-21 22:42:39
http://www.nytimes.com/2013/11/21/us/warrantless-surveillance-continues-to-cause-fallout.html?_r=0
text/html
utf-8
webpage
DROPS-IDN/4307
004
Behavioral Economics
Participatory Sensing
Privacy
Trust
Usability
'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312)
InProceedings
http://drops.dagstuhl.de/opus/volltexte/2013/4307/
2013-11-21 22:43:21
eng
Many researchers have already begun using personal mobile devices as personal "sensing instruments" and designed tools that reposition individuals as producers, consumers, and remixers of a vast openly shared public data set. By empowering people to easily measure, report, and compare their own personal environment, such tools transform everyday citizens into "reporting agents" who uncover and visualize unseen elements of their own everyday experiences. This represents an important new shift in mobile device usage - from a communication tool to a "ubiquitous experience sharing instrument".
This report documents the program and the outcomes of Dagstuhl Seminar 13312 "My Life, Shared" - Trust and Privacy in the Age of Ubiquitous Experience Sharing, which brought together 33 researchers and practitioners from multiple disciplines -- including economics, psychology, sociology, as well as various fields within the discipline of computer science dealing with cryptographic feasibility, scalability and usability/acceptability -- to discuss opportunities and challenges of sharing information from the pervasive environment.
attachment
dagrep_v003_i007_p074_s13312.pdf
2013-11-21 22:43:27
http://drops.dagstuhl.de/opus/volltexte/2013/4307/pdf/dagrep_v003_i007_p074_s13312.pdf
application/pdf
utf-8
attachment
Snapshot
2013-11-21 22:43:21
http://drops.dagstuhl.de/opus/volltexte/2013/4307/
text/html
windows-1252
webpage
TheHill
Sasso
Brendan
Senators: 'No evidence' NSA phone sweeps are useful
Three Democratic senators filed a brief in federal court on Tuesday supporting a lawsuit to end the National Security Agency's bulk collection of phone records.Sens. Mark Udall (Colo.), Ron Wyden (Ore.) and Martin Heinrich (N.M.), who all have access to classified information as members of the Senate Intelligence Committee, argued that the controversial program does little to combat terrorism. "[The senators] have reviewed this surveillance extensively and have seen no evidence that the bulk collection of Americans’ phone records has provided any intelligence of value that could not have been gathered through less intrusive means," lawyers for the lawmakers wrote.
Text
2013-11-19T15:44-05:00
Senators
http://thehill.com/blogs/hillicon-valley/190787-senators-no-evidence-nsa-phone-sweeps-are-useful
2013-11-21 22:43:40
und
attachment
Snapshot
2013-11-21 22:43:40
http://thehill.com/blogs/hillicon-valley/190787-senators-no-evidence-nsa-phone-sweeps-are-useful
text/html
utf-8
webpage
McClatchy
Watkins
Ali
12333
Adam Schiff
Dianne Feinstein
FISA
james clapper
Keith Alexander
NSA
Patriot Act
Ronald Reagan
Section 205
Section 702
Surveillance
warrantless searches
WASHINGTON: Most of NSA’s data collection authorized by order Ronald Reagan issued | National Security & Defense | McClatchy DC
The National Security Agency’s collection of information on Americans’ cellphone and Internet usage reaches far beyond the two programs that have received public attention in recent months, to a presidential order that is older than the Internet itself.
2013-11-21
WASHINGTON
http://www.mcclatchydc.com/2013/11/21/209167/most-of-nsas-data-collection-authorized.html
2013-11-21 22:44:17
attachment
Snapshot
2013-11-21 22:44:17
http://www.mcclatchydc.com/2013/11/21/209167/most-of-nsas-data-collection-authorized.html
text/html
utf-8
newspaperArticle
Politics
The Washington Post
ISSN 0190-8286
Clement
Scott
Poll: Most Americans say Snowden leaks harmed national security
The poll also shows that only 35 percent approve of Obama’s handling of the NSA’s surveillance activity.
2013-11-21
en-US
Poll
http://www.washingtonpost.com/politics/poll-most-americans-say-snowden-leaks-harmed-national-security/2013/11/20/13cc20b8-5229-11e3-9e2c-e1d01116fd98_story.html
2013-11-21 22:44:29
washingtonpost.com
attachment
Washington Post Snapshot
2013-11-21 22:44:31
http://www.washingtonpost.com/politics/poll-most-americans-say-snowden-leaks-harmed-national-security/2013/11/20/13cc20b8-5229-11e3-9e2c-e1d01116fd98_print.html
webpage
An ever watchful eye?: K-P to launch Peshawar Safe City Project – The Express Tribune
2013-11-21
http://tribune.com.pk/story/634604/an-ever-watchful-eye-k-p-to-launch-peshawar-safe-city-project/
2013-11-21 22:53:18
attachment
An ever watchful eye?: K-P to launch Peshawar Safe City Project – The Express Tribune
2013-11-21 22:53:19
http://tribune.com.pk/story/634604/an-ever-watchful-eye-k-p-to-launch-peshawar-safe-city-project/
text/html
utf-8
webpage
POLITICO
House Intelligence Committee
House Judiciary Committee
Mike Rogers
Mike Thompson
National Security Agency
Tony Romm
House committees vie for dominance over NSA reforms - Tony Romm
A turf battle is brewing in the House over which committee will get a first crack at NSA reform — and the outcome could determine the extent to which lawmakers try to reshape U.S. surveillance practices. House Intelligence Committee leaders had planned to consider at least one proposal at a classified session on Thursday — a bill by Rep....
http://www.politico.com/story/2013/11/house-committees-vie-for-dominance-over-nsa-reforms-100173.html
2013-11-21 22:53:25
attachment
Snapshot
2013-11-21 22:53:25
http://www.politico.com/story/2013/11/house-committees-vie-for-dominance-over-nsa-reforms-100173.html?hp=r4
text/html
utf-8
webpage
Risen
Tom
cybersecurity
Internet
NSA
Pulse
Risen, Tom
National Security Data Requests Increase Globally, Report Says
Many countries lack oversight, transparency on security data requests.
2013-11-20
http://www.usnews.com/news/articles/2013/11/20/national-security-data-requests-increase-globally-report-says?utm_content=buffer8a604&utm_source=buffer&utm_medium=twitter&utm_campaign=Buffer
2013-11-21 22:53:30
attachment
Snapshot
2013-11-21 22:53:30
http://www.usnews.com/news/articles/2013/11/20/national-security-data-requests-increase-globally-report-says?utm_content=buffer8a604&utm_source=buffer&utm_medium=twitter&utm_campaign=Buffer
text/html
utf-8
blogPost
Top Level Telecommunications
P/k
NSA
Top Level Telecommunications: BOUNDLESSINFORMANT only shows metadata
October 22, 2013
http://electrospaces.blogspot.com/2013/10/boundlessinformant-only-shows-metadata.html
2013-11-21 22:55:55
Top Level Telecommunications
attachment
Blogspot Snapshot
2013-11-21 22:55:57
http://electrospaces.blogspot.com/2013/10/boundlessinformant-only-shows-metadata.html
text/html
utf-8
webpage
Bloomberg
Strohm
Chris
Google’s Schmidt Sees Encryption Killing Censorship
Protecting Internet traffic with hard-to-crack code may prevent governments from censoring their populations’ communications within a decade, Google Inc. Chairman Eric Schmidt said.
2013-11-20
http://www.bloomberg.com/news/2013-11-21/google-s-schmidt-sees-encryption-killing-censorship.html
2013-11-21 22:57:38
attachment
Bloomberg Printable
2013-11-21 22:57:40
http://www.bloomberg.com/news/print/2013-11-21/google-s-schmidt-sees-encryption-killing-censorship.html
text/html
utf-8
webpage
The Verge
Google's Eric Schmidt: 'the solution to government surveillance is to encrypt everything'
Since revelations of the NSA's widespread data collection and monitoring earlier this year, Google has staunchly denied working with the government agency and has taken it to task on a number of...
Google's Eric Schmidt
http://www.theverge.com/2013/11/21/5130472/googles-eric-schmidt-encrypt-everything-to-prevent-government-surveillance
2013-11-21 22:57:41
attachment
Snapshot
2013-11-21 22:57:41
http://www.theverge.com/2013/11/21/5130472/googles-eric-schmidt-encrypt-everything-to-prevent-government-surveillance
text/html
utf-8
webpage
NewScientist
Hodson
Hal
Throw off the spooks by disguising your web traffic - tech - 20 November 2013 - New Scientist
2013-11-20
http://www.newscientist.com/article/mg22029444.900-throw-off-the-spooks-by-disguising-your-web-traffic.html#.Uo6P01UQDTY
2013-11-21 22:58:00
attachment
Throw off the spooks by disguising your web traffic - tech - 20 November 2013 - New Scientist
2013-11-21 22:58:01
http://www.newscientist.com/article/mg22029444.900-throw-off-the-spooks-by-disguising-your-web-traffic.html#.Uo6P01UQDTY
text/html
utf-8
webpage
Medium
How Antisec Died — Notes from a Strange World
First, an introduction: I write about hackers, and for the past few years that has meant I write about Anonymous.
https://medium.com/quinn-norton/654abf6aeff7
2013-11-21 23:16:36
attachment
Anonymous' LulzXmas - YouTube.webm
video/webm
attachment
Snapshot
2013-11-21 23:16:36
https://medium.com/quinn-norton/654abf6aeff7
text/html
utf-8
webpage
The Daily Dot
Kloc
Joe
Angela Merkel
Edward Snowden
five eyes
internet freedom
NSA
uk
Did the NSA agree to let Britain spy on U.S. citizens?
In 1946, the U.S. and Britain agreed not to spy on one another. Both countries do it anyway.
2013-11-21
http://www.dailydot.com/politics/nsa-uk-secret-memo-spy/
2013-11-22 17:58:29
attachment
Snapshot
2013-11-22 17:58:29
http://www.dailydot.com/politics/nsa-uk-secret-memo-spy/
text/html
utf-8
webpage
Surveillance state fail: privacy wins out in Intelligence Squared debate | Privacy SOS
Please note that by playing this clip YouTube and Google will place a long term cookie on your computer. Intelligence Squared hosted a debate last night on the following proposition: Spy on me, I'd rather be safe.
2013-11-21T00:00:00Z
Surveillance state fail
http://privacysos.org/node/1242
2013-11-22 17:58:37
Please note that by playing this clip YouTube and Google will place a long term cookie on your computer. Intelligence Squared hosted a debate last night on the following proposition: Spy on me, I'd rather be safe.
attachment
Snapshot
2013-11-22 17:58:37
http://privacysos.org/node/1242
text/html
utf-8
attachment
Spy On Me, I'd Rather Be Safe - YouTube.webm
video/webm
webpage
The Daily Dot
Klee
Miles
anonworm
anonymous
cabincr3w
federal pre-sentence investigation report
hacktivist
higinio o. ochoa III
john anthony borell III
law enforcement
Privacy
sabu
Surveillance
On eve of incarceration, Anonymous hacker clears the air
A would-be activist takes stock in a time of transition.
2013-11-21
http://www.dailydot.com/crime/anonymous-kahuna-cabincr2w-statement-prison/
2013-11-22 18:09:37
attachment
Snapshot
2013-11-22 18:09:37
http://www.dailydot.com/crime/anonymous-kahuna-cabincr2w-statement-prison/
text/html
utf-8
webpage
the Guardian
Arthur
Charles
Editor
Technology
Censorship
GCHQ
Internet
Jimmy Wales
NSA
Privacy
technology
Tim Berners-Lee
UK news
UK security and counter-terrorism
United States
US national security
Wikipedia
World news
Tim Berners-Lee: Online surveillance undermines confidence in internet
Jimmy Wales, reveals that Wikipedia will begin encrypting communications with its users to prevent spying. By Charles Arthur
2013-11-22
Tim Berners-Lee
http://www.theguardian.com/technology/2013/nov/22/tim-berners-lee-online-surveillance-internet-wikipedia-encrypting-spying
2013-11-22 18:14:18
attachment
Snapshot
2013-11-22 18:14:18
http://www.theguardian.com/technology/2013/nov/22/tim-berners-lee-online-surveillance-internet-wikipedia-encrypting-spying
text/html
utf-8
blogPost
Huffington Post
Weisman
Vivien Lesnik
A Conversation With Jeremy Hammond, American Political Prisoner Sentenced to 10 Years
I am the first journalist with whom Mr. Hammond met since his arrest in March 2012. This interview was held months before sentencing. At the request of Mr. Hammond's attorneys, who feared his words would be used at sentencing against him, I delayed publishing.
19 Nov 2013 00:00:14 -0500
http://www.huffingtonpost.com/vivien-lesnik-weisman/jeremy-hammond-q-and-a_b_4298969.html
2013-11-22 19:25:54
attachment
Huffington Post
2013-11-22 19:25:56
http://www.huffingtonpost.com/vivien-lesnik-weisman/jeremy-hammond-q-and-a_b_4298969.html?view=print&comm_ref=false
text/html
utf-8
webpage
Dagbladet.no
edward_snowden
NSA
nyheter
overvaking
politikk
Prism
snowden_i_norge
USA
utenriks
NSA-files repeatedly show collection of data «against countries» - not «from»
Journalist Glenn Greenwald explaines why he means Norwegian Intelligence Service are wrong in their interpretation of the Snowden-files.
http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/
2013-11-22 19:30:16
attachment
Snapshot
2013-11-22 19:30:16
http://www.dagbladet.no/2013/11/22/nyheter/edward_snowden/utenriks/usa/nsa/30444117/
text/html
windows-1252
magazineArticle
Foreign Policy
Harris
Shane
Internet
national security
North America
NSA
Obama administration
Science & Technology
Security
Meet the Spies Doing the NSA's Dirty Work
This obscure FBI unit does the domestic surveillance that no other intelligence agency can touch.
November 21, 2013
http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work
2013-11-22 19:39:11
Foreign Policy
attachment
Foreign Policy Snapshot
2013-11-22 19:39:13
http://www.foreignpolicy.com/articles/2013/11/21/the_obscure_fbi_team_that_does_the_nsa_dirty_work?page=full
text/html
utf-8
webpage
Just Security
Thursday
Jennifer Granick
21
November
PM
2013 at 7:06
New FISC Pen Register Opinion: It’s Just a Matter of Time Before Somebody Gets Hurt
A Forum on Law, Rights, and U.S. National Security
2013-11-21
New FISC Pen Register Opinion
http://justsecurity.org/2013/11/21/fisc-pen-register-opinion-its-matter-time-hurt/
2013-11-22 20:38:31
attachment
Snapshot
2013-11-22 20:38:31
http://justsecurity.org/2013/11/21/fisc-pen-register-opinion-its-matter-time-hurt/
text/html
utf-8
newspaperArticle
Technology
BBC
Web inventor in surveillance warning
The "growing tide of surveillance" threatens the democratic nature of the internet, warns the creator of the worldwide web, Sir Tim Berners-Lee.
2013/11/22
http://www.bbc.co.uk/news/technology-25033577
2013-11-22 20:38:37
bbc.co.uk
attachment
BBC News Snapshot
2013-11-22 20:38:39
http://www.bbc.co.uk/news/technology-25033577
text/html
utf-8
webpage
The Washingtion Times
Inside the Beltway: Congressional gold for clandestine heroes of OSS
They had legendary good spirit and the inner mettle to grapple with grim reality as well. That would be the Office of Strategic Services — the OSS — a clandestine agency created during World War II by Army Maj. Gen. William J. Donovan that was the predecessor of the CIA. The inventive determination of those 13,000 uncommon warriors who fought against Nazis and other American enemies seven decades ago has not been forgotten, however.
Inside the Beltway
http://www.washingtontimes.com/news/2013/nov/21/inside-the-beltway-congressional-gold-for-clandest/
2013-11-22 20:38:50
attachment
Snapshot
2013-11-22 20:38:50
http://www.washingtontimes.com/news/2013/nov/21/inside-the-beltway-congressional-gold-for-clandest/
text/html
utf-8
webpage
the Guardian
Arthur
Charles
agencies
Data protection
Internet
NSA
Surveillance
technology
Tim Berners-Lee
United States
US national security
World news
Tim Berners-Lee: UK and US must do more to protect internet users' privacy
'Tide of surveillance and censorship' threatens future of democracy, says inventor of world wide web
2013-11-22
Tim Berners-Lee
http://www.theguardian.com/technology/2013/nov/22/tim-berners-lee-internet-privacy-surveillance-censorship
2013-11-22 20:39:02
attachment
Snapshot
2013-11-22 20:39:02
http://www.theguardian.com/technology/2013/nov/22/tim-berners-lee-internet-privacy-surveillance-censorship
text/html
utf-8
webpage
Bits Blog
Perlroth
Nicole
Goel
Vindu
Surveillance of Citizens by Government
Twitter
Twitter Toughening Its Security to Thwart Government Snoops
Fear of government snoops has led Twitter to be the latest company to make the encryption on its communications much harder to crack.
2013-11-22
http://bits.blogs.nytimes.com/2013/11/22/twitter-toughening-its-security-to-thwart-government-snoops/
2013-11-22 21:37:38
attachment
Snapshot
2013-11-22 21:37:38
http://bits.blogs.nytimes.com/2013/11/22/twitter-toughening-its-security-to-thwart-government-snoops/
text/html
utf-8
webpage
nrc.nl
Edward Snowden
Glenn Greenwald
Hoofdredacteur
Nationale Security Agency
NRC put uit documenten van Edward Snowden
NRC Handelsblad en nrc.next publiceren zaterdag een eerste serie artikelen op basis van documenten van de Amerikaanse NSA. Nationale Security Agency. Deze documenten, afkomstig van klokkenluider Edward Snowden, geven inzicht in de afluister- en spionage- activiteiten van de NSA, wereldwijd. Die zijn van ongekend grote omvang. Spionage in het digitale tijdperk heeft Orwelliaanse proporties aangenomen.
http://www.nrc.nl/hoofdredacteur/2013/11/22/nrc-put-uit-documenten-van-edward-snowden/
2013-11-22 22:18:00
Dutch
attachment
Snapshot
2013-11-22 22:18:00
http://www.nrc.nl/hoofdredacteur/2013/11/22/nrc-put-uit-documenten-van-edward-snowden/
text/html
utf-8
webpage
Centre for Internet and Society
Xynou
Maria
Why 'Facebook' is More Dangerous than the Government Spying on You
In this article, Maria Xynou looks at state and corporate surveillance in India and analyzes why our "choice" to hand over our personal data can potentially be more harmful than traditional, top-down, state surveillance. Read this article and perhaps reconsider your "choice" to use social networking sites, such as Facebook.
2013-11-19
http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you
2013-11-22 22:32:19
attachment
Snapshot
2013-11-22 22:32:19
http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you
text/html
utf-8
webpage
Wyden
Ron
Udall, Wyden, Heinrich Urge Solicitor General to Set Record Straight on Misrepresentations to U.S. Supreme Court in Clapper v. Amnesty | Senator Ron Wyden
WASHINGTON- U.S. Senators Mark Udall (D-Colo.), Ron Wyden (D-Ore.) and Martin Heinrich (D-N.M.) urged U.S. Solicitor Gen
2013-11-21
http://www.wyden.senate.gov/news/press-releases/udall-wyden-heinrich-urge-solicitor-general-to-set-record-straight-on-misrepresentations-to-us-supreme-court-in-clapper-v-amnesty
2013-11-22 23:16:29
attachment
Snapshot
2013-11-22 23:16:29
http://www.wyden.senate.gov/news/press-releases/udall-wyden-heinrich-urge-solicitor-general-to-set-record-straight-on-misrepresentations-to-us-supreme-court-in-clapper-v-amnesty
text/html
utf-8
webpage
0763.hk
china
cisco
content types
corporate
csco
factiva filters
fc&e executive news filter
fc&e industry news filter
general news
industrial news
international relations
interview
interviews with corporate executives
management issues
NSA
political
politics
qcom
qualcomm
senior level management
technology
telecommunications equipment
ztcoy
zte
Qualcomm CEO acknowledges NSA fallout is impacting its business in China.
Paul Jacobs acknowledged U.S. restrictions on Chinese companies and revelations about surveillance by the National Security Agency are impacting Qualcomm's business in the fast-growing country.
http://online.wsj.com/news/article_email/SB10001424052702304337404579214353783842062-lMyQjAxMTAzMDIwMjEyNDIyWj
2013-11-25 18:37:33
attachment
Snapshot
2013-11-25 18:37:33
http://online.wsj.com/news/article_email/SB10001424052702304337404579214353783842062-lMyQjAxMTAzMDIwMjEyNDIyWj
text/html
utf-8
webpage
The Wire
aggregation
Business
entertainment
global
national
news
opinion
politics
technology
The Wire
TheWire.com
Keith Alexander Offered to Resign
General Keith Alexander offered to resign from his position as head of the NSA following the revelations brought to light by Edward Snowden over the summer.
/politics/2013/11/keith-alexander-offered-resign/355471/
2013-11-25 20:01:47
attachment
Snapshot
2013-11-25 20:01:47
http://www.thewire.com/politics/2013/11/keith-alexander-offered-resign/355471/
text/html
utf-8
newspaperArticle
U.S. / Politics
The New York Times
ISSN 0362-4331
Risen
James
Poitras
Laura
Computers and the Internet
Defense Department
Espionage and Intelligence Services
National Security Agency
Surveillance of Citizens by Government
Wiretapping and Other Eavesdropping Devices and Methods
N.S.A. Report Outlined Goals for More Power
The top-secret document described strategies to keep pace with rapidly changing technology and stay ahead of adversaries in intelligence collection.
2013-11-22
http://www.nytimes.com/2013/11/23/us/politics/nsa-report-outlined-goals-for-more-power.html
2013-11-25 20:02:02
NYTimes.com
attachment
New York Times Snapshot
2013-11-25 20:02:02
http://www.nytimes.com/2013/11/23/us/politics/nsa-report-outlined-goals-for-more-power.html?_r=0&pagewanted=all
text/html
utf-8
webpage
La Quadrature du Net
Zimmermann
Jérémie
Snowden and the Future of our Communication Architecture
2013-11-21
https://www.laquadrature.net/en/snowden-and-the-future-of-our-communication-architecture
2013-11-25 20:02:16
attachment
Snowden and the Future of our Communication Architecture | La Quadrature du Net
2013-11-25 20:02:17
https://www.laquadrature.net/en/snowden-and-the-future-of-our-communication-architecture
text/html
utf-8
webpage
MarketWatch
general
International news
Merkel's phone tapped by at least 5 countries
German Chancellor Angela Merkel's cellphone has been tapped by at least five foreign intelligence agencies, German weekly Focus magazine reports Sunday, citing an unnamed German security official. Ms. Merkel's phone wasn't only under U.S. surveillance, but also that of Russia, China, North Korea and the U.K., the article alleges.
http://www.marketwatch.com/story/merkels-phone-tapped-by-at-least-5-countries-2013-11-24
2013-11-25 20:03:13
attachment
Snapshot
2013-11-25 20:03:13
http://www.marketwatch.com/story/merkels-phone-tapped-by-at-least-5-countries-2013-11-24?mod=wsj_share_tweet
text/html
utf-8
webpage
Ars Technica
Borl
Jon
2010
wired com Dec 29
EST
9:58am
$15 phone, 3 minutes all that's needed to eavesdrop on GSM call
Researchers at the Chaos Computer Club Congress have shown how to use four $15 …
2010-12-29
http://arstechnica.com/gadgets/news/2010/12/15-phone-3-minutes-all-thats-needed-to-eavesdrop-on-gsm-call.ars
2013-11-25 20:03:22
attachment
Snapshot
2013-11-25 20:03:22
http://arstechnica.com/gadgets/2010/12/15-phone-3-minutes-all-thats-needed-to-eavesdrop-on-gsm-call/
text/html
utf-8
webpage
DNI GREENWALD FOIA
https://www.documentcloud.org/documents/838729-dni-greenwald-foia.html
2013-11-25 20:04:59
attachment
DNI GREENWALD FOIA
2013-11-25 20:05:00
https://www.documentcloud.org/documents/838729-dni-greenwald-foia.html
text/html
utf-8
webpage
nrc.nl
Binnenland
De NSA-dossiers
Edward Snowden
GCHQ
Glenn Greenwald
National Security Agency
Nieuws
NSA
Document Snowden: Nederland al sinds 1946 doelwit van NSA
Nederland is tussen 1946 en 1968 afgeluisterd door de Amerikanen. Daarvoor is nu voor het eerst bewijs. Het gaat om een document van de Amerikaanse klokkenluider Edward Snowden dat NRC Handelsblad heeft ingezien. Uit het stuk blijkt niet of het afluisteren na 1968 werd voortgezet.
Document Snowden
http://www.nrc.nl/nieuws/2013/11/23/nederland-sinds-1946-doelwit-van-nsa/
2013-11-25 20:05:14
Dutch
attachment
BZu6IlaCQAABiPa.jpg:large (JPEG Image, 1024 × 766 pixels)
2013-11-25 20:05:40
https://pbs.twimg.com/media/BZu6IlaCQAABiPa.jpg:large
image/jpeg
windows-1252
attachment
Snapshot
2013-11-25 20:05:14
http://www.nrc.nl/nieuws/2013/11/23/nederland-sinds-1946-doelwit-van-nsa/
text/html
utf-8
webpage
nrc.nl
De NSA-dossiers
Edward Snowden
GCHQ
Glenn Greenwald
National Security Agency
news
Nieuws
NSA
Standout
NSA infected 50,000 computer networks with malicious software
The American intelligence service - NSA - infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this.
http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/
2013-11-25 20:07:32
attachment
Snapshot
2013-11-25 20:07:32
http://www.nrc.nl/nieuws/2013/11/23/nsa-infected-50000-computer-networks-with-malicious-software/
text/html
utf-8
magazineArticle
Slate
ISSN 1091-2339
Lithwick
Dahlia
Vladeck
Steve
Taking the “Meh” out of Metadata
How the government can discover your health problems, political beliefs, and religious practices using just your metadata.
Nov. 22 2013
en-US
http://www.slate.com/articles/news_and_politics/jurisprudence/2013/11/nsa_and_metadata_how_the_government_can_spy_on_your_health_political_beliefs.html?wpisrc=burger_bar
2013-11-25 20:07:50
Slate
attachment
Slate Snapshot
2013-11-25 20:07:53
http://www.slate.com/articles/news_and_politics/jurisprudence/2013/11/nsa_and_metadata_how_the_government_can_spy_on_your_health_political_beliefs.single.html
text/html
utf-8
webpage
the Guardian
anonymous
Hacking
US constitution and civil liberties
The persecution of Barrett Brown - and how to fight it
Glenn Greenwald: The journalist and Anonymous activist is targeted as part of a broad effort to deter and punish internet freedom activism
2013-03-21
http://www.theguardian.com/commentisfree/2013/mar/21/barrett-brown-persecution-anonymous
2013-11-25 20:07:59
attachment
Snapshot
2013-11-25 20:07:59
http://www.theguardian.com/commentisfree/2013/mar/21/barrett-brown-persecution-anonymous
text/html
utf-8
webpage
VICE
Brown
Barrett
Barrett Brown Is Bored Out of His Mind in Jail | VICE United States
Earlier today, Barrett Brown's legal counsel sent us this letter on behalf of their imprisoned client, who is apparently spending his time in lockup watching telenovelas, The Bad Girls Club, an…
2013-11-11
http://www.vice.com/read/barrett-brown-is-bored-out-of-his-mind-in-jail
2013-11-25 20:08:05
attachment
Snapshot
2013-11-25 20:08:05
http://www.vice.com/read/barrett-brown-is-bored-out-of-his-mind-in-jail
text/html
utf-8
webpage
Parry
Nigel
Sunday
25th
March
2012
album
music
nigel parry
nigel perry
palestine
paradise
Sacrificing Stratfor: How the FBI waited three weeks to close the stable door
nigelparry.com: the website less traveled
2012-03-25
Sacrificing Stratfor
http://nigelparry.com/news/sacrificing-stratfor.shtml
2013-11-25 20:14:56
attachment
Snapshot
2013-11-25 20:14:56
http://nigelparry.com/news/sacrificing-stratfor.shtml
text/html
windows-1252
webpage
Official Gmail Blog
Rideout
Ariel
Official Gmail Blog: Making security easier
Gmail statement on https from 2008.
2008-07-24
http://gmailblog.blogspot.com/2008/07/making-security-easier.html
2013-11-25 20:15:05
attachment
Official Gmail Blog: Making security easier
2013-11-25 20:15:06
http://gmailblog.blogspot.com/2008/07/making-security-easier.html
text/html
utf-8
webpage
Washington Post
Fung
Brian
Surveillance
tracking
Yes, there actually is a huge difference between government and corporate surveillance
In marketplaces, consumers have choices.
2013-11-04
http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/yes-there-actually-is-a-huge-difference-between-government-and-corporate-surveillance/
2013-11-25 20:16:02
attachment
Snapshot
2013-11-25 20:16:02
http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/yes-there-actually-is-a-huge-difference-between-government-and-corporate-surveillance/
text/html
utf-8
webpage
Ammori
Marvin
Blame the NSA, not Facebook and Google: Column
Blaming big tech companies for the NSA's overreach isn't just ignorant – it's dangerous.
2013-11-22
Blame the NSA, not Facebook and Google
http://www.usatoday.com/story/opinion/2013/11/22/nsa-spying-facebook-tech-companies-column/3677799/
2013-11-25 20:35:39
attachment
Snapshot
2013-11-25 20:35:39
http://www.usatoday.com/story/opinion/2013/11/22/nsa-spying-facebook-tech-companies-column/3677799/
text/html
utf-8
webpage
A Strategy for Surveillance Powers - Document - NYTimes.com
2013-11-23
http://www.nytimes.com/interactive/2013/11/23/us/politics/23nsa-sigint-strategy-document.html?ref=politics
2013-11-25 20:36:05
attachment
A Strategy for Surveillance Powers - Document - NYTimes.com
2013-11-25 20:36:06
http://www.nytimes.com/interactive/2013/11/23/us/politics/23nsa-sigint-strategy-document.html?ref=politics
text/html
utf-8
webpage
child pornography
Google
internet watch foundation
local
microsoft
national center for missing & exploited children
news
picasa
seen on
syndicated local
vibNews
woodland
Google’s Role In Woodland Child Pornography Arrest Raises Privacy Concerns - CBS Sacramento
Federal investigators arrested a Woodland man on child pornography charges after Google found images on his computer.
http://sacramento.cbslocal.com/2013/11/21/googles-role-in-woodland-child-pornography-arrest-raises-privacy-concerns/
2013-11-25 20:36:16
attachment
Snapshot
2013-11-25 20:36:16
http://sacramento.cbslocal.com/2013/11/21/googles-role-in-woodland-child-pornography-arrest-raises-privacy-concerns/
text/html
utf-8
webpage
VentureBeat
Kelley
Meghan
Zuckerberg says U.S. is 'continuing to blow it' on privacy matters
Facebook chief executive Mark Zuckerberg thinks the U.S. government screwed up when it comes to the NSA's surveillance techniques. "I think the government really blew it on this one. And I honestly...
2013-11-24
http://venturebeat.com/2013/11/24/zuckerberg-nsa/
2013-11-25 20:36:32
attachment
Snapshot
2013-11-25 20:36:32
http://venturebeat.com/2013/11/24/zuckerberg-nsa/?utm_content=buffer1bda6&utm_source=buffer&utm_medium=twitter&utm_campaign=Buffer
text/html
utf-8
blogPost
Huffington Post
Spectator
Washington
NSA Analyst: "We Could Have Prevented 9/11"
The idea is, NSA only tells Congress what it wants them to hear, and Congress will just have to figure out what it really knows. The problem is, how will Congress find something unless it knows what it's looking for and where to find it?
14 May 2012 16:05:18 -0400
http://www.huffingtonpost.com/washington-spectator/nsa-analyst-we-could-have_b_1513494.html?
2013-12-30 01:41:45
NSA Analyst
attachment
Huffington Post
2013-12-30 01:41:55
http://www.huffingtonpost.com/washington-spectator/nsa-analyst-we-could-have_b_1513494.html??view=print&comm_ref=false
text/html
utf-8
webpage
CBS News
- cbs news
Face the Nation transcripts December 29, 2013: Hayden, Drake, Radack, Gellman
CBS News' Major Garrett hosts the hour-long program on the latest political news
2013-12-29
Face the Nation transcripts December 29, 2013
http://www.cbsnews.com/news/face-the-nation-transcripts-december-29-2013-hayden-drake-radack-gellman/
2013-12-30 01:42:27
attachment
Face the Nation transcripts December 29, 2013: Hayden, Drake, Radack, Gellman - Page 2 - CBS News
2013-12-30 01:42:44
http://www.cbsnews.com/news/face-the-nation-transcripts-december-29-2013-hayden-drake-radack-gellman/2/
text/html
utf-8
attachment
Face the Nation transcripts December 29, 2013: Hayden, Drake, Radack, Gellman - Page 3 - CBS News
2013-12-30 01:43:18
http://www.cbsnews.com/news/face-the-nation-transcripts-december-29-2013-hayden-drake-radack-gellman/3/
text/html
utf-8
attachment
Face the Nation transcripts December 29, 2013: Hayden, Drake, Radack, Gellman - Page 4 - CBS News
2013-12-30 01:43:36
http://www.cbsnews.com/news/face-the-nation-transcripts-december-29-2013-hayden-drake-radack-gellman/4/
text/html
utf-8
attachment
Face the Nation transcripts December 29, 2013: Hayden, Drake, Radack, Gellman - Page 5 - CBS News
2013-12-30 01:43:54
http://www.cbsnews.com/news/face-the-nation-transcripts-december-29-2013-hayden-drake-radack-gellman/5/
text/html
utf-8
attachment
Face the Nation transcripts December 29, 2013: Hayden, Drake, Radack, Gellman - Page 6 - CBS News
2013-12-30 01:44:16
http://www.cbsnews.com/news/face-the-nation-transcripts-december-29-2013-hayden-drake-radack-gellman/6/
text/html
utf-8
attachment
Face the Nation transcripts December 29, 2013: Hayden, Drake, Radack, Gellman - Page 7 - CBS News
2013-12-30 01:45:04
http://www.cbsnews.com/news/face-the-nation-transcripts-december-29-2013-hayden-drake-radack-gellman/7/
text/html
utf-8
attachment
Face the Nation transcripts December 29, 2013: Hayden, Drake, Radack, Gellman - Page 8 - CBS News
2013-12-30 01:45:25
http://www.cbsnews.com/news/face-the-nation-transcripts-december-29-2013-hayden-drake-radack-gellman/8/
text/html
utf-8
attachment
Snapshot
2013-12-30 01:42:27
http://www.cbsnews.com/news/face-the-nation-transcripts-december-29-2013-hayden-drake-radack-gellman/
text/html
utf-8
newspaperArticle
Opinion
The New York Times
ISSN 0362-4331
Knappenberger
Brian
Booz Allen Hamilton Holding Corp
Civil Rights and Liberties
Computers and the Internet
Corporations
Ellsberg, Daniel
National Security Agency
Snowden, Edward J
Surveillance of Citizens by Government
United States
USA PATRIOT Act
‘Why Care About the N.S.A.?’
This Op-Doc video explains why ordinary Americans should be concerned about online surveillance.
2013-11-25
‘Why Care About the N.S.A.?
http://www.nytimes.com/2013/11/26/opinion/why-care-about-the-nsa.html
2013-11-26 16:27:48
NYTimes.com
attachment
New York Times Snapshot
2013-11-26 16:27:48
http://www.nytimes.com/2013/11/26/opinion/why-care-about-the-nsa.html?_r=1&
text/html
utf-8
attachment
Why Care About the NSA_ - Brian Knappenberger Op-Doc - YouTube.webm
video/webm
newspaperArticle
Reuters
Washington
Hosenball
Mark
china
Edward Snowden
Glenn Greenwald
Louise Mensch
russia
United Kingdom
United States
Spies worry over doomsday cache stashed by ex-NSA contractor Snowden
WASHINGTON (Reuters) - British and U.S. intelligence officials say they are worried about a doomsday cache of highly classified, heavily encrypted material they believe former National Security Agency
Mon Nov 25 20:58:39 UTC 2013
http://www.reuters.com/article/2013/11/25/us-usa-security-doomsday-idUSBRE9AO0Y120131125
2013-11-26 16:29:41
Reuters
attachment
Snapshot
2013-11-26 16:29:41
http://www.reuters.com/article/2013/11/25/us-usa-security-doomsday-idUSBRE9AO0Y120131125
text/html
utf-8
webpage
ABC News
Torney
ABC's Kate
Defence and National Security:Security Intelligence
Information and Communication:Broadcasting:ABC
Information and Communication:Journalism
Without fear or favour: why we broke the spy story
The ABC projects Australian democracy to the world not by acting as a mouthpiece for government, but by reporting the news as it is with rigour and independence.
Text
2013-11-26T09:46:20+1100
Without fear or favour
http://www.abc.net.au/news/2013-11-26/torney-why-the-abc-broke-the-spy-story/5116594
2013-11-26 16:29:44
en-AU
http://www.abc.net.au/conditions.htm#UseOfContent
attachment
Snapshot
2013-11-26 16:29:44
http://www.abc.net.au/news/2013-11-26/torney-why-the-abc-broke-the-spy-story/5116594
text/html
utf-8
webpage
SPIEGEL ONLINE
Der Spiegel
Nachrichten
Netzwelt
news
SPIEGEL ONLINE
NSA-Dokumente: So übernimmt der Geheimdienst fremde Rechner
Quantumtheory-Fähigkeiten des GCHQ: Dieser Präsentation zufolge haben die Staatshacker des britischen Geheimdienstes GCHQ auch noch andere Dienste im Angebot als die Kollegen von der NSA. Dazu gehören etwa die E-Mail-Dienste von Google (Gmail) und dem russischen Suchmaschinenbetreiber Yandex, aber auch AOL.
NSA-Dokumente
http://www.spiegel.de/fotostrecke/fotostrecke-105329.html
2013-12-31 22:39:07
attachment
nsa-ant-halluxwater.jpg (JPEG Image, 800 × 1035 pixels) - Scaled (45%)
2013-12-31 22:39:45
http://leaksource.files.wordpress.com/2013/12/nsa-ant-halluxwater.jpg
image/jpeg
windows-1252
attachment
nsa-ant-nightstand.jpg (JPEG Image, 604 × 781 pixels) - Scaled (60%)
2013-12-31 22:40:51
http://leaksource.files.wordpress.com/2013/12/nsa-ant-nightstand.jpg?w=604&h=781
image/jpeg
windows-1252
attachment
S3222_FEEDTROUGH.cleaned.jpg (JPEG Image, 800 × 1035 pixels) - Scaled (45%)
2013-12-31 22:39:26
http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Firewalls_Juniper/S3222_FEEDTROUGH.cleaned.jpg
image/jpeg
windows-1252
attachment
S3222_GOURMETTROUGH.jpg (JPEG Image, 800 × 1035 pixels) - Scaled (45%)
2013-12-31 22:39:30
http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Firewalls_Juniper/S3222_GOURMETTROUGH.jpg
image/jpeg
windows-1252
attachment
S3222_IRATEMONK.jpg (JPEG Image, 800 × 1035 pixels) - Scaled (45%)
2013-12-31 22:39:54
http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Rechner/S3222_IRATEMONK.jpg
image/jpeg
windows-1252
attachment
S3222_IRONCHEF.jpg (JPEG Image, 800 × 1035 pixels) - Scaled (45%)
2013-12-31 22:40:05
http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Server_HP/S3222_IRONCHEF.jpg
image/jpeg
windows-1252
attachment
S3222_JETPLOW.cleaned.jpg (JPEG Image, 800 × 1035 pixels) - Scaled (45%)
2013-12-31 22:39:34
http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Firewalls_Cisco/S3222_JETPLOW.cleaned.jpg
image/jpeg
windows-1252
attachment
S3222_SWAP.jpg (JPEG Image, 800 × 1035 pixels) - Scaled (45%)
2013-12-31 22:40:00
http://www.spiegel.de/static/happ/netzwelt/2014/na/v1/pub/img/Rechner/S3222_SWAP.jpg
image/jpeg
windows-1252
attachment
Snapshot
2013-12-31 22:39:07
http://www.spiegel.de/fotostrecke/nsa-dokumente-so-uebernimmt-der-geheimdienst-fremde-rechner-fotostrecke-105329-13.html
text/html
windows-1252
newspaperArticle
Technology
The New York Times
ISSN 0362-4331
Perlroth
Nicole
Markoff
John
Computers and the Internet
Computer Security
Data Centers
Espionage and Intelligence Services
Google Inc
Lavabit LLC
National Security Agency
Surveillance of Citizens by Government
Wiretapping and Other Eavesdropping Devices and Methods
Yahoo! Inc
N.S.A. May Have Hit Internet Companies at a Weak Spot
Security experts said they believe that government spies bypassed Google and Yahoo and targeted the fiber-optic cables that connect their data centers.
2013-11-25
http://www.nytimes.com/2013/11/26/technology/a-peephole-for-the-nsa.html
2013-11-26 16:30:01
NYTimes.com
attachment
New York Times Snapshot
2013-11-26 16:30:01
http://www.nytimes.com/2013/11/26/technology/a-peephole-for-the-nsa.html?smid=tw-share&pagewanted=all
text/html
utf-8
newspaperArticle
The Japan Times Online
ISSN 0447-5763
NSA asked Japan to tap regionwide fiber-optic cables in 2011
The NSA sought the Japanese government’s cooperation in 2011 over wiretapping fiber-optic cables carrying phone and data across the Asia-Pacific region, but the request was rejected.
Oct 27, 2013
en-US
http://www.japantimes.co.jp/news/2013/10/27/world/nsa-asked-japan-to-tap-regionwide-fiber-optic-cables-in-2011/
2013-11-26 16:33:33
Japan Times Online
attachment
Japan Times Snapshot
2013-11-26 16:33:35
http://www.japantimes.co.jp/news/2013/10/27/world/nsa-asked-japan-to-tap-regionwide-fiber-optic-cables-in-2011/
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Horwitz
Sari
Julian Assange unlikely to face U.S. charges over publishing classified documents
Justice officials say that prosecuting WikiLeaks founder would mean going after news organizations, too.
2013-11-25
en-US
http://www.washingtonpost.com/world/national-security/julian-assange-unlikely-to-face-us-charges-over-publishing-classified-documents/2013/11/25/dd27decc-55f1-11e3-8304-caf30787c0a9_story.html
2013-11-26 16:35:29
washingtonpost.com
attachment
Washington Post Snapshot
2013-11-26 16:35:31
http://www.washingtonpost.com/world/national-security/julian-assange-unlikely-to-face-us-charges-over-publishing-classified-documents/2013/11/25/dd27decc-55f1-11e3-8304-caf30787c0a9_print.html
webpage
BillMoyers.com
Revealed: How Corporate Spooks Spy on Nonprofit Activist Groups | Activism, What Matters Today
A new report shines light on a murky world of private espionage.
Revealed
http://billmoyers.com/2013/11/25/revealed-how-corporate-spooks-spy-on-nonprofit-activist-groups/
2013-11-26 16:36:13
attachment
Snapshot
2013-11-26 16:36:13
http://billmoyers.com/2013/11/25/revealed-how-corporate-spooks-spy-on-nonprofit-activist-groups/
text/html
utf-8
attachment
Spooky Business - spookybusiness.pdf
2013-12-03 22:03:03
http://www.corporatepolicy.org/spookybusiness.pdf
application/pdf
utf-8
webpage
Engelhardt
Tom
TomDispatch
Drones
Military
national security
Salon.com
terrorism
TomDispatch
War
In the national security state, what is everyone so afraid of?
We've created a society where everyone's scared all the time, and it serves the interests of defense contractors
2013-12-25
http://www.salon.com/2013/11/25/in_the_national_security_state_what_is_everyone_so_scared_of_partner/
2013-11-26 18:20:08
attachment
Snapshot
2013-11-26 18:20:08
http://www.salon.com/2013/11/25/in_the_national_security_state_what_is_everyone_so_scared_of_partner/
text/html
utf-8
newspaperArticle
Opinion
The New York Times
ISSN 0362-4331
Udall
Ron Wyden, Mark
Heinrich
Martin
Espionage and Intelligence Services
Foreign Intelligence Surveillance Court
Fourth Amendment (US Constitution)
Law and Legislation
National Security Agency
Search and Seizure
Senate Committee on Intelligence
Surveillance of Citizens by Government
United States Politics and Government
End the N.S.A. Dragnet, Now
A Senate reform bill doesn't go far enough.
2013-11-25
http://www.nytimes.com/2013/11/26/opinion/end-the-nsa-dragnet-now.html
2013-11-26 18:20:20
NYTimes.com
attachment
New York Times Snapshot
2013-11-26 18:20:20
http://www.nytimes.com/2013/11/26/opinion/end-the-nsa-dragnet-now.html?hp&rref=opinion
text/html
utf-8
webpage
House of Commons Hansard Debates for 23 Oct 2013 (pt 0001)
http://www.publications.parliament.uk/pa/cm201314/cmhansrd/cm131023/debtext/131023-0001.htm
2013-11-26 23:13:56
attachment
House of Commons Hansard Debates for 23 Oct 2013 (pt 0001)
2013-11-26 23:13:57
http://www.publications.parliament.uk/pa/cm201314/cmhansrd/cm131023/debtext/131023-0001.htm
text/html
utf-8
webpage
WSJ.com
Financial Industry Beats Tech in Cybersecurity Defense
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-391567/
2013-11-26 23:14:08
attachment
Snapshot
2013-11-26 23:14:08
http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-391567/
text/html
utf-8
webpage
the Guardian
Cybercrime
Data and computer security
Internet
Malware
NSA
Surveillance
technology
UK news
United States
US national security
World news
Snowden spyware revelations: we need to unmask the five-eyed monster
Eric King: With revelations of spyware planted on 50,000 networks, the "five eyes" states have been allowed to trample over their citizens' privacy for far too long
2013-11-26
Snowden spyware revelations
http://www.theguardian.com/commentisfree/2013/nov/26/snowden-spyware-five-eyed-monster-50000-networks-five-eyes-privacy
2013-11-26 23:14:22
attachment
Snapshot
2013-11-26 23:14:22
http://www.theguardian.com/commentisfree/2013/nov/26/snowden-spyware-five-eyed-monster-50000-networks-five-eyes-privacy?CMP=twt_gu
text/html
utf-8
webpage
POLITICO Magazine
Finan
Chris
Chris Finan
In The Arena (10)
National Security (213)
NSA (111)
Surveillance Is Too Important to Be Left to the Generals
With each revelation of the National Security Agency’s vast surveillance network, one thing is becoming clear: The generals charged with designing and managing the agency's initiatives—NSA Director Keith Alexander and Director of National Intelligence James Clapper—have been unable or unwilling to call attention to critical program...
2013-11-25
http://www.politico.com/magazine/story/2013/11/surveillance-is-too-important-to-be-left-to-generals-100263.html
2013-11-26 23:14:30
attachment
Snapshot
2013-11-26 23:14:30
http://www.politico.com/magazine/story/2013/11/surveillance-is-too-important-to-be-left-to-generals-100263.html
text/html
utf-8
webpage
Mayer
Jonathan
Mutchler
Patrick
» MetaPhone: Seeing Someone? Web Policy
2013-11-27
http://webpolicy.org/2013/11/27/metaphone-seeing-someone/
2013-11-27 18:00:54
attachment
MetaPhone » Learn More
2013-11-27 18:01:35
http://metaphone.me/learnmore
text/html
windows-1252
attachment
» MetaPhone: Seeing Someone? Web Policy
2013-11-27 18:00:55
http://webpolicy.org/2013/11/27/metaphone-seeing-someone/
text/html
utf-8
magazineArticle
Foreign Policy
Harris
Shane
intelligence
Military
NSA
Security
Home Alone
With Keith Alexander out fighting fires, meet the woman who's really running the NSA.
November 27, 2013
http://www.foreignpolicy.com/articles/2013/11/26/home_alone_national_security_administration?page=full
2013-11-27 18:11:05
Foreign Policy
attachment
Foreign Policy Snapshot
2013-11-27 18:11:07
http://www.foreignpolicy.com/articles/2013/11/26/home_alone_national_security_administration?page=full
text/html
utf-8
webpage
O'Neill
Patrick Howell
Dot
The Daily
Edward Snowden
Electronic Frontier Foundation
NSA
Salon.com
the daily dot
U.S. Economy
The NSA is crippling America’s economy
In the wake of spying revelations, US companies are reporting profit losses to the tune of billions
2013-11-27
http://www.salon.com/2013/11/27/the_nsa_is_hurting_americas_economy_partner/
2013-11-27 18:11:11
attachment
Snapshot
2013-11-27 18:11:11
http://www.salon.com/2013/11/27/the_nsa_is_hurting_americas_economy_partner/
text/html
utf-8
webpage
Bloomberg
Crawford
Susan
The Spyware That Enables Mobile-Phone Snooping
Thanks to ever-improving technology for intercepting phone calls and text messages, it’s getting easier for U.S. companies’ competitors, both foreign and domestic, to engage in corporate espionage through remote wiretapping. Such activity, which has been widespread in India for years, could be thwarted if U.S. wireless carriers would upgrade their network infrastructure and encryption practices.
2013-11-27
http://www.bloomberg.com/news/2013-11-27/the-spyware-that-enables-mobile-phone-snooping.html
2013-11-27 18:12:02
attachment
Bloomberg Printable
2013-11-27 18:12:04
http://www.bloomberg.com/news/print/2013-11-27/the-spyware-that-enables-mobile-phone-snooping.html
text/html
utf-8
newspaperArticle
Tech
The Washington Post
ISSN 0190-8286
Timberg
Craig
Gellman
Barton
Soltani
Ashkan
Microsoft, suspecting NSA spying, to ramp up efforts to encrypt its Internet traffic
The company is moving toward a new effort to protect its Internet traffic amid suspicions of government spying.
2013-11-27
en-US
http://www.washingtonpost.com/business/technology/microsoft-suspecting-nsa-spying-to-ramp-up-efforts-to-encrypt-its-internet-traffic/2013/11/26/44236b48-56a9-11e3-8304-caf30787c0a9_story.html
2013-11-27 18:13:51
washingtonpost.com
attachment
Did the NSA target Microsoft too? - The Washington Post
2013-11-27 18:14:24
http://apps.washingtonpost.com/g/page/world/did-the-nsa-target-microsoft-too/620/
text/html
utf-8
attachment
Evidence of Microsoft's vulnerability - The Washington Post
2013-11-27 18:14:18
http://apps.washingtonpost.com/g/page/world/hints-of-microsofts-vulnerability/621/
text/html
utf-8
attachment
Microsoft, suspecting NSA spying, to ramp up efforts to encrypt its Internet traffic - The Washington Post
2013-11-27 18:14:52
http://www.washingtonpost.com/business/technology/microsoft-suspecting-nsa-spying-to-ramp-up-efforts-to-encrypt-its-internet-traffic/2013/11/26/44236b48-56a9-11e3-8304-caf30787c0a9_story_1.html
text/html
utf-8
attachment
Washington Post Snapshot
2013-11-27 18:13:53
http://www.washingtonpost.com/business/technology/microsoft-suspecting-nsa-spying-to-ramp-up-efforts-to-encrypt-its-internet-traffic/2013/11/26/44236b48-56a9-11e3-8304-caf30787c0a9_print.html
webpage
Washington Examiner
Accountability
Barack Obama
Eric Holder
FBI
Islamic Jihad
Mark Flatten
Middle east
national security
Religion
terrorism
Video
Watchdog
Watchdog Blog
Obama, Eric Holder, cartoons and Lady Gaga are among the 'inappropriate' images purged from FBI counter-terror training | WashingtonExaminer.com
A photo of President Obama in a turban and cartoons depicting the Prophet Muhammad that led to terrorist plots against the Danish newspaper that published them are among documents purged from FBI counter-terrorism training materials, new disclosures from the agency show. The documents deemed unfit for inclusion in FBI classrooms range from slides showing verses in the Quran favored by terrorists to a video called “God Hates Lady Gaga” produced by a fundamentalist church best known for its intrusive anti-gay protests at veterans' funerals. Entire sections dealing with Middle Eastern history, Islamic culture and techniques for interviewing Muslims while being mindful of Islamic customs were removed. More information
http://washingtonexaminer.com/obama-eric-holder-cartoons-and-lady-gaga-are-among-the-inappropriate-images-purged-from-fbi-counter-terror-training/article/2539658
2013-11-27 18:17:15
attachment
Snapshot
2013-11-27 18:17:15
http://washingtonexaminer.com/obama-eric-holder-cartoons-and-lady-gaga-are-among-the-inappropriate-images-purged-from-fbi-counter-terror-training/article/2539658
text/html
utf-8
webpage
the Guardian
Edward Snowden
espionage
Media
Newspapers
Newspapers & magazines
Press freedom
The Guardian
UK news
UK security and counter-terrorism
United States
World news
It's outrageous to accuse the Guardian of aiding terrorism by publishing Snowden's revelations
Ben Emmerson: Alan Rusbridger is being grilled by MPs – but he has published nothing that could be a threat to national security
2013-12-02
http://www.theguardian.com/commentisfree/2013/dec/02/guardian-terrorism-snowden-alan-rusbridger-free-press
2013-12-03 00:10:44
attachment
Snapshot
2013-12-03 00:10:44
http://www.theguardian.com/commentisfree/2013/dec/02/guardian-terrorism-snowden-alan-rusbridger-free-press
text/html
utf-8
blogPost
Foreign Policy Blogs
china
East Asia
intelligence
Accused of Cyberspying, Huawei Is ‘Exiting the U.S. Market’
Monday, December 2, 2013
http://killerapps.foreignpolicy.com/posts/2013/12/02/accused_of_cyberspying_huawei_is_exiting_the_us_market
2013-12-03 00:10:58
attachment
Foreign Policy Snapshot
2013-12-03 00:11:06
http://killerapps.foreignpolicy.com/posts/2013/12/02/accused_of_cyberspying_huawei_is_exiting_the_us_market?page=full
text/html
utf-8
newspaperArticle
Sunday Review
The New York Times
ISSN 0362-4331
Stellin
Susan
Airport Security
Bernstein, Anya
Ibrahim, Rahinah
terrorism
The Hidden Costs of Terrorist Watch Lists (Book)
Who Is Watching the Watch Lists?
After almost eight years, a case involving terrorist watch lists is going to court.
2013-11-30
http://www.nytimes.com/2013/12/01/sunday-review/who-is-watching-the-watch-lists.html
2013-12-03 00:21:51
NYTimes.com
attachment
New York Times Snapshot
2013-12-03 00:21:51
http://www.nytimes.com/2013/12/01/sunday-review/who-is-watching-the-watch-lists.html?pagewanted=1&hp&rref=opinion&_r=0
text/html
utf-8
webpage
nrc.nl
AIVD
CNE
De NSA
Edward Snowden
English
Hacking
news
Nieuws
NSA
Standout
Dutch intelligence agency AIVD hacks internet forums
The Dutch intelligence service - AIVD - hacks internet web forums to collect the data of all users. The majority of these people are unknown to the intelligence services and are not specified as targets when the hacking and data-collection process starts.
http://www.nrc.nl/nieuws/2013/11/30/dutch-intelligence-agency-aivd-hacks-internet-fora/
2013-12-03 00:22:16
attachment
Snapshot
2013-12-03 00:22:16
http://www.nrc.nl/nieuws/2013/11/30/dutch-intelligence-agency-aivd-hacks-internet-fora/
text/html
utf-8
webpage
The Globe and Mail
Brazil
CSEC
CSEC presentation
CSEC slide show
Edward Snowden
Glenn Greenwald
spy agency
Read a CSEC document that was first acquired by Edward Snowden
The Globe is making available a copy of a leaked CSEC presentation, in collaboration with Brazil-based American journalist Glenn Greenwald
http://www.theglobeandmail.com/news/politics/read-a-csec-document-on-brazil-that-was-first-acquired-by-edward-snowden/article15699941/
2013-12-03 00:23:10
attachment
Snapshot
2013-12-03 00:23:10
http://www.theglobeandmail.com/news/politics/read-a-csec-document-on-brazil-that-was-first-acquired-by-edward-snowden/article15699941/
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Lally
Kathy
Fair Trials International group urges reforms for Interpol arrests
A report by the group says some countries are using the police network for political purposes.
2013-11-29
en-US
http://www.washingtonpost.com/world/europe/fair-trials-group-urges-interpol-arrest-reforms/2013/11/29/46892a20-590c-11e3-bdbf-097ab2a3dc2b_story.html
2013-12-03 00:25:54
washingtonpost.com
attachment
Washington Post Snapshot
2013-12-03 00:25:56
http://www.washingtonpost.com/world/europe/fair-trials-group-urges-interpol-arrest-reforms/2013/11/29/46892a20-590c-11e3-bdbf-097ab2a3dc2b_print.html
webpage
The Globe and Mail
Freeze
Colin
How CSEC became an electronic spying giant - The Globe and Mail
2013-11-30
http://m.theglobeandmail.com/news/politics/how-csec-became-an-electronic-spying-giant/article15699694/?service=mobile
2013-12-03 00:26:00
attachment
How CSEC became an electronic spying giant - The Globe and Mail
2013-12-03 00:26:01
http://m.theglobeandmail.com/news/politics/how-csec-became-an-electronic-spying-giant/article15699694/?service=mobile
text/html
utf-8
webpage
GSM Map Project
GSM security country report: USA - gsmmap.org-country_report-United_States_of_America-2013-08.pdf
GSM security country report: USA
2013-08
http://gsmmap.org/assets/pdfs/gsmmap.org-country_report-United_States_of_America-2013-08.pdf
2014-01-06 13:47:13
attachment
GSM security country report: USA - gsmmap.org-country_report-United_States_of_America-2013-08.pdf
2014-01-06 13:47:13
http://gsmmap.org/assets/pdfs/gsmmap.org-country_report-United_States_of_America-2013-08.pdf
application/pdf
utf-8
webpage
Le Monde.fr
Follorou
Jacques
La France, précieux partenaire de l'espionnage de la NSA
De nouveaux documents soulignent l’autonomie des services secrets en matière de stratégie du renseignement.
2013-11-29
http://www.lemonde.fr/technologies/article/2013/11/29/la-france-precieux-partenaire-de-l-espionnage-de-la-nsa_3522653_651865.html
2013-12-03 00:28:55
fr
attachment
Snapshot
2013-12-03 00:28:55
http://www.lemonde.fr/technologies/article/2013/11/29/la-france-precieux-partenaire-de-l-espionnage-de-la-nsa_3522653_651865.html
text/html
utf-8
webpage
USA Today
Swartz
Jon
Tech giants are countering government spying
Worried that fears of compromised data could hurt their business, the tech firms are in damage-control mode.
2013-12-01
http://www.usatoday.com/story/tech/2013/12/01/tech-firms-counter-nsa-data/3495995/
2013-12-03 20:18:03
attachment
Snapshot
2013-12-03 20:18:03
http://www.usatoday.com/story/tech/2013/12/01/tech-firms-counter-nsa-data/3495995/
text/html
utf-8
webpage
Huffington Post
New Technology Helps Stores Track Your Every Move This Season
WASHINGTON (AP) — It's a big question for marketers: What kind of a buyer are you? And, as important, what are you willing to pay?
11/30/2013
http://www.huffingtonpost.com/2013/11/30/stores-track-you_n_4363811.html?ncid=edlinkusaolp00000003
2013-12-03 20:19:31
attachment
Huffington Post
2013-12-03 20:19:33
http://www.huffingtonpost.com/2013/11/30/stores-track-you_n_4363811.html?view=print&comm_ref=false
text/html
utf-8
webpage
the Guardian
MacAskill
Ewen
Ball
James
Murphy
Katharine
Asia Pacific
Australia
Edward Snowden
espionage
GCHQ
NSA
Surveillance
technology
The NSA files
World news
Revealed: Australian spy agency offered to share data about ordinary citizens
• Secret 5-Eyes document shows surveillance partners discussing what data they can pool about their citizens • DSD indicated it could provide material without some privacy restraints imposed by other countries such as Canada • Medical, legal or religious information 'not automatically limited' • Concern that agency could be 'operating outside its legal mandate'
2013-12-02
Revealed
http://www.theguardian.com/world/2013/dec/02/revealed-australian-spy-agency-offered-to-share-data-about-ordinary-citizens
2013-12-03 20:20:01
attachment
Snapshot
2013-12-03 20:20:01
http://www.theguardian.com/world/2013/dec/02/revealed-australian-spy-agency-offered-to-share-data-about-ordinary-citizens
text/html
utf-8
webpage
PandoDaily
Keeping Secrets: Pierre Omidyar, Glenn Greenwald and the privatization of Snowden's leaks
Who “owns” the NSA secrets leaked by Edward Snowden to reporters Glenn Greenwald and Laura Poitras? Given that eBay founder Pierre Omidyar just invested a quarter of a billion dollars to personally...
Keeping Secrets
http://pando.com/2013/11/27/keeping-secrets/
2013-12-03 20:21:41
attachment
Snapshot
2013-12-03 20:21:41
http://pando.com/2013/11/27/keeping-secrets/
text/html
utf-8
webpage
Electronic Privacy Information Center
www.epic.org
Electronic Privacy Information Center-
Information on electronic privacy issues
Postal Service Privacy
The Electronic Privacy Information Center (EPIC) focuses public attention on emerging civil liberties, privacy, First Amendment issues and works to promote the Public Voice in decisions concerning the future of the Internet.
2013-11-03
https://epic.org/privacy/postal/
2013-12-03 20:22:39
attachment
Snapshot
2013-12-03 20:22:39
https://epic.org/privacy/postal/
text/html
utf-8
webpage
PolicyMic
are
charge
check
contractors
in
keeping
literally
NSA
of
off
paying
senators
the
them
NSA Contractors Are Literally Paying Off the Senators in Charge Of Keeping Them in Check
So much for government transparency.
http://www.policymic.com/articles/72913/nsa-contractors-are-literally-paying-off-the-senators-in-charge-of-keeping-them-in-check
2013-12-03 20:25:54
attachment
Snapshot
2013-12-03 20:25:54
http://www.policymic.com/articles/72913/nsa-contractors-are-literally-paying-off-the-senators-in-charge-of-keeping-them-in-check
text/html
utf-8
webpage
Taking Note
Rosenthal
Andrew
National Security Agency
Surveillance of Citizens by Government
The N.S.A. Dips Into Pornography
New documents reveal that agents gathered evidence on the pornography-viewing habits of alleged radicals.
2013-11-27
http://takingnote.blogs.nytimes.com/2013/11/27/the-modern-honey-trap/
2013-12-03 20:26:01
attachment
Snapshot
2013-12-03 20:26:01
http://takingnote.blogs.nytimes.com/2013/11/27/the-modern-honey-trap/?_r=1#more-15437
text/html
utf-8
blogPost
Top Level Telecommunications
P/k
NSA
Wireless
Top Level Telecommunications: DRTBOX and the DRT surveillance systems
November 27, 2013
http://electrospaces.blogspot.com/2013/11/drtbox-and-drt-surveillance-systems.html
2013-12-03 20:30:22
Top Level Telecommunications
attachment
Blogspot Snapshot
2013-12-03 20:30:24
http://electrospaces.blogspot.com/2013/11/drtbox-and-drt-surveillance-systems.html
text/html
utf-8
webpage
The Atlantic
Friedersdorf
Conor
The Secret Story of How the NSA Began
Congress was surprised to find that a federal intelligence agency they'd scarcely heard of was bigger and more powerful than one that they'd created.
Nov 27 2013, 6:00 AM ET
http://www.theatlantic.com/politics/archive/2013/11/the-secret-story-of-how-the-nsa-began/281862/
2013-12-03 20:32:15
attachment
The Atlantic Print View
2013-12-03 20:32:17
http://www.theatlantic.com/politics/print/2013/11/the-secret-story-of-how-the-nsa-began/281862/
text/html
utf-8
webpage
CBC News
Weston
Greg
Greenwald
Glenn
Gallagher
Ryan
New Snowden docs show U.S. spied during G20 in Toronto
2013-11-27
http://www.cbc.ca/m/touch/politics/story/1.2442448
2013-12-03 20:35:45
attachment
CBC News - New Snowden docs show U.S. spied during G20 in Toronto
2013-12-03 20:35:46
http://www.cbc.ca/m/touch/politics/story/1.2442448
text/html
utf-8
blogPost
The New Yorker Blogs
Davidson
Amy
Edward Snowden
NSA Scandal
Did Edward Snowden Break His Oath?
January 5, 2014
http://www.newyorker.com/online/blogs/closeread/2014/01/did-edward-snowden-break-his-oath.html?mobify=0
2014-01-06 13:58:04
attachment
The New Yorker
2014-01-06 13:58:09
http://www.newyorker.com/online/blogs/closeread/2014/01/did-edward-snowden-break-his-oath.html?mobify=0?printable=true
webpage
NPR.org
Johnson
Carrie
Why FISA Court Judges Rule The Way They Do
Self-policing the National Security Agency comes with big challenges.
2013-12-03
http://www.npr.org/2013/12/03/248320220/why-fisa-court-judges-rule-the-way-they-do
2013-12-03 21:07:06
attachment
Snapshot
2013-12-03 21:07:06
http://www.npr.org/2013/12/03/248320220/why-fisa-court-judges-rule-the-way-they-do
text/html
utf-8
magazineArticle
Buren
Peter Van
Could Google and the NSA Make Whistleblowers Disappear?
December 3, 2013
http://www.thenation.com/article/177430/could-google-and-nsa-make-whistleblowers-disappear
2013-12-03 21:08:11
The Nation
The Nation
ISSN 0027-8378
attachment
The Nation Snapshot
2013-12-03 21:08:13
http://www.thenation.com/print/article/177430/could-google-and-nsa-make-whistleblowers-disappear
text/html
utf-8
webpage
the Guardian
Hopkins
Nick
Taylor
Matthew
Alan Rusbridger
Data protection
espionage
National newspapers
Newspapers
NSA
Privacy
The Guardian
The NSA files
United States
US national security
Guardian will not be intimidated over NSA leaks, Alan Rusbridger tells MPs
Editor tells parliamentary committee that stories revealing mass surveillance by UK and US have prompted global debate
2013-12-03
http://www.theguardian.com/world/2013/dec/03/guardian-not-intimidated-nsa-leaks-alan-rusbridger-surveillance
2013-12-03 21:08:43
attachment
Snapshot
2013-12-03 21:08:43
http://www.theguardian.com/world/2013/dec/03/guardian-not-intimidated-nsa-leaks-alan-rusbridger-surveillance
text/html
utf-8
webpage
Yahoo News
Mendoze
Martha
Techies vs. NSA: Encryption arms race escalates
SAN JOSE, Calif. (AP) — Encrypted email, secure instant messaging and other privacy services are booming in the wake of the National Security Agency's recently revealed surveillance programs. But the flood of new computer security services is of variable quality, and much of it, experts say, can bog down computers and isn't likely to keep out spies.
2013-11-29
Techies vs. NSA
http://news.yahoo.com/techies-vs-nsa-encryption-arms-race-escalates-153931600--finance.html
2013-12-03 21:09:58
attachment
Snapshot
2013-12-03 21:09:58
http://news.yahoo.com/techies-vs-nsa-encryption-arms-race-escalates-153931600--finance.html
text/html
utf-8
webpage
http://www.hindustantimes.com/
Aaron
Sushil
Angela Merkel
Centre for Policy Research
Edward Snowden
G-77
GLen Greenwald
Indo-US nuclear deal
NSA
UK's GCHQ
USA snooping
Waiting for Greenwald: why India must react firmly to NSA spying - Hindustan Times
India's public stand on snooping by US intelligence agencies, which has been muted so far, will be important in the evolving global conversation on internet governance, diplomacy, security and privacy, writes Sushil Aaron.
2013-12-03
Waiting for Greenwald
http://www.hindustantimes.com/comment/analysis/waiting-for-greenwald-why-india-must-react-firmly-to-nsa-spying/article1-1158485.aspx
2013-12-03 21:10:14
attachment
Snapshot
2013-12-03 21:10:14
http://www.hindustantimes.com/comment/analysis/waiting-for-greenwald-why-india-must-react-firmly-to-nsa-spying/article1-1158485.aspx
text/html
utf-8
webpage
More spy leaks to come: Minister
Defence Minister appears to confirm Australian spying, warns of more leaks to come.
More spy leaks to come
http://au.news.yahoo.com/thewest/a/-/national/20119934/more-spy-leaks-to-come-minister/
2013-12-03 21:16:14
attachment
Snapshot
2013-12-03 21:16:14
http://au.news.yahoo.com/thewest/a/-/newshome/20119934/more-spy-leaks-to-come-minister/
text/html
utf-8
webpage
the Guardian
Bernstein
Carl
Alan Rusbridger
Carl Bernstein
Data protection
Edward Snowden
GCHQ
Media
NSA
Surveillance
The Guardian
The NSA files
UK news
United States
US national security
World news
An open letter from Carl Bernstein to Guardian editor Alan Rusbridger
Watergate scandal journalist's letter comes as Guardian editor prepares to appear before MPs over Edward Snowden leaks
2013-12-03
http://www.theguardian.com/media/2013/dec/03/open-letter-carl-bernstein-alan-rusbridger
2013-12-03 21:18:22
attachment
Snapshot
2013-12-03 21:18:22
http://www.theguardian.com/media/2013/dec/03/open-letter-carl-bernstein-alan-rusbridger?CMP=twt_gu
text/html
utf-8
webpage
Salon
Lennard
Natasha
Afghanistan
Al-Qaida
Counterterrorism
Dianne Feinstein
Drones
House Intelligence Committee
intelligence
Iraq
Mike Rogers
national security
NSA
Salon.com
Senate Intelligence Committee
Spying
terrorism
War on Terror
Intelligence committee chairs want you scared. You should be angry
Feinstein and Rogers invoke the old boogeyman of rising terrorism in a cheap attempt to defend surveillance state
2013-12-02
http://www.salon.com/2013/12/02/intelligence_committee_chairs_want_you_scared_you_should_be_angry/
2013-12-03 21:19:42
attachment
Snapshot
2013-12-03 21:19:42
http://www.salon.com/2013/12/02/intelligence_committee_chairs_want_you_scared_you_should_be_angry/
text/html
utf-8
webpage
Bloomberg
Root
Vidya
French Intelligence Involved in NSA Spying in France, Monde Says
French intelligence services worked “very closely” with the U.S. National Security Agency in spying on the country’s citizens, Le Monde reported, citing documents it said it obtained from Edward Snowden.
2013-11-29
http://www.bloomberg.com/news/2013-11-29/french-intelligence-involved-in-nsa-spying-in-france-monde-says.html
2013-12-03 21:28:54
attachment
Bloomberg Printable
2013-12-03 21:28:56
http://www.bloomberg.com/news/print/2013-11-29/french-intelligence-involved-in-nsa-spying-in-france-monde-says.html
text/html
utf-8
newspaperArticle
Hauch
Valerie
A Toronto woman is shocked after she was denied entry into the U.S. because she had been hospitalized for clinical depression.
A Toronto woman is shocked after she was denied entry into the U.S. because she had been hospitalized for clinical depression.
Thu Nov 28 2013
http://www.thestar.com/news/gta/2013/11/28/disabled_woman_denied_entry_to_us_after_agent_cites_supposedly_private_medical_details.html
2013-12-03 21:32:39
Toronto Star
The Toronto Star
ISSN 0319-0781
attachment
Toronto Star Snapshot
2013-12-03 21:32:39
http://www.thestar.com/news/gta/2013/11/28/disabled_woman_denied_entry_to_us_after_agent_cites_supposedly_private_medical_details.html#
text/html
utf-8
webpage
IEEE: Today's Engineer
Colburn
Robert
your engineering heritage: “Messages of a Disloyal Character,” “Black Chambers,” and the History of Bulk Data Collection
2013-11
http://www.todaysengineer.org/2013/Nov/history.asp
2013-12-03 21:56:52
attachment
your engineering heritage: “Messages of a Disloyal Character,” “Black Chambers,” and the History of Bulk Data Collection
2013-12-03 21:56:53
http://www.todaysengineer.org/2013/Nov/history.asp
text/html
windows-1252
interview
Herson
David
Interview with David Herson - SOGIS
1996-09-25
English
http://pages.citebite.com/t2n3b8i4o8skc
2013-12-03 21:58:38
attachment
Interview with David Herson - SOGIS
2013-12-03 21:58:39
http://pages.citebite.com/t2n3b8i4o8skc
text/html
windows-1252
webpage
Radio Canada International
International
Radio Canada
Canadian government refuses to confirm U.S. surveillance of G20 summit in Canada
[medianet id=
2013-11-28
http://www.rcinet.ca/en/2013/11/28/canadian-government-refuses-to-confirm-u-s-surveillance-of-g20-summit-in-canada/
2013-12-03 22:00:38
en_US
[medianet id=
attachment
Snapshot
2013-12-03 22:00:38
http://www.rcinet.ca/en/2013/11/28/canadian-government-refuses-to-confirm-u-s-surveillance-of-g20-summit-in-canada/
text/html
utf-8
webpage
Holland
Joshua
BillMoyers.com
Activism
BillMoyers.com
corporate
hackers
Salon.com
Security
spies
Revealed: How corporate spooks spy on activists
A new report discusses some of the techniques. They can be devious
2013-11-26
Revealed
http://www.salon.com/2013/11/26/revealed_how_corporate_spooks_spy_on_nonprofit_activist_groups/
2013-12-03 22:06:39
attachment
Snapshot
2013-12-03 22:06:39
http://www.salon.com/2013/11/26/revealed_how_corporate_spooks_spy_on_nonprofit_activist_groups/
text/html
utf-8
webpage
Beguoci
Leandro
"Os brasileiros são uma grande inspiração para mim", diz Edward Snowden | Sociedade | VIP
2013-11-27
http://vip.abril.com.br/cultura/sociedade/os-brasileiros-sao-uma-grande-inspiracao-para-mim-diz-edward-snowden/
2013-12-03 22:07:55
Portuguese
attachment
Google Translate
2013-12-03 22:08:42
http://translate.google.com/translate?sl=pt&tl=en&js=n&prev=_t&hl=en&ie=UTF-8&u=http%3A%2F%2Fvip.abril.com.br%2Fcultura%2Fsociedade%2Fos-brasileiros-sao-uma-grande-inspiracao-para-mim-diz-edward-snowden%2F
text/html
utf-8
attachment
"Os brasileiros são uma grande inspiração para mim", diz Edward Snowden | Sociedade | VIP
2013-12-03 22:07:56
http://vip.abril.com.br/cultura/sociedade/os-brasileiros-sao-uma-grande-inspiracao-para-mim-diz-edward-snowden/
text/html
utf-8
newspaperArticle
Tech
The Washington Post
ISSN 0190-8286
Timberg
Craig
Gellman
Barton
Soltani
Ashkan
Microsoft, suspecting NSA spying, to ramp up efforts to encrypt its Internet traffic
The company is moving toward a new effort to protect its Internet traffic amid suspicions of government spying.
2013-11-27
en-US
http://www.washingtonpost.com/business/technology/microsoft-suspecting-nsa-spying-to-ramp-up-efforts-to-encrypt-its-internet-traffic/2013/11/26/44236b48-56a9-11e3-8304-caf30787c0a9_story.html?wpisrc=al_national
2013-12-03 22:09:13
washingtonpost.com
attachment
Washington Post Snapshot
2013-12-03 22:09:15
http://www.washingtonpost.com/business/technology/microsoft-suspecting-nsa-spying-to-ramp-up-efforts-to-encrypt-its-internet-traffic/2013/11/26/44236b48-56a9-11e3-8304-caf30787c0a9_print.html?wpisrc=al_national
text/html
utf-8
newspaperArticle
Spiegel Online
Salloum
Raniah
US Lawmakers in Berlin over NSA Spying Scandal
The Obama administration dispatched two lawmakers to Berlin this week to help ease concerns about the NSA spying scandal. Yet the word "sorry" never crossed their lips.
26.11.2013
http://www.spiegel.de/international/germany/us-lawmakers-in-berlin-over-nsa-spying-scandal-a-935664.html
2013-12-03 22:09:39
Spiegel Online
attachment
US Lawmakers in Berlin over NSA Spying Scandal - SPIEGEL ONLINE
2013-12-03 22:09:41
http://www.spiegel.de/international/germany/us-lawmakers-in-berlin-over-nsa-spying-scandal-a-935664.html
text/html
windows-1252
webpage
The Atlantic
Friedersdorf
Conor
The NSA's Porn-Surveillance Program: Not Safe for Democracy
Its targets extend beyond suspected terrorists—and some rhetoric that the First Amendment would protect is singled out.
Nov 27 2013, 4:04 PM ET
The NSA's Porn-Surveillance Program
http://www.theatlantic.com/politics/archive/2013/11/the-nsas-porn-surveillance-program-not-safe-for-democracy/281914/
2013-12-03 22:09:48
attachment
The Atlantic Print View
2013-12-03 22:09:50
http://www.theatlantic.com/politics/print/2013/11/the-nsas-porn-surveillance-program-not-safe-for-democracy/281914/
text/html
utf-8
webpage
Huffington Post
Greenwald
Glenn
Gallagher
Ryan
Grim
Ryan
Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radicalizers'
WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority.
11/26/2013
http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html?1385526024
2013-12-03 22:11:20
attachment
Huffington Post
2013-12-03 22:11:22
http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html?view=print&comm_ref=false
text/html
utf-8
webpage
the Guardian
Garside
Juliette
Correspondent
Telecommunications
Broadband
Child protection
Counter-terrorism policy
Freedom of speech
Internet
ISPs
politics
technology
UK news
UK security and counter-terrorism
World news
Ministers will order ISPs to block terrorist and extremist websites
PM favours model used to successfully police online child abuse, but broadband companies are wary of infringing free speech
2013-11-27
http://www.theguardian.com/uk-news/2013/nov/27/ministers-order-isps-block-terrorist-websites
2013-12-03 22:13:58
attachment
Snapshot
2013-12-03 22:13:58
http://www.theguardian.com/uk-news/2013/nov/27/ministers-order-isps-block-terrorist-websites
text/html
utf-8
newspaperArticle
Reuters
Alan Rusbridger
Brazil
Carl Bernstein
Cressida Dick
david miranda
Edward Snowden
Glenn Greenwald
Michael Ellis
Michael Holden
russia
United Kingdom
United States
William James
UPDATE 1-British news staff may face terrorism charges over Snowden leaks
* Guardian newspaper editor summoned to parliament* Accused by some of helping terrorists by publishing leaks* Snowden files exposed extent of government surveillance* Senior police officer says considering
Tue Dec 03 19:13:51 UTC 2013
http://www.reuters.com/article/2013/12/03/britain-snowden-guardian-idUSL5N0JI40T20131203
2013-12-03 22:51:46
Reuters
attachment
Snapshot
2013-12-03 22:51:46
http://www.reuters.com/article/2013/12/03/britain-snowden-guardian-idUSL5N0JI40T20131203
text/html
utf-8
webpage
Rolling Stone
albums
all access
culture
Edward Snowden and Glenn Greenwald: The Men Who Leaked the NSA's Secrets | Politics News | Rolling Stone
jann wenner
movies
music
news
photos
politics
pop culture
random notes
reviews
Rolling Stone
songs
videos
Edward Snowden and Glenn Greenwald: The Men Who Leaked the NSA's Secrets | Politics News
How two alienated, angry geeks broke the story of the year
Edward Snowden and Glenn Greenwald
http://www.rollingstone.com/politics/news/snowden-and-greenwald-the-men-who-leaked-the-secrets-20131204
2013-12-04 18:44:13
attachment
Edward Snowden and Glenn Greenwald: The Men Who Leaked the NSA's Secrets | Politics News | Rolling Stone
2013-12-04 18:44:33
http://www.rollingstone.com/politics/news/snowden-and-greenwald-the-men-who-leaked-the-secrets-20131204?page=2
text/html
utf-8
attachment
Edward Snowden and Glenn Greenwald: The Men Who Leaked the NSA's Secrets | Politics News | Rolling Stone
2013-12-04 18:44:44
http://www.rollingstone.com/politics/news/snowden-and-greenwald-the-men-who-leaked-the-secrets-20131204?page=3
text/html
utf-8
attachment
Edward Snowden and Glenn Greenwald: The Men Who Leaked the NSA's Secrets | Politics News | Rolling Stone
2013-12-04 18:44:54
http://www.rollingstone.com/politics/news/snowden-and-greenwald-the-men-who-leaked-the-secrets-20131204?page=4
text/html
utf-8
attachment
Edward Snowden and Glenn Greenwald: The Men Who Leaked the NSA's Secrets | Politics News | Rolling Stone
2013-12-04 18:45:01
http://www.rollingstone.com/politics/news/snowden-and-greenwald-the-men-who-leaked-the-secrets-20131204?page=5
text/html
utf-8
attachment
Edward Snowden and Glenn Greenwald: The Men Who Leaked the NSA's Secrets | Politics News | Rolling Stone
2013-12-04 18:45:07
http://www.rollingstone.com/politics/news/snowden-and-greenwald-the-men-who-leaked-the-secrets-20131204?page=6
text/html
utf-8
attachment
Snapshot
2013-12-04 18:44:13
http://www.rollingstone.com/politics/news/snowden-and-greenwald-the-men-who-leaked-the-secrets-20131204
text/html
utf-8
webpage
wltx.com
Fouraker
Clark
Tower Dumps in SC Could Give Your Cell Data to Police
2013-12-03
http://www.wltx.com/news/article/257093/325/Tower-Dumps-in-SC-Could-Give-Your-Cell-Data-to-Police
2013-12-04 18:47:04
attachment
Snapshot
2013-12-04 18:47:04
http://www.wltx.com/news/onyourside/article/257093/325/Tower-Dumps-in-SC-Could-Give-Your-Cell-Data-to-Police
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Gellman
Barton
Soltani
Ashkan
NSA tracking cellphone locations worldwide, Snowden documents show
Snowden documents show agency is collecting billions of records on whereabouts of mobile devices.
2013-12-05
en-US
http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html
2013-12-05 16:30:57
washingtonpost.com
attachment
NSA tracking cellphone locations worldwide, Snowden documents show - The Washington Post
2013-12-05 16:31:14
http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story_1.html
text/html
utf-8
attachment
NSA tracking cellphone locations worldwide, Snowden documents show - The Washington Post
2013-12-05 16:31:23
http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story_2.html
text/html
utf-8
attachment
Washington Post Snapshot
2013-12-05 16:30:59
http://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_print.html
text/html
utf-8
webpage
the Guardian
Berlin
Philip Oltermann in
London
Alex Hern in
anonymous
Germany
Hacking
PayPal
Protest
technology
wikileaks
World news
WikiLeaks' Sarah Harrison: 'How can you take Pierre Omidyar seriously?'
WikiLeaks staffer who accompanied Edward Snowden to Russia, attacks the eBay founder for not helping the 'PayPal 14'
2013-12-06
WikiLeaks' Sarah Harrison
http://www.theguardian.com/technology/2013/dec/06/wikileaks-sarah-harrison-omidyar-greenwald-ebay-paypal
2013-12-06 21:50:32
attachment
Snapshot
2013-12-06 21:50:32
http://www.theguardian.com/technology/2013/dec/06/wikileaks-sarah-harrison-omidyar-greenwald-ebay-paypal?CMP=twt_gu
text/html
utf-8
webpage
Obama Admits Snowden Disclosures 'Identified Some Areas of Legitimate Concern': Daily Whistleblower News - Government Accountability Project
2013-12-06
http://www.whistleblower.org/blog/44-2013/3100-obama-admits-snowden-disclosures-identified-some-areas-of-legitimate-concern-daily-whistleblower-news
2013-12-06 21:51:07
attachment
Obama Admits Snowden Disclosures 'Identified Some Areas of Legitimate Concern': Daily Whistleblower News - Government Accountability Project
2013-12-06 21:51:08
http://www.whistleblower.org/blog/44-2013/3100-obama-admits-snowden-disclosures-identified-some-areas-of-legitimate-concern-daily-whistleblower-news
text/html
utf-8
blogPost
Foreign Policy Blogs
Traywick
Catherine A.
East Asia
Japan
Military
national security
Security
The Complex
In Japan’s State Secrets Law, Shades of Red, White and Blue
Thursday, December 5, 2013
http://killerapps.foreignpolicy.com/posts/2013/12/05/in_japan_s_state_secrets_law_shades_of_red_white_and_blue
2013-12-06 21:51:39
attachment
Foreign Policy Snapshot
2013-12-06 21:51:44
http://killerapps.foreignpolicy.com/posts/2013/12/05/in_japan_s_state_secrets_law_shades_of_red_white_and_blue?page=full
text/html
utf-8
webpage
New York Times
Johnston
David
BLACKS (NON-US)
United States International Relations
C.I.A. TIE REPORTED IN MANDELA ARREST
The Central Intelligence Agency played an important role in the arrest in 1962 of Nelson Mandela, the African National Congress leader who was jailed for nearly 28 years before his release four
1990-06-10
http://www.nytimes.com/1990/06/10/world/cia-tie-reported-in-mandela-arrest.html
2013-12-06 21:52:25
attachment
Snapshot
2013-12-06 21:52:25
http://www.nytimes.com/1990/06/10/world/cia-tie-reported-in-mandela-arrest.html
text/html
utf-8
webpage
l'Espresso
Revealed: How the Nsa Targets Italy
)
Revealed
http://espresso.repubblica.it/inchieste/2013/12/05/news/revealed-how-the-nsa-targets-italy-1.144428
2013-12-06 21:53:05
attachment
Snapshot
2013-12-06 21:53:05
http://espresso.repubblica.it/inchieste/2013/12/05/news/revealed-how-the-nsa-targets-italy-1.144428
text/html
utf-8
webpage
Huffington Post
AT&T Says It Doesn't Need To Disclose All NSA Data Requests
SAN JOSE, Calif. (AP) — AT&T, under fire for ongoing revelations that it shares and sells customers' communications records to the National Security Agency and other U.S. intelligence offices, says it isn't required to disclose to shareholders what it does with customers' data. In a letter sent Thursday to the Securities and Exchange Commission, AT&T said it protects customer information and complies with government requests for call records "only to the extent required by law." The telecom giant's letter was a response to a shareholder revolt sparked on Nov. 20 by the New York State Common Retirement Fund, the ACLU of Northern California and others.
12/06/2013
http://www.huffingtonpost.com/2013/12/06/att-nsa-surveillance_n_4399517.html?ncid=edlinkusaolp00000003
2013-12-06 21:53:15
attachment
Huffington Post
2013-12-06 21:53:17
http://www.huffingtonpost.com/2013/12/06/att-nsa-surveillance_n_4399517.html?view=print&comm_ref=false
text/html
utf-8
webpage
Nordic News Network
Sweden & NATO
2012-09-22
http://www.nnn.se/nordic/americult/nato/usa-nato.htm
2013-12-06 21:54:59
attachment
Sweden & NATO
2013-12-06 21:55:00
http://www.nnn.se/nordic/americult/nato/usa-nato.htm
text/html
windows-1252
newspaperArticle
World
Stuff.co.nz
HANLEY
SIMON JOHNSON AND MIA
Sweden key partner for US spying on Russia
Sweden has been a key partner for the United States in spying on Russia, Swedish television reported today, citing leaked documents from the US National Security Agency (NSA).
Dec 06, 2013
English
http://www.stuff.co.nz/world/europe/9484568/Sweden-key-partner-for-US-spying-on-Russia
2013-12-06 21:55:58
Stuff.co.nz
attachment
Stuff.co.nz Snapshot
2013-12-06 21:55:58
http://www.stuff.co.nz/world/europe/9484568/Sweden-key-partner-for-US-spying-on-Russia
text/html
utf-8
webpage
CNET
Glenn Greenwald
NewCo
NSA
NSA Scandal
Pierre Omidyar
Surveillance
Saving the Net from the surveillance state: Glenn Greenwald speaks up (Q&A)
The man to whom Edward Snowden entrusted his NSA documents isn't content just to save the Bill of Rights and reinvent journalism. He also wants to stop the Internet from becoming history's most dangerous spy tool. Read this article by Edward Moyer on CNET News.
Saving the Net from the surveillance state
http://news.cnet.com/8301-13578_3-57613838-38/saving-the-net-from-the-surveillance-state-glenn-greenwald-speaks-up-q-a/
2013-12-06 21:56:10
attachment
Snapshot
2013-12-06 21:56:10
http://news.cnet.com/8301-13578_3-57613838-38/saving-the-net-from-the-surveillance-state-glenn-greenwald-speaks-up-q-a/
text/html
utf-8
webpage
ZDNet
Blue
Violet
Microsoft: US government is an 'advanced persistent threat'
Microsoft's EVP of Legal and Corporate Affairs outlined the company's new data protection strategy on the basis that the US government is an "advanced persistent threat" — a label used for cyber criminals.
2013-12-06
Microsoft
http://www.zdnet.com/microsoft-us-government-is-an-advanced-persistent-threat-7000024019/
2013-12-06 21:56:51
attachment
Snapshot
2013-12-06 21:56:51
http://www.zdnet.com/microsoft-us-government-is-an-advanced-persistent-threat-7000024019/
text/html
utf-8
webpage
the Guardian
Engineering
Ethics
Higher education
United States
World news
As engineers, we must consider the ethical implications of our work
Abbas El-Zein: Engineers are behind government spying tools and military weapons. We should be conscious of how our designs are used
2013-12-05
http://www.theguardian.com/commentisfree/2013/dec/05/engineering-moral-effects-technology-impact
2013-12-06 21:57:32
attachment
Snapshot
2013-12-06 21:57:32
http://www.theguardian.com/commentisfree/2013/dec/05/engineering-moral-effects-technology-impact
text/html
utf-8
newspaperArticle
Tech
The Washington Post
ISSN 0190-8286
Timberg
Craig
Microsoft to encrypt data in its services in bid to prevent snooping
The tech giant moves to reassure customers it will protect them against government surveillance.
2013-12-05
en-US
http://www.washingtonpost.com/business/technology/microsoft-to-encrypt-data-in-its-services-in-bid-to-prevent-snooping/2013/12/04/f91f7b02-5d2c-11e3-bc56-c6ca94801fac_story.html
2013-12-06 21:57:48
washingtonpost.com
attachment
Washington Post Snapshot
2013-12-06 21:57:50
http://www.washingtonpost.com/business/technology/microsoft-to-encrypt-data-in-its-services-in-bid-to-prevent-snooping/2013/12/04/f91f7b02-5d2c-11e3-bc56-c6ca94801fac_print.html
text/html
utf-8
webpage
Threat Level
Zetter
Kim
Someone's Been Siphoning Data Through a Huge Security Hole in the Internet | Threat Level | Wired.com
Earlier this year, researchers say, someone mysteriously hijacked internet traffic headed to government agencies, corporate offices and other recipients in the U.S. and elsewhere and redirected it to Belarus and Iceland, before sending it on its way to its legitimate destinations. They did so repeatedly over several months. But luckily someone did notice.
2013-10-05
http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-iceland/
2013-12-06 21:57:54
attachment
Snapshot
2013-12-06 21:57:54
http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-iceland/
text/html
utf-8
webpage
svt.se
Rensfeldt
Gunnar
Snowden files reveal Swedish-American surveillance of Russia
Uppdrag granskning (Mission Investigation) and SVT is the first Swedish news outlet to get access to documents concerning Sweden leaked by whistleblower Edward Snowden, who left the American organization for surveillance, NSA (National Security Agency) in May this year.
2013-12-05
http://www.svt.se/ug/snowden-files-reveale-swedish-american-surveillance-of-russia
2013-12-06 21:58:44
attachment
Snapshot
2013-12-06 21:58:44
http://www.svt.se/ug/snowden-files-reveale-swedish-american-surveillance-of-russia
text/html
utf-8
webpage
Bildt defends Sweden surveillance - The Local
Sweden's Foreign Minister Carl Bildt has defended surveillance practices and the cooperation with UK intelligence agency GCHQ arguing that we face a world of m
2013-11-03
http://www.thelocal.se/20131205/bildt-defends-sweden-surveillance
2013-12-06 21:58:49
attachment
Snapshot
2013-12-06 21:58:49
http://www.thelocal.se/20131205/bildt-defends-sweden-surveillance
text/html
utf-8
webpage
the Guardian
Vilnius
Ian Traynor in
Data protection
espionage
Europe
European commission
European Union
Foreign policy
France
Germany
Lithuania
NSA
politics
Prism
Privacy
Surveillance
Sweden
technology
Telecoms
The NSA files
United States
US foreign policy
US national security
World news
NSA leaks: UK blocks crucial espionage talks between US and Europe
First talks to soothe transatlantic tensions to be restricted to data privacy and Prism programme after Britain and Sweden's veto
2013-07-05
NSA leaks
http://www.theguardian.com/world/2013/jul/05/us-blocks-espionage-talks-europe-nsa-prism
2013-12-06 21:58:54
attachment
Snapshot
2013-12-06 21:58:54
http://www.theguardian.com/world/2013/jul/05/us-blocks-espionage-talks-europe-nsa-prism
text/html
utf-8
webpage
Snowden report fingers Sweden for UK spying - The Local
Continued revelations from US whistle blower Edward Snowden underline that Sweden is one of the main partner countries of the British signals intelligence agenc
2013-11-02
http://www.thelocal.se/20131102/snowden-revelations-implicate-sweden-in-uk-spying?xrs=RebelMouse_tw
2013-12-06 21:59:00
attachment
Snapshot
2013-12-06 21:59:00
http://www.thelocal.se/20131102/snowden-revelations-implicate-sweden-in-uk-spying?xrs=RebelMouse_tw
text/html
utf-8
webpage
Smith
BRad
Protecting customer data from government snooping - The Official Microsoft Blog - Site Home - TechNet Blogs
2013-12-04
https://blogs.technet.com/b/microsoft_blog/archive/2013/12/04/protecting-customer-data-from-government-snooping.aspx?Redirected=true
2013-12-06 21:59:09
attachment
Protecting customer data from government snooping - The Official Microsoft Blog - Site Home - TechNet Blogs
2013-12-06 21:59:10
https://blogs.technet.com/b/microsoft_blog/archive/2013/12/04/protecting-customer-data-from-government-snooping.aspx?Redirected=true
text/html
utf-8
webpage
the Guardian
Adolf Hitler
Edward Snowden
Germany
Media
Surveillance
The NSA files
How Hitler suspended the right to mail and telephone privacy
Surveillance decree helped build Nazi state
2013-12-04
http://www.theguardian.com/media/greenslade/2013/dec/04/surveillance-adolf-hitler
2013-12-06 22:02:07
attachment
Snapshot
2013-12-06 22:02:07
http://www.theguardian.com/media/greenslade/2013/dec/04/surveillance-adolf-hitler
text/html
utf-8
newspaperArticle
Business Day / Media & Advertising
The New York Times
ISSN 0362-4331
Somaiya
Ravi
Classified Information and State Secrets
Guardian (British Newspaper)
National Security Agency
News and News Media
Rusbridger, Alan
Snowden, Edward J
Surveillance of Citizens by Government
Editor Describes Pressure After Leaks by Snowden
Testimony to Parliament from the top editor of The Guardian illustrated the aggressive investigative and spying tactics increasingly faced by news organizations.
2013-12-03
http://www.nytimes.com/2013/12/04/business/media/after-snowden-revelations-a-changed-world-for-journalists.html
2013-12-06 22:02:13
NYTimes.com
attachment
New York Times Snapshot
2013-12-06 22:02:13
http://www.nytimes.com/2013/12/04/business/media/after-snowden-revelations-a-changed-world-for-journalists.html?nl=todaysheadlines&emc=edit_th_20131204
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Marimow
Ann E.
Leonnig
Carol D.
Lawyers for ex-State Dept. worker Stephen J. Kim urge Holder to drop leak charges
Attorneys for Stephen J. Kim say the case might never have been pursued under current Justice guidelines.
2013-12-03
en-US
http://www.washingtonpost.com/world/national-security/lawyers-for-state-dept-worker-stephen-j-kim-urge-holder-to-drop-leak-charges/2013/12/03/65ed8f7e-5c3f-11e3-bc56-c6ca94801fac_story.html?tid=hpModule_308f7142-9199-11e2-bdea-e32ad90da239
2013-12-06 22:02:38
washingtonpost.com
attachment
Washington Post Snapshot
2013-12-06 22:02:40
http://www.washingtonpost.com/world/national-security/lawyers-for-state-dept-worker-stephen-j-kim-urge-holder-to-drop-leak-charges/2013/12/03/65ed8f7e-5c3f-11e3-bc56-c6ca94801fac_print.html?tid=hpModule_308f7142-9199-11e2-bdea-e32ad90da239
text/html
utf-8
webpage
Mail Online
Brady
Tara
Waterboarding prolonged stress positions placed box subjected extreme noise CIAs rendition terror suspects Polish jail revealed
CIA's rendition of two terror suspects in Polish jail revealed
Lawyers for two terror suspects currently held by the U.S. in Guantanamo Bay, Cuba, accuse Poland of human rights abuses.
2013-12-03
http://www.dailymail.co.uk/news/article-2517479/Waterboarding-prolonged-stress-positions-placed-box-subjected-extreme-noise-CIAs-rendition-terror-suspects-Polish-jail-revealed.html
2013-12-06 22:03:01
attachment
Snapshot
2013-12-06 22:03:01
http://www.dailymail.co.uk/news/article-2517479/Waterboarding-prolonged-stress-positions-placed-box-subjected-extreme-noise-CIAs-rendition-terror-suspects-Polish-jail-revealed.html
text/html
windows-1252
blogPost
The New Yorker Blogs
Davidson
Amy
elements
news
What’s Wrong With the N.S.A. Tracking Cell-Phone Locations?
December 6, 2013
http://www.newyorker.com/online/blogs/closeread/2013/12/seven-problems-with-nsa-site-location-collection.html
2013-12-09 19:02:21
attachment
The New Yorker
2013-12-09 19:02:23
http://www.newyorker.com/online/blogs/closeread/2013/12/seven-problems-with-nsa-site-location-collection.html?printable=true
newspaperArticle
Tech
The Washington Post
ISSN 0190-8286
Timberg
Craig
Nakashima
Ellen
FBI’s search for ‘Mo,’ suspect in bomb threats, highlights use of malware for surveillance
FBI’s search for “Mo,” implicated in series of bomb threats, highlights use of malware for surveillance.
2013-12-07
en-US
http://www.washingtonpost.com/business/technology/2013/12/06/352ba174-5397-11e3-9e2c-e1d01116fd98_story_2.html
2013-12-09 19:03:18
washingtonpost.com
attachment
Washington Post Snapshot
2013-12-09 19:03:20
http://www.washingtonpost.com/Error/Generic;jsessionid=79AE7D3FBC736CC1590CC39EDDFA5724
text/html
utf-8
webpage
The Dissenter
Gosztola
Kevin
AT&T Refuses to Disclose to Shareholders What Data It Shares with the NSA | The Dissenter
2013-12-06
http://dissenter.firedoglake.com/2013/12/06/att-refuses-to-disclose-to-shareholders-what-data-it-provides-to-nsa/
2013-12-09 19:04:08
attachment
AT&T Refuses to Disclose to Shareholders What Data It Shares with the NSA | The Dissenter
2013-12-09 19:04:09
http://dissenter.firedoglake.com/2013/12/06/att-refuses-to-disclose-to-shareholders-what-data-it-provides-to-nsa/
text/html
utf-8
webpage
Bits Blog
Chen
Brian X.
AT&
DiNapoli Thomas P
Surveillance of Citizens by Government
Telephones and Telecommunications
T Inc
AT&T Responds to Shareholders' Concerns on User Data
AT&T said that a resolution to share more information about the consumer data requested by the government should be excluded from the ballot at the company’s annual shareholder meeting in the spring.
2013-12-06
http://bits.blogs.nytimes.com/2013/12/06/att-responds-to-shareholders-concerns-on-user-data/
2013-12-09 19:04:59
attachment
Snapshot
2013-12-09 19:04:59
http://bits.blogs.nytimes.com/2013/12/06/att-responds-to-shareholders-concerns-on-user-data/?hp&_r=0
text/html
utf-8
webpage
svt.se
FRA spying on “energy” and “Baltics” for USA
The Swedish National Defence Radio Establishment (FRA) is not only spying on foreign military interests. Now Uppdrag Granskning is able to report that the Baltic region and civilian targets such as the Russian energy sector are also targets of the FRA’s espionage. The information is then shared with the United States, which expresses great appreciation for the Swedish contribution.
2013-12-07
http://www.svt.se/ug/fra-spying-on-energy-and-baltics-for-usa
2013-12-09 19:05:50
attachment
Snapshot
2013-12-09 19:05:50
http://www.svt.se/ug/fra-spying-on-energy-and-baltics-for-usa
text/html
utf-8
webpage
CNET
Moyer
Edward
Glenn Greenwald
NewCo
NSA
NSA Scandal
Pierre Omidyar
Surveillance
Saving the Net from the surveillance state: Glenn Greenwald speaks up (Q&A)
The man to whom Edward Snowden entrusted his NSA documents isn't content just to save the Bill of Rights and reinvent journalism. He also wants to stop the Internet from becoming history's most dangerous spy tool. Read this article by Edward Moyer on CNET News.
2013-12-06
Saving the Net from the surveillance state
http://news.cnet.com/8301-13578_3-57613838-38/saving-the-net-from-the-surveillance-state-glenn-greenwald-speaks-up-q-a/
2013-12-09 19:06:18
attachment
Snapshot
2013-12-09 19:06:18
http://news.cnet.com/8301-13578_3-57613838-38/saving-the-net-from-the-surveillance-state-glenn-greenwald-speaks-up-q-a/
text/html
utf-8
webpage
CBS News
Press
Associated
Chinese firm deemed espionage threat paid U.S. intelligence adviser
2012-12-06
http://www.cbsnews.com/news/us-intel-adviser-paid-by-chinese-firm-deemed-espionage-threat/=
2013-12-09 19:10:38
attachment
Chinese firm deemed espionage threat paid U.S. intelligence adviser - CBS News
2013-12-09 19:10:39
http://www.cbsnews.com/news/us-intel-adviser-paid-by-chinese-firm-deemed-espionage-threat/=
text/html
utf-8
webpage
Boldin
Michael
Released documents prove that Utah mayor exaggerated NSA water contract
Bluffdale, Utah Mayor Derk Timothy claims the contract for his city to provide water to the NSA data center is perpetual. Documents prove otherwise.
2013-12-06
http://communities.washingtontimes.com/neighborhood/view-tenth/2013/dec/6/released-documents-prove-utah-mayor-exaggerated-ns/
2013-12-09 20:58:04
attachment
Snapshot
2013-12-09 20:58:04
http://communities.washingtontimes.com/neighborhood/view-tenth/2013/dec/6/released-documents-prove-utah-mayor-exaggerated-ns/
text/html
utf-8
webpage
Cellphone data spying: It's not just the NSA
The National Security Agency isn't the only government entity secretly collecting data from people's cellphones. Local police are increasingly scooping it up, too.
2013-12-08
Cellphone data spying
http://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-nsa-police/3902809/
2013-12-09 20:58:40
attachment
Snapshot
2013-12-09 20:58:40
http://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-nsa-police/3902809/
text/html
utf-8
newspaperArticle
Los Angeles Times
ISSN 0458-3035
Dilanian
Ken
CIA's anti-terrorism effort called 'colossal flop'
CIA officers given 'non-official cover,' often posing as business executives, tried to collect intelligence on terrorists. The NOC program reportedly has had few successes.
2013-12-08
en-US
http://www.latimes.com/world/la-fg-cia-spies-20131208,0,1187596,full.story
2013-12-09 21:00:09
LA Times
attachment
LA Times Snapshot
2013-12-09 21:00:11
http://www.latimes.com/world/la-fg-cia-spies-20131208,0,1187596,full.story
text/html
windows-1252
newspaperArticle
The Indianapolis Star
Sabalow
Ryan
Indiana State Police tracking cellphones — but won't say how or why
This year, the Indiana State Police paid $373,995 for a device that law enforcement personnel have described as a pow...
2013-12-09
http://www.indystar.com/story/news/2013/12/08/indiana-state-police-tracking-cellphones-but-wont-say-how-or-why/3908333/
2013-12-09 21:01:11
attachment
Snapshot
2013-12-09 21:01:11
http://www.indystar.com/story/news/2013/12/08/indiana-state-police-tracking-cellphones-but-wont-say-how-or-why/3908333/
text/html
utf-8
webpage
The News-Press
Kendall
Marisa
Kelly
John
Crime & Courts
Florida
headlines
local news
news
news-press.com
Southwest Florida
stories
World news
Cell tower dumps not used locally
Southwest Florida law enforcement agencies said they do not use tower dumps to gather information.
2013-12-08
http://www.news-press.com/article/20131208/CRIME/312080049/Cell-tower-dumps-not-used-locally
2013-12-09 21:04:25
attachment
Snapshot
2013-12-09 21:04:25
http://www.news-press.com/article/20131208/CRIME/312080049/Cell-tower-dumps-not-used-locally?nclick_check=1
text/html
windows-1252
webpage
EL PAÍS
Oppenheimer
Walter
administration
cameron
case
espionage
fall
guardian
have
how
mccarthyism
moderation
move
newspaper
NSA
persecution
shadow
show
uk
‘The Guardian’ falls under the shadow of McCarthyism
The persecution of the UK newspaper over the NSA case shows how Cameron administration has moved away from moderation
2013-12-08
http://elpais.com/elpais/2013/12/08/inenglish/1386528219_873150.html
2013-12-09 21:05:41
en
The persecution of the UK newspaper over the NSA case shows how Cameron administration has moved away from moderation
attachment
Snapshot
2013-12-09 21:05:41
http://elpais.com/elpais/2013/12/08/inenglish/1386528219_873150.html
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Nakashima
Ellen
Agencies collected data on Americans’ cellphone use in thousands of ‘tower dumps’
Law enforcement made more than 9,000 requests last year, a congressional inquiry has revealed.
2013-12-09
en-US
http://www.washingtonpost.com/world/national-security/agencies-collected-data-on-americans-cellphone-use-in-thousands-of-tower-dumps/2013/12/08/20549190-5e80-11e3-be07-006c776266ed_story.html
2013-12-09 21:06:55
washingtonpost.com
attachment
Washington Post Snapshot
2013-12-09 21:06:57
http://www.washingtonpost.com/world/national-security/agencies-collected-data-on-americans-cellphone-use-in-thousands-of-tower-dumps/2013/12/08/20549190-5e80-11e3-be07-006c776266ed_print.html
text/html
utf-8
magazineArticle
Lizza
Ryan
intelligence
metadata
National Security Agency (N.S.A.)
politics
(Sen.) Ron Wyden
Surveillance
wiretapping
State of Deception
Why won’t the President rein in the intelligence community?
December 16, 2013
http://www.newyorker.com/reporting/2013/12/16/131216fa_fact_lizza?currentPage=all
2013-12-09 21:07:07
The New Yorker
The New Yorker
ISSN 0028-792X
attachment
The New Yorker
2013-12-09 21:07:09
http://www.newyorker.com/reporting/2013/12/16/131216fa_fact_lizza?currentPage=all?printable=true
text/html
windows-1252
newspaperArticle
Technology
The New York Times
ISSN 0362-4331
Wyatt
Edward
Miller
Claire Cain
AOL Inc
Apple Inc
Computers and the Internet
Facebook Inc
Google Inc
LinkedIn Corporation
Microsoft Corporation
National Security Agency
Privacy
Regulation and Deregulation of Industry
Surveillance of Citizens by Government
Twitter
United States Politics and Government
Yahoo! Inc
Tech Giants Issue Call for Limits on Government Surveillance of Users
Eight major companies, led by Google and Microsoft, are calling for tighter controls on surveillance of their customers' data by governments worldwide.
2013-12-09
http://www.nytimes.com/2013/12/09/technology/tech-giants-issue-call-for-limits-on-government-surveillance-of-users.html
2013-12-09 21:07:25
NYTimes.com
attachment
New York Times Snapshot
2013-12-09 21:07:25
http://www.nytimes.com/2013/12/09/technology/tech-giants-issue-call-for-limits-on-government-surveillance-of-users.html?emc=edit_tnt_20131209&tntemail0=y&_r=1&
text/html
utf-8
webpage
ProPublica
Elliott
Justin
ProPublica
Mazzetti
Mark
The New York Times
World of Spycraft: NSA and CIA Spied in Online Games
Snowden documents show intelligence agencies conducting surveillance and grabbing data in virtual worlds.
2013-12-09
World of Spycraft
http://www.propublica.org/article/world-of-spycraft-intelligence-agencies-spied-in-online-games
2013-12-09 21:07:41
attachment
Snapshot
2013-12-09 21:07:41
http://www.propublica.org/article/world-of-spycraft-intelligence-agencies-spied-in-online-games
text/html
utf-8
webpage
the Guardian
Ball
James
Games
GCHQ
NSA
technology
UK security and counter-terrorism
United States
US national security
World news
Spy agencies in covert push to infiltrate virtual world of online gaming
NSA and GCHQ collect gamers' chats and deploy real-life agents into World of Warcraft and Second Life Read the NSA document: Exploiting Terrorist Use of Games & Virtual Environments
2013-12-09
http://www.theguardian.com/world/2013/dec/09/nsa-spies-online-games-world-warcraft-second-life
2013-12-09 21:08:02
attachment
Snapshot
2013-12-09 21:08:02
http://www.theguardian.com/world/2013/dec/09/nsa-spies-online-games-world-warcraft-second-life?CMP=twt_gu
text/html
utf-8
newspaperArticle
Spiegel Online
Osang
Alexander
Internet
Edward Snowden Neighbor Joyce Kinsey Brands Him a Traitor
Joyce Kinsey and Edward Snowden were neighbors. She observed him night and day. Now that he's gone, she is passing judgment on the former NSA contractor turned whistleblower. Like many Americans, Kinsey views the world from a narrow suburban perspective.
06.12.2013
http://www.spiegel.de/international/world/edward-snowden-neighbor-joyce-kinsey-brands-him-a-traitor-a-937369.html
2013-12-09 21:08:36
Spiegel Online
attachment
Edward Snowden Neighbor Joyce Kinsey Brands Him a Traitor - SPIEGEL ONLINE
2013-12-09 21:08:38
http://www.spiegel.de/international/world/edward-snowden-neighbor-joyce-kinsey-brands-him-a-traitor-a-937369.html
text/html
windows-1252
webpage
O Globo
economia
Clinton: Segurança não justifica espionagem econômica
Para ex-presidente dos EUA, Brasil deveria ter assento permanente no Conselho de Segurança da ONU
2013-11-09
Clinton
http://oglobo.globo.com/economia/clinton-seguranca-nao-justifica-espionagem-economica-11008965
2013-12-09 21:14:13
Portuguese
attachment
Snapshot
2013-12-09 21:14:13
http://oglobo.globo.com/economia/clinton-seguranca-nao-justifica-espionagem-economica-11008965
text/html
utf-8
attachment
The Himalayan Times : Clinton's reaction - Detail News : Nepal News Portal
2013-12-09 21:14:33
http://www.thehimalayantimes.com/fullNews.php?headline=Clinton%27s+reaction&NewsID=399113
text/html
utf-8
newspaperArticle
Europe
BBC
MEPs seek video link with Snowden
Euro MPs move to get direct evidence from US whistleblower Edward Snowden via live video link, for an inquiry into US surveillance.
2014/01/09
http://www.bbc.co.uk/news/world-europe-25669448
2014-01-09 18:51:46
bbc.co.uk
attachment
BBC News Snapshot
2014-01-09 18:51:48
http://www.bbc.co.uk/news/world-europe-25669448
text/html
utf-8
webpage
Washingtonian
Pentagon Developed Mobile Phone Games to Spread US Propaganda, Track People in the Middle East
In 2006, as the war in Iraq was reaching a fever pitch, a Pentagon employee working on special operations teamed up with a Czech technology entrepreneur who had dabbled in the porn business and devised what they considered an ingenious plan. Knowing...
2013-04-09
http://www.washingtonian.com/blogs/dead_drop/cia/in-2005-a-pentagon-employee.php
2013-12-09 21:19:02
attachment
Snapshot
2013-12-09 21:19:02
http://www.washingtonian.com/blogs/dead_drop/cia/in-2005-a-pentagon-employee.php#
text/html
utf-8
newspaperArticle
World
The New York Times
ISSN 0362-4331
Mazzetti
Mark
Elliott
Justin
Computer and Video Games
Espionage and Intelligence Services
National Security Agency
Second Life (Video Game)
Snowden, Edward J
Surveillance of Citizens by Government
terrorism
World of Warcraft (Video Game)
Spies Infiltrate a Fantasy Realm of Online Games
American and British spies have infiltrated online fantasy games, fearing that militants could use them to communicate, move money or plot attacks, documents show.
2013-12-09
http://www.nytimes.com/2013/12/10/world/spies-dragnet-reaches-a-playing-field-of-elves-and-trolls.html
2013-12-10 18:18:28
NYTimes.com
attachment
New York Times Snapshot
2013-12-10 18:18:28
http://www.nytimes.com/2013/12/10/world/spies-dragnet-reaches-a-playing-field-of-elves-and-trolls.html?hpw&rref=us&_r=1&
text/html
utf-8
attachment
NSA documents on games and virtual worlds - ProPublica
2013-12-10 21:01:30
http://www.propublica.org/documents/item/889134-games
text/html
utf-8
webpage
Snowden document shows Canada set up spy posts for NSA
A top secret document retrieved by American whistleblower Edward Snowden reveals Canada has set up covert spying posts around the world and conducted espionage against trading partners at the request of the U.S. National Security Agency.
2013-12-10
http://www.cbc.ca/news/politics/snowden-document-shows-canada-set-up-spy-posts-for-nsa-1.2456886/
2013-12-10 18:18:38
attachment
Snapshot
2013-12-10 18:18:38
http://www.cbc.ca/news/politics/snowden-document-shows-canada-set-up-spy-posts-for-nsa-1.2456886
text/html
utf-8
webpage
the Guardian
Taylor
Matthew
Hopkins
Nick
Books
culture
Data and computer security
Data protection
Günter Grass
Human rights
Internet
Law
Margaret Atwood
Martin Amis
Surveillance
technology
World news
World's leading authors: state surveillance of personal data is theft
500 signatories including Günter Grass, Margaret Atwood and Martin Amis demand 'digital bill of rights' to curb state abuses
2013-12-10
World's leading authors
http://www.theguardian.com/world/2013/dec/10/surveillance-theft-worlds-leading-authors
2013-12-10 18:18:59
attachment
Snapshot
2013-12-10 18:18:59
http://www.theguardian.com/world/2013/dec/10/surveillance-theft-worlds-leading-authors
text/html
utf-8
blogPost
Web Policy
Mutchler
Patrick
» MetaPhone: The NSA Three-Hop Web Policy
2013-12-09
http://webpolicy.org/2013/12/09/metaphone-the-nsa-three-hop/
2013-12-10 18:20:08
English
attachment
» MetaPhone: The NSA Three-Hop Web Policy
2013-12-10 18:20:09
http://webpolicy.org/2013/12/09/metaphone-the-nsa-three-hop/
text/html
utf-8
newspaperArticle
Technology
New Delhi
Joshi
Sandeep
china
cyber security
DEITy
Department of Electronic and Information Technology
India
Internet
internet data storage
NSCS. domain name system
russia
us
India to push for freeing Internet from U.S. control
December 7, 2013
en-IN
http://www.thehindu.com/sci-tech/technology/internet/india-to-push-for-freeing-internet-from-us-control/article5434095.ece?homepage=true
2013-12-10 20:39:55
The Hindu
The HinduISSN 0971-751X
attachment
The Hindu Snapshot
2013-12-10 20:39:55
http://www.thehindu.com/sci-tech/technology/internet/india-to-push-for-freeing-internet-from-us-control/article5434095.ece?homepage=true
text/html
utf-8
webpage
How long does my phone company store my data? How easily will it give my info up to the cops? | Privacy SOS
The Markey cell phone surveillance information, in charts. Click to enlarge. See the letters for more detailed information here. (Sprint's 2012 response is here.)
2013-12-10T00:00:00Z
How long does my phone company store my data?
http://www.privacysos.org/node/1264
2013-12-10 20:40:47
The Markey cell phone surveillance information, in charts. Click to enlarge. See the letters for more detailed information here. (Sprint's 2012 response is here.)
attachment
Snapshot
2013-12-10 20:40:47
http://www.privacysos.org/node/1264
text/html
utf-8
webpage
Privacy International
International agreement reached controlling export of mass and intrusive surveillance technology
https://www.privacyinternational.org/blog/international-agreement-reached-controlling-export-of-mass-and-intrusive-surveillance
2013-12-10 20:41:07
attachment
Snapshot
2013-12-10 20:41:07
https://www.privacyinternational.org/blog/international-agreement-reached-controlling-export-of-mass-and-intrusive-surveillance
text/html
utf-8
webpage
American Civil Liberties Union
Police Requests for Cellphone Data Surge
Outdated Electronic Privacy Laws Allow Police to Access Sensitive Data Without a Warrant
December 9, 2013
FOR IMMEDIATE RELEASE
CONTACT: 212-549-2666, media@aclu.org
WASHINGTON – Law enforcement requests for a variety of cellphone users’ data continued to surge in 2012, according to...
2013-12-09
https://www.aclu.org/national-security/police-requests-cellphone-data-surge
2013-12-10 21:02:31
attachment
Snapshot
2013-12-10 21:02:31
https://www.aclu.org/national-security/police-requests-cellphone-data-surge
text/html
utf-8
webpage
Washington Post
Soltani
Ashkan
Gellman
Barton
New documents show how the NSA infers relationships based on mobile location data
A 24-page NSA whitepaper describes the agency's techniques for inferring relationships from location data.
2013-12-10
http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/
2013-12-10 21:40:47
attachment
Snapshot
2013-12-10 21:40:47
http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/#whitepaper
text/html
utf-8
webpage
Washington Post
Soltani
Ashkan
Peterson
rea
Gellman
Barton
cybersecurity
Google
NSA
Privacy
NSA uses Google cookies to pinpoint targets for hacking
How the NSA piggybacks onto the tracking behaviors of commercial companies to enable exploitation and surveillance.
2013-12-10
http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking/
2013-12-11 17:40:34
attachment
Snapshot
2013-12-11 17:40:34
http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking/
text/html
utf-8
webpage
the Guardian
Paris
Kim Willsher in
Data protection
Europe
France
Surveillance
technology
World news
French officials can monitor internet users in real time under new law
Clause lets police and other agencies spy without authorisation, weeks after France expressed outrage at NSA revelations
2013-12-11
http://www.theguardian.com/world/2013/dec/11/french-officials-internet-users-real-time-law
2013-12-11 19:25:43
attachment
Snapshot
2013-12-11 19:25:43
http://www.theguardian.com/world/2013/dec/11/french-officials-internet-users-real-time-law
text/html
utf-8
webpage
the Guardian
Stoppard
Tom
Data protection
Digital media
Edward Snowden
Internet
Media
social media
Surveillance
technology
The NSA files
World news
State surveillance of personal data: what is the society we wish to protect?
Tom Stoppard, one of 500 leading writers to sign a letter demanding an international bill of digital rights, says 'our masters are in the grip of a delusionary nightmare'
2013-12-10
State surveillance of personal data
http://www.theguardian.com/world/2013/dec/10/state-surveillance-data-tom-stoppard
2013-12-11 19:34:04
attachment
Snapshot
2013-12-11 19:34:04
http://www.theguardian.com/world/2013/dec/10/state-surveillance-data-tom-stoppard
text/html
utf-8
magazineArticle
The Nation
ISSN 0027-8378
Ludlow
Peter
Hacktivists on Trial
December 4, 2013
http://www.thenation.com/article/177462/hacktivists-trial#
2013-12-11 19:34:29
The Nation
attachment
The Nation Snapshot
2013-12-11 19:34:31
http://www.thenation.com/print/article/177462/hacktivists-trial#
text/html
utf-8
webpage
Esquire
Greenwald
Glenn
Glenn Greenwald
Interviews
NSA
Glenn Greenwald: What I've Learned
Journalist, 46, Rio de Janeiro
2014-01
Glenn Greenwald
http://www.esquire.com/blogs/news/glenn-greenwald-interview-0114
2013-12-11 19:35:05
attachment
Snapshot
2013-12-11 19:35:05
http://www.esquire.com/blogs/news/glenn-greenwald-interview-0114
text/html
utf-8
webpage
The Atlantic
Friedersdorf
Conor
Exactly What the State Says to Deceive You About Surveillance
Remember when multiple Obama Administration figures said the NSA doesn't collect cell-phone location data? It turns out that wasn't true.
Dec 11 2013, 9:15 AM ET
http://www.theatlantic.com/politics/archive/2013/12/exactly-what-the-state-says-to-deceive-you-about-surveillance/282239/
2013-12-11 19:35:46
attachment
The Atlantic Print View
2013-12-11 19:35:49
http://www.theatlantic.com/politics/print/2013/12/exactly-what-the-state-says-to-deceive-you-about-surveillance/282239/
text/html
utf-8
webpage
svt.se
FRA has access to controversial surveillance system
The NSA has granted the Swedish FRA access to one of the most controversial systems in its global mass surveillance. Called Xkeyscore, the system makes it possible to monitor millions of people worldwide. This was revealed in new top-secret documents that Uppdrag Granskning has uncovered.
2013-12-11
http://www.svt.se/ug/fra-has-access-to-controversial-surveillance-system
2013-12-11 19:36:10
attachment
Snapshot
2013-12-11 19:36:10
http://www.svt.se/ug/fra-has-access-to-controversial-surveillance-system
text/html
utf-8
webpage
CNNMoney
Pagliery
Jose
Alan Rusbridger
Edward Snowden
Glenn Greenwald
guardian
jose pagliery
new york times
NSA
pagliery
snowden
snowden guardian
snowden new york times
snowden washington post
Tech
Snowden docs had NYTimes exec fearing for his life
Holding on to Snowden's NSA documents "can get scary," says the New York Times' top tech executive.
2013-12-9
http://money.cnn.com/2013/12/09/technology/security/snowden-new-york-times/index.html
2013-12-12 20:55:21
attachment
Snapshot
2013-12-12 20:55:21
http://money.cnn.com/2013/12/09/technology/security/snowden-new-york-times/index.html
text/html
utf-8
webpage
CertiVox confirms it withdrew PrivateSky after GCHQ issued warrant
2013-11-12
http://www.itsecurityguru.org/node/4780
2013-12-12 20:55:43
attachment
Snapshot
2013-12-12 20:55:43
http://www.itsecurityguru.org/node/4780
text/html
utf-8
newspaperArticle
National
Backpacker stripped of tech gear at Auckland Airport
A backpacker coming home for Christmas had every bit of electronic equipment stripped from him at the airport. - New Zealand Herald
Dec 12, 2013
en-NZ
http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11171475
2013-12-12 20:55:57
New Zealand Herald
New Zealand Herald
ISSN 1170-0777
blogPost
Foreign Policy Blogs
Harris
Shane
Edward Snowden's Statement to FP on His Selection as a Global Thinker
December 11, 2013 - 08:52 Pm
http://www.foreignpolicy.com/posts/2013/12/11/edward_snowdens_statement_to_fp_on_his_selection_as_a_global_thinker#sthash.ygRpbku2.ESkNkX1j.dpbs
2013-12-12 20:56:02
attachment
Foreign Policy Snapshot
2013-12-12 20:56:08
http://www.foreignpolicy.com/posts/2013/12/11/edward_snowdens_statement_to_fp_on_his_selection_as_a_global_thinker#sthash.ygRpbku2.ESkNkX1j.dpbs
text/html
utf-8
webpage
Sweden aids NSA-led hacking ops: report - The Local
Sweden cooperated with the United States in operations to hack into computers and carry out internet surveillance on Swedes, according to documents leaked by NS
2013-12-11
Sweden aids NSA-led hacking ops
http://www.thelocal.se/20131211/sweden-aided-in-nsa-hacking-operations-report
2013-12-12 20:56:21
attachment
Snapshot
2013-12-12 20:56:21
http://www.thelocal.se/20131211/sweden-aided-in-nsa-hacking-operations-report
text/html
utf-8
webpage
svt.se
Rensfeldt
Gunnar
The Snowden Documents and Sweden with English subtitles
After six months reporters Fredrik Laurin, Sven Bergman and Joachim Dyfvermark made contact with Glenn Greenwald who holds the documents that Edward Snowden leaked from American signal intelligence organization NSA. They made this report.
2013-12-11
http://www.svt.se/ug/view-the-report-about-the-snowden-documents-and-sweden-with-english-subtitles
2013-12-12 20:56:54
attachment
Snapshot
2013-12-12 20:56:54
http://www.svt.se/ug/view-the-report-about-the-snowden-documents-and-sweden-with-english-subtitles
text/html
utf-8
webpage
ProPublica
Elliott
Justin
ProPublica
Mazzetti
Mark
Times
The New York
World of Spycraft: NSA and CIA Spied in Online Games
Snowden documents show intelligence agencies conducting surveillance and grabbing data in virtual worlds.
2013-12-09
World of Spycraft
http://www.propublica.org/article/world-of-spycraft-intelligence-agencies-spied-in-online-games
2013-12-12 20:57:25
attachment
Snapshot
2013-12-12 20:57:25
http://www.propublica.org/article/world-of-spycraft-intelligence-agencies-spied-in-online-games
text/html
utf-8
webpage
svt.se
Rensfeldt
Gunnar
Read the Snowden Documents From the NSA
Here Uppdrag granskning [Mission: Investigation] the documents leaked by Edwards Snowden and retrieved from Glenn Greenwald that are the basis for the report about Sweden's collaboration with the NSA and the GCHQ.
2013-12-11
http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa
2013-12-13 14:47:35
attachment
2004 – Avtalet SE NEUTRAL
2013-12-13 14:48:11
https://www.documentcloud.org/documents/894388-2004-avtalet-se-neutral.html
text/html
utf-8
attachment
Accomplishments From NSA Doc Dated Circa April 2013
2013-12-13 14:48:02
https://www.documentcloud.org/documents/894401-accomplishments-from-nsa-doc-dated-circa-april.html
text/html
utf-8
attachment
Baltic Region
2013-12-13 14:48:05
https://www.documentcloud.org/documents/894390-baltic-region.html
text/html
utf-8
attachment
FINALAgendaSWEDUSA
2013-12-13 14:47:59
https://www.documentcloud.org/documents/894403-finalagendaswedusa.html
text/html
utf-8
attachment
Quantum From Gchq Doc Dates October 2012
2013-12-13 14:47:56
https://www.documentcloud.org/documents/894404-quantum-from-gchq-doc-dates-october-2012.html
text/html
utf-8
attachment
Snapshot
2013-12-13 14:47:35
http://www.svt.se/ug/read-the-snowden-documents-from-the-nsa
text/html
utf-8
attachment
XKeyscore Slide With Swedish Example
2013-12-13 14:48:07
https://www.documentcloud.org/documents/894389-xkeyscore-slide-with-swedish-example.html
text/html
utf-8
attachment
XKeyscore Sources Dated 2008
2013-12-13 14:47:53
https://www.documentcloud.org/documents/894407-xkeyscore-sources-dated-2008.html
text/html
utf-8
webpage
Germany
Germans abandon hope of US 'no-spy' treaty - The Local
Germany has all but given up hope of securing a no-spy treaty with the USA in the wake of the NSA scandal, according to reports on Tuesday.
2014-01-14
http://www.thelocal.de/20140114/germany-gives-up-hope-of-no-spy-deal-with-nsa-usa
2014-01-14 15:13:07
attachment
Snapshot
2014-01-14 15:13:07
http://www.thelocal.de/20140114/germany-gives-up-hope-of-no-spy-deal-with-nsa-usa
text/html
utf-8
webpage
Gorman
Siobhan
Presidential Task Force Recommends Overhaul of Surveillance Tactics of NSA - WSJ.com
2013-12-12
http://online.wsj.com/news/articles/SB10001424052702304202204579254652728273502
2013-12-13 17:01:49
attachment
Presidential Task Force Recommends Overhaul of Surveillance Tactics of NSA - WSJ.com
2013-12-13 17:01:51
http://online.wsj.com/news/articles/SB10001424052702304202204579254652728273502
text/html
utf-8
webpage
FoxNews.com
Bill Clinton
Cass Sunstein
Chairman Patrick Leahy
CIA
Congressman Jim Sensenbrenner
George W Bush
Keith Alexander
Patrick Leahy
presidential campaign
spy agency
United States
U S
White House
Obama task force reportedly to urge overhaul of NSA spy tactics
Obama task force reportedly to urge overhaul of NSA spy tactics
Text.Article
2013-12-13
http://www.foxnews.com/politics/2013/12/13/obama-task-force-reportedly-to-urge-overhaul-nsa-spy-tactics/
2013-12-13 17:03:33
en-US
A presidential review panel tasked with examining National Security Agency operations has reportedly drafted a series of proposals that would overhaul the agency's surveillance tactics.
attachment
Snapshot
2013-12-13 17:03:33
http://www.foxnews.com/politics/2013/12/13/obama-task-force-reportedly-to-urge-overhaul-nsa-spy-tactics/
text/html
utf-8
webpage
CBS News
Miller
John
NSA leaders split on giving amnesty to Snowden - CBS News
2013-12-12
http://www.cbsnews.com/news/nsa-leaders-split-on-giving-amnesty-to-snowden/
2013-12-13 17:04:19
attachment
NSA leaders split on giving amnesty to Snowden - CBS News
2013-12-13 17:04:20
http://www.cbsnews.com/news/nsa-leaders-split-on-giving-amnesty-to-snowden/
text/html
utf-8
webpage
Capitol City Project
Schoffstall
Joe
Center for public integrity
Dutch Ruppersberger
Lawmakers who oversee government surveillance programs receive millions from intelligence companies
maplight
NSA
NSA Scandal
Ron Wyden
Lawmakers who oversee government surveillance programs receive millions from intelligence companies
Every member who sits on the committees that oversee government intelligence operations has received campaign contributions from the top twenty largest intelligence companies in the United States, according to a new report.
2013-12-13
http://capitolcityproject.com/watchdog-lawmakers-oversee-government-surveillance-programs-receive-millions-intelligence-companies/
2013-12-13 17:07:36
attachment
Snapshot
2013-12-13 17:07:36
http://capitolcityproject.com/watchdog-lawmakers-oversee-government-surveillance-programs-receive-millions-intelligence-companies/
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Drake
Thomas
Ellsberg
Daniel
Gun
Katharine
Kofod
Peter
McGovern
Ray
Radack
Jesselyn
Rowley
Coleen
Civil liberties - international
Edward Snowden
NSA
United States
US national security
wikileaks
World news
Former whistleblowers: open letter to intelligence employees after Snowden
Blowing the whistle on powerful factions is not a fun thing to do, but it is the last avenue for truth, balanced debate and democracy
2013-12-11T09:45EST
en-GB
Former whistleblowers
http://www.theguardian.com/commentisfree/2013/dec/11/whistleblowers-open-letter-after-snowden-revelations
2013-12-13 17:08:48
The Guardian
attachment
Guardian Snapshot
2013-12-13 17:08:50
http://www.theguardian.com/commentisfree/2013/dec/11/whistleblowers-open-letter-after-snowden-revelations
text/html
utf-8
webpage
The Big Story
Apuzzo
Matt
Goldamn
Adam
Afghanistan
Asia
Bill Nelson
Central Asia
Condoleezza Rice
crime
Criminal investigations
Diplomacy
District of Columbia
Dubai
Florida
general news
Government and Politics
Hassan Rouhani
Hillary Clinton
Intelligence agencies
international relations
Iran
Iran government
John Ashcroft
Joseph Sweeney
Law and order
Legislature
Mahmoud Ahmadinejad
Middle east
Military and defense
national security
New Mexico
North America
Organized crime
Pakistan
Political corruption
Political defections
Political issues
Robert Levinson
Robert Mueller
Santa Fe
Smuggling
South Asia
terrorism
United Arab Emirates
United States
United States Congress
United States government
United States Senate
U.S. Central Intelligence Agency
U.S. Department of State
U.S. Federal Bureau of Investigation
War and unrest
Missing American in Iran was on unapproved mission
WASHINGTON (AP) — In March 2007, retired FBI agent Robert Levinson flew to Kish Island, an Iranian resort awash with tourists, smugglers and organi
2013-12-12
http://bigstory.ap.org/article/missing-american-iran-was-working-cia
2013-12-13 17:09:42
attachment
Snapshot
2013-12-13 17:09:42
http://bigstory.ap.org/article/missing-american-iran-was-working-cia
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Oltermann
Philip
Edward Snowden
Europe
European Union
NSA
United States
US national security
World news
Edward Snowden: MEPs vote to invite ex-NSA contractor to testify
Opposition from conservatives fails to derail vote on inviting Snowden to hearing, which could take place as early as January
2013-12-12T08:39EST
en-GB
Edward Snowden
http://www.theguardian.com/world/2013/dec/12/edward-snowden-meps-vote-invite-nsa-contractor-testify
2013-12-13 17:19:32
The Guardian
attachment
Guardian Snapshot
2013-12-13 17:19:33
http://www.theguardian.com/world/2013/dec/12/edward-snowden-meps-vote-invite-nsa-contractor-testify
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Press
Associated
Japan parliament approves contentious secrets law
Japan’s parliament approved a state secrets law that stiffens penalties for leaks by government officials and for journalists who seek such information, overriding criticism that it could be used to cover up government abuses and suppress civil liberties.
2013-12-06
en-US
http://www.washingtonpost.com/world/asia_pacific/japan-parliament-approves-contentious-secrets-law/2013/12/06/db70878a-5ee0-11e3-8d24-31c016b976b2_story.html
2013-12-13 17:19:48
washingtonpost.com
attachment
Washington Post Snapshot
2013-12-13 17:19:51
http://www.washingtonpost.com/world/asia_pacific/japan-parliament-approves-contentious-secrets-law/2013/12/06/db70878a-5ee0-11e3-8d24-31c016b976b2_print.html
text/html
utf-8
webpage
EU InfoCuria - Case-law of the Court of Justice
Villalón
Cruz
EUR-Lex - Recherche simple
According to the Advocate General, Mr Cruz Villalón, the Data Retention Directive is incompatible with the Charter of Fundamental Rights
He proposes, however, that the effects of the finding of invalidity should be suspended in order t o
enable the EU legislature to adopt, within a reasonable period, the measures necessary to remedy the invalidity found
to exist.
2013-12-13
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:62012CC0293:EN:NOT#
2013-12-13 17:26:15
fr
attachment
cp130157en.pdf
2013-12-13 17:23:40
http://curia.europa.eu/jcms/upload/docs/application/pdf/2013-12/cp130157en.pdf
application/pdf
utf-8
attachment
Snapshot
2013-12-13 17:26:15
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:62012CC0293:EN:NOT#
text/html
utf-8
webpage
Wired UK
Baraniuk
Chris
The quest to make encryption accessible to the masses (Wired UK)
The challenge to make encrypted online messaging user-friendly has long been a bugbear of the crypto community. A new breed of tools aims to address this
2013-12-13
http://www.wired.co.uk/news/archive/2013-12/13/cryptography
2013-12-13 19:18:59
attachment
Snapshot
2013-12-13 19:18:59
http://www.wired.co.uk/news/archive/2013-12/13/cryptography
text/html
utf-8
blogPost
Foreign Policy Blogs
Harris
Shane
Top NSA Civilian Resigns As Surveillance Controversy Swirls
December 13, 2013 - 02:52 Pm
http://complex.foreignpolicy.com/posts/2013/12/13/top_nsa_civilian_resigns_as_surveillance_controversy_swirls#sthash.EJyt7ZP9.cwlo7zQH.dpbs
2013-12-13 20:51:22
attachment
Foreign Policy Snapshot
2013-12-13 20:51:27
http://complex.foreignpolicy.com/posts/2013/12/13/top_nsa_civilian_resigns_as_surveillance_controversy_swirls#sthash.EJyt7ZP9.cwlo7zQH.dpbs
text/html
utf-8
webpage
International Business Times
Raywood
Dan
GCHQ Forced Secure Email Service PrivateSky to Shut Down
Security firm Certivox forced to pull its PrivateSky product after GCHQ threatened it with a warrant.
2013-12-11T16:33:23+00:00
http://www.ibtimes.co.uk/articles/529392/20131211/gchq-forced-privatesky-secure-email-service-offline.htm
2013-12-13 22:25:47
attachment
Snapshot
2013-12-13 22:25:47
http://www.ibtimes.co.uk/articles/529392/20131211/gchq-forced-privatesky-secure-email-service-offline.htm
text/html
utf-8
webpage
Weston
Greg
Edward Snowden
Hugh Segal
John Adams Csec
CSEC watchdog muzzled, defanged: Greg Weston
In theory, the government has in place an oversight commissioner for CSEC, the country's electronic spy agency. But in the Catch-22 world of intelligence, it gets to censor the reports to Parliament.
2013-12-13
CSEC watchdog muzzled, defanged
http://www.cbc.ca/news/politics/csec-watchdog-muzzled-defanged-greg-weston-1.2462279
2013-12-13 22:25:58
attachment
Snapshot
2013-12-13 22:25:58
http://www.cbc.ca/news/politics/csec-watchdog-muzzled-defanged-greg-weston-1.2462279
text/html
utf-8
blogPost
RJGallagher.co.uk
Gallagher
Ryan
GCHQ's Dubious Role in The 'Quantum' Hacking Spy Tactic
2013-12-13
http://notes.rjgallagher.co.uk/2013/12/gchq-quantum-hacking-surveillance-legality-nsa-sweden.html
2013-12-13 22:27:07
attachment
Ryan Gallagher | RJGallagher.co.uk: GCHQ's Dubious Role in The 'Quantum' Hacking Spy Tactic
2013-12-13 22:27:08
http://notes.rjgallagher.co.uk/2013/12/gchq-quantum-hacking-surveillance-legality-nsa-sweden.html
text/html
utf-8
webpage
Gerstein
Josh
Judge: NSA phone program likely unconstitutional - Josh Gerstein - POLITICO.com
2013-12-16
http://www.politico.com/story/2013/12/national-security-agency-phones-judge-101203.html
2013-12-16 20:01:48
attachment
Judge: NSA phone program likely unconstitutional - Josh Gerstein - POLITICO.com
2013-12-16 20:01:49
http://www.politico.com/story/2013/12/national-security-agency-phones-judge-101203.html
text/html
utf-8
webpage
Yahoo News
White House demands trial for Snowden after amnesty talk
The White House Monday renewed its demand for Edward Snowden to return home to face trial, after a top spy official floated the idea of an amnesty deal to plug his damaging intelligence leaks. The fate of fugitive contractor Snowden, currently in temporary asylum in Russia, is under fresh scrutiny after a National Security Agency official said he would personally consider a deal with Snowden if he stopped exposing US secrets. "Our position has not changed on that matter at all," White House spokesman Jay Carney said. "Mr Snowden has been accused of leaking classified information and he faces felony charges here in the United States.
2013-12-16
http://news.yahoo.com/snowden-stole-39-keys-kingdom-39-nsa-official-001233254.html
2013-12-16 20:07:43
attachment
Snapshot
2013-12-16 20:07:43
http://news.yahoo.com/snowden-stole-39-keys-kingdom-39-nsa-official-001233254.html
text/html
utf-8
webpage
Esquire
Collins
Ben
news
60 Minutes' NSA Propaganda Wasn't Even Good
This is no longer a fringe opinion. The NSA is doing the creepy stuff of sci-fi movies, and they accidentally let you know about it last night
2013-12-16
http://www.esquire.com/blogs/news/nsa-60-minutes-report
2013-12-16 20:10:02
attachment
Snapshot
2013-12-16 20:10:02
http://www.esquire.com/blogs/news/nsa-60-minutes-report?src=spr_TWITTER&spr_id=1456_35507628
text/html
utf-8
webpage
CNN
Starr
Barbara
Snowden did not access 'crown jewels' of NSA intel, official says
U.S. intelligence now believes Edward Snowden did not gain access to the "crown jewels" of National Security Agency programs that secretly intercept and monitor conversations around the world, CNN has learned.
2013-07-23
http://www.cnn.com/2013/07/22/politics/snowden-intel/index.html
2013-12-16 20:11:07
attachment
Snapshot
2013-12-16 20:11:07
http://edition.cnn.com/2013/07/22/politics/snowden-intel/
text/html
utf-8
webpage
Forbes
Greenberg
Andy
CIO Network
Human Ingenuity
Innovation and Science
Innovation & Science
Mobile
Security
social media
Tech
An NSA Coworker Remembers The Real Edward Snowden: 'A Genius Among Geniuses'
Perhaps Edward Snowden's hoodie should have raised suspicions. The black sweatshirt sold by the civil libertarian Electronic Frontier Foundation featured a parody of the National Security Agency's logo, with the traditional key in an eagle's claws replaced by a collection of AT&T cables, and eavesdropping headphones covering the menacing bird's ears. [...]
2013-12-16
An NSA Coworker Remembers The Real Edward Snowden
http://www.forbes.com/sites/andygreenberg/2013/12/16/an-nsa-coworker-remembers-the-real-edward-snowden-a-genius-among-geniuses/
2013-12-16 20:11:35
attachment
Snapshot
2013-12-16 20:11:35
http://www.forbes.com/sites/andygreenberg/2013/12/16/an-nsa-coworker-remembers-the-real-edward-snowden-a-genius-among-geniuses/
text/html
utf-8
webpage
Radack
Jesselyn
Barack Obama
Edward Snowden
Mark Udall
NSA
Ron Wyden
Salon.com
Thomas Drake
whistleblower
How to trap a whistleblower
Tell them that going through "proper channels" will provide meaningful redress to their concerns, not injure them
2013-08-16
http://www.salon.com/2013/08/16/how_to_trap_a_whistleblower/
2013-12-16 20:11:58
attachment
Snapshot
2013-12-16 20:11:58
http://www.salon.com/2013/08/16/how_to_trap_a_whistleblower/
text/html
utf-8
webpage
The Atlantic
Friedersdorf
Conor
New Evidence That the Head of the NSA Misled Us
Obama Administration officials now say they may never know exactly what Edward Snowden took.
Dec 16 2013, 7:00 AM ET
http://www.theatlantic.com/politics/archive/2013/12/new-evidence-that-the-head-of-the-nsa-misled-us/282365/
2013-12-16 20:13:13
attachment
The Atlantic Print View
2013-12-16 20:13:27
http://www.theatlantic.com/politics/print/2013/12/new-evidence-that-the-head-of-the-nsa-misled-us/282365/
text/html
utf-8
tvBroadcast
CBS
Miller
John
Rosen
Ira
Schonder
Gabrielle
NSA speaks out on Snowden, spying - CBS News
Inside the NSA
2013-12-15
English
http://www.cbsnews.com/news/nsa-speaks-out-on-snowden-spying/
2013-12-16 20:15:20
attachment
NSA speaks out on Snowden, spying - CBS News
2013-12-16 20:15:21
http://www.cbsnews.com/news/nsa-speaks-out-on-snowden-spying/
text/html
utf-8
blogPost
Exhaustive Search
Blaze
Matt
Matt Blaze: How Law Enforcement Tracks Cellular Phones
2013-12-13
http://www.crypto.com/blog/celltapping/
2013-12-16 20:19:38
attachment
Matt Blaze: How Law Enforcement Tracks Cellular Phones
2013-12-16 20:19:39
http://www.crypto.com/blog/celltapping/
text/html
windows-1252
newspaperArticle
Tech
The Washington Post
ISSN 0190-8286
Timberg
Craig
Soltani
Ashkan
By cracking cellphone code, NSA has capacity for decoding private conversations
The agency’s cracking of A5/1 gives it the means to decode potentially billions of calls and texts.
2013-12-16
en-US
http://www.washingtonpost.com/business/technology/by-cracking-cellphone-code-nsa-has-capacity-for-decoding-private-conversations/2013/12/13/e119b598-612f-11e3-bf45-61f69f54fc5f_story.html
2013-12-16 20:24:28
washingtonpost.com
attachment
Washington Post Snapshot
2013-12-16 20:24:36
http://www.washingtonpost.com/business/technology/by-cracking-cellphone-code-nsa-has-capacity-for-decoding-private-conversations/2013/12/13/e119b598-612f-11e3-bf45-61f69f54fc5f_print.html
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Nakashima
Ellen
White House to preserve controversial policy on NSA, Cyber Command leadership
Critics say agencies needed separate heads to avoid undue concentration of power in single individual.
2013-12-14
en-US
http://www.washingtonpost.com/world/national-security/white-house-to-preserve-controversial-policy-on-nsa-cyber-command-leadership/2013/12/13/4bb56a48-6403-11e3-a373-0f9f2d1c2b61_story.html
2013-12-16 20:24:40
washingtonpost.com
attachment
Washington Post Snapshot
2013-12-16 20:24:47
http://www.washingtonpost.com/world/national-security/white-house-to-preserve-controversial-policy-on-nsa-cyber-command-leadership/2013/12/13/4bb56a48-6403-11e3-a373-0f9f2d1c2b61_print.html
text/html
utf-8
webpage
Yahoo News Canada
Zakarina
Tabassum
Strobel
Warren
EXCLUSIVE - After 'cataclysmic' Snowden affair, NSA faces winds of change
The U.S. National Security Agency has made dozens of changes in its operations and computer networks to prevent the emergence of another Edward Snowden, including potential disciplinary action, a top NSA official said on Friday, as a White House review panel recommended restraints on NSA spying. Former NSA contractor Snowden's disclosures have been "cataclysmic" for the eavesdropping agency, Richard Ledgett, who leads a task force responding to the leaks, said in a rare interview at NSA's heavily guarded Fort Meade headquarters. In the more than hour-long interview, Ledgett acknowledged the agency had done a poor job in its initial public response to revelations of vast NSA monitoring of phone and Internet data; He also stoutly defended the NSA's mission of tracking terrorist plots and other threats, and said its recruiting of young codebreakers, linguists and computer geeks has not been affected by the Snowden affair - even as internal morale has been.
2013-12-14
http://ca.news.yahoo.com/exclusive-cataclysmic-snowden-affair-nsa-032218664.html
2013-12-16 20:27:45
attachment
Snapshot
2013-12-16 20:27:45
http://ca.news.yahoo.com/exclusive-cataclysmic-snowden-affair-nsa-032218664.html
text/html
utf-8
webpage
Gawker
Trotter
J.K.
abc news
ASSOCIATED PRESS
Gawker
Media
new york times
secrets
ABC, NYT Repeatedly Lied About CIA Operative Robert Levinson
ABC News and The New York Times have known since 2007 that Robert Levinson, the ex-FBI agent who was kidnapped in Iran, was not, as the U.S. government and his family claimed, an independent businessman: He was working for the CIA. The Times’ report today discloses this timeline; ABC News’ report does not—but a source at the network confirmed to Gawker that ABC reporters discovered the CIA connection in 2007 as well. At the request of the government and Levinson’s family, however, both outlets repeatedly stated, without any caveats, that Levinson was on a “business trip” when he was captured. A review of their coverage indicates that ABC News did so at least 7 times, and the Times at least 3 times.
2013-12-13
http://gawker.com/abc-nyt-repeatedly-lied-about-cia-operative-robert-lev-1482879951?utm_content=buffer598c8&utm_source=buffer&utm_medium=twitter&utm_campaign=Buffer
2013-12-16 20:28:41
attachment
Snapshot
2013-12-16 20:28:41
http://gawker.com/abc-nyt-repeatedly-lied-about-cia-operative-robert-lev-1482879951?utm_content=buffer598c8&utm_source=buffer&utm_medium=twitter&utm_campaign=Buffer
text/html
utf-8
blogPost
Informed Comment
Cole
Juan
Dear Pres. Obama: Dissent isn't Possible in a Surveillance State | Informed Comment
2013-12-11
http://www.juancole.com/2013/12/dissent-possible-surveillance.html
2013-12-16 20:40:34
English
attachment
Dear Pres. Obama: Dissent isn't Possible in a Surveillance State | Informed Comment
2013-12-16 20:40:35
http://www.juancole.com/2013/12/dissent-possible-surveillance.html
text/html
utf-8
newspaperArticle
National
New Zealand Herald
ISSN 1170-0777
Fisher
David
Backpacker stripped of tech gear at Auckland Airport
A backpacker coming home for Christmas had every bit of electronic equipment stripped from him at the airport. - New Zealand Herald
Dec 12, 2013
en-NZ
http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11171475
2013-12-16 20:43:39
New Zealand Herald
newspaperArticle
World / Middle East
The New York Times
ISSN 0362-4331
Meier
Barry
Central Intelligence Agency
Espionage and Intelligence Services
Iran
Levinson, Robert A
A Disappearing Spy, and a Scandal at the C.I.A.
When Robert A. Levinson disappeared in Iran in 2007, U.S. officials insisted he was a private investigator. In fact, he was a C.I.A. contractor.
2013-12-13
http://www.nytimes.com/2013/12/14/world/middleeast/a-disappearing-american-spy-and-the-cia.html
2013-12-16 20:47:57
NYTimes.com
attachment
New York Times Snapshot
2013-12-16 20:47:57
http://www.nytimes.com/2013/12/14/world/middleeast/a-disappearing-american-spy-and-the-cia.html?hp&_r=1&&pagewanted=all
text/html
utf-8
newspaperArticle
U.S.
The New York Times
ISSN 0362-4331
Mazzetti
Mark
Schmidt
Michael S.
Classified Information and State Secrets
Computer Security
National Security Agency
News and News Media
Obama, Barack
Snowden, Edward J
Surveillance of Citizens by Government
United States International Relations
Officials Say U.S. May Never Know Extent of Snowden’s Leaks
Investigators remain in the dark partly because the facility where the former National Security Agency contractor Edward J. Snowden worked was not equipped with software to monitor employees.
2013-12-14
http://www.nytimes.com/2013/12/15/us/officials-say-us-may-never-know-extent-of-snowdens-leaks.html
2013-12-16 20:48:51
NYTimes.com
attachment
New York Times Snapshot
2013-12-16 20:48:51
http://www.nytimes.com/2013/12/15/us/officials-say-us-may-never-know-extent-of-snowdens-leaks.html?pagewanted=all
text/html
utf-8
newspaperArticle
US & Canada
BBC
Dymond
Jonny
NSA 'debates' amnesty for Snowden
A top NSA official raises the possibility of an amnesty for fugitive intelligence contractor Edward Snowden if he agrees to stop leaking documents.
2013/12/16
http://www.bbc.co.uk/news/world-us-canada-25399345
2013-12-16 20:57:27
bbc.co.uk
attachment
BBC News Snapshot
2013-12-16 20:57:55
http://www.bbc.co.uk/news/world-us-canada-25399345
text/html
utf-8
webpage
Forbes
McNeal
Greg
215
Business
data collection
klayman
metadata
NSA
Obama
snowden
Surveillance
Klayman V. Obama, NSA Metadata Collection Opinion (OCR)
Embedded below is the full opinion in Klayman v. Obama in which Judge Richard Leon finds the program violates the Fourth Amendment. Gregory S. McNeal is a professor specializing in law and public policy. You can follow him on Twitter @GregoryMcNeal.
2013-12-16
http://www.forbes.com/sites/gregorymcneal/2013/12/16/klayman-v-obama-nsa-metadata-collection-opinion-ocr/
2013-12-16 21:17:51
attachment
191885863-Klayman-v-Obama-NSA-Metadata-Opinion.pdf
application/pdf
attachment
Snapshot
2013-12-16 21:17:51
http://www.forbes.com/sites/gregorymcneal/2013/12/16/klayman-v-obama-nsa-metadata-collection-opinion-ocr/
text/html
utf-8
newspaperArticle
U.S. / Politics
The New York Times
ISSN 0362-4331
Savage
Charlie
Klayman, Larry
Leon, Richard J
National Security Agency
Suits and Litigation (Civil)
Surveillance of Citizens by Government
Federal Judge Rules Against N.S.A. Phone Data Program
A decision finds that keeping records of Americans' phone calls probably violates the Constitution and orders the government to stop collecting data on two plaintiffs.
2013-12-16
http://www.nytimes.com/2013/12/17/us/politics/federal-judge-rules-against-nsa-phone-data-program.html
2013-12-16 21:35:58
NYTimes.com
attachment
New York Times Snapshot
2013-12-16 21:35:58
http://www.nytimes.com/2013/12/17/us/politics/federal-judge-rules-against-nsa-phone-data-program.html?_r=0
text/html
utf-8
blogPost
The New Yorker Blogs
Davidson
Amy
NSA Scandal
politics
The Domino’s Hypothetical: Judge Leon vs. the N.S.A.
December 16, 2013
http://www.newyorker.com/online/blogs/closeread/2013/12/the-dominos-hypothetical-judge-leon-vs-the-nsa.html
2013-12-17 17:38:20
The Domino’s Hypothetical
attachment
The New Yorker
2013-12-17 17:38:22
http://www.newyorker.com/online/blogs/closeread/2013/12/the-dominos-hypothetical-judge-leon-vs-the-nsa.html?printable=true
newspaperArticle
World / Europe
The New York Times
ISSN 0362-4331
Sanger
David E.
Smale
Alison
Espionage and Intelligence Services
Germany
Merkel, Angela
National Security Agency
Obama, Barack
United States International Relations
U.S.-Germany Intelligence Partnership Falters Over Spying
As President Obama considers his options on the surveillance of allies, damage to the United States' relationship with Germany has proved difficult to repair.
2013-12-16
http://www.nytimes.com/2013/12/17/world/europe/us-germany-intelligence-partnership-falters-over-spying.html
2013-12-17 17:38:43
NYTimes.com
attachment
New York Times Snapshot
2013-12-17 17:38:43
http://www.nytimes.com/2013/12/17/world/europe/us-germany-intelligence-partnership-falters-over-spying.html?_r=0&pagewanted=all
text/html
utf-8
webpage
MIT Technology Review
Soghoian
Christopher
Snowden’s Leaks Have Finally Forced Companies to Enhance Their Security
Revelations about NSA surveillance have prompted Yahoo, Microsoft, and other companies to deploy long-overdue security improvements.
2013-12-17
http://www.technologyreview.com/view/522756/snowdens-leaks-have-finally-forced-companies-to-enhance-their-security/
2013-12-17 17:39:07
attachment
Snapshot
2013-12-17 17:39:07
http://www.technologyreview.com/view/522756/snowdens-leaks-have-finally-forced-companies-to-enhance-their-security/
text/html
utf-8
webpage
Foreign Policy
Drezner
Daniel
Tone-Deaf at the Listening Post
2013-12-16
http://www.foreignpolicy.com/articles/2013/12/16/tone_deaf_at_the_listening_post_my_day_at_the_NSA#sthash.PNLzcBFA.v1MpoZq8.dpbs
2013-12-17 17:40:28
attachment
Tone-Deaf at the Listening Post
2013-12-17 17:40:29
http://www.foreignpolicy.com/articles/2013/12/16/tone_deaf_at_the_listening_post_my_day_at_the_NSA#sthash.PNLzcBFA.v1MpoZq8.dpbs
text/html
utf-8
webpage
POLITICO Magazine
Aid
Matthew M.
Edward Snowden (301)
Intelligence (97)
Matthew M. Aid
NSA (122)
Surveillance (157)
Washington And The World (13)
Slobberknockered
Edward J. Snowden must be pleased with what he started. A group appointed by President Barack Obama in August to review the National Security Agency’s hugely controversial spying operations has finished its work, and, based on the early leaks and my own conversations, the resulting report is going to be a doozy. Expectations for the panel have...
2013-12-16
http://www.politico.com/magazine/story/2013/12/nsa-panel-report-snowden-slobberknockered-101208.html
2013-12-17 17:41:30
attachment
Slobberknockered - POLITICO Magazine
2013-12-17 17:41:51
http://www.politico.com/magazine/story/2013/12/nsa-panel-report-snowden-slobberknockered-101208_Page2.html
text/html
utf-8
attachment
Snapshot
2013-12-17 17:41:30
http://www.politico.com/magazine/story/2013/12/nsa-panel-report-snowden-slobberknockered-101208.html
text/html
utf-8
newspaperArticle
World / Americas
The New York Times
ISSN 0362-4331
The Associated Press
Snowden Offers to Help Brazil if Granted Asylum
In a letter posted online, the National Security Agency leaker Edward J. Snowden said he was willing to help Brazil investigate U.S. surveillance, but could not fully do so unless he receives asylum.
2013-12-17
http://www.nytimes.com/aponline/2013/12/17/world/americas/ap-lt-brazil-snowden.html
2013-12-17 17:43:20
NYTimes.com
attachment
New York Times Snapshot
2013-12-17 17:43:20
http://www.nytimes.com/aponline/2013/12/17/world/americas/ap-lt-brazil-snowden.html
text/html
utf-8
attachment
Original Edward Snowden letter published on A Folha today. An open letter to - Pastebin.com
2013-12-17 17:43:43
http://pastebin.com/2ybz27UE
text/html
utf-8
webpage
The Big Story
Brooks
Bradley
AP Subject
Asylum seekers
Brazil
Brazil government
crime
Dilma Rousseff
Domestic spying
Editorial
Edward Snowden
espionage
general news
Government and Politics
Government surveillance
Human rights and civil liberties
Immigration
Intelligence agencies
Latin America and Caribbean
Media
Military and defense
Military intelligence
national security
News media
Newspapers
North America
Political issues
Right to privacy
Social affairs
Social issues
South America
United States
United States government
U.S. National Security Agency
Snowden: NSA's indiscriminate spying 'collapsing'
RIO DE JANEIRO (AP) — National Security Agency leaker Edward Snowden wrote in a lengthy "open letter to the people of Brazil" that he's been inspir
2013-10-17
Snowden
http://bigstory.ap.org/article/report-snowden-would-help-brazil-if-given-asylum
2013-12-17 17:44:06
attachment
Snapshot
2013-12-17 17:44:06
http://bigstory.ap.org/article/report-snowden-would-help-brazil-if-given-asylum
text/html
utf-8
webpage
Talking Points Memo
Brooks
Bradley
Snowden: NSA's Indiscriminate Spying 'Collapsing'
Updated 8:11 A.M. ETRIO DE JANEIRO (AP) -- National Security Agency leaker Edward Snowden wrote in a lengthy "open letter to the people of Brazil" that he's been inspired by the global debate ignited by his release of thousands of National Security Agency documents, and that the NSA's culture of indiscriminate global espionage "is collapsing."In the letter, released widely online, Snowden commended the Brazilian government for its strong stand against U.S. spying.He said he'd be willing to help the South American nation investigate NSA spying on its soil, but could not fully participate in doing so without being granted political asylum, because the U.S. "government will continue to interfere with my ability to speak."
2013-12-17
Snowden
http://talkingpointsmemo.com/news/snowden-bides-for-political-asylum-in-brazil
2013-12-17 17:44:13
attachment
Snapshot
2013-12-17 17:44:13
http://talkingpointsmemo.com/news/snowden-bides-for-political-asylum-in-brazil
text/html
utf-8
newspaperArticle
Opinion
The New York Times
ISSN 0362-4331
The Editorial Board
Data-Mining and Database Marketing
Editorials
Fourth Amendment (US Constitution)
Leon, Richard J
National Security Agency
Privacy
Suits and Litigation (Civil)
Surveillance of Citizens by Government
United States
USA PATRIOT Act
Wiretapping and Other Eavesdropping Devices and Methods
A Powerful Rebuke of Mass Surveillance
At last, a federal judge reviews and rules against the National Security Agency's phone-data collection program.
2013-12-16
http://www.nytimes.com/2013/12/17/opinion/a-powerful-rebuke-of-mass-surveillance.html
2013-12-17 17:44:26
NYTimes.com
attachment
New York Times Snapshot
2013-12-17 17:44:26
http://www.nytimes.com/2013/12/17/opinion/a-powerful-rebuke-of-mass-surveillance.html?hp&rref=opinion
text/html
utf-8
newspaperArticle
Washington Post
Timberg
Craig
Nakashima
Ellen
news
Agreements with private companies protect U.S. access to cables’ data for surveillance
The U.S. government had a problem: Spying in the digital age required access to the fiber-optic cables traversing the world’s oceans, carrying torrents of data at the speed of light. And one of...
2013-07-06
http://articles.washingtonpost.com/2013-07-06/business/40406049_1_u-s-access-global-crossing-surveillance-requests
2013-12-17 17:45:11
attachment
Agreements with private companies protect U.S. access to cables’ data for surveillance - Page 2 - Washington Post
2013-12-17 17:46:24
http://articles.washingtonpost.com/2013-07-06/business/40406049_1_u-s-access-global-crossing-surveillance-requests/2
text/html
utf-8
attachment
Agreements with private companies protect U.S. access to cables’ data for surveillance - Page 3 - Washington Post
2013-12-17 17:46:38
http://articles.washingtonpost.com/2013-07-06/business/40406049_1_u-s-access-global-crossing-surveillance-requests/3
text/html
utf-8
attachment
Snapshot
2013-12-17 17:45:11
http://articles.washingtonpost.com/2013-07-06/business/40406049_1_u-s-access-global-crossing-surveillance-requests
text/html
utf-8
magazineArticle
Lemieux
Scott
Four Takeaways from Yesterday's NSA Ruling
The U.S. District Court decided that the NSA's collection of phone metadata is likely unconstitutional. What does that mean?
December 17, 2013
en-US
http://prospect.org/article/four-takeaways-yesterdays-nsa-ruling
2013-12-17 17:47:36
American Prospect
The American Prospect
ISSN 1049-7285
attachment
American Prospect Snapshot
2013-12-17 17:47:38
http://prospect.org/article/four-takeaways-yesterdays-nsa-ruling
text/html
utf-8
blogPost
Schneier on Security
Schneier
Bruce
Schneier on Security: Today I Briefed Congress on the NSA
2014-01-16
https://www.schneier.com/blog/archives/2014/01/today_i_briefed.html
2014-01-17 15:58:23
attachment
Schneier on Security: Today I Briefed Congress on the NSA
2014-01-17 15:58:24
https://www.schneier.com/blog/archives/2014/01/today_i_briefed.html
text/html
utf-8
webpage
onthemedia
Vogt
P. J.
analysis
Bob Garfield
Brooke Gladstone
Media
NPR
On The Media
public
radio
WNYC
That Bomb-Hoaxing Harvard Student Was Using Tor, But They Caught Him Anyway
Kim sent the threatening emails using a Tor browser, which anonymizes your web browsing, paired with an anonymous email program called Guerilla Mail. That actually could have been enough to protect his identity, except that he did all of this on Harvard's wireless internet.
2013-12-18
http://www.onthemedia.org/story/harvard-bomb-threat/?utm_source=sharedUrl&utm_media=metatag&utm_campaign=sharedUrl
2013-12-19 17:09:38
attachment
Snapshot
2013-12-19 17:09:38
http://www.onthemedia.org/story/harvard-bomb-threat/
text/html
utf-8
webpage
Ars Technica
Nate
2013
erson-Dec 18
EST
9:00pm
NSA reform panel: Foreigners actually have privacy rights, too!
US "should grant greater privacy protection" to foreigners.
2013-12-18
NSA reform panel
http://arstechnica.com/tech-policy/2013/12/spying-reform-panel-the-world-is-not-the-nsas-playground/
2013-12-19 17:16:55
attachment
Snapshot
2013-12-19 17:16:55
http://arstechnica.com/tech-policy/2013/12/spying-reform-panel-the-world-is-not-the-nsas-playground/
text/html
utf-8
newspaperArticle
Reuters
Soto
Alonso
Winter
Brian
Brazil
Celso Amorim
china
Dilma Rousseff
Donna Hrinak
France
François Hollande
Junichi Sato
Karin Enstrom
Richard Aboulafia
Sweden
United States
UPDATE 3-Saab wins Brazil jet deal after NSA spying sours Boeing bid
BRASILIA/SAO PAULO, Dec 18 (Reuters) - Brazil awarded a $4.5billion contract to Saab AB on Wednesday to replace its agingfleet of fighter jets, a surprise coup for the
Wed Dec 18 23:20:13 UTC 2013
http://www.reuters.com/article/2013/12/18/brazil-jets-idUSL2N0JX17W20131218
2013-12-19 17:30:55
Reuters
attachment
Snapshot
2013-12-19 17:30:55
http://www.reuters.com/article/2013/12/18/brazil-jets-idUSL2N0JX17W20131218
text/html
utf-8
webpage
Foreign Policy
Groll
Elias
Will the U.S. Strong-Arm Brazil to Keep Snowden Out?
2013-12-18
http://blog.foreignpolicy.com/posts/2013/12/17/will_the_us_strongarm_brazil_to_keep_snowden_out
2013-12-19 20:10:09
attachment
Will the U.S. Strong-Arm Brazil to Keep Snowden Out?
2013-12-19 20:10:10
http://blog.foreignpolicy.com/posts/2013/12/17/will_the_us_strongarm_brazil_to_keep_snowden_out
text/html
utf-8
blogPost
Some Things That Don't Fit Into 140 Characters
Rouwhorst
Koen
FLYING PIG: GCHQ’s TLS/SSL knowledge base | Koen Rouwhorst
2013-12-17
http://koen.io/2013/12/flying-pig-gchq-tls-ssl-knowledge-base/
2013-12-19 20:13:08
attachment
FLYING PIG: GCHQ’s TLS/SSL knowledge base | Koen Rouwhorst
2013-12-19 20:13:09
http://koen.io/2013/12/flying-pig-gchq-tls-ssl-knowledge-base/
text/html
utf-8
webpage
Foreign Policy
Harris
Shane
NSA’s Top Geek: ‘I Don’t Know’ If There’s Another Snowden
2013-12-17
http://complex.foreignpolicy.com/posts/2013/12/17/nsa_s_top_geek_i_don_t_know_if_there_s_another_snowden
2013-12-19 20:15:53
attachment
NSA’s Top Geek: ‘I Don’t Know’ If There’s Another Snowden
2013-12-19 20:15:54
http://complex.foreignpolicy.com/posts/2013/12/17/nsa_s_top_geek_i_don_t_know_if_there_s_another_snowden
text/html
utf-8
webpage
www.epic.org
Electronic Privacy Information Center-
Information on electronic privacy issues
Electronic Privacy Information Center
The yearend report from the Inspector General at the Department of Justice points to new privacy and civil liberties concerns. The report Top Management and Performance Challenges Facing the Department of Justice - 2013 finds that “technologica...
2013-12-16
https://epic.org/2013/12/justice-department-inspector-g.html
2013-12-19 20:16:19
attachment
Snapshot
2013-12-19 20:16:19
https://epic.org/2013/12/justice-department-inspector-g.html
text/html
utf-8
attachment
USDOJ/OIG | Top Management Challenges 2012
2013-12-19 20:16:25
http://www.justice.gov/oig/challenges/2013.htm
text/html
utf-8
webpage
CNN
Wiebe
J. Kirk
Who broke the law, Snowden or the NSA?
Kirk Wiebe says Edward Snowden and federal workers swear to uphold the Constitution above all, so if massive surveillance is unconstitutional, who's wrong?
2013-12-18
http://www.cnn.com/2013/12/17/opinion/wiebe-snowden-amnesty/index.html
2013-12-19 20:16:34
attachment
Snapshot
2013-12-19 20:16:34
http://edition.cnn.com/2013/12/17/opinion/wiebe-snowden-amnesty/index.html
text/html
utf-8
webpage
MSNBC
Vladeck
Stephen
My day at the NSA: A pr campaign for secret surveillance programs
The NSA remains committed to the idea that, because a surveillance program will be more effective if no one knows about it, the public should remain ignorant.
2013-12-17
My day at the NSA
http://www.msnbc.com/msnbc/my-day-the-nsa
2013-12-19 20:19:03
attachment
Snapshot
2013-12-19 20:19:03
http://www.msnbc.com/msnbc/my-day-the-nsa
text/html
utf-8
webpage
American Civil Liberties Union
Romero
Anthony D.
Edward Snowden is a Patriot
Edward Snowden is a patriot.
As a whistleblower of illegal government activity that was sanctioned and kept secret by the legislative, executive, and judicial branches of government for years, he undertook great personal risk for the public good. And he has single-handedly reignited a gl...
2013-12-17
https://www.aclu.org/blog/national-security/edward-snowden-patriot
2013-12-19 20:30:17
attachment
Snapshot
2013-12-19 20:30:17
https://www.aclu.org/blog/national-security/edward-snowden-patriot
text/html
utf-8
webpage
Amnesty International
Brazil must seriously consider Snowden asylum request | Amnesty International
2013-12-17
http://www.amnesty.org/en/news/brazil-must-seriously-consider-snowden-asylum-request-2013-12-17
2013-12-19 20:30:41
attachment
Brazil must seriously consider Snowden asylum request | Amnesty International
2013-12-19 20:30:42
http://www.amnesty.org/en/news/brazil-must-seriously-consider-snowden-asylum-request-2013-12-17
text/html
utf-8
newspaperArticle
U.S. / Politics
The New York Times
ISSN 0362-4331
Liptak
Adam
Fourth Amendment (US Constitution)
Leon, Richard J
National Security Agency
Supreme Court (US)
Surveillance of Citizens by Government
After Ruling Critical of N.S.A., Uncertain Terrain for Appeal
A definitive decision on a telephone surveillance effort seems likely, but much else is unclear, as Supreme Court opinions have pointed in opposite directions.
2013-12-17
http://www.nytimes.com/2013/12/18/us/politics/after-ruling-critical-of-nsa-uncertain-terrain-for-appeal.html
2013-12-19 20:31:56
NYTimes.com
attachment
New York Times Snapshot
2013-12-19 20:31:56
http://www.nytimes.com/2013/12/18/us/politics/after-ruling-critical-of-nsa-uncertain-terrain-for-appeal.html?ref=us
text/html
utf-8
magazineArticle
Foreign Policy
Rothkopf
David
It’s Not About Snowden -- It’s About Madison
The jig is up for anyone who argues that the Constitution doesn't cover metadata.
December 18, 2013
http://www.foreignpolicy.com/articles/2013/12/17/it_s_not_about_snowden_it_s_about_madison_nsa_metadata
2013-12-19 20:32:21
Foreign Policy
attachment
Foreign Policy Snapshot
2013-12-19 20:32:27
http://www.foreignpolicy.com/articles/2013/12/17/it_s_not_about_snowden_it_s_about_madison_nsa_metadata
text/html
utf-8
newspaperArticle
Tech
The Washington Post
ISSN 0190-8286
Kang
Cecilia
Nakashima
Ellen
Tech executives to Obama: NSA spying revelations are hurting business
In a meeting at the White House, they warned that a consumer backlash could harm the broader economy.
2013-12-18
en-US
Tech executives to Obama
http://www.washingtonpost.com/business/technology/2013/12/17/6569b226-6734-11e3-a0b9-249bbb34602c_story.html?wprss=rss_business
2013-12-19 20:33:12
washingtonpost.com
attachment
Washington Post Snapshot
2013-12-19 20:33:15
http://www.washingtonpost.com/business/technology/2013/12/17/6569b226-6734-11e3-a0b9-249bbb34602c_print.html?wprss=rss_business
text/html
utf-8
blogPost
The New Yorker Blogs
Phillips
Michael
elements
NSA Scandal
techpages
A New Legal Theory for the Age of Mass Surveillance
December 17, 2013
http://www.newyorker.com/online/blogs/elements/2013/12/a-new-legal-theory-for-the-age-of-mass-surveillance.html
2013-12-19 20:33:22
attachment
The New Yorker
2013-12-19 20:33:24
http://www.newyorker.com/online/blogs/elements/2013/12/a-new-legal-theory-for-the-age-of-mass-surveillance.html?printable=true
newspaperArticle
Technology
The Guardian
ISSN 0261-3077
Hern
Alex
Data and computer security
Data protection
Edward Snowden
Freedom of speech
Internet
Privacy
technology
The NSA files
Tim Berners-Lee
World news
Tim Berners-Lee leads call for more transparency over mass surveillance
Open letter claims UK and US governments are contradicting accountability pledge of Open Government Partnership
2013-12-18T19:01EST
en-GB
http://www.theguardian.com/technology/2013/dec/19/tim-berners-lee-data-privacy-surveillance
2013-12-19 21:20:52
The Guardian
attachment
Guardian Snapshot
2013-12-19 21:20:55
http://www.theguardian.com/technology/2013/dec/19/tim-berners-lee-data-privacy-surveillance
text/html
utf-8
webpage
TheHill
Tummarello
Kate
Senate report warns of vast data mining 'behind veil of secrecy'
The Senate Commerce Committee released a report Wednesday warning of the harms of firms that silently track and label consumers for marketing purposes.The report — based on an investigation of nine companies that Chairman Jay Rockefeller (D-W.Va.) initiated last year — focuses on data brokers, or companies that track consumers online and offline, and encourages continued oversight of the industry from lawmakers.
Text
2013-12-18T12:10-05:00
http://thehill.com/blogs/hillicon-valley/technology/193523-senate-report-warns-of-vast-data-mining-behind-veil-of
2013-12-19 21:21:04
und
attachment
Snapshot
2013-12-19 21:21:04
http://thehill.com/blogs/hillicon-valley/technology/193523-senate-report-warns-of-vast-data-mining-behind-veil-of
text/html
utf-8
webpage
Professors blogg -- On Human Rights For All
artedenoli
What Is Behind The Bogus Case of Sweden VS. Mr Assange?
In "Who is behind. . .? On the Swedish collaboration with US spying" (Please do not refer to it as "cooperation between FRA and NSA", for Sweden gets no benefit for its own national interests, at t...
2013-12-18
http://professorsblogg.com/2013/12/18/bogus_swecasevs-assange_why/
2013-12-19 21:21:18
attachment
Snapshot
2013-12-19 21:21:18
http://professorsblogg.com/2013/12/18/bogus_swecasevs-assange_why/
text/html
utf-8
webpage
Säpo puts pressure on internet providers for data access - Radio Sweden | Sveriges Radio
2013-12-17
https://sverigesradio.se/sida/artikel.aspx?programid=2054&artikel=5735711
2013-12-19 21:22:52
attachment
Säpo puts pressure on internet providers for data access - Radio Sweden | Sveriges Radio
2013-12-19 21:22:53
https://sverigesradio.se/sida/artikel.aspx?programid=2054&artikel=5735711
text/html
utf-8
newspaperArticle
US
Wall Street Journal
Gorman
Siobhan
Barrett
Delvin
Lee
Carol E.
armed forces
domestic politics
espionage
general news
government bodies
international relations
judicial branch
national security
political
politics
Panel seeks to overhaul spy practices.
A presidential panel called for broad changes to both foreign and domestic U.S. spy practices that, if adopted, would significantly curtail the National Security Agency's activities.
2013-12-19
http://online.wsj.com/news/article_email/SB10001424052702304866904579266381778464284-lMyQjAxMTAzMDEwODExNDgyWj
2013-12-19 21:23:21
attachment
Snapshot
2013-12-19 21:23:21
http://online.wsj.com/news/article_email/SB10001424052702304866904579266381778464284-lMyQjAxMTAzMDEwODExNDgyWj
text/html
utf-8
webpage
The Times of India
Press
Associated
National Security Agency
NSA
NSA surveillance
Obama
snowden
Vladimir Putin
NSA surveillance needed to fight terrorism: Putin
President Vladimir Putin said on Thursday that the National Security Agency surveillance is necessary to fight terrorism, but added that the government needs to "limit the appetite'' of the agency with a clear set of ground rules.
2013-12-19
NSA surveillance needed to fight terrorism
http://timesofindia.indiatimes.com/world/europe/NSA-surveillance-needed-to-fight-terrorism-Putin/articleshow/27648851.cms
2013-12-19 21:26:37
attachment
Snapshot
2013-12-19 21:26:37
http://timesofindia.indiatimes.com/world/europe/NSA-surveillance-needed-to-fight-terrorism-Putin/articleshow/27648851.cms
text/html
utf-8
webpage
ProPublica
Brandeisky
Kara
ProPublica
The Surveillance Reforms Obama Supported Before He Was President
The White House has opposed efforts to rein in NSA snooping, but only five years ago, Sen. Obama supported substantial reforms.
2013-08-07
http://www.propublica.org/article/the-surveillance-reforms-obama-supported-before-he-was-president
2013-12-19 21:27:26
attachment
Snapshot
2013-12-19 21:27:26
http://www.propublica.org/article/the-surveillance-reforms-obama-supported-before-he-was-president
text/html
utf-8
webpage
The Big Story
Rousseff
Dilma
Angela Merkel
Brazil
Brazil government
Classified information
Data privacy
Dilma Rousseff
Domestic spying
Edward Snowden
Europe
general news
Germany
Germany government
Government and Politics
Government surveillance
Human rights and civil liberties
Intelligence agencies
Latin America and Caribbean
Laws
Legislation
Legislature
Military and defense
national security
Navi Pillay
North America
Political issues
Right to privacy
Social affairs
Social issues
South America
technology
Technology issues
United Nations
United Nations General Assembly
United States
United States government
U.S. National Security Agency
Western Europe
UN votes to protect privacy in digital age
UNITED NATIONS (AP) — The U.N.
2013-12-18
http://bigstory.ap.org/article/un-votes-protect-privacy-digital-age
2013-12-19 21:29:47
attachment
Snapshot
2013-12-19 21:29:47
http://bigstory.ap.org/article/un-votes-protect-privacy-digital-age
text/html
utf-8
webpage
TheHill
Weaver
Dustin
President boxed in on NSA reforms
One observer said the NSA review panel pulled "the rug out from under" the White House.
Text
2013-12-19T16:05-05:00
http://thehill.com/blogs/hillicon-valley/technology/193668-president-boxed-in-on-nsa-reforms
2013-12-20 22:00:40
und
attachment
Snapshot
2013-12-20 22:00:40
http://thehill.com/blogs/hillicon-valley/technology/193668-president-boxed-in-on-nsa-reforms?utm_content=bufferdc5f7&utm_source=buffer&utm_medium=twitter&utm_campaign=Buffer
text/html
utf-8
webpage
Jacobsen
Libby
Verizon to Publish Transparency Report Disclosing Law Enforcement Requests for Customer Information | Verizon Public Policy
2013-12-19
http://publicpolicy.verizon.com/blog/entry/verizon-to-publish-transparency-report-disclosing-law-enforcement-requests
2013-12-20 22:00:52
attachment
Verizon to Publish Transparency Report Disclosing Law Enforcement Requests for Customer Information | Verizon Public Policy
2013-12-20 22:00:53
http://publicpolicy.verizon.com/blog/entry/verizon-to-publish-transparency-report-disclosing-law-enforcement-requests
text/html
utf-8
webpage
HotAir.com
Morrissey
Ed
Barack Obama
Foreign Intelligence Surveillance Act
james clapper
NSA
perjury
Rand Paul
Surveillance
Paul: Clapper’s crimes are more injurious to US than Snowden’s - Hot Air
Do the NSA surveillance programs actually work?
2013-12-19
Paul
http://hotair.com/archives/2013/12/19/paul-clappers-crimes-are-more-injurious-to-us-than-snowdens/
2013-12-20 22:01:56
attachment
Snapshot
2013-12-20 22:01:56
http://hotair.com/archives/2013/12/19/paul-clappers-crimes-are-more-injurious-to-us-than-snowdens/
text/html
utf-8
webpage
The New Yorker
Davidson
Amy
The Two Cases for Amnesty for Snowden : The New Yorker
2013-12-19
http://www.newyorker.com/online/blogs/comment/2013/12/nsa-two-cases-for-amnesty-for-snowden.html
2013-12-20 22:02:52
attachment
The Two Cases for Amnesty for Snowden : The New Yorker
2013-12-20 22:02:53
http://www.newyorker.com/online/blogs/comment/2013/12/nsa-two-cases-for-amnesty-for-snowden.html
text/html
windows-1252
webpage
Ars Technica
Goodin
Dan
NSA’s broken Dual_EC random number generator has a “fatal bug” in OpenSSL
No plans to fix a bug in "toxic" algorithm that no one seems to use.
2013-12-19
http://arstechnica.com/security/2013/12/nsas-broken-dual_ec-random-number-generator-has-a-fatal-bug-in-openssl/
2013-12-20 22:03:34
attachment
Snapshot
2013-12-20 22:03:34
http://arstechnica.com/security/2013/12/nsas-broken-dual_ec-random-number-generator-has-a-fatal-bug-in-openssl/
text/html
utf-8
webpage
Lawfare
Margulies
Peter
Desperately Seeking Substance (Not Slogans) in Review Group Report on NSA Surveillance
While the Report of the President’s Review Group (see Ritika’s post here and Ben’s here) has already generated classic Washington-style buzz because of its criticism of the NSA’s bulk collection of metadata, the real embarrassment should be felt by the Rev
2013-13-19
http://www.lawfareblog.com/2013/12/desperately-seeking-substance-not-slogans-in-review-group-report-on-nsa-surveillance/
2013-12-20 22:04:34
attachment
Snapshot
2013-12-20 22:04:34
http://www.lawfareblog.com/2013/12/desperately-seeking-substance-not-slogans-in-review-group-report-on-nsa-surveillance/
text/html
utf-8
webpage
The New York Times
Jaffer
Jameel
national security
National Security Agency
Surveillance
terrorism
End Snowden's Prosecution - Room for Debate
Without Snowden, the president wouldn't even have drafted the panel that recommended changing the surveillance programs he revealed. By Jameel Jaffer.
2013-12-19
http://www.nytimes.com/roomfordebate/2013/12/19/has-snowden-been-vindicated/end-snowdens-prosecution
2013-12-20 22:05:19
attachment
Snapshot
2013-12-20 22:05:19
http://www.nytimes.com/roomfordebate/2013/12/19/has-snowden-been-vindicated/end-snowdens-prosecution
text/html
utf-8
webpage
The New York Times
Radack
Jesselyn
national security
National Security Agency
Surveillance
terrorism
High-Level Confirmation That Snowden's a Whistle-Blower - Room for Debate
A federal judge and a White House panel show real concern about government overreach, not fear about imaginary damage by Edward Snowden. By Jesselyn Radack.
2013-12-20
http://www.nytimes.com/roomfordebate/2013/12/19/has-snowden-been-vindicated/high-level-confirmation-that-snowdens-a-whistle-blower?smid=tw-share
2013-12-20 22:05:45
attachment
Snapshot
2013-12-20 22:05:45
http://www.nytimes.com/roomfordebate/2013/12/19/has-snowden-been-vindicated/high-level-confirmation-that-snowdens-a-whistle-blower?smid=tw-share
text/html
utf-8
webpage
The New York Times
Baker
Stewart
national security
National Security Agency
Surveillance
terrorism
Report on the N.S.A.: A Battle That Snowden Is Not Winning - Room for Debate
Nothing that the panel report on the N.S.A. says vindicates Edward Snowden’s decision to violate the law and put masses of sensitive intelligence at risk. By Stewart Baker.
2013-12-19
Report on the N.S.A.
http://www.nytimes.com/roomfordebate/2013/12/19/has-snowden-been-vindicated/report-on-the-nsa-a-battle-that-snowden-is-not-winning
2013-12-20 22:06:53
attachment
Snapshot
2013-12-20 22:06:53
http://www.nytimes.com/roomfordebate/2013/12/19/has-snowden-been-vindicated/report-on-the-nsa-a-battle-that-snowden-is-not-winning
text/html
utf-8
webpage
TheHill
Sasso
Brendan
GOP requests criminal probe of intel czar
House Republicans want an investigation into whether James Clapper lied to Congress.
Text
2013-12-19T16:26-05:00
http://thehill.com/blogs/hillicon-valley/193685-republicans-call-for-investigation-of-obama-intel-czar-for-lying
2013-12-20 22:07:23
und
attachment
Snapshot
2013-12-20 22:07:23
http://thehill.com/blogs/hillicon-valley/193685-republicans-call-for-investigation-of-obama-intel-czar-for-lying
text/html
utf-8
blogPost
Foreign Policy Blogs
Groll
Elias
Silicon Valley Scores Victory Against the Surveillance State
December 19, 2013 - 07:35 Pm
http://blog.foreignpolicy.com/posts/2013/12/19/silicon_valley_scores_victory_against_the_surveillance_state
2013-12-20 22:07:43
attachment
Foreign Policy Snapshot
2013-12-20 22:08:00
http://blog.foreignpolicy.com/posts/2013/12/19/silicon_valley_scores_victory_against_the_surveillance_state
text/html
utf-8
webpage
Talking Points Memo
Bobic
Igor
Peter King Slams Paul For Attacking Clapper: 'He Disgraced His Office'
Rep. Peter King (R-NY) blasted Sen. Rand Paul (R-KY) on Thursday for comparing National Security Agency Director James Clapper to Edward Snowden, the former NSA contractor who leaked classified information about America's surveillance programs.
Paul criticized Clapper on Wednesday for "lying" to Congress about the extent of NSA's programs.
2013-12-19
Peter King Slams Paul For Attacking Clapper
http://talkingpointsmemo.com/livewire/peter-king-slams-paul-for-attacking-clapper-he-disgraced-his-office
2013-12-20 22:07:55
attachment
Snapshot
2013-12-20 22:07:55
http://talkingpointsmemo.com/livewire/peter-king-slams-paul-for-attacking-clapper-he-disgraced-his-office
text/html
utf-8
webpage
Gorman
Siobhan
armed forces
domestic politics
espionage
general news
international relations
national security
political
politics
Report to Obama calls for targeted NSA searches instead of amassing as much data as possible
The National Security Agency's core operational model is called into question in one little-noticed recommendation by the review panel evaluating the spy agency, and is likely to reignite a contentious debate within U.S. intelligence circles.
2013-12-19
http://online.wsj.com/news/article_email/SB10001424052702304773104579268820073404740-lMyQjAxMTAzMDEwOTExNDkyWj
2013-12-20 22:08:44
attachment
Snapshot
2013-12-20 22:08:44
http://online.wsj.com/news/article_email/SB10001424052702304773104579268820073404740-lMyQjAxMTAzMDEwOTExNDkyWj
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Rusbridger
Alan
Counter-terrorism policy
Data protection
Edward Snowden
GCHQ
Media
MI5
MI6
Newspapers
Newspapers & magazines
NSA
politics
Press freedom
Surveillance
The NSA files
UK news
UK security and counter-terrorism
United States
US national security
World news
Obama's NSA review gives the lie to Britain's timid platitudes: a debate is possible
In the US, the official response to Snowden's revelations celebrates journalism and calls for real change. In Britain, the picture has been rather different
2013-12-19T15:50EST
en-GB
Obama's NSA review gives the lie to Britain's timid platitudes
http://www.theguardian.com/commentisfree/2013/dec/19/obama-nsa-review-britain-debate-possible
2013-12-20 22:09:14
The Guardian
attachment
Guardian Snapshot
2013-12-20 22:09:17
http://www.theguardian.com/commentisfree/2013/dec/19/obama-nsa-review-britain-debate-possible
text/html
utf-8
blogPost
The Dissenter
Gosztola
Kevin
Thin Thread
Whistleblowers Vindicated as Presidential Review Group Recommends Alternative to NSA Vacuuming Data | The Dissenter
2013-12-19
http://dissenter.firedoglake.com/2013/12/19/whistleblowers-vindicated-as-presidential-review-group-recommends-alternative-to-nsa-vacuuming-data/
2013-12-20 22:10:46
attachment
Whistleblowers Vindicated as Presidential Review Group Recommends Alternative to NSA Vacuuming Data | The Dissenter
2013-12-20 22:10:47
http://dissenter.firedoglake.com/2013/12/19/whistleblowers-vindicated-as-presidential-review-group-recommends-alternative-to-nsa-vacuuming-data/
text/html
utf-8
webpage
A Tiny Revolution
A Tiny Revolution: Has Morley Safer Ever Told John Miller This Story?: 'Look, If You Think Any American Official Is Going to Tell You the Truth, Then You're Stupid'
2013-12-17
http://www.tinyrevolution.com/mt/archives/003698.html
2013-12-20 22:13:20
attachment
2013-12-20 22:14:02
http://www.tinyrevolution.com/mt/archives/safer2.html
text/html
windows-1252
attachment
A Tiny Revolution: Has Morley Safer Ever Told John Miller This Story?: 'Look, If You Think Any American Official Is Going to Tell You the Truth, Then You're Stupid'
2013-12-20 22:13:21
http://www.tinyrevolution.com/mt/archives/003698.html
text/html
utf-8
webpage
Gorman
armed forces
domestic politics
espionage
general news
international relations
national security
political
politics
Report to Obama calls for targeted NSA searches instead of amassing as much data as possible
The National Security Agency's core operational model is called into question in one little-noticed recommendation by the review panel evaluating the spy agency, and is likely to reignite a contentious debate within U.S. intelligence circles.
2013-12-19
http://online.wsj.com/news/article_email/SB10001424052702304773104579268820073404740-lMyQjAxMTAzMDEwOTExNDkyWj
2013-12-20 22:14:27
attachment
Snapshot
2013-12-20 22:14:27
http://online.wsj.com/news/article_email/SB10001424052702304773104579268820073404740-lMyQjAxMTAzMDEwOTExNDkyWj
text/html
utf-8
webpage
NBC News
Correspondent
Michael IsikoffNBC News National Investigative
NSA program stopped no terror attacks, says White House panel member
A member of the White House review panel on NSA surveillance said he was “absolutely” surprised when he discovered the agency’s lack of evidence that the bulk collection of telephone call records had thwarted any terrorist attacks.
2013-12-20T09:22:13-05:00
http://investigations.nbcnews.com/_news/2013/12/20/21975158-nsa-program-stopped-no-terror-attacks-says-white-house-panel-member
2013-12-20 22:16:03
attachment
Snapshot
2013-12-20 22:16:03
http://investigations.nbcnews.com/_news/2013/12/19/21975158-nsa-program-stopped-no-terror-attacks-says-white-house-panel-member?lite
text/html
utf-8
newspaperArticle
World
The New York Times
ISSN 0362-4331
Glanz
James
Lehren
Andrew W.
National Security Agency
Snowden, Edward J
Surveillance of Citizens by Government
N.S.A. Dragnet Included Allies, Aid Groups and Business Elite
Documents leaked by Edward J. Snowden reveal that an Israeli prime minister and the heads of international aid organizations were among more than 1,000 subjects of surveillance in recent years.
2013-12-20
http://www.nytimes.com/2013/12/21/world/nsa-dragnet-included-allies-aid-groups-and-business-elite.html
2013-12-20 22:16:58
NYTimes.com
attachment
New York Times Snapshot
2013-12-20 22:16:58
http://www.nytimes.com/2013/12/21/world/nsa-dragnet-included-allies-aid-groups-and-business-elite.html?pagewanted=all
text/html
utf-8
newspaperArticle
UK news
The Guardian
ISSN 0261-3077
Ball
James
Hopkins
Nick
Charities
Europe
European commission
European Union
GCHQ
Germany
NSA
Society
Surveillance
The NSA files
UK news
UK security and counter-terrorism
United Nations
United States
US national security
Voluntary sector
World news
GCHQ and NSA targeted charities, Germans, Israeli PM and EU chief
• Unicef and Médecins du Monde were on surveillance list• Targets went well beyond potential criminals and terrorists• Revelations could cause embarrassment at EU summit
2013-12-20T15:06EST
en-GB
http://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted-aid-agencies-german-government-eu-commissioner?CMP=twt_gu
2013-12-20 22:17:43
The Guardian
attachment
Guardian Snapshot
2013-12-20 22:17:45
http://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted-aid-agencies-german-government-eu-commissioner?CMP=twt_gu
text/html
utf-8
newspaperArticle
Spiegel Online
Poitras
Laura
Rosenbach
Marcel
Stark
Holger
Snowden Documents Show GCHQ Targeted European and German Politicians
Documents from the archive of whistleblower and former NSA worker Edward Snowden show that Britain's GCHQ signals intelligence agency has targeted European, German and Israeli politicians for surveillance.
20.12.2013
http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135.html
2013-12-20 22:17:54
Spiegel Online
attachment
Snowden Documents Show GCHQ Targeted European and German Politicians - SPIEGEL ONLINE
2013-12-20 22:17:56
http://www.spiegel.de/international/world/snowden-documents-show-gchq-targeted-european-and-german-politicians-a-940135.html
text/html
windows-1252
webpage
European Commission
EUROPA - PRESS RELEASES - Press release - Statement by Commission spokeswoman on the newspaper allegations of surveillance of Vice-President Almunia
2013-12-20
http://europa.eu/rapid/press-release_MEMO-13-1189_en.htm
2013-12-20 22:18:18
attachment
EUROPA - PRESS RELEASES - Press release - Statement by Commission spokeswoman on the newspaper allegations of surveillance of Vice-President Almunia
2013-12-20 22:18:19
http://europa.eu/rapid/press-release_MEMO-13-1189_en.htm
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Norton-Taylor
Richard
Africa
CIA
Law
Libya
MI6
Middle East and North Africa
Rendition
Torture
UK news
United States
World news
Libyan told he cannot pursue rendition claim in case it harms UK interests
High court judge says Abdel Hakim Belhaj has well-founded claim, but case would damage British-US relations
2013-12-20T09:23EST
en-GB
http://www.theguardian.com/world/2013/dec/20/libyan-rendition-claim-uk-interests
2013-12-20 22:19:44
The Guardian
attachment
Guardian Snapshot
2013-12-20 22:19:46
http://www.theguardian.com/world/2013/dec/20/libyan-rendition-claim-uk-interests
text/html
utf-8
newspaperArticle
Los Angeles Times
ISSN 0458-3035
Williams
Carol J.
U.N. votes to protect online privacy; Edward Snowden leaks credited
2013-12-19
en-US
http://www.latimes.com/world/worldnow/la-fg-wn-un-surveillance-privacy-rights-edward-snowden-20131219,0,1981619.story#ixzz2o2P5Vcj8
2013-12-20 22:20:02
LA Times
attachment
LA Times Snapshot
2013-12-20 22:20:11
http://www.latimes.com/world/worldnow/la-fg-wn-un-surveillance-privacy-rights-edward-snowden-20131219,0,1981619.story#ixzz2o2P5Vcj8
text/html
utf-8
email
Perrin
Trevor
[Cfrg] Requesting removal of CFRG co-chair
The Crypto Forum Research Group is chartered to provide crypto advice
to IETF Working Groups. As CFRG co-chair for the last 2 years, Kevin
has shaped CFRG discussion and provided CFRG opinion to WGs.
Kevin's handling of the "Dragonfly" protocol raises doubts that he is
performing these duties competently. Additionally, Kevin's employment
with the National Security Agency raises conflict-of-interest
concerns.
2013-12-20
Requesting removal of CFRG co-chair
http://www.ietf.org/mail-archive/web/cfrg/current/msg03554.html
2013-12-20 22:20:24
attachment
[Cfrg] Requesting removal of CFRG co-chair
2013-12-20 22:20:25
http://www.ietf.org/mail-archive/web/cfrg/current/msg03554.html
text/html
windows-1252
attachment
[Cfrg] Response to the request to remove CFRG co-chair
2014-01-08 22:03:13
http://www.ietf.org/mail-archive/web/cfrg/current/msg03736.html
text/html
windows-1252
webpage
AT&T Update On Government Surveillance Position -- DALLAS, Dec. 20, 2013 /PRNewswire/ --
2013-12-20
http://www.prnewswire.com/news-releases/att-update-on-government-surveillance-position-236750591.html
2013-12-20 22:21:18
attachment
AT&T Update On Government Surveillance Position -- DALLAS, Dec. 20, 2013 /PRNewswire/ --
2013-12-20 22:21:19
http://www.prnewswire.com/news-releases/att-update-on-government-surveillance-position-236750591.html
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Miller
Greg
Nakashima
Ellen
Officials’ defenses of NSA phone program may be unraveling
A court ruling and an expert panel cast doubt on phone effort’s legality and value in deterring terrorism.
2013-12-20
en-US
http://www.washingtonpost.com/world/national-security/officials-defenses-of-nsa-phone-program-may-be-unraveling/2013/12/19/6927d8a2-68d3-11e3-ae56-22de072140a2_story.html?Post+generic=%3Ftid%3Dsm_twitter_washingtonpost
2013-12-20 22:22:38
washingtonpost.com
attachment
Washington Post Snapshot
2013-12-20 22:22:49
http://www.washingtonpost.com/world/national-security/officials-defenses-of-nsa-phone-program-may-be-unraveling/2013/12/19/6927d8a2-68d3-11e3-ae56-22de072140a2_print.html?Post+generic=%3Ftid%3Dsm_twitter_washingtonpost
text/html
utf-8
newspaperArticle
Reuters
San Francisco
Menn
Joseph
Art Coviello
Bruce Schneier
Chung Yin Chan
D. James Bidzos
Edward Snowden
Martin Hellman
Michael Wenocur
United States
Exclusive: Secret contract tied NSA and security industry pioneer
SAN FRANCISCO (Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million
Fri Dec 20 21:20:37 UTC 2013
Exclusive
http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220
2013-12-20 22:22:47
Reuters
attachment
Snapshot
2013-12-20 22:22:47
http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220
text/html
utf-8
webpage
Ars Technica
Goodin
Dan
Critics: NSA agent co-chairing key crypto standards body should be removed
There's an elephant in the room at the Internet Engineering Task Force.
2013-12-20
Critics: NSA agent co-chairing key crypto standards body should be removed
http://arstechnica.com/security/2013/12/critics-nsa-agent-co-chairing-key-crypto-standards-body-should-be-removed/
2013-12-21 02:13:50
attachment
Snapshot
2013-12-21 02:13:50
http://arstechnica.com/security/2013/12/critics-nsa-agent-co-chairing-key-crypto-standards-body-should-be-removed/
text/html
utf-8
email
Green
Lucky
[cryptography] [Cryptography] RSA equivalent key length/strength
Wed Sep 18 17:23:11 EDT 2013
http://lists.randombit.net/pipermail/cryptography/2013-September/005341.html
2013-12-21 02:15:30
attachment
snapshot
2013-12-21 02:15:32
http://lists.randombit.net/pipermail/cryptography/2013-September/005341.html
text/html
windows-1252
newspaperArticle
U.S.
The New York Times
ISSN 0362-4331
Savage
Charlie
Sanger
David E.
California
Classified Information and State Secrets
National Security Agency
Obama, Barack
Surveillance of Citizens by Government
White House Tries to Prevent Judge From Ruling on Surveillance Efforts
The Obama administration moved to prevent a judge from ruling on the constitutionality of warrantless surveillance programs authorized during the Bush administration.
2013-12-21
http://www.nytimes.com/2013/12/22/us/white-house-tries-to-prevent-judge-from-ruling-on-surveillance-efforts.html
2013-12-22 14:32:39
NYTimes.com
attachment
New York Times Snapshot
2013-12-22 14:32:39
http://www.nytimes.com/2013/12/22/us/white-house-tries-to-prevent-judge-from-ruling-on-surveillance-efforts.html?_r=0
text/html
utf-8
webpage
Ars Technica
Johnston
Casey
Data brokers won’t even tell the government how it uses, sells your data
They do disclose consumer types like "credit reliant" and "resilient renter."
2013-12-21
http://arstechnica.com/business/2013/12/data-brokers-wont-even-tell-the-government-how-it-uses-sells-your-data/
2013-12-22 14:33:07
attachment
Snapshot
2013-12-22 14:33:07
http://arstechnica.com/business/2013/12/data-brokers-wont-even-tell-the-government-how-it-uses-sells-your-data/
text/html
utf-8
webpage
DW.DE
Snowden ally Appelbaum claims his Berlin apartment was invaded | News | DW.DE | 21.12.2013
Jacob Appelbaum, a US Internet activist and one of the people with access to Edward Snowden's documents, has told a Berlin paper that his apartment was broken into, saying he suspected US involvement.
2013-12-21
http://www.dw.de/snowden-ally-appelbaum-claims-his-berlin-apartment-was-invaded/a-17315069
2013-12-22 14:34:27
attachment
Snapshot
2013-12-22 14:34:27
http://www.dw.de/snowden-ally-appelbaum-claims-his-berlin-apartment-was-invaded/a-17315069
text/html
utf-8
newspaperArticle
Reuters
Berlin
Angela Merkel
Barack Obama
East Germany
Germany
Hans-Peter Uhl
United States
Germany should ban U.S. contracting companies passing data to NSA: report
BERLIN (Reuters) - U.S. contracting companies such as Cisco, which manages much of the German armed forces' data, should be contractually barred from passing sensitive information to the U.S. security
Sat Dec 21 13:09:30 UTC 2013
Germany should ban U.S. contracting companies passing data to NSA
http://www.reuters.com/article/2013/12/21/us-germany-spying-idUSBRE9BK07P20131221
2013-12-23 20:37:55
Reuters
attachment
Snapshot
2013-12-23 20:37:55
http://www.reuters.com/article/2013/12/21/us-germany-spying-idUSBRE9BK07P20131221
text/html
utf-8
webpage
Sharwood
Simon
F-Secure won't speak at imperialist lackey RSA's conference
Research head Mikko Hypponen picks up his bat and ball and goes home
2013-12-24
http://www.theregister.co.uk/2013/12/24/fsecure_wont_speak_at_imperialist_lackey_rsas_conference/
2013-12-24 15:36:30
attachment
Snapshot
2013-12-24 15:36:30
http://www.theregister.co.uk/2013/12/24/fsecure_wont_speak_at_imperialist_lackey_rsas_conference/
text/html
utf-8
newspaperArticle
Washington Post
Gellman
Barton
Edward Snowden, after months of NSA revelations, says his mission’s accomplished - The
His leaks have fundamentally altered the U.S. government’s relationship with its citizens, the rest of the world.
2013-12-23
http://www.washingtonpost.com//world/national-security/edward-snowden-after-months-of-nsa-revelations-says-his-missions-accomplished/2013/12/23/49fc36de-6c1c-11e3-a523-fe73f0ff6b8d_story.html
2013-12-24 15:38:08
attachment
Snapshot
2013-12-24 15:38:08
http://m.washingtonpost.com/world/national-security/edward-snowden-after-months-of-nsa-revelations-says-his-missions-accomplished/2013/12/23/49fc36de-6c1c-11e3-a523-fe73f0ff6b8d_story.html
text/html
utf-8
webpage
GitHub Gists
0xabad1dea
0xabad1dea/rsa-not-buying-it.md
Sorry, RSA, I'm just not buying it - Gist is a simple way to share snippets of text and code with others.
2013-12-23
https://gist.github.com//0xabad1dea/8101758
2013-12-24 15:38:51
attachment
Snapshot
2013-12-24 15:38:51
https://gist.github.com/0xabad1dea/8101758
text/html
utf-8
webpage
The Atlantic
Sanchez
Julian
The War on Terror's Jedi Mind Trick
National-security officials insist new violations of privacy are essential for keeping Americans safe from terror—but there's no evidence the programs have stopped any attacks.
Dec 23 2013, 4:49 PM ET
http://www.theatlantic.com/politics/archive/2013/12/the-war-on-terrors-jedi-mind-trick/282620/
2013-12-24 15:41:18
attachment
The Atlantic Print View
2013-12-24 15:41:20
http://www.theatlantic.com/politics/print/2013/12/the-war-on-terrors-jedi-mind-trick/282620/
text/html
utf-8
webpage
Kaplan
Rebecca
- cbs news
Former CIA Deputy Director: NSA "is not spying on Americans"
Michael Morell, who sat on the surveillance review group authorized by President Obama, defended the NSA but suggested that phone metadata not be held by them
2013-12-22
Former CIA Deputy Director
http://www.cbsnews.com/news/former-cia-deputy-director-nsa-is-not-spying-on-americans/
2013-12-24 16:00:30
attachment
Snapshot
2013-12-24 16:00:30
http://www.cbsnews.com/news/former-cia-deputy-director-nsa-is-not-spying-on-americans/
text/html
utf-8
webpage
Freedom of the Press Foundation
If Snowden Returned to US For Trial, All Whistleblower Evidence Would Likely Be Inadmissible
There seems to be a new talking point from government officials since a federal judge ruled NSA surveillance is likely unconstitutional last week: if Edward Snowden thinks he's a whistleblower, he should come back and stand trial.
https://pressfreedomfoundation.org/blog/2013/12/if-snowden-returned-us-trial-all-whistleblower-evidence-would-likely-be-inadmissible
2013-12-24 16:02:38
attachment
Snapshot
2013-12-24 16:02:38
https://pressfreedomfoundation.org/blog/2013/12/if-snowden-returned-us-trial-all-whistleblower-evidence-would-likely-be-inadmissible
text/html
utf-8
webpage
MSNBC
Serwer
Adam
How Sotomayor undermined Obama's NSA
If Snowden gave federal courts the means to declare the National Security Agency's data-gathering unconstitutional, Sotomayor showed them how.
2013-12-23
http://www.msnbc.com/msnbc/how-sotomayor-undermined-obamas-nsa
2013-12-24 16:05:36
attachment
Snapshot
2013-12-24 16:05:36
http://www.msnbc.com/msnbc/how-sotomayor-undermined-obamas-nsa
text/html
utf-8
blogPost
Cowley
Matthew
The Wall Street Journal
2013-12-22
http://blogs.wsj.com/washwire/2013/12/22/snowden-criticizes-u-s-panel-overseeing-surveillance/
2013-12-24 16:06:31
attachment
WSJ-Blogs Snapshot
2013-12-24 16:06:36
http://blogs.wsj.com/washwire/2013/12/22/snowden-criticizes-u-s-panel-overseeing-surveillance/
text/html
utf-8
webpage
FAIR Blog
Hart
Peter
David Gregory's NSA Source--His Wife
The NSA's mass surveillance programs are the subject of continued legal and political challenge--but there remain serious problems with how some in the media are covering the issue. Take the Decemb...
2013-12-13
http://www.fair.org/blog/2013/12/23/david-gregorys-nsa-source-his-wife/
2013-12-24 16:07:48
attachment
Snapshot
2013-12-24 16:07:48
http://www.fair.org/blog/2013/12/23/david-gregorys-nsa-source-his-wife/
text/html
utf-8
webpage
022511-motion55.pdf
Government's motion in US v Thomas Drake to exclude mention of published newspaper articles in court.
2011-02-25
http://www.fas.org/sgp/jud/drake/022511-motion55.pdf
2013-12-24 16:09:48
attachment
022511-motion55.pdf
2013-12-24 16:09:48
http://www.fas.org/sgp/jud/drake/022511-motion55.pdf
application/pdf
utf-8
webpage
022511-motion54.pdf
Government's motion in US v Thomas Drake to exclude mention of published newspaper articles in court.
2011-02-25
http://www.fas.org/sgp/jud/drake/022511-motion54.pdf
2013-12-24 16:11:45
attachment
022511-motion54.pdf
2013-12-24 16:11:45
http://www.fas.org/sgp/jud/drake/022511-motion54.pdf
application/pdf
utf-8
newspaperArticle
Politics
The Washington Post
ISSN 0190-8286
Rucker
Philip
Miller
Greg
Obama promises review of NSA spying program, possible reforms
In year-end press conference, president also faces questions on continuing gridlock in Washington.
2013-12-21
en-US
http://www.washingtonpost.com/politics/obama-concludes-tough-year-with-press-conference/2013/12/20/7840204c-6991-11e3-a0b9-249bbb34602c_story.html
2013-12-25 14:29:57
washingtonpost.com
attachment
Washington Post Snapshot
2013-12-25 14:30:00
http://www.washingtonpost.com/politics/obama-concludes-tough-year-with-press-conference/2013/12/20/7840204c-6991-11e3-a0b9-249bbb34602c_print.html
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Greenwald
Glenn
Ackerman
Spencer
Data protection
Fisa court
George Bush
Internet
NSA
Obama administration
Privacy
Surveillance
technology
The NSA files
United States
US national security
World news
NSA collected US email records in bulk for more than two years under Obama
• Secret program launched by Bush continued 'until 2011'• Fisa court renewed collection order every 90 days• Current NSA programs still mine US internet metadata
2013-06-27T11:20EDT
en-GB
http://www.theguardian.com/world/2013/jun/27/nsa-data-mining-authorised-obama
2013-12-25 14:30:35
The Guardian
attachment
Guardian Snapshot
2013-12-25 14:30:39
http://www.theguardian.com/world/2013/jun/27/nsa-data-mining-authorised-obama
text/html
utf-8
newspaperArticle
Opinion
The New York Times
ISSN 0362-4331
The Editorial Board
Classified Information and State Secrets
National Security Agency
Obama, Barack
Snowden, Edward J
Surveillance of Citizens by Government
Mr. Obama’s Disappointing Response
In his news conference, the president, yet again, offers little more than bland reassurances on the government's runaway surveillance policy.
2013-12-20
http://www.nytimes.com/2013/12/21/opinion/mr-obamas-disappointing-response.html
2013-12-25 14:30:50
NYTimes.com
attachment
New York Times Snapshot
2013-12-25 14:30:50
http://www.nytimes.com/2013/12/21/opinion/mr-obamas-disappointing-response.html?hp&rref=opinion
text/html
utf-8
webpage
CNN
Crump
Catherine
The best week for privacy in a long time
Catherine Crump says actions by a judge, an NSA review panel and the president signaled that surveillance programs may be reined in
2013-12-21
http://www.cnn.com/2013/12/21/opinion/crump-privacy-victories/index.html
2013-12-25 14:32:01
attachment
Snapshot
2013-12-25 14:32:01
http://www.cnn.com/2013/12/21/opinion/crump-privacy-victories/index.html?c=&page=2
text/html
utf-8
newspaperArticle
Reuters
San Francisco
Menn
Joseph
Art Coviello
Bruce Schneier
Chung Yin Chan
D. James Bidzos
Edward Snowden
Martin Hellman
Michael Wenocur
United States
Exclusive: Secret contract tied NSA and security industry pioneer
SAN FRANCISCO (Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million
Fri Dec 20 22:07:30 UTC 2013
Exclusive
http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220
2013-12-25 14:33:08
Reuters
attachment
Snapshot
2013-12-25 14:33:08
http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220
text/html
utf-8
blogPost
Greenwald
Glenn
UT Documents: Questions/responses for journalists linking to the Pando post - and other matters
2013-12-01
http://utdocuments.blogspot.com.br/2013/12/questionsresponses-for-journalists.html
2013-12-25 14:35:09
UT Documents
attachment
Snapshot
2013-12-25 14:35:09
http://utdocuments.blogspot.com.br/2013/12/questionsresponses-for-journalists.html
text/html
utf-8
blogPost
BillMoyers.com
Richardson
Reed
What the Press Should Learn From the “Snowden Effect” | Perspectives, What Matters Today
The media has reported on the ever-expanding security apparatus before, but it took Snowden to get America's attention.
2013-12-20
http://billmoyers.com/2013/12/20/what-the-press-should-learn-from-the-%e2%80%9csnowden-effect%e2%80%9d/
2013-12-25 14:35:58
attachment
Snapshot
2013-12-25 14:35:58
http://billmoyers.com/2013/12/20/what-the-press-should-learn-from-the-%E2%80%9Csnowden-effect%E2%80%9D/
text/html
utf-8
newspaperArticle
U.S.
The New York Times
ISSN 0362-4331
Savage
Charlie
Sanger
David E.
California
Classified Information and State Secrets
National Security Agency
Obama, Barack
Surveillance of Citizens by Government
White, Jeffrey S
White House Tries to Prevent Judge From Ruling on Surveillance Efforts
The Obama administration moved to prevent a judge from ruling on the constitutionality of warrantless surveillance programs authorized during the Bush administration.
2013-12-21
http://www.nytimes.com/2013/12/22/us/white-house-tries-to-prevent-judge-from-ruling-on-surveillance-efforts.html
2013-12-25 14:37:59
NYTimes.com
attachment
New York Times Snapshot
2013-12-25 14:37:59
http://www.nytimes.com/2013/12/22/us/white-house-tries-to-prevent-judge-from-ruling-on-surveillance-efforts.html?hp=&_r=1&
text/html
utf-8
blogPost
The New Yorker Blogs
Cassidy
John
NSA Scandal
politics
Inside the White House N.S.A. Report: The Good and the Bad
December 20, 2013
http://www.newyorker.com/online/blogs/johncassidy/2013/12/nsa-report-white-house-the-good-and-the-bad.html
2013-12-25 14:38:26
Inside the White House N.S.A. Report
attachment
The New Yorker
2013-12-25 14:38:28
http://www.newyorker.com/online/blogs/johncassidy/2013/12/nsa-report-white-house-the-good-and-the-bad.html?printable=true
webpage
Miranda
David
Folha de S.Paulo - Internacional - En - World - David Miranda: Open Letter to the Brazilian People - 22/12/2013
2013-12-22
http://www1.folha.uol.com.br/internacional/en/world/2013/12/1389128-david-miranda-open-letter-to-the-brazilian-people.shtml
2013-12-25 14:38:58
attachment
Folha de S.Paulo - Internacional - En - World - David Miranda: Open Letter to the Brazilian People - 22/12/2013
2013-12-25 14:38:59
http://www1.folha.uol.com.br/internacional/en/world/2013/12/1389128-david-miranda-open-letter-to-the-brazilian-people.shtml
text/html
windows-1252
webpage
TheHill
Barron-Lopez
Laura
Rogers says Snowden committed treason
Rogers also defended the NSA's surveillance program, which Snowden helped expose.
Text
2013-12-22T11:15-05:00
http://thehill.com/blogs/hillicon-valley/technology/193832-rep-rogers-says-snowden-committed-treason
2013-12-25 14:39:47
und
attachment
Snapshot
2013-12-25 14:39:47
http://thehill.com/blogs/hillicon-valley/technology/193832-rep-rogers-says-snowden-committed-treason
text/html
utf-8
blogPost
McMurry
Evan
tv
Sen. Manchin on NSA: ‘Big Brother Truly Is Watching You’ | Mediaite
Senator Joe Manchin (D-WV) told CNN's Candy Crowley on Sunday's State of the Union that the National Security Agency's expansive surveillance program was, in fact, Orwellian, as it had been diagnosed last week by federal judge Richard Leon in his decision rendering the agency's massive phone metadata collection unconstitutional.
2013-12-22
http://www.mediaite.com/tv/sen-manchin-to-cnn-on-nsa-big-brother-truly-is-watching-you/
2013-12-25 14:40:10
Sen. Manchin on NSA
attachment
Snapshot
2013-12-25 14:40:10
http://www.mediaite.com/tv/sen-manchin-to-cnn-on-nsa-big-brother-truly-is-watching-you/
text/html
utf-8
webpage
Fantástico
Bridi
Sonia
Fantástico
notícia
notícias
Edward Snowden fala com exclusividade para o
Snowden diz que "nunca vai trocar informações por asilo", mas afirma que, se o governo oferecer, vem morar no Brasil.
"Snowden says 'will never exchange information for asylum,' but says that if the government offers, he will come to live in Brazil."
2013-12-22
http://g1.globo.com/fantastico/noticia/2013/12/edward-snowden-fala-com-exclusividade-para-o-fantastico.html
2013-12-25 14:41:29
Portuguese
attachment
Snapshot
2013-12-25 14:41:29
http://g1.globo.com/fantastico/noticia/2013/12/edward-snowden-fala-com-exclusividade-para-o-fantastico.html
text/html
utf-8
webpage
Heilman
Ethan
backdoors
Hacking
history
Leaks
netsec
A Brief History of NSA Backdoors.
In response to the recent revelations about the NSA backdooring RSA libraries I’ve compiled a brief, incomplete, history of NSA backdoors. Help me make it better by emailing corrections and additions...
2013-12-21
http://ethanheilman.tumblr.com/post/70646748808/a-brief-history-of-nsa-backdoors
2013-12-25 14:43:37
attachment
A Brief History of NSA Backdoors | Hacker News
2013-12-25 14:45:05
https://news.ycombinator.com/item?id=6947133
text/html
utf-8
attachment
Snapshot
2013-12-25 14:43:37
http://ethanheilman.tumblr.com/post/70646748808/a-brief-history-of-nsa-backdoors
text/html
utf-8
webpage
NationalJournal.com
Hirsh
Michael
NSA Panel Member Recommends Increased Data Collection
Former CIA chief says controversial "bulk" collection of data should be expanded to include email, and could prevent the next 9/11.
2013-12-22
http://www.nationaljournal.com/defense/nsa-panel-member-recommends-increased-data-collection-20131222
2013-12-25 14:45:15
attachment
Snapshot
2013-12-25 14:45:15
http://www.nationaljournal.com/defense/nsa-panel-member-recommends-increased-data-collection-20131222
text/html
utf-8
webpage
Jeffers
Cindy
Edward Snowden
Edward Snowden leaks
Government surveillance
journalism
National Security Agency
NSA
NSA Leaks
NSA spying
NSA surveillance
Obama NSA
Privacy
Salon.com
Spying
Surveillance
Edward Snowden’s heroic work: Our media must match his courage
The media must continue to push back in 2014 against the government's violations of privacy and civil liberties
2013-12-23
Edward Snowden’s heroic work
http://www.salon.com/2013/12/23/edward_snowdens_heroic_work_our_media_must_match_his_courage/
2013-12-25 14:45:48
attachment
Snapshot
2013-12-25 14:45:48
http://www.salon.com/2013/12/23/edward_snowdens_heroic_work_our_media_must_match_his_courage/
text/html
utf-8
magazineArticle
The New York Review of Books
ISSN 0028-7504
Marwick
Alice E.
How Your Data Are Being Deeply Mined
January 9, 2014
http://www.nybooks.com/articles/archives/2014/jan/09/how-your-data-are-being-deeply-mined/
2013-12-25 14:47:28
The New York Review of Books
attachment
NYRB Snapshot
2013-12-25 14:47:36
http://www.nybooks.com/articles/archives/2014/jan/09/how-your-data-are-being-deeply-mined/?pagination=false
text/html
utf-8
webpage
The Wire
Bump
Philip
aggregation
Business
entertainment
global
national
news
opinion
politics
technology
The Wire
TheWire.com
Why Does CBS Keep Asking Its Ridiculous Amnesty Question About Snowden?
During an interview with National Security Adviser Susan Rice that aired Sunday, CBS' Lesley Stahl asked Rice if the government was considering offering amnesty to Edward Snowden. Stop asking this.
12/23/2013
http://www.thewire.com/politics/2013/12/why-does-cbs-keep-asking-its-completely-wrong-amnesty-question-about-snowden/356431/
2013-12-25 14:48:56
attachment
Snapshot
2013-12-25 14:48:56
http://www.thewire.com/politics/2013/12/why-does-cbs-keep-asking-its-completely-wrong-amnesty-question-about-snowden/356431/
text/html
utf-8
webpage
Forbes
Hill
Kashmir
Tech
The Biggest Privacy Stories of 2013
Forget "twerking" and "selfies." Dictionary.com dubbed "privacy" the word of the year in 2013.
2013-12-23
http://www.forbes.com/sites/kashmirhill/2013/12/23/the-biggest-privacy-stories-of-2013/
2013-12-25 14:49:32
attachment
Snapshot
2013-12-25 14:49:32
http://www.forbes.com/sites/kashmirhill/2013/12/23/the-biggest-privacy-stories-of-2013/
text/html
utf-8
videoRecording
Snowden
Edward Joseph
Alternative Christmas Message - 4oD
Alternative Christmas Message on 4 on Demand. Watch Alternative Christmas Message online when you want on 4oD. Whistleblower Edward Snowden, who revealed the mass surveillance programmes organised by the US and other governments, gives this year's The Alternative Christmas Message. Six months ago, Snowden, a computer analyst turned whistleblower, brought to global attention top-secret National Security Agency (NSA) documents leading to revelations about widespread United States surveillance on phone and internet communications. Snowden lays out his vision for why privacy matters and why he believes mass indiscriminate surveillance by governments of their people is wrong.
2013-12-25
http://www.channel4.com/programmes/alternative-christmas-message/4od
2013-12-25 15:03:14
www.channel4.com
attachment
A Christmas Message From Edward Snowden - YouTube.webm
video/webm
attachment
Snapshot
2013-12-25 15:03:14
http://www.channel4.com/programmes/alternative-christmas-message/4od
text/html
utf-8
webpage
The Sydney Morning Herald
Gellman
Barton
Mission accomplished, says Edward Snowden
The cascading effects of Edward Snowden's revelations have made themselves felt in Congress, the courts, popular culture, Silicon Valley and world capitals.
2013-12-24
http://www.smh.com.au/world/mission-accomplished-says-edward-snowden-20131224-hv6t0.html
2013-12-25 15:05:42
attachment
Snapshot
2013-12-25 15:05:42
http://www.smh.com.au/world/mission-accomplished-says-edward-snowden-20131224-hv6t0.html
text/html
utf-8
webpage
Reason.com
Healy
Gene
Civil Liberties
HomePage
NSA
Obama administration
politics
Surveillance
Obama's Epic Fib About the NSA
Whether the president likes it or not, the debate is on.
2013-12-24
http://reason.com/archives/2013/12/24/obamas-epic-fibs-about-the-nsa
2013-12-25 15:06:21
attachment
Snapshot
2013-12-25 15:06:21
http://reason.com/archives/2013/12/24/obamas-epic-fibs-about-the-nsa
text/html
utf-8
blogPost
Feldman
Josh
columnists
tv
Greenwald And NYT‘s James Risen Completely Deflate Jeffrey Toobin’s Tortured Logic On NSA, Snowden | Mediaite
Tonight marked the second night in a row that Guardian journalist Glenn Greenwald tussled with CNN legal analyst Jeffrey Toobin over the release of NSA surveillance programs, only this time he was joined by New York Times journalist James Risen (who's currently involved in a leak case of his own). Greenwald and Risen tag-teamed Toobin to rebut some of the most ridiculous claims made to date around the surveillance debate.
2013-07-31
http://www.mediaite.com/tv/greenwald-and-nyts-james-risen-completely-deflate-jeffrey-toobins-tortured-logic-on-nsa-snowden/
2013-12-25 15:07:59
attachment
Snapshot
2013-12-25 15:07:59
http://www.mediaite.com/tv/greenwald-and-nyts-james-risen-completely-deflate-jeffrey-toobins-tortured-logic-on-nsa-snowden/
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Walker
Peter
Channel 4
Data protection
Edward Snowden
espionage
Europe
Media
NSA
Privacy
russia
Surveillance
UK news
United States
US national security
World news
Edward Snowden to broadcast Channel 4's alternative Christmas Day message
NSA whistleblower records message from Russia, filmed by Laura Poitras, warning of the dangers of a loss of privacy
2013-12-24T11:00EST
en-GB
http://www.theguardian.com/world/2013/dec/24/edward-snowden-channel-4-christmas-day-message
2013-12-25 15:09:25
The Guardian
attachment
Guardian Snapshot
2013-12-25 15:09:28
http://www.theguardian.com/world/2013/dec/24/edward-snowden-channel-4-christmas-day-message
text/html
utf-8
webpage
Hypponen
Mikko
An Open Letter to the Chiefs of EMC and RSA - F-Secure Weblog : News from the Lab
2013-12-23
http://www.f-secure.com/weblog/archives/00002651.html
2013-12-25 15:10:41
attachment
An Open Letter to the Chiefs of EMC and RSA - F-Secure Weblog : News from the Lab
2013-12-25 15:10:42
http://www.f-secure.com/weblog/archives/00002651.html
text/html
windows-1252
webpage
National Review Online
Yoo
John
Article
Articles
Breaking News
Columns
Conservatism
Conservative Commentary
Conservative News
Conservative Opinion
GOP
John Yoo
Latest News
National Review
National Review Online
Party
political
politics
Republican
Right Wing
The Flaw in the Fourth Amendment NSA Ruling
WFB
John Yoo - The Flaw in the Fourth Amendment NSA Ruling
In Klayman v. Obama, a federal trial judge in Washington, D.C., declared that the National Security Administration’s bulk collection of phone records violated the Fourth Amendment to the Constitution. The decision will not be easily criticized as the work of an ACLU sympathizer, as was the recent judicial effort to ban NYPD’s stop-and-frisk policy (which was correctly overruled on appeal). The judge here is Richard Leon, an appointee of George W. Bush who has been fairly tough on habeas corpus cases from Guantanamo Bay. I have known Judge Leon for many years, well before he joined the bench, and have long respected his skills as a trial lawyer and congressional investigator.
But I still think that Leon has erred. He is the only trial judge to rule so far against the NSA. His main problem is that there is a Supreme Court precedent on the point, Smith v. Maryland. In Smith, the Court held that the government did not need a warrant to use pen registers, which are used to record dialed phone numbers. Smith held that no search had occurred because there was no constitutional privacy right over phone numbers, because we all provide them to a third-party — the phone company. In general, when we reveal private information to a third party, we lose privacy rights over it.
Judge Leon cannot claim that the reasoning of Smith does not cover the telephone metadata at issue here, because the data collected are exactly the same as the kind held unprotected in Smith. Leon’s decision instead argues that technology has changed so much that Smith is no longer good law. But that is not Judge Leon’s decision to make; that is up to the Supreme Court. Judge Leon concludes that the ability to collect and analyze the data, and the extent of its collection, was unlike anything in existence at the time of Smith. Again, that was not for Judge Leon to decide, but for the Supreme Court.
In fact, I do not think that this is fundamentally the job of judges. It may be time to reconceive the rules of search and seizure in light of new Internet technologies — but that is the responsibility of our elected representatives. Only they can determine what society’s “reasonable expectation of privacy” is in Internet and telephone communications. Judges are the last people to fairly claim they have their fingers on the pulse of the American people. Only our elected representatives can properly balance existing privacy rights (if any), against the need for information to protect the nation from terrorist attack. Judges are far too insulated and lack the expertise to make effective judgments on national-security and foreign affairs. The president and Congress must take up their duty and work out the rules to govern surveillance to protect the nation’s security, and when they don’t, it is left up to the branch least capable of doing so, the judiciary.
Besides, if Judge Leon is right that an increase in the government’s ability to collect and analyze information should suddenly transform non-private data into constitutionally-protected “persons, houses, papers, and effects,” then why don’t the courts protect all kinds of other information? Under his logic, the Fourth Amendment should also protect all credit-card information, financial transactions, travel reservations, public Facebook and LinkedIn posts, and so on — information that we have always allowed law enforcement and national-security agencies to search because we have handed the information over to private third-parties.
2013-12-17
http://www.nationalreview.com/corner/366567/flaw-fourth-amendment-nsa-ruling-john-yoo
2013-12-25 15:12:39
attachment
Snapshot
2013-12-25 15:12:39
http://www.nationalreview.com/corner/366567/flaw-fourth-amendment-nsa-ruling-john-yoo
text/html
utf-8
webpage
Techdirt.
Masnick
Mike
Author Of Torture Memo Says Judges Are Too Out Of Touch To Determine If NSA Violated The 4th Amendment | Techdirt
John Yoo, who famously wrote the legal rationale for allowing the US government to torture people, has already defended the NSA's activities, arguing that it takes too long for the NSA to obey the Constitution, so it shouldn't have to. ...
2013-12-24
http://www.techdirt.com/articles/20131218/17550825612/author-torture-memo-says-judges-are-too-out-touch-to-determine-if-nsa-violated-4th-amendment.shtml
2013-12-25 15:13:09
attachment
Snapshot
2013-12-25 15:13:09
http://www.techdirt.com/articles/20131218/17550825612/author-torture-memo-says-judges-are-too-out-touch-to-determine-if-nsa-violated-4th-amendment.shtml
text/html
windows-1252
magazineArticle
Foreign Policy
Knott
Stephen F.
If George Washington Were Alive, He'd be Reading Your Email
What James Madison (and the rest of the Founding Fathers) would have thought of the NSA and Edward Snowden.
January 29, 2014
http://www.foreignpolicy.com/articles/2014/01/29/if_george_washington_were_alive_he_d_be_reading_your_email_founding_fathers_nsa
2014-01-31 01:38:22
Foreign Policy
attachment
Foreign Policy Snapshot
2014-01-31 01:38:24
http://www.foreignpolicy.com/articles/2014/01/29/if_george_washington_were_alive_he_d_be_reading_your_email_founding_fathers_nsa
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Drake
Thomas
Data protection
Edward Snowden
Law
NSA
Privacy
Surveillance
The NSA files
United States
US Congress
US constitution and civil liberties
US military
US national security
World news
Snowden saw what I saw: surveillance criminally subverting the constitution
So we refused to be part of the NSA's dark blanket. That is why whistleblowers pay the price for being the backstop of democracy
2013-06-12T07:00EDT
en-GB
Snowden saw what I saw
http://www.theguardian.com/commentisfree/2013/jun/12/snowden-surveillance-subverting-constitution
2013-12-30 01:45:50
The Guardian
attachment
Guardian Snapshot
2013-12-30 01:45:55
http://www.theguardian.com/commentisfree/2013/jun/12/snowden-surveillance-subverting-constitution
text/html
utf-8
newspaperArticle
Spiegel Online
Appelbaum
Jacob
Horchert
Judith
Stöcker
Christian
Catalog Reveals NSA Has Back Doors for Numerous Devices
After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices.
29.12.2013
http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html
2013-12-30 01:46:16
Spiegel Online
attachment
Catalog Reveals NSA Has Back Doors for Numerous Devices - SPIEGEL ONLINE
2013-12-30 01:46:18
http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html
text/html
windows-1252
newspaperArticle
Spiegel Online
Staff
SPIEGEL
United Kingdom
United States
The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks
The NSA's TAO hacking unit is considered to be the intelligence agency's top secret weapon. It maintains its own covert network, infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by those it is targeting.
29.12.2013
http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html
2013-12-30 01:46:35
Spiegel Online
attachment
Inside TAO: Targeting Mexico - SPIEGEL ONLINE
2013-12-30 01:46:56
http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-2.html
text/html
windows-1252
attachment
Inside TAO: The NSA's Shadow Network - SPIEGEL ONLINE
2013-12-30 01:47:06
http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html
text/html
windows-1252
attachment
The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks - SPIEGEL ONLINE
2013-12-30 01:46:37
http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html
text/html
windows-1252
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Naughton
John
Edward Snowden
GCHQ
Internet
NSA
Surveillance
technology
UK news
UK security and counter-terrorism
United States
US national security
World news
Here's how data thieves have captured our lives on the internet
It's not just governments. Companies such as Google and Facebook spy on us too. We have clicked through to their 'free' digital services at the cost of sacrificing our privacy. So how do we get out?
2013-12-28
en-GB
http://www.theguardian.com/commentisfree/2013/dec/29/internet-corporate-surveillance
2013-12-30 01:48:03
The Guardian
attachment
Guardian Snapshot
2013-12-30 01:48:07
http://www.theguardian.com/commentisfree/2013/dec/29/internet-corporate-surveillance
text/html
utf-8
webpage
Lennard
Natasha
Editor's Picks
Education
Environment
government
interview
new york times
Noam Chomsky
NSA
Power
Salon.com
Surveillance
technology
Noam Chomsky, the Salon interview: Governments are power systems, trying to sustain power
Exclusive: The polymath looks back with Salon on this year's NSA revelations and ahead to the earth's destruction
2013-12-29
Noam Chomsky, the Salon interview
http://www.salon.com/2013/12/29/chomsky_governments_are_power_systems_trying_to_sustain_power/
2013-12-30 01:49:32
attachment
Snapshot
2013-12-30 01:49:32
http://www.salon.com/2013/12/29/chomsky_governments_are_power_systems_trying_to_sustain_power/
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Linebaugh
Heather
Afghanistan
Drones
Iraq
Pakistan
United States
US military
Yemen
I worked on the US drone program. The public should know what really goes on
Few of the politicians who so brazenly proclaim the benefits of drones have a real clue how it actually works (and doesn't)
2013-12-29T07:30EST
en-GB
http://www.theguardian.com/commentisfree/2013/dec/29/drones-us-military
2013-12-30 01:50:35
The Guardian
attachment
Guardian Snapshot
2013-12-30 01:50:40
http://www.theguardian.com/commentisfree/2013/dec/29/drones-us-military
text/html
utf-8
webpage
Kaplan
Rebecca
- cbs news
Eight months later, Edward Snowden defies labels
As the courts have ruled both ways on Snowden's revelations, his foes and supporters take to "Face the Nation" to make the case for what he means to the U.S.
2013-12-29
http://www.cbsnews.com/news/eight-months-later-edward-snowden-defies-labels/
2013-12-30 01:51:48
attachment
Snapshot
2013-12-30 01:51:48
http://www.cbsnews.com/news/eight-months-later-edward-snowden-defies-labels/
text/html
utf-8
webpage
Sirota
David
ACLU
Barack Obama
Criminal Justice
Editor's Picks
Edward Snowden
FISA
james clapper
Jeff Merkley
NSA
Prism
Richard Nixon
Salon.com
Put the NSA on trial
With potential perjury by top officials, and new questions about spying, let's stop assuming everything is legal
2013-06-11
http://www.salon.com/2013/06/11/put_the_nsa_on_trial/
2013-12-30 01:53:17
attachment
Snapshot
2013-12-30 01:53:17
http://www.salon.com/2013/06/11/put_the_nsa_on_trial/
text/html
utf-8
blogPost
Boing Boing
Sun
Cory Doctorow at 7:53 am
29
Dec
2013
TAO: the NSA's hacker plumber-wunderkinds
A new Snowden leak disclosed in Der Spiegel details the operations of the NSA's Tailored Access Operations group (TAO), the "plumbers" of the spy agency who collect and deploy exploits to infiltrate computer systems.
2013-12-29
http://boingboing.net/2013/12/29/tao-the-nsas-hacker-plumber.html
2013-12-30 01:54:06
TAO
attachment
Snapshot
2013-12-30 01:54:06
http://boingboing.net/2013/12/29/tao-the-nsas-hacker-plumber.html
text/html
utf-8
blogPost
The Heart of the Matter
Eisler
Barry
David Miranda and the Preclusion of Privacy
2013-08-27
http://barryeisler.blogspot.com.br/2013_08_01_archive.html
2013-12-30 01:55:02
attachment
Snapshot
2013-12-30 01:55:02
http://barryeisler.blogspot.com.br/2013_08_01_archive.html
text/html
utf-8
blogPost
Green
Matthew
A Few Thoughts on Cryptographic Engineering: A few more notes on NSA random number generators
2013-12-28
http://blog.cryptographyengineering.com/2013/12/a-few-more-notes-on-nsa-random-number.html
2013-12-30 01:56:55
A Few Thoughts on Cryptographic Engineering
attachment
Snapshot
2013-12-30 01:56:55
http://blog.cryptographyengineering.com/2013/12/a-few-more-notes-on-nsa-random-number.html
text/html
utf-8
newspaperArticle
Opinion
The New York Times
ISSN 0362-4331
The Editorial Board
American Civil Liberties Union
Espionage and Intelligence Services
National Security Agency
Pauley, William H III
Surveillance of Citizens by Government
This Week, Mass Surveillance Wins
Congressional action is urgently needed after a federal court upholds the N.S.A. phone dragnet.
2013-12-27
http://www.nytimes.com/2013/12/28/opinion/this-week-mass-surveillance-wins.html
2013-12-30 01:57:13
NYTimes.com
attachment
New York Times Snapshot
2013-12-30 01:57:13
http://www.nytimes.com/2013/12/28/opinion/this-week-mass-surveillance-wins.html?_r=1&
text/html
utf-8
webpage
POLITICO
Hohmann
James
2014 Elections
James Hohmann
Jeff Merkley
John Walsh
Mark Begich
Mark Udall
Montana
National Security Agency
Surveillance
Eying 2014, Western Dems condemn NSA surveillance
Western Democrats on the ballot in 2014 are strongly condemning the National Security Agency. Montana Lt. Gov. John Walsh, a candidate for Senate who is likely to be appointed when Sen. Max Baucus (D) becomes ambassador to China, is the latest in a long line of Democrats to protest, releasing a statement Friday that blasted a federal judge’s...
2013-12-27
http://www.politico.com/story/2013/12/western-democrats-nsa-surveillance-2014-elections-101579.html
2013-12-30 01:57:58
attachment
Snapshot
2013-12-30 01:57:58
http://www.politico.com/story/2013/12/western-democrats-nsa-surveillance-2014-elections-101579.html?hp=l1
text/html
utf-8
webpage
Freedom of the Press Foundation
Leopold
Jason
NSA Sees "Grave Damage" to National Security If Draft Talking Points on Surveillance Released
The National Security Agency appears to have spent a lot of time trying to agree on a set of talking points agency officials could use to respond to revelations that originated with Edward Snowden about the lawfulness of the agency’s classified surveillance programs.
Indeed, last October, I filed a Freedom of Information Act (FOIA) request seeking all draft talking points—from June 1, 2013 through the present—prepared by the NSA after The Guardian and Washington Post broke news about the agency’s controversial programs.
2014-01-29
https://pressfreedomfoundation.org/blog/2014/01/nsa-sees-grave-damage-national-security-if-draft-talking-points-surveillance-released
2014-01-31 01:38:38
attachment
Snapshot
2014-01-31 01:38:38
https://pressfreedomfoundation.org/blog/2014/01/nsa-sees-grave-damage-national-security-if-draft-talking-points-surveillance-released
text/html
utf-8
webpage
ABC News
Press
LARRY NEUMEISTER Associated
Courts
general news
Government and Politics
Government programs
Government surveillance
Human rights and civil liberties
Judiciary
Law and order
Legal proceedings
local news
National courts
National governments
national news
Political issues
terrorism
us news
War and unrest
NY Judge Cites 9/11 in Ruling NSA Phone Taps Are Legal
The debate over the National Security Agency's collection of millions of Americans' telephone records fell squarely into the courts when a federal judge in Manhattan upheld the legality of the program, citing its need in the fight against terrorism, just days after another federal judge...
2013-12-28
http://abcnews.go.com/US/wireStory/ny-judge-rules-nsa-phone-surveillance-legal-21348222
2013-12-30 02:00:18
attachment
Snapshot
2013-12-30 02:00:18
http://abcnews.go.com/US/wireStory/ny-judge-rules-nsa-phone-surveillance-legal-21348222?singlePage=true
text/html
utf-8
newspaperArticle
Reuters
New York
Stempel
Jonathan
Barack Obama
Edward Snowden
Jim Urquhart
Peter King
Richard Leon
United States
William Pauley
U.S. judge says NSA phone surveillance is lawful
NEW YORK (Reuters) - A federal judge ruled that a National Security Agency program that collects records of millions of Americans' phone calls is lawful, calling it a counter-punch to terrorism that does
Fri Dec 27 19:46:32 UTC 2013
http://www.reuters.com/article/2013/12/27/us-usa-security-aclu-idUSBRE9BQ0DA20131227
2013-12-30 02:00:35
Reuters
attachment
Snapshot
2013-12-30 02:00:35
http://www.reuters.com/article/2013/12/27/us-usa-security-aclu-idUSBRE9BQ0DA20131227
text/html
utf-8
blogPost
Reuters Blogs - Jack Shafer
Shafer
Jack
daniel patrick moynihan
Edward Snowden
Leaks
Daniel Patrick Moynihan’s 1998 lesson on the price of secrets
To read Secrecy now is to despair. As long as threats exist against America and opportunistic legislators hold office, there appears no practical way to roll back the secrecy bureaucracy.
2013-12-27
http://blogs.reuters.com/jackshafer/2013/12/27/daniel-patrick-moynihans-1998-lesson-on-the-price-of-secrets/
2013-12-30 02:01:15
attachment
Snapshot
2013-12-30 02:01:15
http://blogs.reuters.com/jackshafer/2013/12/27/daniel-patrick-moynihans-1998-lesson-on-the-price-of-secrets/
text/html
utf-8
blogPost
PandoDaily
Snowden's biggest revelation: We don't know what power is anymore, nor do we care
It’s been a busy end of 2013 for the Snowden/NSA story: a pair of conflicting judicial rulings on the legality or illegality of the NSA’s phone surveillance program; an Obama-appointed panel recomm...
12/29/2013
http://pando.com/2013/12/29/snowdens-biggest-revelation-we-dont-know-what-power-is-anymore-nor-do-we-care/
2013-12-30 02:05:35
Snowden's biggest revelation
attachment
Snapshot
2013-12-30 02:05:35
http://pando.com/2013/12/29/snowdens-biggest-revelation-we-dont-know-what-power-is-anymore-nor-do-we-care/
text/html
utf-8
webpage
GitHub
greenwald-30c3-keynote
greenwald-30c3-keynote - Glenn Greenwald's keynote at 30C3 (the 30th edition of the Chaos Communications Congress).
https://github.com/poppingtonic/greenwald-30c3-keynote
2013-12-31 22:40:19
attachment
Snapshot
2013-12-31 22:40:19
https://github.com/poppingtonic/greenwald-30c3-keynote/
text/html
utf-8
webpage
Threat Level
Borland
John
NSA
Glenn Greenwald: 'A Lot' More NSA Documents to Come | Threat Level | Wired.com
Nearly seven months after journalist and privacy activist Glenn Greenwald publicized Edward Snowden's first revelations of the vast scope of the NSA's digital surveillance, his life has changed absolutely. Living in Brazil, he is advised not to travel. He's a hero to privacy activists, and demonized by governments and national security agencies. And in a video keynote address to the Chaos Communication Congress (CCC) in Hamburg today, he promised that he and Edward Snowden aren't anywhere near finished. "There are a lot more stories to come, a lot more documents that will be covered," Greenwald said. "It's important that we understand what it is we're publishing, so what we say about them is accurate."
2013-12-27
Glenn Greenwald
http://www.wired.com/threatlevel/2013/12/greenwald-lot-nsa-documents-come/
2013-12-31 22:40:25
attachment
Snapshot
2013-12-31 22:40:25
http://www.wired.com/threatlevel/2013/12/greenwald-lot-nsa-documents-come/
text/html
utf-8
webpage
CNET
Moyer
Edward
NSA
NSA Scandal
Surveillance
Surveilling the new year: The NSA story moves into 2014
The end of 2013 saw a rush of big NSA news, from a judge calling an agency program 'almost Orwellian' to a bevy of tech stars talking reform at the White House. What lies ahead? Read this article by Edward Moyer on CNET News.
2013-12-30
Surveilling the new year
http://news.cnet.com/8301-13578_3-57616144-38/surveilling-the-new-year-the-nsa-story-moves-into-2014/
2013-12-31 22:41:04
attachment
Snapshot
2013-12-31 22:41:04
http://news.cnet.com/8301-13578_3-57616144-38/surveilling-the-new-year-the-nsa-story-moves-into-2014/
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Jarvis
Jeff
NSA
The NSA files
United States
US constitution and civil liberties
US politics
World news
The primary NSA issue isn't privacy, it's authority
At heart, the NSA debate is about what the government is allowed to do with what it knows and who is overseeing it
2013-12-30T10:08EST
en-GB
http://www.theguardian.com/commentisfree/2013/dec/30/nsa-surveillance-debate-how-government-uses-data
2013-12-31 22:41:22
The Guardian
attachment
Guardian Snapshot
2013-12-31 22:41:26
http://www.theguardian.com/commentisfree/2013/dec/30/nsa-surveillance-debate-how-government-uses-data
text/html
utf-8
webpage
CNN
Bergen
Peter
Would NSA surveillance have stopped 9/11 plot?
Peter Bergen says the failure to stop 9/11 wasn't due to a lack of intelligence data but to a policy failure by the Bush administration
2013-12-30
http://www.cnn.com/2013/12/30/opinion/bergen-nsa-surveillance-september-11/index.html
2013-12-31 22:41:50
attachment
Snapshot
2013-12-31 22:41:50
http://us.cnn.com/2013/12/30/opinion/bergen-nsa-surveillance-september-11/index.html
text/html
utf-8
interview
Wizner
Ben
Gregory
David
UT Documents: ACLU's Ben Wizner on Meet the Press
2013-12-30
TV
en-US
UT Documents
http://utdocuments.blogspot.com.br/2013/12/aclus-ben-wizner-on-meet-press.html
2013-12-31 22:43:06
attachment
Snapshot
2013-12-31 22:43:06
http://utdocuments.blogspot.com.br/2013/12/aclus-ben-wizner-on-meet-press.html
text/html
utf-8
blogPost
LeakSource
NSA's ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware
12/29/2013 SPIEGEL: After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for num...
http://leaksource.wordpress.com/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-firmware/
2013-12-31 22:43:14
attachment
Snapshot
2013-12-31 22:43:14
http://leaksource.wordpress.com/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-firmware/
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Pincus
Walter
Good or not, change is coming to the NSA
NSA may be collecting fewer dots, and fewer people will have access — so connections may be missed.
2013-12-30
en-US
http://www.washingtonpost.com/world/national-security/good-or-not-change-is-coming-to-the-nsa/2013/12/30/54f2f570-7192-11e3-8b3f-b1666705ca3b_story.html
2013-12-31 22:43:42
washingtonpost.com
attachment
Washington Post Snapshot
2013-12-31 22:43:45
http://www.washingtonpost.com/world/national-security/good-or-not-change-is-coming-to-the-nsa/2013/12/30/54f2f570-7192-11e3-8b3f-b1666705ca3b_print.html
text/html
utf-8
webpage
Ex-NSA chief calls for Obama to reject recommendations
Retired general Michael Hayden, former director of the NSA and the CIA, called on President Obama to show
http://www.usatoday.com/story/news/politics/2013/12/30/gen-michael-hayden-urges-obama-reject-nsa-commission-recommendations/4249983/
2013-12-31 22:44:04
attachment
Snapshot
2013-12-31 22:44:04
http://www.usatoday.com/story/news/politics/2013/12/30/gen-michael-hayden-urges-obama-reject-nsa-commission-recommendations/4249983/
text/html
utf-8
webpage
The Daily Beast
Klaidman
Daniel
Barack Obama
Google
National Security Agency
U.S. News
Yahoo
Obama’s Defining Fight: How He Will Take On the NSA’s Surveillance State in 2014
Before he left for Hawaii, the president was sending signals that government surveillance programs need an overhaul to restore the public’s faith on issues of national security.
12.31.13
Obama’s Defining Fight
http://www.thedailybeast.com/articles/2013/12/31/obama-s-defining-fight-how-he-will-take-on-the-nsa-s-surveillance-state-in-2014.html
2013-12-31 22:44:33
attachment
Daily Beast Snapshot
2013-12-31 22:44:41
http://www.thedailybeast.com/articles/2013/12/31/obama-s-defining-fight-how-he-will-take-on-the-nsa-s-surveillance-state-in-2014.print.html
text/html
utf-8
webpage
Orange to sue NSA over underwater cable hacking - Computer Business Review
2013-12-31
http://www.cbronline.com/news/orange-to-charge-nsa-for-using-cable-in-surveillance-project-311213-4153796
2013-12-31 22:44:52
attachment
Orange to sue NSA over underwater cable hacking - Computer Business Review
2013-12-31 22:44:53
http://www.cbronline.com/news/orange-to-charge-nsa-for-using-cable-in-surveillance-project-311213-4153796
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Timm
Trevor
Barack Obama
Edward Snowden
NSA
The NSA files
United States
World news
President Obama claims the NSA has never abused its authority. That's false
The facts that we know so far – from Fisa court documents to LOVEINT – show that the NSA has overstepped its powers
2013-12-31T10:40EST
en-GB
http://www.theguardian.com/commentisfree/2013/dec/31/nsa-powers-have-been-abused
2013-12-31 22:45:17
The Guardian
attachment
Guardian Snapshot
2013-12-31 22:45:21
http://www.theguardian.com/commentisfree/2013/dec/31/nsa-powers-have-been-abused
text/html
utf-8
webpage
Sullivan
Margaret
new york times
Accuracy, Secrecy and Equality: What Mattered to Times Readers in 2013
The public editor looks back at some of issues of the past year.
2013-12-31
Accuracy, Secrecy and Equality
http://publiceditor.blogs.nytimes.com/2013/12/31/accuracy-secrecy-and-equality-what-mattered-to-times-readers-in-2013/
2013-12-31 22:46:02
attachment
Snapshot
2013-12-31 22:46:02
http://publiceditor.blogs.nytimes.com/2013/12/31/accuracy-secrecy-and-equality-what-mattered-to-times-readers-in-2013/?smid=tw-share
text/html
utf-8
blogPost
Foreign Policy Blogs
Harris
Shane
Transvestites, ‘Erotic Massages,’ and Metadata: DEA’s Colombia Scandal Deepens
December 31, 2013 - 02:21 Pm
http://complex.foreignpolicy.com/posts/2013/12/31/transvestites_erotic_massages_and_metadata_dea_s_colombia_scandal_deepens
2013-12-31 22:46:40
Transvestites, ‘Erotic Massages,’ and Metadata
attachment
Foreign Policy Snapshot
2013-12-31 22:46:51
http://complex.foreignpolicy.com/posts/2013/12/31/transvestites_erotic_massages_and_metadata_dea_s_colombia_scandal_deepens
text/html
utf-8
webpage
The Atlantic
Friedersdorf
Conor
analysis
Atlantic
Breaking News
Business
commentary
culture
International
national and life
news
opinion
politics
science
technology
The Atlantic
TheAtlantic.com
The Atlantic Magazine
A Dare for NSA Staffers: Do the Quarter-Snowden With a Twist
How to register alarm without revealing secrets or risking jail
12/31/2013
A Dare for NSA Staffers
http://www.theatlantic.com/politics/archive/2013/12/a-dare-for-nsa-staffers-do-the-quarter-snowden-with-a-twist/282732/
2013-12-31 22:47:02
attachment
Snapshot
2013-12-31 22:47:02
http://m.theatlantic.com/politics/archive/2013/12/a-dare-for-nsa-staffers-do-the-quarter-snowden-with-a-twist/282732/
text/html
utf-8
webpage
Bits Blog
Perlroth, Nicole
American Civil Liberties Union
Apple Inc
Computer Security
Cyberattacks and Hackers
Der Spiegel
Espionage and Intelligence Services
Freedom of Speech and Expression
iPhone
National Security Agency
Recording Equipment
software
Text Messaging
Apple Says It Is 'Unaware' of N.S.A. iPhone Hack Program
In an unusually strong worded statement, Apple said it was unaware of N.S.A. efforts to hack into the iPhone and would continue to use its resources to defend customers from security attacks “regardless of who’s behind them.”
2013-12-31
http://bits.blogs.nytimes.com/2013/12/31/apple-says-it-is-unaware-of-n-s-a-iphone-hack-program/
2013-12-31 22:47:16
attachment
Snapshot
2013-12-31 22:47:16
http://bits.blogs.nytimes.com/2013/12/31/apple-says-it-is-unaware-of-n-s-a-iphone-hack-program/?_r=0
text/html
utf-8
blogPost
Press Think
Rosen
Jay
Three things I learned from the Snowden files » Pressthink
2013-12-29
http://pressthink.org/2013/12/three-things-i-learned-from-the-snowden-files/
2013-12-31 22:47:21
attachment
Snapshot
2013-12-31 22:47:21
http://pressthink.org/2013/12/three-things-i-learned-from-the-snowden-files/
text/html
utf-8
newspaperArticle
Opinion
The New York Times
ISSN 0362-4331
The Editorial Board
Classified Information and State Secrets
Computer Security
Constitution (US)
Editorials
Foreign Intelligence Surveillance Court
National Security Agency
Snowden, Edward J
Surveillance of Citizens by Government
United States
Whistle-Blowers
Edward Snowden, Whistle-Blower
Considering the value of his leaks and the N.S.A. abuses he has exposed, Mr. Snowden should be offered clemency or a plea bargain.
2014-01-01
http://www.nytimes.com/2014/01/02/opinion/edward-snowden-whistle-blower.html
2014-01-02 17:43:07
NYTimes.com
attachment
New York Times Snapshot
2014-01-02 17:43:07
http://www.nytimes.com/2014/01/02/opinion/edward-snowden-whistle-blower.html
text/html
utf-8
newspaperArticle
Opinions
The Washington Post
ISSN 0190-8286
Marcus
Ruth
Edward Snowden, the insufferable whistleblower
George Orwell could teach Edward Snowden a thing or two.
2014-01-02
en-US
http://www.washingtonpost.com/opinions/ruth-marcus-snowden-the-insufferable-whistleblower/2013/12/31/7649539a-7250-11e3-8b3f-b1666705ca3b_allComments.html?ctab=all_&
2014-01-02 18:52:03
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-02 18:52:05
http://www.washingtonpost.com/opinions/ruth-marcus-snowden-the-insufferable-whistleblower/2013/12/31/7649539a-7250-11e3-8b3f-b1666705ca3b_allComments.html?ctab=all_&
text/html
utf-8
blogPost
Washington Post
Peterson
Andrea
Here’s what we learned about the NSA’s spying programs in 2013
We learned a lot about the NSA this year. Next year, we need to decide what to do about it.
2013-12-31
http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/31/heres-what-we-learned-about-the-nsas-spying-programs-in-2013/
2014-01-02 18:53:56
attachment
Snapshot
2014-01-02 18:53:56
http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/31/heres-what-we-learned-about-the-nsas-spying-programs-in-2013/
text/html
utf-8
webpage
The Daily Dot
Hathaway
Jay
apple
dropoutjeep
hot mic
iPhone
jacob appelbaum
NSA
Spying
The NSA has nearly complete backdoor access to Apple's iPhone
SMS messages, location, camera, hot mic. The NSA can see it all.
2013-12-30
http://www.dailydot.com/politics/nsa-backdoor-iphone-access-camera-mic-appelbaum/
2014-01-02 18:54:41
attachment
Snapshot
2014-01-02 18:54:41
http://www.dailydot.com/politics/nsa-backdoor-iphone-access-camera-mic-appelbaum/
text/html
utf-8
blogPost
AllThingsD
Hesseldahl
Arik
apple
atd facebook
enterprise
general
ios
iPhone
Mobile
National Security Agency
news
NSA
Security
Surveillance
Apple Denies Working with NSA on iPhone Backdoor
The company says it will try to defend against attacks on its products by anyone.
2013-12-31
http://allthingsd.com/20131231/apple-says-it-is-unaware-of-nsas-iphone-backdoor/
2014-01-02 18:54:46
attachment
Snapshot
2014-01-02 18:54:46
http://allthingsd.com/20131231/apple-says-it-is-unaware-of-nsas-iphone-backdoor/
text/html
utf-8
blogPost
AllThingsD
Voices
Michael Dearing in
featured post
general
harrison metal
Media
michael dearing
National Security Agency
news
NSA
rsa
Security
silicon valley
social
Surveillance
Trust
voices
The NSA and the Corrosion of Silicon Valley
The dolphin in the tuna net is us -- our industry, our work, and the social fabric of our community.
2013-12-30
http://allthingsd.com/20131230/the-nsa-and-silicon-valley/
2014-01-02 18:55:55
attachment
Snapshot
2014-01-02 18:55:55
http://allthingsd.com/20131230/the-nsa-and-silicon-valley/
text/html
utf-8
webpage
Techdirt.
NSA Admits Lots Of People Could Have Done What Snowden Did | Techdirt
The NSA keeps changing its story about Snowden. Was he brilliant or a nobody? Did he have access to all these documents or did he have to hack into systems? Did he get the important stuff or not? Each time the story seems to be different. A few...
http://www.techdirt.com/articles/20131217/16522125593/nsa-admits-lots-people-could-have-done-what-snowden-did.shtml
2014-01-02 19:04:40
attachment
Snapshot
2014-01-02 19:04:40
http://www.techdirt.com/articles/20131217/16522125593/nsa-admits-lots-people-could-have-done-what-snowden-did.shtml
text/html
windows-1252
webpage
Threat Level
Kravets
David
border searches
First Amendment
Fourth Amendment
Court Upholds Willy-Nilly Gadget Searches Along U.S. Border | Threat Level | Wired.com
A federal judge today upheld a President Barack Obama administration policy allowing U.S. officials along the U.S. border to seize and search laptops, smartphones and other electronic devices for any reason.
2013-12-31
http://www.wired.com/threatlevel/2013/12/gadget-border-searches-2/
2014-01-02 19:04:45
attachment
Snapshot
2014-01-02 19:04:45
http://www.wired.com/threatlevel/2013/12/gadget-border-searches-2/
text/html
utf-8
newspaperArticle
Technology
The Guardian
ISSN 0261-3077
Hern
Alex
Data and computer security
Edward Snowden
Email
Ladar Levison
NSA
Privacy
Email is broken - but Dark Mail Alliance is aiming to fix it
Edward Snowden's email provider is teaming up with secure communications firm Silent Circle to try and fix email for good
2013-12-31T11:56EST
en-GB
http://www.theguardian.com/technology/2013/dec/31/email-broken-dark-mail-alliance-fix-silent-sircle-snowden
2014-01-02 19:44:16
The Guardian
attachment
Guardian Snapshot
2014-01-02 19:44:19
http://www.theguardian.com/technology/2013/dec/31/email-broken-dark-mail-alliance-fix-silent-sircle-snowden
text/html
utf-8
magazineArticle
Foreign Policy
Walton
Calder
How Zionist Extremism Became British Spies’ Biggest Enemy
In World War II's aftermath, MI5 turned to fight
a new threat. It wasn't the Soviets. It was bombers from Jerusalem.
January 2, 2014
http://www.foreignpolicy.com/articles/2014/01/01/how_zionist_extremists_helped_create_britain_s_surveillance_state#sthash.AT42iEqf.dpuf
2014-01-02 19:48:36
Foreign Policy
attachment
Foreign Policy Snapshot
2014-01-02 19:48:40
http://www.foreignpolicy.com/articles/2014/01/01/how_zionist_extremists_helped_create_britain_s_surveillance_state#sthash.AT42iEqf.dpuf
text/html
utf-8
newspaperArticle
Media
The Guardian
ISSN 0261-3077
Weaver
Matthew
BBC
Data protection
Julian Assange
Media
NSA
PJ Harvey
Radio 4
Surveillance
The NSA files
UK news
wikileaks
Julian Assange rails against surveillance on Today programme
BBC Radio 4 show hears WikiLeaks founder's alternative Thought for the Day, with musician PJ Harvey as guest editor
2014-01-02T05:44EST
en-GB
http://www.theguardian.com/media/2014/jan/02/julian-assange-surveillance-thought-for-the-day-wkileaks-pj-harvey
2014-01-02 19:48:58
The Guardian
attachment
Guardian Snapshot
2014-01-02 19:49:01
http://www.theguardian.com/media/2014/jan/02/julian-assange-surveillance-thought-for-the-day-wkileaks-pj-harvey
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Editorial
Edward Snowden
Snowden affair: the case for a pardon
Snowden gave classified information to journalists, even though he knew the likely consequences. That was an act of courage
2014-01-01T18:16EST
en-GB
Snowden affair
http://www.theguardian.com/world/2014/jan/01/snowden-affair-case-for-pardon-editorial
2014-01-02 19:49:25
The Guardian
attachment
Guardian Snapshot
2014-01-02 19:49:27
http://www.theguardian.com/world/2014/jan/01/snowden-affair-case-for-pardon-editorial
text/html
utf-8
webpage
Computerworld
Schuman
Evan
Android
BYOD
Edward Snowden
Evan Schuman TOC
Google
Government/Industries
Lavabit
Management
Privacy
privacy policy
subpoena
2014: Time to rethink privacy
Companies have to fully confront the privacy issues they face and rethink their policies from the bottom up.
2013-12-31T06:37-05:00
2014
http://www.computerworld.com/s/article/9245088/2014_Time_to_rethink_privacy?pageNumber=1
2014-01-02 19:51:30
attachment
2014: Time to rethink privacy - Computerworld
2014-01-02 19:51:55
http://www.computerworld.com/s/article/9245088/2014_Time_to_rethink_privacy?taxonomyId=84&pageNumber=2
text/html
utf-8
attachment
2014: Time to rethink privacy - Computerworld
2014-01-02 19:52:01
http://www.computerworld.com/s/article/9245088/2014_Time_to_rethink_privacy?taxonomyId=84&pageNumber=3
text/html
utf-8
attachment
2014: Time to rethink privacy - Computerworld
2014-01-02 19:52:10
http://www.computerworld.com/s/article/9245088/2014_Time_to_rethink_privacy?taxonomyId=84&pageNumber=4
text/html
utf-8
attachment
Snapshot
2014-01-02 19:51:30
http://www.computerworld.com/s/article/9245088/2014_Time_to_rethink_privacy
text/html
utf-8
newspaperArticle
Reuters
Washington
Spetalnick
Matt
Holland
Steve
Barack Obama
United States
Yuri Gripas
Obama to press China's Xi to act against cyber spying
WASHINGTON (Reuters) - President Barack Obama will tell Chinese President Xi Jinping at a California summit this week that Washington considers Beijing responsible for any cyber attacks launched from Chinese
Tue Jun 04 23:51:35 UTC 2013
http://www.reuters.com/article/2013/06/04/us-usa-china-idUSBRE9531E220130604
2014-01-02 19:52:48
Reuters
attachment
Snapshot
2014-01-02 19:52:48
http://www.reuters.com/article/2013/06/04/us-usa-china-idUSBRE9531E220130604
text/html
utf-8
webpage
TheHill
Balluck
Kyle
Former Obama official agrees with call for Snowden clemency
Anne-Marie Slaughter oversaw the Policy Planning Staff in Obama's State Department.
Text
2014-01-02T10:18-05:00
http://thehill.com/blogs/blog-briefing-room/news/194249-former-obama-official-agrees-with-call-for-snowden-clemency
2014-01-02 19:57:25
und
attachment
Snapshot
2014-01-02 19:57:25
http://thehill.com/blogs/blog-briefing-room/news/194249-former-obama-official-agrees-with-call-for-snowden-clemency
text/html
utf-8
blogPost
Rants.org
Fogel
Karl
rants.org » Blog Archive » Support Snowden all the way, New York Times.
2014-01-02
http://www.rants.org/2014/01/02/support_snowden_all_the_way_nyt/
2014-01-02 20:24:41
attachment
Snapshot
2014-01-02 20:24:41
http://www.rants.org/2014/01/02/support_snowden_all_the_way_nyt/
text/html
utf-8
newspaperArticle
The Washington Post
ISSN 0190-8286
Rich
Steven
Gellman
Barton
NSA seeks to build quantum computer that could crack most types of encryption
2014-01-02
http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_print.html
2014-01-02 23:30:26
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-02 23:30:28
http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_print.html
text/html
utf-8
webpage
Mother Jones
If you think the NSA debate has been valuable, you have Edward Snowden to thank
Without him, it wouldn't have happened. Period.
http://www.motherjones.com/kevin-drum/2014/01/if-you-think-nsa-debate-has-been-valuable-you-have-edward-snowden-thank
2014-01-02 23:32:15
attachment
Snapshot
2014-01-02 23:32:15
http://www.motherjones.com/kevin-drum/2014/01/if-you-think-nsa-debate-has-been-valuable-you-have-edward-snowden-thank
text/html
utf-8
webpage
Academics Against Mass Surveillance
2014-01-03
http://academicsagainstsurveillance.net/
2014-01-03 15:25:53
attachment
Academics Against Mass Surveillance
2014-01-03 15:25:54
http://academicsagainstsurveillance.net/
text/html
windows-1252
blogPost
Keys
Matthew
American companies respond to new NSA hacking claims | The Desk
2014-01-02
http://thedesk.matthewkeys.net/2014/01/01/american-companies-respond-to-new-nsa-hacking-claims/
2014-01-03 15:26:54
attachment
Snapshot
2014-01-03 15:26:54
http://thedesk.matthewkeys.net/2014/01/01/american-companies-respond-to-new-nsa-hacking-claims/
text/html
utf-8
webpage
Foreign Policy
Rovner
Joshua
Long
Austin
Why the Obama administration should ignore recommendations from the panel it established to review NSA surveillance.
2014-01-02
Reckless Reforms
http://www.foreignpolicy.com/articles/2014/01/02/reckless_reforms_nsa
2014-01-03 15:28:41
attachment
Reckless Reforms
2014-01-03 15:28:42
http://www.foreignpolicy.com/articles/2014/01/02/reckless_reforms_nsa
text/html
utf-8
email
Appelbaum
Jacob
[liberationtech] Recent Der Spiegel coverage about the NSA and GCHQ
Thu Jan 2 16:37:45 PST 2014
https://mailman.stanford.edu/pipermail/liberationtech/2014-January/012498.html
2014-01-03 15:37:04
attachment
Catalog Reveals NSA Has Back Doors for Numerous Devices - SPIEGEL ONLINE
2014-01-03 15:40:29
http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html
text/html
windows-1252
attachment
DER SPIEGEL
2014-01-03 15:40:59
https://magazin.spiegel.de/digital/index_SP.html#SP/2014/1/124188114
text/html
utf-8
attachment
Inside TAO: Targeting Mexico - SPIEGEL ONLINE
2014-01-03 15:40:10
http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-2.html
text/html
windows-1252
attachment
Inside TAO: The NSA's Shadow Network - SPIEGEL ONLINE
2014-01-03 15:40:15
http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html
text/html
windows-1252
attachment
Interactive Graphic: The NSA's Spy Catalog - SPIEGEL ONLINE
2014-01-03 15:40:36
http://www.spiegel.de/international/world/a-941262.html
text/html
windows-1252
attachment
Interaktive Grafik: Hier sitzen die Späh-Werkzeuge der NSA - SPIEGEL ONLINE
2014-01-03 15:42:22
http://www.spiegel.de/netzwelt/netzpolitik/interaktive-grafik-hier-sitzen-die-spaeh-werkzeuge-der-nsa-a-941030.html
text/html
windows-1252
attachment
Neue Dokumente: Der geheime Werkzeugkasten der NSA - SPIEGEL ONLINE
2014-01-03 15:40:42
http://www.spiegel.de/netzwelt/netzpolitik/neue-dokumente-der-geheime-werkzeugkasten-der-nsa-a-941153.html
text/html
windows-1252
attachment
NSA-Dokumente: So knackt der Geheimdienst Internetkonten - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:41:22
http://www.spiegel.de/fotostrecke/nsa-dokumente-so-knackt-der-geheimdienst-internetkonten-fotostrecke-105326.html
text/html
windows-1252
attachment
NSA-Dokumente: So knackt der Geheimdienst Internetkonten - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:42:28
http://www.spiegel.de/fotostrecke/nsa-dokumente-so-knackt-der-geheimdienst-internetkonten-fotostrecke-105326-2.html
text/html
windows-1252
attachment
NSA-Dokumente: So knackt der Geheimdienst Internetkonten - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:42:33
http://www.spiegel.de/fotostrecke/nsa-dokumente-so-knackt-der-geheimdienst-internetkonten-fotostrecke-105326-11.html
text/html
windows-1252
attachment
NSA-Dokumente: So knackt der Geheimdienst Internetkonten - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:42:37
http://www.spiegel.de/fotostrecke/nsa-dokumente-so-knackt-der-geheimdienst-internetkonten-fotostrecke-105326-12.html
text/html
windows-1252
attachment
NSA-Dokumente: So knackt der Geheimdienst Internetkonten - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:42:42
http://www.spiegel.de/fotostrecke/nsa-dokumente-so-knackt-der-geheimdienst-internetkonten-fotostrecke-105326-13.html
text/html
windows-1252
attachment
NSA-Dokumente: So knackt der Geheimdienst Internetkonten - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:42:58
http://www.spiegel.de/fotostrecke/nsa-dokumente-so-knackt-der-geheimdienst-internetkonten-fotostrecke-105326-13.html
text/html
windows-1252
attachment
NSA-Dokumente: So übernimmt der Geheimdienst fremde Rechner - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:41:29
http://www.spiegel.de/fotostrecke/nsa-dokumente-so-uebernimmt-der-geheimdienst-fremde-rechner-fotostrecke-105329.html
text/html
windows-1252
attachment
NSA-Dokumente: So übernimmt der Geheimdienst fremde Rechner - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:41:35
http://www.spiegel.de/fotostrecke/nsa-dokumente-so-uebernimmt-der-geheimdienst-fremde-rechner-fotostrecke-105329-5.html
text/html
windows-1252
attachment
NSA-Dokumente: So übernimmt der Geheimdienst fremde Rechner - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:41:41
http://www.spiegel.de/fotostrecke/nsa-dokumente-so-uebernimmt-der-geheimdienst-fremde-rechner-fotostrecke-105329-24.html
text/html
windows-1252
attachment
NSA-Dokumente: So übernimmt der Geheimdienst fremde Rechner - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:41:51
http://www.spiegel.de/fotostrecke/nsa-dokumente-so-uebernimmt-der-geheimdienst-fremde-rechner-fotostrecke-105329-3.html
text/html
windows-1252
attachment
NSA-Dokumente: So übernimmt der Geheimdienst fremde Rechner - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:42:02
http://www.spiegel.de/fotostrecke/nsa-dokumente-so-uebernimmt-der-geheimdienst-fremde-rechner-fotostrecke-105329-15.html
text/html
windows-1252
attachment
NSA-Dokumente: So übernimmt der Geheimdienst fremde Rechner - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:42:08
http://www.spiegel.de/fotostrecke/nsa-dokumente-so-uebernimmt-der-geheimdienst-fremde-rechner-fotostrecke-105329-21.html
text/html
windows-1252
attachment
NSA-Dokumente: So übernimmt der Geheimdienst fremde Rechner - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:42:53
http://www.spiegel.de/fotostrecke/nsa-dokumente-so-uebernimmt-der-geheimdienst-fremde-rechner-fotostrecke-105329-24.html
text/html
windows-1252
attachment
NSA Secret Toolbox: ANT Unit Offers Spy Gadgets for Every Need - SPIEGEL ONLINE
2014-01-03 15:40:22
http://www.spiegel.de/international/world/nsa-secret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html
text/html
windows-1252
attachment
QFIRE - die "Vorwärtsverteidigng" der NSA - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:41:46
http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358-15.html
text/html
windows-1252
attachment
QFIRE - die "Vorwärtsverteidigng" der NSA - SPIEGEL ONLINE - Netzwelt
2014-01-03 15:41:58
http://www.spiegel.de/fotostrecke/qfire-die-vorwaertsverteidigng-der-nsa-fotostrecke-105358.html
text/html
windows-1252
attachment
Quantumtheory: Wie die NSA weltweit Rechner hackt - SPIEGEL ONLINE
2014-01-03 15:40:50
http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html
text/html
windows-1252
attachment
Quantumtheory: Wie die NSA weltweit Rechner hackt - SPIEGEL ONLINE
2014-01-03 15:42:47
http://www.spiegel.de/netzwelt/netzpolitik/quantumtheory-wie-die-nsa-weltweit-rechner-hackt-a-941149.html
text/html
windows-1252
attachment
snapshot
2014-01-03 15:37:06
https://mailman.stanford.edu/pipermail/liberationtech/2014-January/012498.html
text/html
windows-1252
attachment
The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks - SPIEGEL ONLINE
2014-01-03 15:40:03
http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html
text/html
windows-1252
webpage
Forbes
Magee
Tamlin
Cambridge University
Cloud Computing
Data Driven
Edward Snowden
GCHQ
MI5
NSA
On Demand
Ross J Anderson
secret services
Security
social media
Tech
Tempora
Cambridge's Head of Cryptography: I Would Abolish MI5
Privacy campaigner and Cambridge University's Head of Cryptography, Professor Ross J Anderson, has suggested one way to begin stamping out the British state's unaccountable involvement in the NSA spying scandal - to end the domestic secret services entirely.
2014-01-03
Cambridge's Head of Cryptography
http://www.forbes.com/sites/tamlinmagee/2014/01/03/cambridges-head-of-cryptography-i-would-abolish-mi5/
2014-01-03 20:00:27
attachment
Snapshot
2014-01-03 20:00:27
http://www.forbes.com/sites/tamlinmagee/2014/01/03/cambridges-head-of-cryptography-i-would-abolish-mi5/
text/html
utf-8
webpage
The Daily Beast
Chang
Gordon G.
china
Edward Snowden
World news
Snowden Lied About China Contacts
Snowden lied about his contacts with China. Should he get clemency?
01.03.14
http://www.thedailybeast.com/articles/2014/01/03/snowden-lied-about-china-contacts.html
2014-01-03 20:01:16
attachment
Daily Beast Snapshot
2014-01-03 20:01:24
http://www.thedailybeast.com/articles/2014/01/03/snowden-lied-about-china-contacts.print.html
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Ackerman
Spencer
NSA
Privacy
Surveillance
US Congress
US House of Representatives
US politics
US Senate
Senator presses NSA to reveal whether it spies on members of Congress
• Vermont's Bernie Sanders poses question to spy agency
• NSA entering political minefield as it fights to keep programs
2014-01-03T15:11EST
en-GB
http://www.theguardian.com/world/2014/jan/03/nsa-asked-spying-congress-bernie-sanders?CMP=twt_gu
2014-01-03 23:01:01
The Guardian
attachment
Guardian Snapshot
2014-01-03 23:01:07
http://www.theguardian.com/world/2014/jan/03/nsa-asked-spying-congress-bernie-sanders?CMP=twt_gu
text/html
utf-8
magazineArticle
Slate
ISSN 1091-2339
Kaplan
Fred
Why Snowden Won’t (and Shouldn’t) Get Clemency
He went too far to be considered just a whistleblower.
Jan. 3 2014
en-US
http://www.slate.com/articles/news_and_politics/war_stories/2014/01/edward_snowden_doesn_t_deserve_clemency_the_nsa_leaker_hasn_t_proved_he.html
2014-01-03 23:02:15
Slate
attachment
Slate Snapshot
2014-01-03 23:02:18
http://www.slate.com/articles/news_and_politics/war_stories/2014/01/edward_snowden_doesn_t_deserve_clemency_the_nsa_leaker_hasn_t_proved_he.single.html
text/html
utf-8
newspaperArticle
Opinion
The New York Times
ISSN 0362-4331
Clapper, James R Jr
Office of the Director of National Intelligence
Surveillance of Citizens by Government
Testimony of the National Intelligence Director
Robert S. Litt of the Office of the Director of National Intelligence responds to an editorial.
2014-01-03
http://www.nytimes.com/2014/01/04/opinion/testimony-of-the-national-intelligence-director.html
2014-01-05 16:53:14
NYTimes.com
attachment
New York Times Snapshot
2014-01-05 16:53:14
http://www.nytimes.com/2014/01/04/opinion/testimony-of-the-national-intelligence-director.html
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Ackerman
Spencer
Edward Snowden
espionage
Fisa court
Law
NSA
Obama administration
Privacy
Surveillance
The NSA files
United States
US Congress
US constitution and civil liberties
US domestic policy
US national security
US politics
US Senate
Vermont
World news
NSA statement does not deny 'spying' on members of Congress
• Agency responds to questions from Senator Bernie Sanders
• Statement cites 'same privacy protections as all US persons'
2014-01-04T15:31EST
en-GB
http://www.theguardian.com/world/2014/jan/04/nsa-spying-bernie-sanders-members-congress?CMP=twt_gu
2014-01-05 16:53:29
The Guardian
attachment
Guardian Snapshot
2014-01-05 16:53:41
http://www.theguardian.com/world/2014/jan/04/nsa-spying-bernie-sanders-members-congress?CMP=twt_gu
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Greenwald
Glenn
Poitras
Laura
MacAskill
Ewen
Data protection
Israel
Middle East and North Africa
NSA
Obama administration
Privacy
Surveillance
The NSA files
United States
US foreign policy
US national security
US politics
World news
NSA shares raw intelligence including Americans' data with Israel
• Secret deal places no legal limits on use of data by Israelis• Only official US government communications protected• Agency insists it complies with rules governing privacy• Read the NSA and Israel's 'memorandum of understanding'
2013-09-11T10:40EDT
en-GB
http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents
2014-01-05 16:53:33
The Guardian
attachment
Guardian Snapshot
2014-01-05 16:53:56
http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents
text/html
utf-8
blogPost
PandoDaily
Is the NSA spying on Congress?
“Has the NSA spied, or is the NSA currently spying, on members of Congress or other American elected officials?” This is the huge question U.S. Senator Bernie Sanders (I-Vt.) is asking the National...
1/3/2014
http://pando.com/2014/01/03/is-the-nsa-spying-on-congress/
2014-01-05 16:54:12
attachment
Snapshot
2014-01-05 16:54:12
http://pando.com/2014/01/03/is-the-nsa-spying-on-congress/
text/html
utf-8
blogPost
Errata Security: Why we have to boycott RSA
http://blog.erratasec.com/2014/01/why-we-have-to-boycott-rsa.html
2014-01-05 16:54:47
Errata Security
attachment
Snapshot
2014-01-05 16:54:47
http://blog.erratasec.com/2014/01/why-we-have-to-boycott-rsa.html
text/html
utf-8
blogPost
Greenwald
Glenn
Phillips
Colby D.
UT Documents: Email exchange with reader over First Look and NSA reporting
2014-01-06
http://utdocuments.blogspot.com.br/2014/01/email-exchange-with-reader-over-first.html
2014-01-06 14:03:59
UT Documents
attachment
Snapshot
2014-01-06 14:03:59
http://utdocuments.blogspot.com.br/2014/01/email-exchange-with-reader-over-first.html
text/html
utf-8
webpage
Freedom of the Press Foundation
Timm
Trevor
Sen. Schumer is Wrong; Snowden Would Be Barred From Arguing His Case At Trial
It seems every week a new member of Congress goes on a Sunday talk show and incorrectly states that if Edward Snowden came back to the United States to stand trial, he would be able to tell his side of the story to a jury and argue he is a whistleblower.
2014-01-06
https://pressfreedomfoundation.org/blog/2014/01/sen-schumer-wrong-snowden-would-be-barred-arguing-his-case-trial
2014-01-06 14:16:38
attachment
Snapshot
2014-01-06 14:16:38
https://pressfreedomfoundation.org/blog/2014/01/sen-schumer-wrong-snowden-would-be-barred-arguing-his-case-trial
text/html
utf-8
webpage
The Progressive
Wheeler
Marcy
Snowden Betrayed the NSA, Not the Constitution
2014-01-06
http://progressive.org/snowdens-crime-was-against-secrecy-not-the-constitution
2014-01-06 20:20:24
attachment
Snapshot
2014-01-06 20:20:24
http://progressive.org/snowdens-crime-was-against-secrecy-not-the-constitution
text/html
utf-8
webpage
Sarnia Observer
Proussalidis
Daniel
CSE admits it 'incidentally' spied on Canadians
After months of denying it spies on Canadians, the Communications Security Establishment (CSE) now admits it may
2014-01-03
http://www.theobserver.ca/2014/01/03/cse-admits-it-incidentally-spying-on-canadians
2014-01-06 20:53:53
attachment
Snapshot
2014-01-06 20:53:53
http://www.theobserver.ca/2014/01/03/cse-admits-it-incidentally-spying-on-canadians
text/html
utf-8
newspaperArticle
U.S. / Politics
The New York Times
ISSN 0362-4331
Knowlton
Brian
Espionage and Intelligence Services
National Security Agency
Paul, Rand
Schumer, Charles E
Senate
Snowden, Edward J
Surveillance of Citizens by Government
Senators Differ Sharply on Penalty for Snowden
Senator Rand Paul said he did not believe that Edward J. Snowden deserved the death penalty or life in prison for exposing national secrets, but Senator Charles E. Schumer said he should stand trial and face the consequences.
2014-01-05
http://www.nytimes.com/2014/01/06/us/politics/senators-differ-sharply-on-penalty-for-snowden.html
2014-01-06 20:55:25
NYTimes.com
attachment
New York Times Snapshot
2014-01-06 20:55:25
http://www.nytimes.com/2014/01/06/us/politics/senators-differ-sharply-on-penalty-for-snowden.html?ref=world&_r=0
text/html
utf-8
webpage
Stewart
Brian
Edward Snowden did us all a favour, it's time to curb the snooping
Thanks to whistleblower Edward Snowden, the most stunning global lesson these last months has been the extent of the state's assault on privacy, Brian Stewart writes. But getting the spy genie back into so many bottles won't be easy.
2014-01-03
http://www.cbc.ca/1.2483644
2014-01-06 20:55:45
attachment
Snapshot
2014-01-06 20:55:45
http://www.cbc.ca/news/world/edward-snowden-did-us-all-a-favour-it-s-time-to-curb-the-snooping-1.2483644
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Harris
John
Conservatives
Labour
politics
Surveillance
UK news
Welfare
The left is too silent on the clunking fist of state power
Government's role is vital, but an arrogant and centralised state is as big a problem as the out-of-control market
2014-01-05T16:00EST
en-GB
http://www.theguardian.com/commentisfree/2014/jan/05/left-silent-state-power-government-market
2014-01-06 20:56:44
The Guardian
attachment
Guardian Snapshot
2014-01-06 20:56:47
http://www.theguardian.com/commentisfree/2014/jan/05/left-silent-state-power-government-market
text/html
utf-8
magazineArticle
The New Yorker
ISSN 0028-792X
Wright
Lawrence
Central Intelligence Agency (C.I.A.)
Edward Snowden
Federal Bureau of Investigation (F.B.I.)
National Security Agency (N.S.A.)
politics
Surveillance
Telephone Calls
The Al Qaeda Switchboard
January 13, 2014
http://www.newyorker.com/talk/comment/2014/01/13/140113taco_talk_wright?mobify=0
2014-01-06 21:01:04
The New Yorker
attachment
The New Yorker
2014-01-06 21:01:06
http://www.newyorker.com/talk/comment/2014/01/13/140113taco_talk_wright?mobify=0?printable=true
text/html
windows-1252
newspaperArticle
U.S.
The New York Times
ISSN 0362-4331
Mazzetti
Mark
COINTELPRO
Davidon, William C
Demonstrations, Protests and Riots
Federal Bureau of Investigation
Forsyth, Keith
Hoover, J Edgar
Medsger, Betty
Raines, Bonnie
Raines, John
Surveillance of Citizens by Government
Burglars Who Took On F.B.I. Abandon Shadows
Burglars who broke into an F.B.I. field office in 1971 and stole files that revealed the extent of the bureau's surveillance of political groups are only now revealing their identities.
2014-01-07
http://www.nytimes.com/2014/01/07/us/burglars-who-took-on-fbi-abandon-shadows.html
2014-01-07 20:28:27
NYTimes.com
attachment
Burglars Who Took On F.B.I. Abandon Shadows - NYTimes.com
2014-01-07 20:31:14
http://www.nytimes.com/2014/01/07/us/burglars-who-took-on-fbi-abandon-shadows.html?pagewanted=2
text/html
utf-8
attachment
New York Times Snapshot
2014-01-07 20:28:27
http://www.nytimes.com/2014/01/07/us/burglars-who-took-on-fbi-abandon-shadows.html?pagewanted=1
text/html
utf-8
webpage
Esquire
Pierce
Charles P.
COINTELPRO
Edward Snowden
FBI
Snowden Effect
Surveillance
The Snowden Effect, Continued
The 1971 burglars were criminals, just as Snowden is accused of being. The activities they exposed were criminal, just as some of what Snowden exposed was, and just as lying to Congress is.
2014-01-07
http://www.esquire.com/blogs/politics/fbi-burglers-010714
2014-01-07 20:31:18
attachment
Snapshot
2014-01-07 20:31:18
http://www.esquire.com/blogs/politics/fbi-burglers-010714?src=spr_TWITTER&spr_id=1456_38683788
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Greenwald
Glenn
COINTELPRO
US constitution and civil liberties
The FBI's anticipatory prosecution of Muslims to criminalize speech
A court ruling in one of the most abusive prosecutions yet highlights the dangers posed by this familiar tactic
2013-03-19T12:10EDT
en-GB
http://www.theguardian.com/commentisfree/2013/mar/19/preemptive-prosecution-muslims-cointelpro
2014-01-07 20:32:39
The Guardian
attachment
Guardian Snapshot
2014-01-07 20:32:41
http://www.theguardian.com/commentisfree/2013/mar/19/preemptive-prosecution-muslims-cointelpro
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Blaze
Matt
NSA
Surveillance
The NSA files
United States
US politics
World news
NSA revelations: the 'middle ground' everyone should be talking about
The NSA's Tailored Access Operations show there's a way to be safe and get good intelligence without mass surveillance
2014-01-06T12:17EST
en-GB
NSA revelations
http://www.theguardian.com/commentisfree/2014/jan/06/nsa-tailored-access-operations-privacy
2014-01-07 20:34:03
The Guardian
attachment
Guardian Snapshot
2014-01-07 20:34:06
http://www.theguardian.com/commentisfree/2014/jan/06/nsa-tailored-access-operations-privacy
text/html
utf-8
webpage
Foreign Policy
Hudson
John
FBI Drops Law Enforcement as 'Primary' Mission
2014-01-05
http://thecable.foreignpolicy.com/posts/2014/01/05/fbi_drops_law_enforcement_as_primary_mission#sthash.OowcRrkB.dpbs
2014-01-07 20:37:56
attachment
FBI Drops Law Enforcement as 'Primary' Mission
2014-01-07 20:37:57
http://thecable.foreignpolicy.com/posts/2014/01/05/fbi_drops_law_enforcement_as_primary_mission#sthash.OowcRrkB.dpbs
text/html
utf-8
webpage
Princeton Alumni Weekly
Jacobson
Louis
Princeton Alumni Weekly: Reporting on Government Surveillance: Q&A - Barton Gellman '82
2014-01-08
http://paw.princeton.edu/issues/2014/01/08/pages/1121/index.xml?utm_source=hootsuite&utm_campaign=hootsuite
2014-01-07 21:22:48
attachment
Princeton Alumni Weekly: Reporting on Government Surveillance: Q&A - Barton Gellman '82
2014-01-07 21:22:49
http://paw.princeton.edu/issues/2014/01/08/pages/1121/index.xml?utm_source=hootsuite&utm_campaign=hootsuite
text/html
windows-1252
newspaperArticle
Opinions
The Washington Post
ISSN 0190-8286
Bradbury
Steven G.
Don’t limit the NSA’s effectiveness
Curtailing its access to telephone records would hamper the agency’s effectiveness.
2014-01-03
en-US
http://www.washingtonpost.com/opinions/dont-limit-the-nsas-effectiveness/2014/01/03/c876bdc8-73dc-11e3-9389-09ef9944065e_story.html
2014-01-07 21:28:23
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-07 21:28:25
http://www.washingtonpost.com/opinions/dont-limit-the-nsas-effectiveness/2014/01/03/c876bdc8-73dc-11e3-9389-09ef9944065e_print.html
text/html
utf-8
blogPost
Washington Post
Sargent
Greg
bulk surveillance
Edward Snowden
nsa bulk surveillance
NSA surveillance
Yes, we have Snowden to thank for NSA surveillance debate
It's hard to imagine the debate would have unfolded as it did without Edward Snowden's revelations.
2014-01-02
http://www.washingtonpost.com/blogs/plum-line/wp/2014/01/02/yes-we-have-snowden-to-thank-for-nsa-surveillance-debate/
2014-01-07 21:35:25
attachment
Snapshot
2014-01-07 21:35:25
http://www.washingtonpost.com/blogs/plum-line/wp/2014/01/02/yes-we-have-snowden-to-thank-for-nsa-surveillance-debate/
text/html
utf-8
newspaperArticle
UK news
The Guardian
ISSN 0261-3077
Malik
Shiv
Children
Counter-terrorism policy
crime
David Cameron
politics
Public finance
Society
Tax and spending
UK news
UK security and counter-terrorism
Schoolboy warned by police over picket plan at David Cameron's office
Nicky Wishart, 12, told he faced arrest if public disorder ensued and armed officers would be present
2010-12-10T12:49EST
en-GB
http://www.theguardian.com/uk/2010/dec/10/schoolboy-quizzed-cameron-office-picket
2014-01-07 22:34:55
The Guardian
attachment
Guardian Snapshot
2014-01-07 22:35:01
http://www.theguardian.com/uk/2010/dec/10/schoolboy-quizzed-cameron-office-picket
text/html
utf-8
report
Rochester, NY
Social Science Research Network
Roberts
Andrew J.
Autonomy
Domination
Political Participation
Privacy
Republicanism
A Republican Account of the Value of Privacy
This article provides an account of the value of privacy in securing the republican aims of self-government and conditions of non-domination. It describes how loss of privacy might lead to subjugation to dominating power. The republican concept of domination provides the foundation of a broad and coherent account of the value of privacy. One that encompasses circumstances in which the subject (i) suffers interference as a result of the loss, (ii) is aware that he has suffered a loss of privacy, but suffers no subsequent interference, and (iii) is unaware that he has suffered any loss of privacy, and suffers no subsequent interference. Liberal accounts explain the value of privacy in the first two circumstances by pointing to the possible effect of the loss on the autonomy of the subject, but because they focus on autonomy are unable to explain why privacy is valuable where an agent is unaware of the loss. The republican account provided here explains why loss is harmful in all three circumstances. The final part of the article argues that because privacy is a pre-requisite for effective participation in political life, and republicans consider such participation to be the essence of self-government and the means through which a polity can secure conditions of freedom, in a republican democracy individual privacy will be seen as a collective good.
ID 2369680
SSRN Scholarly Paper
2013/12/18
http://papers.ssrn.com/abstract=2369680
2014-01-07 22:35:17
papers.ssrn.com
attachment
Snapshot
2014-01-07 22:35:17
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2369680
text/html
utf-8
attachment
SSRN-id2369680.pdf
application/pdf
webpage
CNET
McCullagh
Declan
Eric Holder
Justice Department
National Security Agency
NSA
Surveillance
How Web mail providers leave door open for NSA surveillance
Protecting users' e-mail privacy from the National Security Agency and other intelligence services means using encryption. But with the exception of Google, few companies do everything they can. Read this article by Declan McCullagh on CNET News.
2013-06-21
http://news.cnet.com/8301-13578_3-57590389-38/how-web-mail-providers-leave-door-open-for-nsa-surveillance/
2014-01-07 22:44:52
attachment
Snapshot
2014-01-07 22:44:52
http://news.cnet.com/8301-13578_3-57590389-38/how-web-mail-providers-leave-door-open-for-nsa-surveillance/
text/html
utf-8
webpage
mirror
Martin
Stephen
Conservative Party
crime
David Cameron
facebook
politics
Thames Valley Police
Boy of 12 hauled out of class by police over David Cameron Facebook protest
A schoolboy trying to save his youth club was hauled from class after his plan to protest outside David Cameron's constituency office was spotted - by anti-terror police.
2010-12-12
http://www.mirror.co.uk/news/uk-news/boy-of-12-hauled-out-of-class-268999
2014-01-07 22:45:41
attachment
Snapshot
2014-01-07 22:45:41
http://www.mirror.co.uk/news/uk-news/boy-12-hauled-out-class-268999
text/html
utf-8
blogPost
Digital Dao
Carr
Jeffrey
Clipper Chip
Dual_EC_DRBG
James Bidzos
NIST
NSA
rsa
Digital Dao: NSA's $10M RSA Contract: Origins
Monday, January 6, 2014
http://jeffreycarr.blogspot.com/2014/01/nsas-10m-rsa-contract-origins.html
2014-01-07 22:49:25
Digital Dao
attachment
Blogspot Snapshot
2014-01-07 22:49:27
http://jeffreycarr.blogspot.com/2014/01/nsas-10m-rsa-contract-origins.html
text/html
utf-8
webpage
Burlington Free Press
Burlington
burlingtonfreepress.com
headlines
local news
news
Politics and Government
stories
Vermont
World news
Sanders calls for leniency for Snowden
U.S. Sen. Berine Sanders, I-Vt., says former National Security Agency contractor Edward Snowden should be spared a long prison sentence or 'permanent exile' for leaking classified material.
http://www.burlingtonfreepress.com/article/20140106/NEWS03/301060024/Sanders-calls-for-leniency-for-NSA-contractor-Snowden
2014-01-07 22:49:45
attachment
Snapshot
2014-01-07 22:49:45
http://www.burlingtonfreepress.com/apps/pbcs.dll/article?AID=2014301060024&nclick_check=1
text/html
windows-1252
blogPost
emptywheel
Wheeler
Marcy
In 2009, NSA Said It Had a “Present Example” of Abuse Similar to Project Minaret | emptywheel
2013-11-27
http://www.emptywheel.net/2013/11/27/in-2009-nsa-said-it-had-a-present-example-of-abuse-similar-to-project-minaret/
2014-01-07 22:53:05
attachment
In 2009, NSA Said It Had a “Present Example” of Abuse Similar to Project Minaret | emptywheel
2014-01-07 22:53:06
http://www.emptywheel.net/2013/11/27/in-2009-nsa-said-it-had-a-present-example-of-abuse-similar-to-project-minaret/
text/html
utf-8
webpage
Time
Dozier
Kimberly
U.S. Suspect Possibly Targeted for Drone Attack | TIME.com
2014-02-10
http://nation.time.com/2014/02/10/u-s-suspect-possibly-targeted-for-drone-attack/
2014-02-10 20:55:41
attachment
U.S. Suspect Possibly Targeted for Drone Attack | TIME.com
2014-02-10 20:55:42
http://nation.time.com/2014/02/10/u-s-suspect-possibly-targeted-for-drone-attack/
text/html
utf-8
newspaperArticle
US
The New York Times
ISSN 0362-4331
Lichtblau
Eric
Risen
James
Civil Rights and Liberties
Intelligence Services
Justice Department
National Security Agency
Surveillance of Citizens by Government
United States Politics and Government
Wiretapping and Other Eavesdropping Devices and Methods
Officials Say U.S. Wiretaps Exceeded Law
There was an “overcollection” of domestic e-mails and calls of Americans by the N.S.A., officials said.
2009-04-16
http://www.nytimes.com/2009/04/16/us/16nsa.html
2014-01-07 22:53:52
NYTimes.com
attachment
New York Times Snapshot
2014-01-07 22:53:52
http://www.nytimes.com/2009/04/16/us/16nsa.html?_r=0&hp=&pagewanted=all
text/html
windows-1252
newspaperArticle
Opinions
The Washington Post
ISSN 0190-8286
Robinson
Eugene
The NSA is collecting too much information
The NSA’s job is keeping the country safe, not collecting lots of records.
2014-01-07
en-US
http://www.washingtonpost.com/opinions/eugene-robinson-the-nsa-is-collecting-too-much-information/2014/01/06/c34244cc-770a-11e3-af7f-13bf0e9965f6_story.html
2014-01-07 22:54:31
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-07 22:54:44
http://www.washingtonpost.com/opinions/eugene-robinson-the-nsa-is-collecting-too-much-information/2014/01/06/c34244cc-770a-11e3-af7f-13bf0e9965f6_print.html
text/html
utf-8
webpage
Threat Level
Levy
Steven
gallery
magazine-feb-2014
How the NSA Almost Killed the Internet | Threat Level | Wired.com
Google, Facebook, Microsoft, and the other tech titans have had to fight for their lives against their own government. An exclusive look inside their year from hell—and why the Internet will never be the same.
2014-01-07
How the NSA Almost Killed the Internet
http://www.wired.com/threatlevel/2014/01/how-the-us-almost-killed-the-internet/
2014-01-07 22:54:48
attachment
Snapshot
2014-01-07 22:54:48
http://www.wired.com/threatlevel/2014/01/how-the-us-almost-killed-the-internet/all/
text/html
utf-8
newspaperArticle
New York Times
Janson
Donald
COINTELPRO
F.B.I. File Theft Stirs Rage and Joy
1971-03-29
English
http://jfk.hood.edu/Collection/White%20Materials/White%20Assassination%20Clippings%20Folders/Security%20Folders/Security-FBI/Item%200284.pdf
2014-01-08 15:33:38
attachment
Item 0284.pdf
2014-01-08 15:33:38
http://jfk.hood.edu/Collection/White%20Materials/White%20Assassination%20Clippings%20Folders/Security%20Folders/Security-FBI/Item%200284.pdf
application/pdf
utf-8
blogPost
Consortium News
Binney
William
Drake
Thomas
Loomis
Edward
Wiebe
J. Kirk
McGovern
Ray
Murray
Elizabeth
Rowley
Coleen
Ellsberg
Daniel
NSA Insiders Reveal What Went Wrong | Consortiumnews
2014-01-07
http://consortiumnews.com/2014/01/07/nsa-insiders-reveal-what-went-wrong/
2014-01-08 16:18:54
attachment
Snapshot
2014-01-08 16:18:54
http://consortiumnews.com/2014/01/07/nsa-insiders-reveal-what-went-wrong/
text/html
utf-8
webpage
NationalJournal.com
Volz
Dustin
Obama Invites NSA's Top Congressional Critics to Meet at White House
Thursday's meeting is by invitation only and staffers are banned from attending.
2014-01-07
http://www.nationaljournal.com/defense/obama-invites-nsa-s-top-congressional-critics-to-meet-at-white-house-20140107
2014-01-08 16:21:06
attachment
Snapshot
2014-01-08 16:21:06
http://www.nationaljournal.com/defense/obama-invites-nsa-s-top-congressional-critics-to-meet-at-white-house-20140107
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Raines
Bonnie
COINTELPRO
Edward Snowden
FBI
Pennsylvania
United States
Democracy needs whistleblowers. That's why I broke into the FBI in 1971
Like Snowden, we broke laws to reveal something that was more dangerous. We wanted to hold J Edgar Hoover accountable
2014-01-07T13:22EST
en-GB
http://www.theguardian.com/commentisfree/2014/jan/07/fbi-1971-burglary-hold-government-accountable?CMP=twt_gu
2014-01-08 16:25:04
The Guardian
attachment
Guardian Snapshot
2014-01-08 16:25:06
http://www.theguardian.com/commentisfree/2014/jan/07/fbi-1971-burglary-hold-government-accountable?CMP=twt_gu
text/html
utf-8
webpage
Watkins
Ali
WASHINGTON: Intelligence committee divided over NSA limits after hearing from White House panel | National Security & Defense | McClatchy DC
The Senate Intelligence Committee quietly invited the White House-appointed National Security Agency task force to a closed briefing Tuesday afternoon to discuss proposed changes to the agency’s programs. But despite what lawmakers said was a productive discussion, committee members remain sharply divided over possible reform.
2014-01-07
WASHINGTON
http://www.mcclatchydc.com/2014/01/07/213796/intelligence-committee-divided.html
2014-01-08 16:25:58
attachment
Snapshot
2014-01-08 16:25:58
http://www.mcclatchydc.com/2014/01/07/213796/intelligence-committee-divided.html
text/html
utf-8
webpage
Ars Technica
Goodin
Dan
boycott
NSA
rsa
More researchers join RSA conference boycott to protest $10 million NSA deal
With seven weeks to go, at least 8 speakers cancel their RSA Conference plans.
1/7/2014
http://arstechnica.com/security/2014/01/more-researchers-join-rsa-conference-boycott-to-protest-10-million-nsa-deal/
2014-01-08 16:26:33
attachment
Snapshot
2014-01-08 16:26:33
http://arstechnica.com/security/2014/01/more-researchers-join-rsa-conference-boycott-to-protest-10-million-nsa-deal/
text/html
utf-8
webpage
Moraes
Claude
Draft EU Parliment Report on the US NSA surveillance programme
2014-01-08
http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+COMPARL+PE-526.085+02+DOC+PDF+V0//EN
2014-01-08 19:12:38
attachment
Microsoft Word - 2014-526085.MSWORD - getDoc.do
2014-01-08 19:12:38
http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+COMPARL+PE-526.085+02+DOC+PDF+V0//EN
application/pdf
utf-8
webpage
Techdirt.
Dianne Feinstein Admits That Her 'NSA Reform' Bill Is About Protecting Existing Surveillance Programs | Techdirt
See, there's a problem when you lie: you always forget how to keep your story straight. You may remember, for example, that Senator Dianne Feinstein, at the end of October, released a bill that pretended to be about reforming the NSA and its...
http://www.techdirt.com/articles/20140107/18092725793/dianne-feinstein-admits-that-her-nsa-reform-bill-is-about-protecting-existing-surveillance-programs.shtml
2014-01-08 19:16:36
attachment
Snapshot
2014-01-08 19:16:36
http://www.techdirt.com/articles/20140107/18092725793/dianne-feinstein-admits-that-her-nsa-reform-bill-is-about-protecting-existing-surveillance-programs.shtml
text/html
windows-1252
webpage
Bloomberg
Talev
Margaret
Snowden Left in Russia’s Cold as Obama Prepares NSA Limit
President Barack Obama and his advisers aren’t discussing clemency for Edward Snowden as they draw up a response to the backlash over U.S. government surveillance, according to an administration official with knowledge of the deliberations.
Jan 8, 2014 12:00 AM ET
http://www.bloomberg.com/news/2014-01-08/snowden-left-in-russia-s-cold-as-obama-prepares-nsa-limit.html
2014-01-08 19:20:40
attachment
Bloomberg Printable
2014-01-08 19:20:42
http://www.bloomberg.com/news/print/2014-01-08/snowden-left-in-russia-s-cold-as-obama-prepares-nsa-limit.html
text/html
utf-8
webpage
Press
Associated
From the Wires
Salon.com
Intel chief talks NSA changes with advisory panel
Intel chief talks NSA changes with advisory panel
2014-01-08
http://www.salon.com/2014/01/08/intel_chief_talks_nsa_changes_with_advisory_panel/
2014-01-08 19:21:13
attachment
Snapshot
2014-01-08 19:21:13
http://www.salon.com/2014/01/08/intel_chief_talks_nsa_changes_with_advisory_panel/
text/html
utf-8
webpage
Open Rights Group
Williams
Ed Paton
Open Rights Group - MEPs release draft report damning blanket Internet surveillance
2013-01-08
https://www.openrightsgroup.org/blog/2013/meps-release-draft-report-damning-blanket-internet-surveillance
2014-01-08 19:32:11
attachment
Snapshot
2014-01-08 19:32:11
https://www.openrightsgroup.org/blog/2013/meps-release-draft-report-damning-blanket-internet-surveillance
text/html
utf-8
webpage
Kos
Happy Cog Studios-http://www happycog com and Daily
Daily Kos: Two Disastrous Programs Collide: Drone Assassination & NSA Mass Surveillance
New reports thanks in part to National Security Agency (NSA) whistleblower Edward Snowden reveal the disastrous collision of two secret, unaccountable and legally dubious U.S. programs - targeted ...
2014-02-10
Daily Kos
http://www.dailykos.com/story/2014/02/10/1276440/-Two-Disastrous-Programs-Collide-Drone-Assassination-NSA-Mass-Surveillance
2014-02-10 20:56:10
en
attachment
Snapshot
2014-02-10 20:56:10
http://www.dailykos.com/story/2014/02/10/1276440/-Two-Disastrous-Programs-Collide-Drone-Assassination-NSA-Mass-Surveillance
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Ackerman
Spencer
Roberts
Dan
NSA
Obama administration
Privacy
Surveillance
United States
US Congress
US constitution and civil liberties
US national security
US politics
World news
Obama nears decision on NSA reforms as spy leaders meet at White House
• Decision on surveillance expected before state of the union
• Congressional leaders to join as president mulls NSA review
2014-01-08T13:23EST
en-GB
http://www.theguardian.com/world/2014/jan/08/obama-decision-nsa-reforms-surveillance
2014-01-08 19:44:28
The Guardian
attachment
Guardian Snapshot
2014-01-08 19:44:30
http://www.theguardian.com/world/2014/jan/08/obama-decision-nsa-reforms-surveillance
text/html
utf-8
webpage
The Atlantic
Friedersdorf
Conor
The NSA Leaks Are About Democracy, Not Just Privacy
Edward Snowden-sourced stories that aren't about spying on Americans still have an important value because they inform citizens about public policy.
Jan 8 2014, 7:03 AM ET
http://www.theatlantic.com/politics/archive/2014/01/the-nsa-leaks-are-about-democracy-not-just-privacy/282902/
2014-01-08 19:44:41
attachment
The Atlantic Print View
2014-01-08 19:44:43
http://www.theatlantic.com/politics/print/2014/01/the-nsa-leaks-are-about-democracy-not-just-privacy/282902/
text/html
utf-8
blogPost
Washington Post
Klein
Ezra
Democracy
Edward Snowden
NSA
Surveillance
The NSA vs. democracy
The NSA program ultimately require the public to trust the government. But the public doesn't trust the government. Not even close.
2013-06-28
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/28/the-nsa-vs-democracy/
2014-01-08 19:55:42
attachment
Snapshot
2014-01-08 19:55:42
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/28/the-nsa-vs-democracy/
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Nakashima
Ellen
NSA exploring alternatives to holding database of domestic phone records
The agency is exploring how to relinquish control of the records while still being able to exploit them.
2014-01-07
en-US
http://www.washingtonpost.com/world/national-security/nsa-considers-shifting-database-of-domestic-phone-logs-to-third-parties/2014/01/07/1df6b7f6-7718-11e3-8963-b4b654bcc9b2_story.html
2014-01-08 20:44:37
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-08 20:44:39
http://www.washingtonpost.com/world/national-security/nsa-considers-shifting-database-of-domestic-phone-logs-to-third-parties/2014/01/07/1df6b7f6-7718-11e3-8963-b4b654bcc9b2_print.html
text/html
utf-8
radioBroadcast
Forsyth
Keith
Raines
Bonnie
Raines
John
Medsger
Betty
Kairys
David
Goodman
Amy
Shaikh
Nermeen
COINTELPRO
"It Was Time to Do More Than Protest": Activists Admit to 1971 FBI Burglary That Exposed COINTELPRO
One of the great mysteries of the Vietnam War era has been solved. On March 8, 1971, a group of activists — including a cabdriver, a day care director and two professors — broke into an FBI office in Media, Pennsylvania. They stole every document they found and then leaked many to the press, including details about FBI abuses and the then-secret counter-intelligence program to infiltrate, monitor and disrupt social and political movements, nicknamed COINTELPRO. They called themselves the Citizens’ Commission to Investigate the FBI. No one was ever caught for the break-in. The burglars’ identities remained a secret until this week when they finally came forward to take credit for the caper that changed history. Today we are joined by three of them — John Raines, Bonnie Raines and Keith Forsyth; their attorney, David Kairys; and Betty Medsger, the former Washington Post reporter who first broke the story of the stolen FBI documents in 1971 and has now revealed the burglars’ identities in her new book, "The Burglary: The Discovery of J. Edgar Hoover’s Secret FBI."
Democracy Now!
Interview
2014-01-08
English
"It Was Time to Do More Than Protest"
http://www.democracynow.org/2014/1/8/it_was_time_to_do_more
2014-01-08 21:14:44
attachment
Snapshot
2014-01-08 21:14:44
http://www.democracynow.org/2014/1/8/it_was_time_to_do_more
text/html
utf-8
webpage
COINTELPRO
FBI Documents released by the Citizens' Commission to Investigate the F.B.I.
1971-06
http://privacysos.org/sites/all/files/citizenscommittee.pdf
2014-01-08 21:20:01
attachment
citizenscommittee.pdf
2014-01-08 21:20:01
http://privacysos.org/sites/all/files/citizenscommittee.pdf
application/pdf
utf-8
webpage
BuzzFeed
Nocera
Kate
More Congressmen Say They're Open To Clemency Deal To Bring Edward Snowden Back To U.S.
"I've come to the conclusion that he's more of a whistle-blower than a villain," said Rep. Jim McGovern.
2014-01-02
http://www.buzzfeed.com/katenocera/more-congressmen-say-theyre-open-to-clemency-deal-to-bring-e
2014-01-08 22:03:58
English
attachment
Snapshot
2014-01-08 22:03:58
http://www.buzzfeed.com/katenocera/more-congressmen-say-theyre-open-to-clemency-deal-to-bring-e
text/html
utf-8
webpage
Salon
Sirota
David
ACLU
Alan Grayson
Congress
Editor's Picks
Edward Snowden
FISA
Fourth Amendment
james clapper
NSA
Salon.com
Surveillance
The Guardian
Does the government actually understand the 4th Amendment?
NSA argues that it has "probable cause" to surveil us at all times -- meaning we're all terrorist suspects. What?
2013-06-17
http://www.salon.com/2013/06/17/were_all_terrorist_suspects_now/
2014-01-08 22:05:00
attachment
Snapshot
2014-01-08 22:05:00
http://www.salon.com/2013/06/17/were_all_terrorist_suspects_now/
text/html
utf-8
newspaperArticle
Opinions
The Washington Post
ISSN 0190-8286
McLaughlin
John
NSA intelligence-gathering programs keep us safe
The agency’s actions keeps us safe, and should keep up its good work.
2014-01-03
en-US
http://www.washingtonpost.com/opinions/nsa-intelligence-gathering-programs-keep-us-safe/2014/01/02/0fd51b22-7173-11e3-8b3f-b1666705ca3b_story.html
2014-01-08 22:09:23
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-08 22:09:25
http://www.washingtonpost.com/opinions/nsa-intelligence-gathering-programs-keep-us-safe/2014/01/02/0fd51b22-7173-11e3-8b3f-b1666705ca3b_print.html
text/html
utf-8
newspaperArticle
Magazine
BBC
McKelvey
Tara
What if US authorities take your laptop?
A US judge has ruled authorities can seize travellers' laptops at the border without offering any justification or suspecting them of a crime. What happens if they take yours?
2014/01/03
http://www.bbc.co.uk/news/magazine-25458533
2014-01-08 22:09:50
bbc.co.uk
attachment
BBC News Snapshot
2014-01-08 22:09:52
http://www.bbc.co.uk/news/magazine-25458533
text/html
utf-8
webpage
Fisher
Dennis
IRTF Chair Refuses Removal of NSA Employee as Co-Chair of Crypto Working Group | Threatpost - English - Global - threatpost.com
2014-01-07
http://threatpost.com/irtf-chair-wont-remove-nsa-employee-as-co-chair-of-crypto-working-group/103473
2014-01-08 22:26:22
attachment
IRTF Chair Refuses Removal of NSA Employee as Co-Chair of Crypto Working Group | Threatpost - English - Global - threatpost.com
2014-01-08 22:26:23
http://threatpost.com/irtf-chair-wont-remove-nsa-employee-as-co-chair-of-crypto-working-group/103473
text/html
utf-8
webpage
Ars Technica
Goodin
Dan
cryptography
encryption
ietf
internet-engineering-task-force
standards
NSA employee will continue to co-chair influential crypto standards group
Standards boss rejects claims that the appointment opens standards up to NSA sabotage.
1/7/2014
http://arstechnica.com/security/2014/01/nsa-employee-will-continue-to-co-chair-influential-crypto-standards-group/
2014-01-08 22:26:56
attachment
Snapshot
2014-01-08 22:26:56
http://arstechnica.com/security/2014/01/nsa-employee-will-continue-to-co-chair-influential-crypto-standards-group/
text/html
utf-8
webpage
Sullivan
Margaret
new york times
Snowden Edward J
Weeks in the Making, an Editorial on Snowden May Go 'Beyond What Is Realistic'
The editorial page editor tells the public editor how the editorial came about.
2014-01-02
http://publiceditor.blogs.nytimes.com/2014/01/02/weeks-in-the-making-an-editorial-on-snowden-may-go-beyond-what-is-realistic/
2014-01-08 22:29:11
attachment
Snapshot
2014-01-08 22:29:11
http://publiceditor.blogs.nytimes.com/2014/01/02/weeks-in-the-making-an-editorial-on-snowden-may-go-beyond-what-is-realistic/
text/html
utf-8
webpage
The Daily Beast
Lake
Eli
Edward Snowden
Google
National Security Agency
U.S. News
Yahoo
Michael Hayden, Ex-NSA Director, Says Clemency for Edward Snowden Is ‘Outrageous’ Idea
Editorials in the New York Times and The Guardian urged leniency with the leaker, but former NSA director Michael Hayden says that would send the wrong message.
01.02.14
http://www.thedailybeast.com/articles/2014/01/02/michael-hayden-ex-nsa-director-says-clemency-for-edward-snowden-is-outrageous-idea.html
2014-01-08 22:32:10
attachment
Daily Beast Snapshot
2014-01-08 22:32:16
http://www.thedailybeast.com/articles/2014/01/02/michael-hayden-ex-nsa-director-says-clemency-for-edward-snowden-is-outrageous-idea.print.html
text/html
utf-8
webpage
Business Insider
Edwards
Jim
apple
Jim Edwards
NSA
Just Two Words From Apple On The NSA's iPhone Hacking Show How The Tech Community Now Hates The NSA
"We will continue to use our resources to stay ahead of malicious hackers."
2013-12-31
http://www.businessinsider.com/apple-anger-on-the-nsa-iphone-hacking-2013-12
2014-01-08 22:35:05
attachment
Snapshot
2014-01-08 22:35:05
http://www.businessinsider.com/apple-anger-on-the-nsa-iphone-hacking-2013-12
text/html
utf-8
webpage
BostonGlobe.com
Gillum
Jack
2014
Business
Computer and data security
Computing and information technology
Contracts and orders
Corporate news
EMC
Government and Politics
Government business and finance
Government surveillance
Human rights and civil liberties
Intelligence agencies
Military and defense
Military intelligence
national security
NSA surveillance
Political issues
Products and services
Protest
RSA Security
Social affairs
Social issues
software
technology
Technology issues
Experts withdraw from Internet security conference - The Boston Globe
WASHINGTON — At least eight researchers or policy experts have withdrawn from an Internet security conference after the sponsor reportedly used flawed encryption technology deliberately in commercial software to allow the National Security Agency to spy more easily on computer users. RSA Security, owned by data storage giant EMC Corp. of Hopkinton Mass., has disputed claims it intentionally introduced the flawed encryption algorithm, but otherwise has declined to discuss what a published report last month described as a $10 million government contract. The revelation supplemented documents leaked by former NSA contractor Edward Snowden showing that the NSA tried to weaken Internet encryption. The pullouts from the highly regarded RSA Conference represent early blowback by technology researchers and policy experts who have complained that the government’s surveillance efforts have, in some cases, weakened Internet security even for innocent users.
2014-01-09
http://www.bostonglobe.com/business/2014/01/09/experts-withdraw-from-internet-security-conference/n8phU8anJZIFOtt0fFaxkJ/story.html
2014-01-09 19:54:59
attachment
Snapshot
2014-01-09 19:54:59
http://www.bostonglobe.com/business/2014/01/09/experts-withdraw-from-internet-security-conference/n8phU8anJZIFOtt0fFaxkJ/story.html
text/html
utf-8
webpage
Foreign Policy
Harris
Shane
Congressmen Reveal Secret Report’s Findings to Discredit Snowden
2014-01-09
http://complex.foreignpolicy.com/posts/2014/01/09/congressmen_reveal_secret_report_s_findings_to_discredit_snowden
2014-01-09 19:57:47
attachment
Congressmen Reveal Secret Report’s Findings to Discredit Snowden
2014-01-09 19:57:48
http://complex.foreignpolicy.com/posts/2014/01/09/congressmen_reveal_secret_report_s_findings_to_discredit_snowden
text/html
utf-8
attachment
Congressmen Reveal Secret Report’s Findings to Discredit Snowden
2014-01-09 22:20:45
http://complex.foreignpolicy.com/posts/2014/01/09/congressmen_reveal_secret_report_s_findings_to_discredit_snowden
text/html
utf-8
blogPost
Gosztola
Kevin
As Obama Holds Meetings, NSA Whistleblowers Warn Reforms to Preserve the Surveillance State | The Dissenter
The White House is holding a number of meetings on possible National Security Agency reforms.
2014-01-09
http://dissenter.firedoglake.com/2014/01/09/as-obama-holds-meetings-nsa-whistleblowers-caution-against-reforms-to-preserve-the-surveillance-state/
2014-01-09 20:00:51
attachment
Snapshot
2014-01-09 20:00:51
http://dissenter.firedoglake.com/2014/01/09/as-obama-holds-meetings-nsa-whistleblowers-caution-against-reforms-to-preserve-the-surveillance-state/
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Hopkins
Nick
Traynor
Ian
Data protection
Europe
European Union
GCHQ
NSA
Surveillance
technology
UK news
United States
US national security
World news
NSA and GCHQ activities appear illegal, says EU parliamentary inquiry
Civil liberties committee report demands end to indiscriminate collection of personal data by British and US agencies
2014-01-09T12:02EST
en-GB
http://www.theguardian.com/world/2014/jan/09/nsa-gchq-illegal-european-parliamentary-inquiry?CMP=twt_fd
2014-01-09 20:01:22
The Guardian
attachment
Guardian Snapshot
2014-01-09 20:01:24
http://www.theguardian.com/world/2014/jan/09/nsa-gchq-illegal-european-parliamentary-inquiry?CMP=twt_fd
text/html
utf-8
webpage
CREDO Mobile
Mobile
CREDO
CREDO Mobile - Transparency
CREDO Mobile Transparency Report on Government requests for subscriber information.
2014-01
http://www.credomobile.com/misc/transparency.aspx
2014-01-09 20:09:34
attachment
CREDO Mobile - Transparency
2014-01-09 20:09:35
http://www.credomobile.com/misc/transparency.aspx
text/html
utf-8
webpage
Huffington Post
Pace
Julie
Obama Weighs Limiting NSA Access To Phone Records
WASHINGTON (AP) — President Barack Obama is expected to rein in spying on foreign leaders and is considering restricting National Security Agency access to Americans' phone records, according to people familiar with a White House review of the government's surveillance programs. Obama could unveil his highly anticipated decisions as early as next week.
2014-01-09
http://www.huffingtonpost.com/2014/01/09/obama-nsa_n_4567195.html
2014-01-09 20:17:27
attachment
Huffington Post
2014-01-09 20:17:29
http://www.huffingtonpost.com/2014/01/09/obama-nsa_n_4567195.html?view=print&comm_ref=false
text/html
utf-8
document
Olejnik
Lukasz
Tran
Minh-Dung
Castelluccia
Selling Off Privacy at Auction
Abstract
—Real-Time Bidding (RTB) and Cookie Matching (CM) are transforming the advertising landscape to an extremely dynamic market and make targeted advertising considerably permissive. The emergence of these technologies allows companies to exchange user data as a product and therefore raises important concerns from privacy perspectives. In this paper, we perform a privacy analysis of CM and RTB and quantify the leakage of users’ browsing histories due to these mechanisms. We study this problem on a corpus of users’ Web histories, and show that using these technologies, certain companies can significantly improve their tracking and profiling capabilities. We detect 41 companies serving ads via RTB and over 125 using cookie Matching. We show that 91% of users in our dataset were affected by CM and in certain cases, 27% of users’ histories could be leaked to 3rd-party companies through RTB.
We expose a design characteristic of RTB systems to observe the prices which advertisers pay for serving ads to Web users. We leverage this feature and provide important insights into these prices by analyzing different user profiles and visiting contexts. Our study shows the variation of prices according to context information including visiting site, time and user’s physical location. We experimentally confirm that users with known history are evaluated higher than new comers, that some user profiles are more valuable than others, and that users’ intents, such as looking for a commercial product, are sold at higher prices than users’ browsing histories. In addition, we show that there is a huge gap between users’ perception of the value of their personal information and its actual value on the market. A recent study by Carrascal et al. showed that, on average, users evaluate the price of the disclosure of their presence on a Web site to EUR 7. We show that user’s browsing history elements are routinely being sold off for less than $0:0005.
2013-12-06
English
http://hal.archives-ouvertes.fr/docs/00/91/52/49/PDF/SellingOffPrivacyAtAuction.pdf
2014-01-09 20:32:54
attachment
[hal-00915249, v1] Selling Off Privacy at Auction - SellingOffPrivacyAtAuction.pdf
2014-01-09 20:32:54
http://hal.archives-ouvertes.fr/docs/00/91/52/49/PDF/SellingOffPrivacyAtAuction.pdf
application/pdf
utf-8
webpage
Hasan
Mehdi
The left lionises Edward Snowden, but who will speak up for Israel's Mordechai Vanunu?
2014-01-09
http://www.newstatesman.com/2014/01/who-will-speak-israels-edward-snowden
2014-01-09 20:39:25
English
attachment
The left lionises Edward Snowden, but who will speak up for Israel's Mordechai Vanunu?
2014-01-09 20:39:26
http://www.newstatesman.com/2014/01/who-will-speak-israels-edward-snowden
text/html
utf-8
webpage
Scientific American
|
Camille François
Scientific American Blog Network
technology
World Wide Web
What Is War in the Digital Realm? A Reality Check on the Meaning of “Cyberspace” | Guest Blog, Scientific American Blog Network
Cyber is everywhere: in political speeches, in newspapers, at dinner conversations. There's cyberwar and cybersex and cybercafés (they still exist, I promise), and there's ...
2013-11-26
What Is War in the Digital Realm?
http://blogs.scientificamerican.com/guest-blog/2013/11/26/what-is-war-in-cyberspace-a-reality-check-on-the-meaning-of-cyber/
2014-01-09 20:41:10
attachment
Snapshot
2014-01-09 20:41:10
http://blogs.scientificamerican.com/guest-blog/2013/11/26/what-is-war-in-cyberspace-a-reality-check-on-the-meaning-of-cyber/
text/html
utf-8
report
Rochester, NY
Social Science Research Network
Sinha
G. Alex
FAA
FISA
Human rights
ICCPR
NSA
Patriot Act
Privacy
Surveillance
NSA Surveillance Since 9/11 and the Human Right to Privacy
Since shortly after 9/11, the National Security Agency (“NSA”) has been collecting massive amounts of data about American citizens and permanent residents, ostensibly with the aim of preempting future terrorist attacks. While the NSA’s program has invited substantial scholarly attention, specifically surrounding its compliance with the United States Constitution and various domestic statutes, the academic debate about its merits entirely omits one crucial fact: the United States is also legally obliged to protect a human right to privacy, as codified in Article 17 of the International Covenant on Civil and Political Rights (“ICCPR”). This paper seeks to eliminate the blind spot caused by that omission, illustrating the relevance of human rights for assessing the legality and propriety of NSA surveillance. It argues that even under conservative assumptions about the scope of the NSA program and the coverage of the ICCPR, there is good reason to think that the program violates the covenant. At the very least, as this detailed case study of the NSA program demonstrates, more clarity from the Human Rights Committee on the right to privacy is essential in a world characterized by increasing government surveillance.Part 1 of this paper provides a brief history of domestic spying in the United States, leading up to and through the passage of the Foreign Intelligence Surveillance Act of 1978 (“FISA”). FISA constituted the first major legislative effort to regulate the electronic surveillance of American citizens or permanent residents within the United States for foreign intelligence or international counterterrorism purposes, and Part 1 concludes by outlining the key provisions of this landmark statute. Part 2 of the paper traces the chronology of revelations about the NSA program and relevant statutory developments, starting with the original disclosure of the program in December of 2005 and ending with revelations made in August of 2013. Part 3 of the paper unpacks the language of Article 17 of the ICCPR, and discusses the obligations of states parties to uphold the right to privacy enshrined there. This Part then compares what we know about the NSA program with state responsibilities under the ICCPR.
ID 2327806
SSRN Scholarly Paper
2013/08/31
http://papers.ssrn.com/abstract=2327806
2014-01-09 20:41:55
papers.ssrn.com
attachment
Snapshot
2014-01-09 20:41:55
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2327806#.Us4ZoMEQl_c.twitter
text/html
utf-8
attachment
SSRN-id2327806.pdf
application/pdf
webpage
Wired Enterprise
Finley
Klint
indie web
Twitter
Out in the Open: An NSA-Proof Twitter, Built With Code From Bitcoin and BitTorrent | Wired Enterprise | Wired.com
Miguel Freitas has built a more secure and robust alternative to Twitter, making use of code from two other massively successful online projects: bitcoin and BitTorrent.
2014-01-13
Out in the Open
http://www.wired.com/wiredenterprise/2014/01/twister/
2014-01-13 15:39:50
attachment
Snapshot
2014-01-13 15:39:50
http://www.wired.com/wiredenterprise/2014/01/twister/
text/html
utf-8
webpage
Bloomberg
Talev
Margaret
Snowden Left in Russia’s Cold as Obama Prepares NSA Limit
President Barack Obama and his advisers aren’t discussing clemency for Edward Snowden as they draw up a response to the backlash over U.S. government surveillance, according to an administration official with knowledge of the deliberations.
Jan 8, 2014 12:00 AM ET
http://www.bloomberg.com/news/2014-01-08/snowden-left-in-russia-s-cold-as-obama-prepares-nsa-limit.html
2014-01-09 20:42:35
attachment
Bloomberg Printable
2014-01-09 20:42:37
http://www.bloomberg.com/news/print/2014-01-08/snowden-left-in-russia-s-cold-as-obama-prepares-nsa-limit.html
text/html
utf-8
webpage
Freedom of the Press Foundation
Ellsberg
Daniel
On Secrecy, Oaths, and Edward Snowden
These two pieces, the first by Marcy Wheeler, in part commenting on the second by Amy Davidson in the New Yorker (along with Snowden himself, in his interview with Bart Gellman
2014-01-08
https://pressfreedomfoundation.org/blog/2014/01/secrecy-oaths-and-edward-snowden
2014-01-09 20:47:00
English
attachment
Snapshot
2014-01-09 20:47:00
https://pressfreedomfoundation.org/blog/2014/01/secrecy-oaths-and-edward-snowden
text/html
utf-8
webpage
Freedom of the Press Foundation
Timm
Trevor
Intel Committee Published Fact-Free Press Release About Secret 'Damage' Assessments of NSA Leaks
House Intelligence Committee chairman Rep. Mike Rogers and his Democractic counterpart Rep. Dutch Ruppersberger published a press release today touting a classified Defense Department report alleging that Edward Snowden’s leaks—and by proxy, stories published by news organizations—threaten national security and “are likely to have lethal consequences for our troops in the field.”
2014-01-09
https://pressfreedomfoundation.org/blog/2014/01/intel-committee-published-fact-free-press-release-about-secret-damage-assessments-nsa
2014-01-09 21:01:34
attachment
Snapshot
2014-01-09 21:01:34
https://pressfreedomfoundation.org/blog/2014/01/intel-committee-published-fact-free-press-release-about-secret-damage-assessments-nsa
text/html
utf-8
webpage
NationalJournal.com
Volz
Dustin
Lawmakers Skeptical Obama Will Reform NSA After White House Summit
The president sat down with a small group of lawmakers Thursday to discuss NSA surveillance. What happens next is anyone's guess.
2014-01-09
http://www.nationaljournal.com/technology/lawmakers-skeptical-obama-will-reform-nsa-after-white-house-summit-20140109
2014-01-09 21:02:20
attachment
After Meeting with Obama, Bob Goodlatte Calls for Reform of Phone Dragnet | emptywheel
2014-01-09 21:02:49
http://www.emptywheel.net/2014/01/09/after-meeting-with-obama-bob-goodlatte-calls-for-reform-of-phone-dragnet/
text/html
utf-8
attachment
House Passes Innovation Act to Make Reforms to our Patent System
2014-01-09 21:02:46
http://judiciary.house.gov/news/2013/01092014.html
text/html
utf-8
attachment
Snapshot
2014-01-09 21:02:20
http://www.nationaljournal.com/technology/lawmakers-skeptical-obama-will-reform-nsa-after-white-house-summit-20140109
text/html
utf-8
webpage
NPR.org
Memmott
Mark
NSA Says It Would Welcome Public Advocate At FISA Court
Revelations about the National Security Agency's surveillance programs have led to calls for change.
2014-01-09
http://www.npr.org/blogs/thetwo-way/2014/01/09/261079074/nsa-says-it-would-welcome-public-advocate-at-fisa-court
2014-01-09 21:03:04
attachment
Snapshot
2014-01-09 21:03:04
http://www.npr.org/blogs/thetwo-way/2014/01/09/261079074/nsa-says-it-would-welcome-public-advocate-at-fisa-court?sc=tw&cc=share
text/html
utf-8
webpage
Aftenposten
Færaas
Arild
Sources: We were pressured to weaken the mobile security in the 80's
Four men who were part of a group that wrote mobile history tell for the first time how strong protection against eavesdropping of cell phones was weakened.
2014-01-09
Sources
http://www.aftenposten.no/nyheter/uriks/Sources-We-were-pressured-to-weaken-the-mobile-security-in-the-80s-7413285.html
2014-01-09 22:10:48
attachment
Snapshot
2014-01-09 22:10:48
http://www.aftenposten.no/nyheter/uriks/Sources-We-were-pressured-to-weaken-the-mobile-security-in-the-80s-7413285.html#.Us8SnGRDvrN
text/html
utf-8
newspaperArticle
Technology
The Guardian
ISSN 0261-3077
Hern
Alex
Data and computer security
Google
Internet
Prism
Search engines
technology
Anonymous search tool DuckDuckGo answered 1bn queries in 2013
The 'anti-Google', which searches the web without tracking or monitoring the user, now answers 4m queries a day
2014-01-09T08:24EST
en-GB
http://www.theguardian.com/technology/2014/jan/09/anonymous-search-tool-duckduckgo-1bn-queries-2013-google
2014-01-10 16:36:22
The Guardian
attachment
Guardian Snapshot
2014-01-10 16:36:24
http://www.theguardian.com/technology/2014/jan/09/anonymous-search-tool-duckduckgo-1bn-queries-2013-google
text/html
utf-8
blogPost
Foreign Policy Blogs
Harris
Shane
Hudson
John
Inside the White House Meetings to Reform the NSA
January 9, 2014 - 06:36 Pm
http://complex.foreignpolicy.com/posts/2014/01/09/inside_the_white_house_meetings_to_reform_the_nsa
2014-01-10 16:39:08
attachment
Foreign Policy Snapshot
2014-01-10 16:39:11
http://complex.foreignpolicy.com/posts/2014/01/09/inside_the_white_house_meetings_to_reform_the_nsa#sthash.Lfm5vICe.dpbs
text/html
utf-8
webpage
Huffington Post
Reilly
Ryan J.
Sledge
Matt
FBI Director: Snowden No 'Hero' For Revealing Government Operating As 'Founders Intended'
WASHINGTON -- FBI Director James Comey said he thinks there's a legitimate debate to be had about the National Security Agency's phone surveillance program. But don't get him started on the notion that the man who sparked that debate, leaker Edward Snowden, should be called a whistleblower.
2014-01-09
FBI Director
http://www.huffingtonpost.com/2014/01/09/fbi-director-snowden_n_4571257.html?utm_hp_ref=tw
2014-01-10 16:41:59
attachment
Huffington Post
2014-01-10 16:42:01
http://www.huffingtonpost.com/2014/01/09/fbi-director-snowden_n_4571257.html?view=print&comm_ref=false
text/html
utf-8
blogPost
Van Buren
Peter
Whistleblowing Is About the Message, Not the Messenger | The Dissenter
The current media pablum about whether Snowden is “narcissistic” or “spiteful” or the devil himself is nonsense.
2014-01-09
http://dissenter.firedoglake.com/2014/01/09/whistleblowing-is-about-the-message-not-the-messenger/
2014-01-10 16:42:19
attachment
Snapshot
2014-01-10 16:42:19
http://dissenter.firedoglake.com/2014/01/09/whistleblowing-is-about-the-message-not-the-messenger/
text/html
utf-8
magazineArticle
Foreign Policy
Gomez
David
I Spy
Welcome to the FBI's new mission.
January 9, 2014
English
http://www.foreignpolicy.com/articles/2014/01/09/i_spy_fbi_national_security
2014-01-10 16:48:47
Foreign Policy
attachment
Foreign Policy Snapshot
2014-01-10 16:48:52
http://www.foreignpolicy.com/articles/2014/01/09/i_spy_fbi_national_security#sthash.KqlRGPCk.dpbs
text/html
utf-8
webpage
PCMAG
Eddy
Max
What It's Like When The FBI Asks You To Backdoor Your Software
When an FBI agent casually approached Nico Sell about installing a backdoor into her secure messaging program, the agent did not know what he was in for.
2014-01-08
http://securitywatch.pcmag.com/security/319544-what-it-s-like-when-the-fbi-asks-you-to-backdoor-your-software
2014-01-10 16:49:30
attachment
Snapshot
2014-01-10 16:49:30
http://securitywatch.pcmag.com/security/319544-what-it-s-like-when-the-fbi-asks-you-to-backdoor-your-software
text/html
windows-1252
blogPost
Ashkan Soltani
ashkansoltani
The Cost of Surveillance
The Yale Law Journal Online (YLJO) just published an article that I co-authored with Kevin Bankston (first workshopped at the Privacy Law Scholars Conference last year) entitled "Tiny Constables an...
2014-01-09
http://ashkansoltani.org/2014/01/09/the-cost-of-surveillance/
2014-01-10 16:50:17
attachment
Snapshot
2014-01-10 16:50:17
http://ashkansoltani.org/2014/01/09/the-cost-of-surveillance/
text/html
utf-8
attachment
The Yale Law Journal Online - Tiny Constables and the Cost of Surveillance: Making Cents Out of United States v. Jones
2014-01-10 16:50:31
http://www.yalelawjournal.org/the-yale-law-journal-pocket-part/constitutional-law/tiny-constables-and-the-cost-of-surveillance:-making-cents-out-of-united-states-v.-jones
text/html
utf-8
newspaperArticle
Politics
The Washington Post
ISSN 0190-8286
Nakamura
David
Behind-the-scenes, White House preoccupied by NSA surveillance controversy
Obama may be talking about income inequality in public, but in private, the NSA preoccupies the White House.
2014-01-09
en-US
http://www.washingtonpost.com/politics/behind-the-scenes-white-house-preoccupied-by-nsa-surveillance-controversy/2014/01/09/2d6ee2ba-789b-11e3-8963-b4b654bcc9b2_story.html
2014-01-10 16:54:56
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-10 16:54:58
http://www.washingtonpost.com/politics/behind-the-scenes-white-house-preoccupied-by-nsa-surveillance-controversy/2014/01/09/2d6ee2ba-789b-11e3-8963-b4b654bcc9b2_print.html
text/html
utf-8
webpage
Watkins
Ali
WASHINGTON: How New Mexico’s Sen. Heinrich came to be NSA critic | Mass Surveillance | McClatchy DC
There was little in the new senator’s voting record from his time in the House of Representatives that would have telegraphed his transformation into one of the NSA’s fiercest critics.
2014-01-10
WASHINGTON
http://www.mcclatchydc.com/2014/01/10/214038/how-new-mexicos-sen-heinrich-came.html
2014-01-10 16:55:07
attachment
Snapshot
2014-01-10 16:55:07
http://www.mcclatchydc.com/2014/01/10/214038/how-new-mexicos-sen-heinrich-came.html
text/html
utf-8
radioBroadcast
NPR
Inskeep
Steve
Inglis
John C.
Transcript: NSA Deputy Director John Inglis
Morning Edition's Steve Inskeep talks with John Inglis about running a spy agency in a democracy.
NPR.org
2013-01-10
English
Transcript
http://www.npr.org/2014/01/10/261282601/transcript-nsa-deputy-director-john-inglis
2014-01-10 16:55:39
attachment
Snapshot
2014-01-10 16:55:39
http://www.npr.org/2014/01/10/261282601/transcript-nsa-deputy-director-john-inglis?live=1
text/html
utf-8
blogPost
Washington Post
Nakamura
David
NSA
Obama NSA
obama nsa speech
Obama to speak on NSA reforms Jan. 17, White House says
The president and his aides have been focused behind-the-scenes this week on finishing its review of the spy agency.
2014-01-10
http://www.washingtonpost.com/blogs/post-politics/wp/2014/01/10/obama-to-speak-on-nsa-reforms-jan-17-white-house-says/
2014-01-10 20:49:27
attachment
Snapshot
2014-01-10 20:49:27
http://www.washingtonpost.com/blogs/post-politics/wp/2014/01/10/obama-to-speak-on-nsa-reforms-jan-17-white-house-says/?wpisrc=al_comboPN_p
text/html
utf-8
webpage
NPR.org
Neuman
Scott
The Case Against Clemency: Expert Says Snowden's Leaks Hurt Security
Former NSA general counsel Stewart Baker says Edward Snowden damaged U.S. intelligence gathering.
2014-01-09
The Case Against Clemency
http://www.npr.org/blogs/thetwo-way/2014/01/09/261044030/the-case-against-clemency-snowdens-leaks-damaged-security
2014-01-10 20:50:33
attachment
Snapshot
2014-01-10 20:50:33
http://www.npr.org/blogs/thetwo-way/2014/01/09/261044030/the-case-against-clemency-snowdens-leaks-damaged-security
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Ackerman
Spencer
Barack Obama
espionage
FBI
Fisa court
Law
NSA
Obama administration
Privacy
Ron Wyden
Surveillance
The NSA files
United States
US Congress
US constitution and civil liberties
US domestic policy
US foreign policy
US politics
US Senate
World news
NSA makes final push to retain most mass surveillance powers
• Deputy director: bulk data collection is an 'insurance policy'• President Obama set to announce future scope of operations
2014-01-10T12:23EST
en-GB
http://www.theguardian.com/world/2014/jan/10/nsa-mass-surveillance-powers-john-inglis-npr?CMP=twt_gu
2014-01-10 20:52:18
The Guardian
attachment
Guardian Snapshot
2014-01-10 20:52:20
http://www.theguardian.com/world/2014/jan/10/nsa-mass-surveillance-powers-john-inglis-npr?CMP=twt_gu
text/html
utf-8
blogPost
Schneier on Security
Schneier
Bruce
How the NSA Threatens National Security
2014-01-13
https://www.schneier.com/blog/archives/2014/01/how_the_nsa_thr.html
2014-01-13 15:40:34
English
attachment
Schneier on Security: How the NSA Threatens National Security
2014-01-13 15:40:35
https://www.schneier.com/blog/archives/2014/01/how_the_nsa_thr.html
text/html
utf-8
webpage
Lennard
Natasha
Drones
Glenn Greenwald
Jeremy Scahill
JSOC
Military
NSA
personhood
Philosophy
Salon.com
subjects
Surveillance
NSA-based drone strikes: A deep philosophical problem
A target that emerges from electronic surveillance cannot be assumed to align with a body on the ground to kill
2014-02-13
NSA-based drone strikes
http://www.salon.com/2014/02/13/nsa_based_drone_strikes_a_deep_philosophical_problem/
2014-02-14 18:46:04
attachment
Snapshot
2014-02-14 18:46:04
http://www.salon.com/2014/02/13/nsa_based_drone_strikes_a_deep_philosophical_problem/
text/html
utf-8
webpage
Center for Strategic and International Studies
Lewis
James Andrew
2014 as the Year of Encryption: A (Very) Brief History of Encryption Policy
2014-01-10
http://csis.org/publication/2014-year-encryption-very-brief-history-encryption-policy
2014-01-13 17:11:31
attachment
2014 as the Year of Encryption: A (Very) Brief History of Encryption Policy | Center for Strategic and International Studies
2014-01-13 17:11:32
http://csis.org/publication/2014-year-encryption-very-brief-history-encryption-policy
text/html
utf-8
webpage
ABC News
Thomas
Pierre
election news
FBI
james comey
pierre thomas
political news
political news articles
politics news
super bowl
FBI Chief: 'I Worry' About Homegrown Jihadists
FBI Director James Comey speaks to reporters about emerging terrorist threats
2014-01-09
FBI Chief
http://abcnews.go.com/Politics/fbi-director-james-comey-worry-threat-homegrown-pajama/story?id=21481116
2014-01-13 17:32:10
attachment
Snapshot
2014-01-13 17:32:10
http://abcnews.go.com/Politics/fbi-director-james-comey-worry-threat-homegrown-pajama/story?id=21481116&singlePage=true
text/html
utf-8
magazineArticle
Slate
ISSN 1091-2339
Gage
Beverly
COINTELPRO
Band of Burglars
The infamous Media, Pa., FBI break-in paved the way for the Church Committee. Can it inspire intelligence reform in our own time?
Jan. 9 2014
en-US
http://www.slate.com/articles/news_and_politics/history/2014/01/media_pa_fbi_break_in_revelations_what_we_can_learn_from_them_about_intelligence.html
2014-01-13 17:33:36
Slate
attachment
Slate Snapshot
2014-01-13 17:33:40
http://www.slate.com/articles/news_and_politics/history/2014/01/media_pa_fbi_break_in_revelations_what_we_can_learn_from_them_about_intelligence.single.html
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Ackerman
Spencer
Barack Obama
espionage
FBI
Fisa court
Law
NSA
Obama administration
Privacy
Ron Wyden
Surveillance
The NSA files
United States
US Congress
US constitution and civil liberties
US domestic policy
US foreign policy
US politics
US Senate
World news
NSA makes final push to retain most mass surveillance powers
• Deputy director: bulk data collection is an 'insurance policy'• President Obama set to announce future scope of operations
2014-01-10T12:23EST
en-GB
http://www.theguardian.com/world/2014/jan/10/nsa-mass-surveillance-powers-john-inglis-npr?CMP=twt_gu
2014-01-13 17:34:35
The Guardian
attachment
Guardian Snapshot
2014-01-13 17:34:37
http://www.theguardian.com/world/2014/jan/10/nsa-mass-surveillance-powers-john-inglis-npr?CMP=twt_gu
text/html
utf-8
blogPost
Walter's Stupid Ideas
van Holst
Walter
Why Snowden is no Agee and why it is authoritarian thinking to compare the two
The blog War on the Rocks (of which I had never heard before, but who needs serendipity when you follow eccentrics on Twitter) recently ran a piece by Mark Stout arguing that if Edward Snowden shou...
2014-01-11
http://waltersstupidideas.com/why-snowden-is-no-agee-and-why-it-is-authoritarian-thinking-to-compare-the-two/
2014-01-13 17:43:06
attachment
Snapshot
2014-01-13 17:43:06
http://waltersstupidideas.com/why-snowden-is-no-agee-and-why-it-is-authoritarian-thinking-to-compare-the-two/
text/html
utf-8
newspaperArticle
Lifestyle
The Washington Post
ISSN 0190-8286
Medsger
Betty
COINTELPRO
Remembering an earlier time when a theft unmasked government surveillance
The 1971 burglary of an FBI office raised an unprecedented outcry against U.S. tactics.
2014-01-11
en-US
http://www.washingtonpost.com/lifestyle/style/remembering-an-earlier-time-when-a-theft-unmasked-government-surveillance/2014/01/10/30e9ee44-7963-11e3-8963-b4b654bcc9b2_story.html?tid=HP_top
2014-01-13 20:21:07
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-13 20:21:12
http://www.washingtonpost.com/lifestyle/style/remembering-an-earlier-time-when-a-theft-unmasked-government-surveillance/2014/01/10/30e9ee44-7963-11e3-8963-b4b654bcc9b2_print.html?tid=HP_top
text/html
utf-8
webpage
The Times of Israel
Shamah
David
cyber-security
Magal Security
safe cities
Taiwan
‘Safe City’ gives town’s residents more protection, free connection
Ramat Hasharon has installed a thorough and sophisticated Safe City security system that is getting attention around the world
2014-01-05
http://www.timesofisrael.com/safe-city-gives-towns-residents-more-protection-free-connection/
2014-01-13 20:54:24
attachment
Snapshot
2014-01-13 20:54:24
http://www.timesofisrael.com/safe-city-gives-towns-residents-more-protection-free-connection/
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Lewis
Paul
Barack Obama
Edward Snowden
espionage
John McCain
NSA
Obama administration
Privacy
Surveillance
The NSA files
United States
US Congress
US domestic policy
US foreign policy
US national security
US politics
US Senate
World news
John McCain seeks congressional investigation into 'broken' NSA
• 'There has been overreach' says Republican senator • Obama to announce surveillance proposals on Friday
2014-01-12T11:09EST
en-GB
http://www.theguardian.com/world/2014/jan/12/john-mccain-nsa-congressional-investigation
2014-01-13 21:18:11
The Guardian
attachment
Guardian Snapshot
2014-01-13 21:18:13
http://www.theguardian.com/world/2014/jan/12/john-mccain-nsa-congressional-investigation
text/html
utf-8
blogPost
Notes
Gallagher
Ryan
culture
current affairs
home affairs
investigative journalism
journalist
New Statesman
open democracy
politics
reporter
R.J. Gallagher
Ryan Gallagher
Scotland
Scottish
Slate
Society
the big issue
The Guardian
writer
Ryan Gallagher | RJGallagher.co.uk: The EU Parliamentary Inquiry's Report on Mass Surveillance
Online home of Scottish journalist Ryan Gallagher
2012-01-11
http://notes.rjgallagher.co.uk/2014/01/eu-surveillance-inquiry-report-snowden-leaks-nsa-gchq.html
2014-01-13 21:18:26
Ryan Gallagher | RJGallagher.co.uk
attachment
Snapshot
2014-01-13 21:18:26
http://notes.rjgallagher.co.uk/2014/01/eu-surveillance-inquiry-report-snowden-leaks-nsa-gchq.html
text/html
utf-8
webpage
Sachs
Rob
Assange lawyer skeptical Obama will reform NSA
Edward Snowden
Michael Ratner
NSA
nsa leak
NSA reform
nsa surveillance program
Rob Sachs
Assange lawyer skeptical Obama will reform NSA
By Rob Sachs
WASHINGTON (VR)—What should be the limits of NSA access to the phone records of Americans?
2014-01-11T04:25:00-0500
http://voiceofrussia.com/us/2014_01_11/Assange-lawyer-skeptical-Obama-will-reform-NSA-3567/
2014-01-13 21:19:40
attachment
Snapshot
2014-01-13 21:19:40
http://voiceofrussia.com/us/2014_01_11/Assange-lawyer-skeptical-Obama-will-reform-NSA-3567/
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Nakashima
Ellen
NSA phone record collection does little to prevent terrorist attacks, group says
Study of 225 cases finds traditional law enforcement methods usually provide the spark for an investigation.
2014-01-12
en-US
http://www.washingtonpost.com/world/national-security/nsa-phone-record-collection-does-little-to-prevent-terrorist-attacks-group-says/2014/01/12/8aa860aa-77dd-11e3-8963-b4b654bcc9b2_story.html?tid=auto_complete
2014-01-13 21:20:10
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-13 21:20:12
http://www.washingtonpost.com/world/national-security/nsa-phone-record-collection-does-little-to-prevent-terrorist-attacks-group-says/2014/01/12/8aa860aa-77dd-11e3-8963-b4b654bcc9b2_print.html?tid=auto_complete
text/html
utf-8
blogPost
emptywheel
Wheeler
Marcy
The NSA Does Know the Identity of Some of the Targets It Is Contact-Chaining | emptywheel
2014-01-13
http://www.emptywheel.net/2014/01/13/the-nsa-does-know-the-identity-of-some-of-the-targets-it-is-contact-chaining/
2014-01-13 21:22:02
attachment
The NSA Does Know the Identity of Some of the Targets It Is Contact-Chaining | emptywheel
2014-01-13 21:22:03
http://www.emptywheel.net/2014/01/13/the-nsa-does-know-the-identity-of-some-of-the-targets-it-is-contact-chaining/
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Miller
Greg
Goldman
Adam
Spy agencies’ attorney has fiercely defended surveillance programs revealed by Snowden
Attorney Robert S. Litt has led an unusually high-profile response to the Snowden leaks.
2014-01-13
en-US
http://www.washingtonpost.com/world/national-security/2014/01/12/43841ac6-7a34-11e3-af7f-13bf0e9965f6_story.html
2014-01-13 21:22:31
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-13 21:22:33
http://www.washingtonpost.com/world/national-security/2014/01/12/43841ac6-7a34-11e3-af7f-13bf0e9965f6_print.html
text/html
utf-8
blogPost
TomDispatch
Van Buren
Peter
Tomgram: Peter Van Buren, We Have to Destroy Our Constitution to Save It
2014-01-12
http://www.tomdispatch.com/post/175792/tomgram%3A_peter_van_buren%2C_we_have_to_destroy_our_constitution_to_save_it/
2014-01-13 21:22:44
en-US
attachment
Tomgram: Peter Van Buren, We Have to Destroy Our Constitution to Save It | TomDispatch
2014-01-13 21:22:45
http://www.tomdispatch.com/post/175792/tomgram%3A_peter_van_buren%2C_we_have_to_destroy_our_constitution_to_save_it/
text/html
windows-1252
webpage
The Washingtion Times
Dinan
Stephen
Spending bill takes first swipe at NSA over domestic spying
Tucked inside the massive new government spending bill are several demands from Congress that the National Security Agency finally report to Congress on the details of its snooping programs, including the number of telephone records collected and the number actually viewed by NSA employees.
2014-01-14
http://www.washingtontimes.com/news/2014/jan/14/spending-bill-takes-first-swipe-nsa/
2014-01-14 20:03:20
attachment
Snapshot
2014-01-14 20:03:20
http://www.washingtontimes.com/news/2014/jan/14/spending-bill-takes-first-swipe-nsa/
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Nakashima
Ellen
Man convicted in terror case seeks evidence from warrantless spying
Oregon man guilty of Christmas tree bombing plot opens door for possible constitutional challenge to NSA program.
2014-01-14
en-US
http://www.washingtonpost.com/world/national-security/man-convicted-in-terror-case-challenges-warrantless-spying/2014/01/13/af7da5de-7cba-11e3-95c6-0a7aa80874bc_story.html
2014-01-14 20:04:13
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-14 20:04:15
http://www.washingtonpost.com/world/national-security/man-convicted-in-terror-case-challenges-warrantless-spying/2014/01/13/af7da5de-7cba-11e3-95c6-0a7aa80874bc_print.html
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Oltermann
Philip
Angela Merkel
Barack Obama
espionage
Germany
NSA
Surveillance
United States
World news
US will not enter bilateral no-spy deal with Germany, reports media
Despite assurance from Barack Obama, United States has not ruled out bugging political leaders' calls, claims German paper
2014-01-14T08:05EST
en-GB
http://www.theguardian.com/world/2014/jan/14/us-not-entering-no-spy-agreement-germany-media
2014-01-14 20:04:51
The Guardian
attachment
Guardian Snapshot
2014-01-14 20:04:54
http://www.theguardian.com/world/2014/jan/14/us-not-entering-no-spy-agreement-germany-media
text/html
utf-8
webpage
Braun
Stephen
Phone firms balking at proposal that would force them to store surveillance data
WASHINGTON — Telephone companies are quietly balking at the idea of changing how they collect and store Americans' phone records to help the National Security Agency's surveillance programs
2014-01-14
http://www.startribune.com/politics/national/240049371.html
2014-01-14 20:05:45
attachment
Snapshot
2014-01-14 20:05:45
http://www.startribune.com/politics/national/240049371.html
text/html
utf-8
webpage
Dozier
Kimberly
Lawmakers to Obama: show us the money you spend on intelligence
WASHINGTON — A bipartisan group of lawmakers wants the president to disclose what the U
2014-01-14
Lawmakers to Obama
http://www.startribune.com/politics/national/240143661.html
2014-01-14 20:07:22
attachment
Snapshot
2014-01-14 20:07:22
http://www.startribune.com/politics/national/240143661.html
text/html
utf-8
blogPost
The Dissenter
Gosztola
Kevin
Former Church Committee Investigator to Testify at Trial Against US Military Spying on Activists
A former Church Committee investigator, former Army intelligence officer and a professor of constitutional law has agreed to be an expert witness in a
2014-01-13
http://dissenter.firedoglake.com/2014/01/13/former-church-committee-investigator-to-testify-at-trial-against-us-military-spying-on-activists/
2014-01-14 20:08:15
en-US
attachment
Snapshot
2014-01-14 20:08:15
http://dissenter.firedoglake.com/2014/01/13/former-church-committee-investigator-to-testify-at-trial-against-us-military-spying-on-activists/
text/html
utf-8
blogPost
Huffington Post
Stone
Geoffrey R.
The NSA's Telephone Metadata Program Is Unconstitutional
In my judgment the existing program is unconstitutional. As currently structured, it violates the Fourth Amendment's requirement of "reasonableness." On the other hand, it should be possible for the government to correct the deficiencies in the program in a manner that both preserves its legitimate value and substantially mitigates the risks to privacy that it currently poses.
09 Jan 2014 18:59:09 -0500
http://www.huffingtonpost.com/geoffrey-r-stone/the-nsas-telephone-meta-d_b_4571523.html
2014-01-14 20:10:45
attachment
Huffington Post
2014-01-14 20:10:48
http://www.huffingtonpost.com/geoffrey-r-stone/the-nsas-telephone-meta-d_b_4571523.html?view=print&comm_ref=false
text/html
utf-8
webpage
POLITICO
Gerstein
Josh
Barack Obama
Josh Gerstein
National Security Agency
NSA
Surveillance
The limits of President Obama’s power on NSA reform
President Barack Obama on Friday will try to put the ongoing surveillance controversy behind him, laying out reforms to U.S. intelligence-gathering activities aimed at reassuring Americans that his administration will right the balance between civil liberties and national security. But Obama’s powers have significant limits. Many of the key reforms...
2014-01-13
http://www.politico.com/story/2014/01/nsa-surveillance-limits-102081.html
2014-01-14 20:11:39
attachment
Snapshot
2014-01-14 20:11:39
http://www.politico.com/story/2014/01/nsa-surveillance-limits-102081.html
text/html
utf-8
attachment
The limits of President Obama’s power on NSA reform - Josh Gerstein - POLITICO.com
2014-01-14 20:12:23
http://www.politico.com/story/2014/01/nsa-surveillance-limits-102081_Page2.html
text/html
utf-8
webpage
MercuryNews.com
Braun
Stephen
Close ties between White House, NSA spying review panel
With just weeks remaining before its first deadline to report back to the White House, the supposedly independent review panel has effectively been operating as an arm of the Office of the Director of National Intelligence, which oversees the NSA and all other U.S. spy efforts.
2013-09-22
http://www.mercurynews.com/nation-world/ci_24151392/close-ties-between-white-house-nsa-spying-review
2014-01-14 20:14:18
attachment
Snapshot
2014-01-14 20:14:18
http://www.mercurynews.com/nation-world/ci_24151392/close-ties-between-white-house-nsa-spying-review
text/html
utf-8
webpage
Foreign Policy
Ricks
Thomas E.
The more I listen to American intelligence officials, the more I edge toward Snowden
2014-01-10
http://ricks.foreignpolicy.com/posts/2014/01/10/the_more_i_listen_to_american_intelligence_officials_the_more_i_edge_toward_snowden
2014-01-14 20:19:08
en-US
attachment
The more I listen to American intelligence officials, the more I edge toward Snowden
2014-01-14 20:19:09
http://ricks.foreignpolicy.com/posts/2014/01/10/the_more_i_listen_to_american_intelligence_officials_the_more_i_edge_toward_snowden
text/html
utf-8
webpage
Just Security
Monday
Marshall Erwin
Guest Post: Connecting the Dots: Assessing the Effectiveness of Bulk Phone Records Collection
A Forum on Law, Rights, and U.S. National Security
2014-01-13
Guest Post
http://justsecurity.org/2014/01/13/guest-post-connecting-dots/
2014-01-14 20:31:53
attachment
Snapshot
2014-01-14 20:31:53
http://justsecurity.org/2014/01/13/guest-post-connecting-dots/
text/html
utf-8
webpage
TheHill
Helfrich
Jesse
President’s goal for NSA reform — no more Edward Snowdens
Changes will include more stringent — and more frequent — vetting of security clearances.
Text
2014-01-14T06:00-05:00
http://thehill.com/homenews/administration/195326-presidents-goal-for-nsa-reform-no-more-edward-snowdens
2014-01-14 20:45:24
und
attachment
Snapshot
2014-01-14 20:45:24
http://thehill.com/homenews/administration/195326-presidents-goal-for-nsa-reform-no-more-edward-snowdens
text/html
utf-8
webpage
Wired Enterprise
Finley
Klint
firefox
mozilla
Mozilla Calls on World to Protect Firefox Browser From the NSA | Wired Enterprise | Wired.com
Brendan Eich is the chief technology officer of the Mozilla Foundation, the non-profit behind the Firefox web browser. Among many other things, he oversees the Firefox security team -- the software engineers who work to steel the browser against online attacks from hackers, phishers, and other miscreants -- and that team is about to get bigger. Much, much bigger.
2014-01-14
http://www.wired.com/wiredenterprise/2014/01/mozilla/
2014-01-14 20:47:28
attachment
Snapshot
2014-01-14 20:47:28
http://www.wired.com/wiredenterprise/2014/01/mozilla/
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Savage
Charlie
Classified Information and State Secrets
Ellsberg, Daniel
Freedom of the Press
Freedom of the Press Foundation
House Committee on Intelligence
News and News Media
Pentagon Papers
Snowden, Edward J
Surveillance of Citizens by Government
wikileaks
Snowden to Join Board of Press Freedom Foundation
The foundation set up by Daniel Ellsberg, the Pentagon Papers leaker and a supporter of Edward J. Snowden, encourages publishing government secrets in the public interest.
2014-01-14
http://www.nytimes.com/2014/01/15/us/politics/snowden-to-join-board-of-press-freedom-foundation.html
2014-01-14 21:07:01
NYTimes.com
attachment
New York Times Snapshot
2014-01-14 21:07:01
http://www.nytimes.com/2014/01/15/us/politics/snowden-to-join-board-of-press-freedom-foundation.html?_r=1
text/html
utf-8
magazineArticle
The New Yorker
ISSN 0028-792X
Talbot
Margaret
Betty Medsger
COINTELPRO
Federal Bureau of Investigation (F.B.I.)
John Raines
politics
“The Burglary”
William Davidon
Opened Files
January 20, 2014
http://www.newyorker.com/talk/comment/2014/01/20/140120taco_talk_talbot?mbid=social_tablet_e
2014-01-15 18:14:18
The New Yorker
attachment
The New Yorker
2014-01-15 18:14:20
http://www.newyorker.com/talk/comment/2014/01/20/140120taco_talk_talbot?mbid=social_tablet_e?printable=true
text/html
windows-1252
newspaperArticle
The New York Times
ISSN 0362-4331
Sanger
David E.
Shanker
Thom
china
Computers and the Internet
Computer Security
Cyberattacks and Hackers
Cyberwarfare
National Security Agency
Snowden, Edward J
N.S.A. Devises Radio Pathway Into Computers
The agency has put software in thousands of computers that allows for surveillance and can also create a path for launching cyberattacks, according to documents, experts and officials.
2014-01-14
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html
2014-01-15 18:14:36
NYTimes.com
attachment
New York Times Snapshot
2014-01-15 18:14:36
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?_r=0
text/html
utf-8
webpage
Threat Level
Levy
Steven
FISA
Foreign Intelligence Surveillance Court
Fourth Amendment
NSA
Patriot Act
Spying
Surveillance
I Spent Two Hours Talking With the NSA's Bigwigs. Here's What Has Them Mad | Threat Level | Wired.com
My expectations were low when I asked the National Security Agency to cooperate with my story on the impact of Edward Snowden’s leaks on the tech industry. Imagine my surprise when they agreed to let me behind the fence.
2014-01-13
http://www.wired.com/threatlevel/2014/01/nsa-surveillance/
2014-01-15 19:40:32
attachment
Snapshot
2014-01-15 19:40:32
http://www.wired.com/threatlevel/2014/01/nsa-surveillance/
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Baker
Peter
Savage
Charlie
Bates, John D
Espionage and Intelligence Services
Foreign Intelligence Surveillance Court
National Security Agency
Obama, Barack
Roberts, John G Jr
Surveillance of Citizens by Government
Obama to Place Some Restraints on Surveillance
President Obama plans to increase limits on access to phone data, call for privacy safeguards for foreigners and propose the creation of a public advocate post, according to people briefed on his thinking.
2014-01-14
http://www.nytimes.com/2014/01/15/us/politics/judge-warns-proposed-safeguards-could-hamper-surveillance-court.html
2014-01-15 19:44:56
NYTimes.com
attachment
New York Times Snapshot
2014-01-15 19:44:56
http://www.nytimes.com/2014/01/15/us/politics/judge-warns-proposed-safeguards-could-hamper-surveillance-court.html?_r=0
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Nakashima
Ellen
Surveillance-court judges oppose White House group’s NSA proposals
White House panel’s ideas would cut the secret court’s effectiveness, letter claims as Obama weighs reforms.
2014-01-15
en-US
http://www.washingtonpost.com/world/national-security/surveillance-court-judges-oppose-white-house-groups-nsa-proposals/2014/01/14/3c41e1e2-7d60-11e3-93c1-0e888170b723_story.html
2014-01-15 19:48:57
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-15 19:48:59
http://www.washingtonpost.com/world/national-security/surveillance-court-judges-oppose-white-house-groups-nsa-proposals/2014/01/14/3c41e1e2-7d60-11e3-93c1-0e888170b723_print.html
text/html
utf-8
webpage
Mother Jones
Drum
Kevin
Obama plans no significant changes to NSA surveillance
The reforms he announces this week will be purely cosmetic.
2013-01-15
http://www.motherjones.com/kevin-drum/2014/01/obama-plans-no-significant-changes-nsa-surveillance
2014-01-15 19:51:38
attachment
Snapshot
2014-01-15 19:51:38
http://www.motherjones.com/kevin-drum/2014/01/obama-plans-no-significant-changes-nsa-surveillance
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Whitlock
Craig
Timberg
Craig
Border-patrol drones being borrowed by other agencies more often than previously known
Records show border-patrol drones are being borrowed by the agencies more often than previously thought.
2014-01-15
en-US
http://www.washingtonpost.com/world/national-security/border-patrol-drones-being-borrowed-by-other-agencies-more-often-than-previously-known/2014/01/14/5f987af0-7d49-11e3-9556-4a4bf7bcbd84_story.html?wprss=rss_AllWPStoriesandBlogs&Post+generic=%3Ftid%3Dsm_twitter_washingtonpost
2014-01-15 19:52:36
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-15 19:52:38
http://www.washingtonpost.com/world/national-security/border-patrol-drones-being-borrowed-by-other-agencies-more-often-than-previously-known/2014/01/14/5f987af0-7d49-11e3-9556-4a4bf7bcbd84_print.html?wprss=rss_AllWPStoriesandBlogs&Post+generic=%3Ftid%3Dsm_twitter_washingtonpost
text/html
utf-8
blogPost
Washington Post
Fung
Brian
Cyber Command’s exploding budget, in 1 chart
The agency's budget will more than double under the just-passed House omnibus spending bill.
2014-01-15
http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/15/cyber-commands-exploding-budget-in-1-chart/
2014-01-15 21:41:41
attachment
Snapshot
2014-01-15 21:41:41
http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/15/cyber-commands-exploding-budget-in-1-chart/
text/html
utf-8
webpage
Center for Democracy and Technology
Nojeim
Greg
Growing Consensus on Necessary Surveillance Reforms | Center for Democracy & Technology
2014-01-15
https://www.cdt.org/blogs/greg-nojeim/1501growing-consensus-necessary-surveillance-reforms
2014-01-15 21:42:29
attachment
common-ground-surveillance-principles.pdf
2014-01-15 21:43:25
https://www.cdt.org/files/pdfs/common-ground-surveillance-principles.pdf
application/pdf
utf-8
attachment
Growing Consensus on Necessary Surveillance Reforms | Center for Democracy & Technology
2014-01-15 21:42:30
https://www.cdt.org/blogs/greg-nojeim/1501growing-consensus-necessary-surveillance-reforms
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Baker
Peter
Espionage and Intelligence Services
National Security Agency
Obama, Barack
Speeches and Statements
Surveillance of Citizens by Government
Obama’s Path From Critic to Overseer of Spying
In 2007, Barack Obama described a surveillance state run amok. He is now the leader of a surveillance state that some of his own advisers think has gotten out of control.
2014-01-15
en-US
http://www.nytimes.com/2014/01/16/us/obamas-path-from-critic-to-defender-of-spying.html
2014-01-16 17:35:44
NYTimes.com
attachment
New York Times Snapshot
2014-01-16 17:35:44
http://www.nytimes.com/2014/01/16/us/obamas-path-from-critic-to-defender-of-spying.html?_r=0
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Ball
James
GCHQ
Mobile phones
NSA
Obama administration
Privacy
Surveillance
technology
The NSA files
UK news
World news
NSA collects millions of text messages daily in 'untargeted' global sweep
• NSA extracts location, contacts and financial transactions • 'Dishfire' program sweeps up 'pretty much everything it can'• GCHQ using database to search metadata from UK numbers
• Dishfire presentation on text message collection – key extracts
2014-01-16T13:55EST
en-GB
http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep
2014-01-16 20:53:56
The Guardian
attachment
Guardian Snapshot
2014-01-16 20:53:58
http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep
text/html
utf-8
attachment
NSA Dishfire presentation on text message collection – key extracts | World news | theguardian.com
2014-01-17 15:59:19
http://www.theguardian.com/world/interactive/2014/jan/16/nsa-dishfire-text-messages-documents
text/html
utf-8
attachment
NSA Dishfire presentation on text message collection – key extracts | World news | theguardian.com
2014-01-17 15:59:57
http://www.theguardian.com/world/interactive/2014/jan/16/nsa-dishfire-text-messages-documents
text/html
utf-8
attachment
NSA Dishfire presentation on text message collection – key extracts | World news | theguardian.com
2014-01-17 16:00:16
http://www.theguardian.com/world/interactive/2014/jan/16/nsa-dishfire-text-messages-documents
text/html
utf-8
attachment
NSA Dishfire presentation on text message collection – key extracts | World news | theguardian.com
2014-01-17 16:00:21
http://www.theguardian.com/world/interactive/2014/jan/16/nsa-dishfire-text-messages-documents
text/html
utf-8
attachment
NSA Dishfire presentation on text message collection – key extracts | World news | theguardian.com
2014-01-17 16:00:26
http://www.theguardian.com/world/interactive/2014/jan/16/nsa-dishfire-text-messages-documents
text/html
utf-8
attachment
NSA Dishfire presentation on text message collection – key extracts | World news | theguardian.com
2014-01-17 16:00:31
http://www.theguardian.com/world/interactive/2014/jan/16/nsa-dishfire-text-messages-documents
text/html
utf-8
attachment
NSA Dishfire presentation on text message collection – key extracts | World news | theguardian.com
2014-01-17 16:00:36
http://www.theguardian.com/world/interactive/2014/jan/16/nsa-dishfire-text-messages-documents
text/html
utf-8
attachment
NSA Dishfire presentation on text message collection – key extracts | World news | theguardian.com
2014-01-17 16:00:41
http://www.theguardian.com/world/interactive/2014/jan/16/nsa-dishfire-text-messages-documents
text/html
utf-8
newspaperArticle
Business
The Guardian
ISSN 0261-3077
Ball
James
Harding
Luke
Garside
Juliette
BT
Business
GCHQ
NSA
Surveillance
Telecommunications industry
The NSA files
UK news
UK security and counter-terrorism
verizon communications
Vodafone
World news
BT and Vodafone among telecoms companies passing details to GCHQ
Fears of customer backlash over breach of privacy as firms give GCHQ unlimited access to their undersea cables
2013-08-02T13:36EDT
en-GB
http://www.theguardian.com/business/2013/aug/02/telecoms-bt-vodafone-cables-gchq
2014-01-16 20:58:12
The Guardian
attachment
Guardian Snapshot
2014-01-16 20:58:15
http://www.theguardian.com/business/2013/aug/02/telecoms-bt-vodafone-cables-gchq
text/html
utf-8
newspaperArticle
Tech
Fitzgerald
Drew
Ramachandran
Shalini
Netflix-Traffic Feud Leads to Video Slowdown
Netflix has been at odds with Verizon and other broadband providers over how much Netflix streaming video they will carry without being paid additional fees. Now the conflict is slowing Netflix traffic.
2014-02-19T02:35:00.000Z
http://online.wsj.com/news/articles/SB10001424052702304899704579391223249896550?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702304899704579391223249896550.html
2014-02-19 22:30:02
Wall Street Journal
Wall Street Journal
ISSN 0099-9660
attachment
Wall Street Journal Snapshot
2014-02-19 22:30:05
http://online.wsj.com/news/articles/SB10001424052702304899704579391223249896550?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702304899704579391223249896550.html
text/html
utf-8
webpage
Loomis
Edward
Wiebe
J. Kirk
Drake
Thomas
Binney
William
Roark
Diane
We need real protection from the NSA: Column
Our intelligence agencies have been tearing holes into the Bill of Rights.
2014-01-16
We need real protection from the NSA
http://www.usatoday.com/story/opinion/2014/01/15/nsa-protection-snowden-spying-column/4499793/
2014-01-16 21:13:21
attachment
Snapshot
2014-01-16 21:13:21
http://www.usatoday.com/story/opinion/2014/01/15/nsa-protection-snowden-spying-column/4499793/
text/html
utf-8
webpage
Yahoo News
Knox
Oliver
Obama NSA speech on anniversary of Eisenhower warning
It’s a coincidence, White House aides say. President Barack Obama did not deliberately schedule his big NSA speech for Friday to mark the anniversary of Dwight Eisenhower’s warning that the “military-industrial complex” posed a potential threat to American democracy.
2014-01-16
http://news.yahoo.com/obama-nsa-speech-on-anniversary-of-eisenhower-warning-025532326.html
2014-01-16 21:29:21
en-US
attachment
Snapshot
2014-01-16 21:29:21
http://news.yahoo.com/obama-nsa-speech-on-anniversary-of-eisenhower-warning-025532326.html
text/html
utf-8
webpage
International Business Times
Al-Bassam
Mustafa
Let's Make 2014 All About Privacy-Respecting and Encryption-Aware Software
Former member of LulzSec Mustafa al-Bassam says we can reclaim our privacy in 2014 by Google, Microsoft etc.
2014-01-16
http://www.ibtimes.co.uk/lets-make-2014-all-about-privacy-respecting-encryption-aware-software-1432608
2014-01-16 21:30:08
attachment
Snapshot
2014-01-16 21:30:08
http://www.ibtimes.co.uk/lets-make-2014-all-about-privacy-respecting-encryption-aware-software-1432608
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Nakashima
Ellen
Nakamura
David
Obama expected to turn to Congress to help decide fate of NSA phone data collection
Obama, set to announce limits to the program Friday, is expected to call on lawmakers to help decide its future.
2014-01-16
en-US
http://www.washingtonpost.com/world/national-security/obama-expected-to-turn-to-congress-to-help-decide-fate-of-nsa-phone-data-collection/2014/01/15/cddc83fa-7e0a-11e3-95c6-0a7aa80874bc_story.html
2014-01-16 21:37:49
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-16 21:37:51
http://www.washingtonpost.com/world/national-security/obama-expected-to-turn-to-congress-to-help-decide-fate-of-nsa-phone-data-collection/2014/01/15/cddc83fa-7e0a-11e3-95c6-0a7aa80874bc_print.html
text/html
utf-8
webpage
ITAR-TASS
Sinkel
Patrick
Новости
Skype ready to share users’ data with Russian police
A group of Russian deputies introduced a package of counter-terrorism amendments Wednesday that propose additional regulations, in particular, those in the communications industry
2014-01-15
http://en.itar-tass.com/russia/714741
2014-01-16 21:38:04
attachment
Snapshot
2014-01-16 21:38:04
http://en.itar-tass.com/russia/714741
text/html
utf-8
webpage
Freedom of the Press Foundation
Timm
Trevor
Highlights From Daniel Ellsberg’s Reddit AMA on Edward Snowden and NSA Surveillance
Pentagon Papers whistleblower (and our co-founder) Daniel Ellsberg held an expansive, seven-hour long Reddit “Ask Me Anything” session yesterday to explain why NSA whistleblower Edward Snowden will join our board of directors.
2014-01-16
https://pressfreedomfoundation.org/blog/2014/01/highlights-daniel-ellsbergs-reddit-ama-edward-snowden-and-nsa-surveillance
2014-01-16 21:39:24
attachment
Snapshot
2014-01-16 21:39:24
https://pressfreedomfoundation.org/blog/2014/01/highlights-daniel-ellsbergs-reddit-ama-edward-snowden-and-nsa-surveillance
text/html
utf-8
newspaperArticle
Business
The Guardian
ISSN 0261-3077
Garside
Juliette
correspondent
telecoms
Business
Chris Grayling
Edward Snowden
GCHQ
politics
Privacy
Telecommunications industry
Theresa May
UK news
UK security and counter-terrorism
United States
Vodafone
World news
Vodafone takes a stand on privacy with plan to disclose wiretapping demands
Mobile phone company wants to be open about government requests it receives in the 25 countries where it operates
2014-01-15T15:43EST
en-GB
http://www.theguardian.com/business/2014/jan/15/vodafone-aims-to-disclose-wiretap-demands
2014-01-16 21:55:18
The Guardian
attachment
Guardian Snapshot
2014-01-16 21:55:20
http://www.theguardian.com/business/2014/jan/15/vodafone-aims-to-disclose-wiretap-demands
text/html
utf-8
blogPost
xnyhps' blog
Alkemade
Thijs
Misconceptions about forward-secrecy - xnyhps’ blog
2014-01-17
https://blog.thijsalkema.de/blog/2014/01/17/misconceptions-about-forward-secrecy/
2014-01-17 16:12:02
attachment
Misconceptions about forward-secrecy - xnyhps’ blog
2014-01-17 16:12:03
https://blog.thijsalkema.de/blog/2014/01/17/misconceptions-about-forward-secrecy/
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Landler
Mark
Baker
Peter
Espionage and Intelligence Services
Obama, Barack
Privacy
Snowden, Edward J
Surveillance of Citizens by Government
Obama to Call for Overhaul of N.S.A.’s Phone Data Collection Program
The president, embracing some of a panel’s recommendations, will outline his plans for more limits on government eavesdropping.
2014-01-17
http://www.nytimes.com/2014/01/18/us/politics/obama-to-balance-privacy-and-security-concerns-in-speech-on-surveillance-aides-say.html
2014-01-17 16:14:36
NYTimes.com
attachment
New York Times Snapshot
2014-01-17 16:14:36
http://www.nytimes.com/2014/01/18/us/politics/obama-to-balance-privacy-and-security-concerns-in-speech-on-surveillance-aides-say.html?smid=tw-share&_r=0
text/html
utf-8
webpage
Business Insider
1
337
Barack Obama
Brett LoGiurato
Edward Snowden
NSA
White House
Obama Gives A Strong Defense Of The NSA While Announcing Big Changes To Surveillance Programs
President Barack Obama outlined Friday morning...
2014-01-17
http://www.businessinsider.com/obama-nsa-speech-snowden-2014-1
2014-01-17 17:27:14
attachment
Snapshot
2014-01-17 17:27:14
http://www.businessinsider.com/obama-nsa-speech-snowden-2014-1
text/html
utf-8
webpage
Presidential Policy Directive/PPD-28
2014-01-17
https://www.documentcloud.org/documents/1006318-2014sigint-mem-ppd-rel.html
2014-01-17 17:27:53
attachment
2014sigint Mem Ppd Rel
2014-01-17 17:27:54
https://www.documentcloud.org/documents/1006318-2014sigint-mem-ppd-rel.html
text/html
utf-8
newspaperArticle
US
Wall Street Journal
ISSN 0099-9660
Gorman
Carol E. Lee And Siobhan
Obama Says NSA's Mass Collection of U.S. Phone Data Will End
President Obama said Friday that the U.S. government will end its mass collection of American phone data, a victory for civil libertarians that marks the most significant curtailment of U.S. surveillance practices in more than a decade.
2014-01-17T17:39:00.000Z
http://online.wsj.com/news/articles/SB10001424052702304603704579326333792513314?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702304603704579326333792513314.html
2014-01-17 19:50:50
Wall Street Journal
attachment
Wall Street Journal Snapshot
2014-01-17 19:50:52
http://online.wsj.com/news/articles/SB10001424052702304603704579326333792513314?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702304603704579326333792513314.html
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Greenwald
Glenn
Barack Obama
NSA
Surveillance
United States
US constitution and civil liberties
World news
Obama's NSA 'reforms' are little more than a PR attempt to mollify the public
Obama is draping the banner of change over the NSA status quo. Bulk surveillance that caused such outrage will remain in place
2014-01-17T14:23EST
en-GB
http://www.theguardian.com/commentisfree/2014/jan/17/obama-nsa-reforms-bulk-surveillance-remains
2014-01-17 19:51:30
The Guardian
attachment
Guardian Snapshot
2014-01-17 19:51:32
http://www.theguardian.com/commentisfree/2014/jan/17/obama-nsa-reforms-bulk-surveillance-remains
text/html
utf-8
magazineArticle
Foreign Policy
92
6
Farrell
Henry
Finnemore
Martha
The End of Hypocrisy: American Foreign Policy in the Age of Leaks
2013-11
en-US
http://www.foreignaffairs.com/articles/140155/henry-farrell-and-martha-finnemore/the-end-of-hypocrisy#
2014-01-17 19:52:32
attachment
Henry Farrell and Martha Finnemore | Hypocrisy and U.S. Foreign Policy | Foreign Affairs
2014-01-17 19:52:33
http://www.foreignaffairs.com/articles/140155/henry-farrell-and-martha-finnemore/the-end-of-hypocrisy#
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Greenwald
Glenn
Barack Obama
NSA
Surveillance
United States
US constitution and civil liberties
World news
Obama's NSA 'reforms' are little more than a PR attempt to mollify the public
Obama is draping the banner of change over the NSA status quo. Bulk surveillance that caused such outrage will remain in place
2014-01-17T14:23EST
en-GB
http://www.theguardian.com/commentisfree/2014/jan/17/obama-nsa-reforms-bulk-surveillance-remains
2014-01-17 20:18:19
The Guardian
attachment
Guardian Snapshot
2014-01-17 20:18:21
http://www.theguardian.com/commentisfree/2014/jan/17/obama-nsa-reforms-bulk-surveillance-remains
text/html
utf-8
blogPost
Washington Post
Sargent
Greg
NSA
nsa overreach
NSA spying
NSA surveillance
Ron Wyden
A good first step, but the fundamental argument remains unresolved
Obama's NSA reforms won't end the practice that civil libertarians find most objectionable.
2014-01-17
http://www.washingtonpost.com/blogs/plum-line/wp/2014/01/17/a-good-first-step-but-the-fundamental-argument-remains-unresolved/
2014-01-17 20:26:07
attachment
Snapshot
2014-01-17 20:26:07
http://www.washingtonpost.com/blogs/plum-line/wp/2014/01/17/a-good-first-step-but-the-fundamental-argument-remains-unresolved/
text/html
utf-8
webpage
Lennard
Natasha
Barack Obama
Edward Snowden
FISA
Leaks
National Security Agency
NSA
nsa reforms
Oversight
Privacy
Salon.com
Spying
Surveillance
Whistle-blower
Obama’s NSA reforms: The devil in the details
In a game of realpolitik, Obama puts forward no substantial surveillance reforms, just a gambit for public trust
2014-01-17
Obama’s NSA reforms
http://www.salon.com/2014/01/17/obamas_nsa_reforms_the_devil_in_the_details/
2014-01-17 20:26:27
attachment
Snapshot
2014-01-17 20:26:27
http://www.salon.com/2014/01/17/obamas_nsa_reforms_the_devil_in_the_details/
text/html
utf-8
webpage
Pace
Julie
Press
The Associated
Barack Obama
Edward Snowden
NSA
NSA surveillance
Salon.com
Surveillance
Obama announces NSA reforms
...But will they be enough?
2014-01-17
http://www.salon.com/2014/01/17/obama_announces_nsa_reforms/
2014-01-17 20:27:15
attachment
Snapshot
2014-01-17 20:27:15
http://www.salon.com/2014/01/17/obama_announces_nsa_reforms/
text/html
utf-8
webpage
TechFreedom
Szoka
Berlin
Media Statement
NSA
Surveillance
Obama’s NSA Reforms Positive, but Don’t Address Biggest Concerns
In a speech today, President Obama announced he will “end the Section 215 bulk metadata program as it currently exists,” among other executive actions and proposals for Congress. Starting immediately, NSA analysts will only be able investigate individuals two degrees of separation, or “hops,” from its targets, rather than the previous three hops; the Attorney General will work with the Foreign Intelligence Surveillance Court (FISC) to ensure no queries are made without prior judicial approval. The President will direct the Attorney General and Director of National Intelligence to review many items, including storing metadata with telecom companies or a third party, and make recommendations before Congress considers reauthorizing the program in March.
The following statement may be attributed to TechFreedom President Berin Szoka:
The reforms announced today will certainly help address some of the greatest privacy concerns raised by U.S. surveillance. But the speech will probably be remembered most for the much-needed reforms it didn’t announce. First, outsourcing the retention of call records to private companies is a fig leaf that conceals the real issue: the legal standard for access. The President would let the NSA access meta-data if it can establish “reasonable suspicion that a particular number is linked to a terrorist organization.” This standard is too low to protect the privacy of the innocent. In general, the Fourth Amendment requires a “probable cause” showing before a court may issue a warrant. The courts are struggling to address this issue based on a confusing series of 1970s cases about wiretapping. They seem to be moving, cautiously, to restoring the Founders’ understanding: there is one Fourth Amendment for all technologies, just as there is one First Amendment for all media. Until they do that, it’s up to Congress and the President to fix the problem. Second, while the President made much about narrowing the purposes of U.S. surveillance of non-citizens, he didn’t actually promise any real changes about how that surveillance is conducted. This should trouble everyone everywhere, especially those who rely on American Internet companies. It’s bad news for those companies, who need the trust of their global user base. Failing to address international concerns will only help those trying to shut off cross-border data flows to U.S. companies. That would would spell the end of the Internet as an open, global platform and, ironically, facilitate surveillance by foreign governments with far fewer scruples. Third, the President focused entirely on surveillance by national security agencies, saying nothing at all about the need for greater protections against law enforcement, from the IRS and DOJ to local prosecutors. That’s especially disappointing because, just last month, a Whitehouse.gov petition demanding a warrant requirement to protect cloud email services got well over 100,000 signatures. The White House has promised to respond to any petition that crossed that threshold. Today’s speech would have been the perfect opportunity to say, once and for all, that we need a consistent warrant requirement, an idea now supported by 169 Members of the House.
Szoka is available for comment at media@techfreedom.org. TechFreedom is a plaintiff in First Unitarian Church of Los Angeles v. NSA, a lawsuit challenging the phone collection program’s constitutionality. In 2011, TechFreedom opposed a bill to require ISPs to store user metadata, calling it a “digital dragnet.” TechFreedom has worked extensively to fight against government mass surveillance, while also explaining the need for Congress to reform the outdated 1986 Electronic Privacy Communications Act governing law enforcement access to private data.
2014-01-17
http://techfreedom.org/post/73628486631/obamas-nsa-reforms-positive-but-dont-address
2014-01-17 20:28:31
attachment
Snapshot
2014-01-17 20:28:31
http://techfreedom.org/post/73628486631/obamas-nsa-reforms-positive-but-dont-address
text/html
utf-8
webpage
Wyden
Ron
Udall
Mark
Heinrich
Martin
Statement on President’s Announcement on Surveillance Reform
Washington, D.C. Senators Ron Wyden (D-Ore.), Mark Udall (D-Colo.), and Martin Heinrich (D-N.M.), members of the U.S. S
2014-01-1
http://www.wyden.senate.gov/news/press-releases/senators-wyden-udall-heinrich-statement-on-presidents-announcement-on-surveillance-reform
2014-01-17 20:29:46
attachment
Snapshot
2014-01-17 20:29:46
http://www.wyden.senate.gov/news/press-releases/senators-wyden-udall-heinrich-statement-on-presidents-announcement-on-surveillance-reform
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
McCarthy
Tom
Barack Obama
Fisa court
Law
NSA
Obama administration
Privacy
Surveillance
United States
US Congress
US constitution and civil liberties
US domestic policy
US national security
US politics
World news
Obama announces new limits on NSA surveillance programs – live reaction
Speech outlines changes taken from NSA review panel
Changes to include storing telephone data in private entity
Reforms will not end controversial surveillance practices
Read our latest news story
2014-01-17T13:18EST
en-GB
http://www.theguardian.com/world/2014/jan/17/obama-nsa-surveillance-reforms-speech-live#block-52d96fd1e4b040bca45b4a84
2014-01-17 20:30:57
The Guardian
attachment
Guardian Snapshot
2014-01-17 20:31:00
http://www.theguardian.com/world/2014/jan/17/obama-nsa-surveillance-reforms-speech-live#block-52d96fd1e4b040bca45b4a84
text/html
utf-8
webpage
New America Foundation
Bankston
Kevin
Meinrath
Sascha
STATEMENT: OTI on President's NSA Speech: Some Positive Signs, But Key Questions Remain Unaddressed
2014-01-17
http://newamerica.net/node/101250
2014-01-17 20:31:58
attachment
STATEMENT: OTI on President's NSA Speech: Some Positive Signs, But Key Questions Remain Unaddressed | NewAmerica.org
2014-01-17 20:31:59
http://newamerica.net/node/101250
text/html
utf-8
webpage
Mozilla Privacy Blog
Fowler
Alex
Response to President Obama’s Speech on Surveillance
Expansive government surveillance practices have severely damaged the health of the open Internet, creating calls for change from diverse organizations around the world along with ...
2014-01-17
https://blog.mozilla.org/privacy/2014/01/17/response-to-president-obamas-speech-on-surveillance/
2014-01-17 20:33:14
attachment
Snapshot
2014-01-17 20:33:14
https://blog.mozilla.org/privacy/2014/01/17/response-to-president-obamas-speech-on-surveillance/
text/html
utf-8
webpage
ProPublica
Brandeisky
Kara
Four Questionable Claims Obama Has Made on NSA Surveillance
President Obama, who is delivering a speech on surveillance policy today, has made a series of misleading statements about the NSA.
2014-01-17
http://www.propublica.org/article/four-questionable-claims-obama-has-made-on-nsa-surveillance
2014-01-17 20:39:29
en-US
attachment
Snapshot
2014-01-17 20:39:29
http://www.propublica.org/article/four-questionable-claims-obama-has-made-on-nsa-surveillance?utm_campaign=sprout&utm_medium=social&utm_source=twitter&utm_content=1389961996
text/html
utf-8
webpage
BuzzFeed
Johnson
Benny
America's Spies Want Edward Snowden Dead
"I would love to put a bullet in his head," one Pentagon official told BuzzFeed. The NSA leaker is enemy No. 1 among those inside the intelligence world.
2014-01-16
http://www.buzzfeed.com/bennyjohnson/americas-spies-want-edward-snowden-dead
2014-01-17 20:40:45
attachment
Snapshot
2014-01-17 20:40:45
http://www.buzzfeed.com/bennyjohnson/americas-spies-want-edward-snowden-dead
text/html
utf-8
webpage
BuzzFeed
Johnsen
Gregory D.
60 Words And A War Without End: The Untold Story Of The Most Dangerous Sentence In U.S. History
Written in the frenzied, emotional days after 9/11, the Authorization for the Use of Military Force was intended to give President Bush the ability to retaliate against whoever orchestrated the att...
2014-01-16
60 Words And A War Without End
http://www.buzzfeed.com/gregorydjohnsen/60-words-and-a-war-without-end-the-untold-story-of-the-most
2014-01-17 20:42:20
attachment
Snapshot
2014-01-17 20:42:20
http://www.buzzfeed.com/gregorydjohnsen/60-words-and-a-war-without-end-the-untold-story-of-the-most
text/html
utf-8
webpage
The Big Story
Pace
Julie
Adam Schiff
Anthony Romero
Barack Obama
Business
Checks and balances
Classified information
Courts
District of Columbia
Domestic spying
Edward Snowden
general news
Government and Politics
Government business and finance
Government programs
Government regulations
Government surveillance
Human rights and civil liberties
Industry regulation
Intelligence agencies
Judiciary
Kimberly Dozier
Legislature
Military and defense
National courts
National governments
national security
North America
Political issues
Right to privacy
Separation of powers
Social affairs
Social issues
technology
Telecommunications regulation
terrorism
United States
United States Congress
United States government
United States Senate
U.S. Department of Justice
U.S. National Security Agency
War and unrest
Obama's NSA announcements just the starting point
WASHINGTON (AP) — President Barack Obama's blueprint for overhauling the government's sweeping surveillance program is just the starting point.
2014-01-17
http://bigstory.ap.org/article/officials-obama-likely-ok-phone-record-changes
2014-01-17 20:42:59
en-US
attachment
Snapshot
2014-01-17 20:42:59
http://bigstory.ap.org/article/officials-obama-likely-ok-phone-record-changes
text/html
utf-8
webpage
Feinstein
Dianne
Rogers
Mike
Feinstein, Rogers Statement on President’s Signals Intelligence Review - Press Releases - News Room - United States Senator Dianne Feinstein
2014-01-17
http://www.feinstein.senate.gov/public/index.cfm/press-releases?ID=664f7ff4-a1c0-4a7a-874a-631a855fbd8b
2014-01-17 21:39:38
attachment
Feinstein, Rogers Statement on President’s Signals Intelligence Review - Press Releases - News Room - United States Senator Dianne Feinstein
2014-01-17 21:39:39
http://www.feinstein.senate.gov/public/index.cfm/press-releases?ID=664f7ff4-a1c0-4a7a-874a-631a855fbd8b
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Apuzzo
Matt
Drug Enforcement Administration
Federal Bureau of Investigation
Holder, Eric H Jr
Justice Department
Racial Profiling
United States Politics and Government
U.S. to Expand Rules Limiting Use of Profiling by Federal Agents
The new rules will prohibit federal agents from considering religion, national origin, gender and sexual orientation in their investigations, a government official said.
2014-01-15
http://www.nytimes.com/2014/01/16/us/politics/us-to-expand-rules-limiting-use-of-profiling-by-federal-agents.html
2014-01-17 21:40:21
NYTimes.com
attachment
New York Times Snapshot
2014-01-17 21:40:21
http://www.nytimes.com/2014/01/16/us/politics/us-to-expand-rules-limiting-use-of-profiling-by-federal-agents.html?_r=0
text/html
utf-8
magazineArticle
Slate
ISSN 1091-2339
Kaplan
Fred
Pretty Good Privacy
The three ambitious NSA reforms endorsed by Obama, and the one he rejected.
Jan. 17 2014
en-US
http://www.slate.com/articles/news_and_politics/war_stories/2014/01/obama_s_nsa_reforms_the_president_s_proposals_for_metadata_and_the_fisa.html
2014-01-17 21:41:16
Slate
attachment
Slate Snapshot
2014-01-17 21:41:18
http://www.slate.com/articles/news_and_politics/war_stories/2014/01/obama_s_nsa_reforms_the_president_s_proposals_for_metadata_and_the_fisa.single.html
text/html
utf-8
newspaperArticle
Technology
The Guardian
ISSN 0261-3077
Kiss
Jemima
Apps
Data and computer security
facebook
instagram
Privacy
social media
Social networking
Privacy tools used by 28% of the online world, research finds
Concern about privacy, and frustration over censorship and content blocking is driving millions to use anonymity tools
2014-01-21T08:22EST
en-GB
http://www.theguardian.com/technology/2014/jan/21/privacy-tools-censorship-online-anonymity-tools
2014-01-21 16:16:03
The Guardian
attachment
Guardian Snapshot
2014-01-21 16:16:05
http://www.theguardian.com/technology/2014/jan/21/privacy-tools-censorship-online-anonymity-tools
text/html
utf-8
report
Karlstad University
Winter
Philipp
Lindskog
Stefan
Spoiled Onions: Exposing Malicious Tor Exit Relays
Technical Report
2014-01-20
en
http://www.cs.kau.se/philwint/spoiled_onions/
2014-01-21 17:12:33
attachment
exitmap.zip
application/zip
attachment
NullHypothesis/exitmap · GitHub
2014-01-21 17:15:16
https://github.com/NullHypothesis/exitmap
text/html
utf-8
attachment
Spoiled Onions
2014-01-21 17:12:34
http://www.cs.kau.se/philwint/spoiled_onions/
text/html
windows-1252
attachment
techreport.pdf
2014-01-21 17:14:39
http://www.cs.kau.se/philwint/spoiled_onions/techreport.pdf
application/pdf
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
The Editorial Board
Civil Rights and Liberties
Data-Mining and Database Marketing
Espionage and Intelligence Services
National Security Agency
Obama, Barack
Privacy
Speeches and Statements
Surveillance of Citizens by Government
The President on Mass Surveillance
Restoring trust in government agencies requires more than a few good restrictions on collecting personal data.
2014-01-17
http://www.nytimes.com/2014/01/18/opinion/the-president-on-mass-surveillance.html
2014-01-21 17:59:37
NYTimes.com
attachment
New York Times Snapshot
2014-01-21 17:59:37
http://www.nytimes.com/2014/01/18/opinion/the-president-on-mass-surveillance.html?_r=0
text/html
utf-8
newspaperArticle
Business
The Washington Post
ISSN 0190-8286
Nakashima
Ellen
Huawei hires former U.S. defense contractor official
China-based firm tries to counter perceptions that it is trying to insert its technology into U.S. systems on behalf of Chinese intelligence services
2012-07-10
en-US
http://www.washingtonpost.com/business/economy/huawei-hires-former-us-defense-contractor-official/2012/07/10/gJQAbygtbW_story.html
2014-01-21 18:01:45
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-21 18:01:47
http://www.washingtonpost.com/business/economy/huawei-hires-former-us-defense-contractor-official/2012/07/10/gJQAbygtbW_print.html
text/html
utf-8
webpage
NPR.org
Johnson
Carrie
5 Takeaways From The President's NSA Speech
The real battle over bulk phone record collection could come next year.
2014-01-17
http://www.npr.org/2014/01/17/263500378/5-takeaways-from-the-presidents-nsa-speech
2014-01-21 20:22:30
attachment
Snapshot
2014-01-21 20:22:30
http://www.npr.org/2014/01/17/263500378/5-takeaways-from-the-presidents-nsa-speech
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Gellman
Barton
Obama’s restrictions on NSA surveillance rely on narrow definition of ‘spying’
President does not include ingestion of tens of trillions of records about phone calls, e-mails and locations.
2014-01-18
en-US
http://www.washingtonpost.com/world/national-security/obamas-restrictions-on-nsa-surveillance-rely-on-narrow-definition-of-spying/2014/01/17/2478cc02-7fcb-11e3-93c1-0e888170b723_story.html
2014-01-21 20:22:46
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-21 20:22:57
http://www.washingtonpost.com/world/national-security/obamas-restrictions-on-nsa-surveillance-rely-on-narrow-definition-of-spying/2014/01/17/2478cc02-7fcb-11e3-93c1-0e888170b723_print.html
text/html
utf-8
newspaperArticle
The Toronto Star
ISSN 0319-0781
Greenwald
Glenn
Poitras
Laura
In a declassified memo, the head of Canada’s eavesdropping agency says the Edward Snowden leaks sparked a CSEC examination of its practices for protecting the privacy of Canadians
In a declassified memo, the head of Canada’s eavesdropping agency says the Edward Snowden leaks sparked a CSEC examination of its practices for protecting the privacy of Canadians
Fri Jan 17 2014
http://www.thestar.com/news/canada/2014/01/17/nsa_leaks_prompted_major_canadian_eavesdropping_review.html
2014-01-21 20:22:55
Toronto Star
attachment
Toronto Star Snapshot
2014-01-21 20:22:55
http://www.thestar.com/news/canada/2014/01/17/nsa_leaks_prompted_major_canadian_eavesdropping_review.html
text/html
utf-8
webpage
Foreign Policy
Hudson
John
In Reversal, FBI Now Emphasizes Role in Law Enforcement
2014-01-17
http://thecable.foreignpolicy.com/posts/2014/01/17/in_reversal_fbi_now_emphasizes_role_in_law_enforcement
2014-01-21 20:33:03
attachment
In Reversal, FBI Now Emphasizes Role in Law Enforcement
2014-01-21 20:33:04
http://thecable.foreignpolicy.com/posts/2014/01/17/in_reversal_fbi_now_emphasizes_role_in_law_enforcement
text/html
utf-8
webpage
Foreign Policy
Rothkopf
David
From Messiah to Mediocrity
2014-01-17
http://www.foreignpolicy.com/articles/2014/01/17/from_messiah_to_mediocrity_obama_nsa_speech
2014-01-21 20:33:21
attachment
From Messiah to Mediocrity
2014-01-21 20:33:22
http://www.foreignpolicy.com/articles/2014/01/17/from_messiah_to_mediocrity_obama_nsa_speech
text/html
utf-8
webpage
ProPublica
Brandeisky
Kara
Four Questionable Claims Obama Has Made on NSA Surveillance
President Obama, who delivered a speech on surveillance policy today, has made a series of misleading statements about the NSA.
2014-01-17
http://www.propublica.org/article/four-questionable-claims-obama-has-made-on-nsa-surveillance
2014-01-21 20:39:54
attachment
Snapshot
2014-01-21 20:39:54
http://www.propublica.org/article/four-questionable-claims-obama-has-made-on-nsa-surveillance?utm_campaign=sprout&utm_medium=social&utm_source=twitter&utm_content=1389981587
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Gellman
Barton
Obama’s restrictions on NSA surveillance rely on narrow definition of ‘spying’
President does not include ingestion of tens of trillions of records about phone calls, e-mails and locations.
2014-01-18
en-US
http://www.washingtonpost.com/world/national-security/obamas-restrictions-on-nsa-surveillance-rely-on-narrow-definition-of-spying/2014/01/17/2478cc02-7fcb-11e3-93c1-0e888170b723_story.html
2014-01-21 20:40:48
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-21 20:41:00
http://www.washingtonpost.com/world/national-security/obamas-restrictions-on-nsa-surveillance-rely-on-narrow-definition-of-spying/2014/01/17/2478cc02-7fcb-11e3-93c1-0e888170b723_print.html
text/html
utf-8
webpage
NationalJournal.com
Oliphant
James
Obama's NSA Proposals Fall Far Short of Real Change
The White House's tepid plan aims to calm the public, not curtail the government's surveillance programs.
2014-01-17
http://www.nationaljournal.com/white-house/obama-s-nsa-proposals-fall-far-short-of-real-change-20140117
2014-01-21 20:40:57
attachment
Snapshot
2014-01-21 20:40:57
http://www.nationaljournal.com/white-house/obama-s-nsa-proposals-fall-far-short-of-real-change-20140117
text/html
utf-8
webpage
Government Accountability Project
Accountability Project
Government
GAP Statement on Presidential Remarks on Signal Intelligence Programs on 1/17/14 - Government Accountability Project
2014-01-18
http://www.whistleblower.org/blog/48-2014/3143-gap-statement-on-presidential-remarks-on-signal-intelligence-programs-on-11714
2014-01-21 20:42:10
attachment
GAP Statement on Presidential Remarks on Signal Intelligence Programs on 1/17/14 - Government Accountability Project
2014-01-21 20:42:11
http://www.whistleblower.org/blog/48-2014/3143-gap-statement-on-presidential-remarks-on-signal-intelligence-programs-on-11714
text/html
utf-8
webpage
POLITICO Magazine
Hafetz
Jonathan
Barack Obama
In The Arena
Jonathan Hafetz
National Security Agency
Is Obama Failing Constitutional Law?
In his speech meant to quell concerns over government surveillance, President Obama on Friday offered something of a primer on the history of espionage, from the heroic patrols made by Paul Revere in the Revolution to the sordid eavesdropping the FBI perpetrated against Martin Luther King, Jr. The history lesson—triggered, of course, by the revelations...
2014-01-17
http://www.politico.com/magazine/story/2014/01/nsa-speech-and-obamas-troubles-with-con-law-hed-tk-102340.html
2014-01-21 20:43:02
attachment
Is Obama Failing Constitutional Law? - Jonathan Hafetz - POLITICO Magazine
2014-01-21 20:43:17
http://www.politico.com/magazine/story/2014/01/nsa-speech-and-obamas-troubles-with-con-law-hed-tk-102340_Page2.html
text/html
utf-8
attachment
Snapshot
2014-01-21 20:43:02
http://www.politico.com/magazine/story/2014/01/nsa-speech-and-obamas-troubles-with-con-law-hed-tk-102340.html?hp=pm_2#.UtrPdxBpTIU
text/html
utf-8
webpage
Lawfare
Edgar
Tim
A Way Forward on Bulk Collection
President Obama’s address on Friday outlining surveillance reforms for the NSA hit the mark in both substance and tone. He defended without apology the necessity of intelligence gathering, outlined the real dangers to privacy and civil liberties of unchec
2014-01-18
http://www.lawfareblog.com/2014/01/a-way-forward-on-bulk-collection/
2014-01-21 20:43:36
attachment
Snapshot
2014-01-21 20:43:36
http://www.lawfareblog.com/2014/01/a-way-forward-on-bulk-collection/#.UtrZKvhlA8o
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Sanger
David E.
Miller
Claire Cain
Corporations
Data-Mining and Database Marketing
National Security Agency
Obama, Barack
Reform Government Surveillance
Surveillance of Citizens by Government
In Keeping Grip on Data Pipeline, Obama Does Little to Reassure Industry
While President Obama bolstered some protections for citizens, he did nothing, at least yet, to address the data security concerns of U.S. technology companies.
2014-01-17
http://www.nytimes.com/2014/01/18/technology/in-keeping-grip-on-data-pipeline-obama-does-little-to-reassure-industry.html
2014-01-21 20:44:02
NYTimes.com
attachment
New York Times Snapshot
2014-01-21 20:44:02
http://www.nytimes.com/2014/01/18/technology/in-keeping-grip-on-data-pipeline-obama-does-little-to-reassure-industry.html?_r=0
text/html
utf-8
interview
Obama
Barack
Kleber
Claus
ZDF transcript: Interview with U.S. President Barack Obama
Released 18/January/2014
2014-01-18
en-US
ZDF transcript
http://www.scribd.com/doc/200642641/ZDF-transcript-Interview-with-U-S-President-Barack-Obama
2014-01-21 20:44:15
attachment
Snapshot
2014-01-21 20:44:15
http://www.scribd.com/doc/200642641/ZDF-transcript-Interview-with-U-S-President-Barack-Obama
text/html
utf-8
webpage
Threat Level
Levy
Steven
Edward Snowden
NSA
Surveillance
Why Obama's NSA Reforms Won't Solve Silicon Valley's Trust Problem | Threat Level | Wired.com
When Barack Obama announced his reforms of National Security Agency surveillance programs today, few people were as interested as Larry Page, Mark Zuckerberg, Tim Cook, Marissa Mayer, and Steve Ballmer.
2014-01-17
http://www.wired.com/threatlevel/2014/01/obama-nsa-2/
2014-01-21 20:45:46
attachment
Snapshot
2014-01-21 20:45:46
http://www.wired.com/threatlevel/2014/01/obama-nsa-2/
text/html
utf-8
webpage
The New Yorker
Lizza
Ryan
A Major Victory for Snowden and N.S.A. Reformers : The New Yorker
2014-01-17
http://www.newyorker.com/online/blogs/newsdesk/2014/01/a-major-victory-for-snowden-and-nsa-reformers.html
2014-01-21 20:46:23
attachment
A Major Victory for Snowden and N.S.A. Reformers : The New Yorker
2014-01-21 20:46:24
http://www.newyorker.com/online/blogs/newsdesk/2014/01/a-major-victory-for-snowden-and-nsa-reformers.html
text/html
windows-1252
webpage
Solove
Daniel
10 Reasons Why Privacy Matters
Why does privacy matter? Often courts and commentators struggle to articulate why privacy is valuable. They see privacy violations as often slight annoyances. But privacy matters a lot more than that
2014-01-13
http://www.linkedin.com/today/post/article/20140113044954-2259773-10-reasons-why-privacy-matters
2014-01-21 20:47:04
attachment
Snapshot
2014-01-21 20:47:04
http://www.linkedin.com/today/post/article/20140113044954-2259773-10-reasons-why-privacy-matters
text/html
utf-8
newspaperArticle
The Hindu
ISSN 0971-751X
Washington
PTI
Assange
Julian
Barack Obama
Edward Snowden
Julian Assange on NSA
NSA surveillance
U.S. electronic snooping
Obama surveillance proposal will change little: Assange
January 19, 2014
en-IN
Obama surveillance proposal will change little
http://www.thehindu.com/news/international/world/article5590964.ece
2014-01-21 20:47:27
The Hindu
attachment
The Hindu Snapshot
2014-01-21 20:47:27
http://www.thehindu.com/news/international/world/article5590964.ece
text/html
utf-8
webpage
POLITICO
Sneed
Adam
Adam Sneed
Edward Snowden
Mike Rogers
National Security Agency
russia
Rogers: Russia may be behind Snowden leak
The chairman of the House Intelligence Committee says Edward Snowden likely received help stealing information from the National Security Agency — and that help may have come from Russian intelligence officials. In a pre-recorded interview for NBC’s “Meet the Press” with David Gregory, Rep. Mike Rogers (R-Mich.) questioned how...
2014-01-18
Rogers
http://www.politico.com/story/2014/01/mike-rogers-edward-snowden-russia-102355.html
2014-01-21 20:48:46
attachment
Snapshot
2014-01-21 20:48:46
http://www.politico.com/story/2014/01/mike-rogers-edward-snowden-russia-102355.html#.UtvDUKvHY1g.twitter
text/html
utf-8
webpage
TheHill
Balluck
Kyle
Obama embracing surveillance structure of George W. Bush, Hayden says
Michael Hayden said proposed reforms would “fundamentally preserve” controversial programs.
Text
2014-01-19T10:49-05:00
http://thehill.com/blogs/hillicon-valley/technology/195898-hayden-obama-embracing-bush-surveillance-structure
2014-01-21 20:50:13
und
attachment
Snapshot
2014-01-21 20:50:13
http://thehill.com/blogs/hillicon-valley/technology/195898-hayden-obama-embracing-bush-surveillance-structure
text/html
utf-8
webpage
The Daily Caller
Coglianese
Vince
fox news sunday
Patrick Leahy
Sen. Leahy on NSA spying: We need to stop government from controlling American people [VIDEO]
Sen. Patrick Leahy says the American people are at risk of being controlled by their government due to the expansive surveillance powers of the National Security Agency. Speaking on
1/19/2014
Sen. Leahy on NSA spying
http://dailycaller.com/2014/01/19/sen-leahy-on-nsa-spying-we-need-to-stop-government-from-controlling-american-people-video/
2014-01-21 20:50:37
attachment
Snapshot
2014-01-21 20:50:37
http://dailycaller.com/2014/01/19/sen-leahy-on-nsa-spying-we-need-to-stop-government-from-controlling-american-people-video/?onswipe_redirect=no
text/html
utf-8
webpage
ProPublica
Meyer
Theodoric
Maass
Peter
A.m
10:55
No Warrant, No Problem: How the Government Can Get Your Digital Data
From subpoenas to secret court orders, the government has an arsenal of legal tools for sweeping up your personal data.
2014-01-08
No Warrant, No Problem
http://www.propublica.org/special/no-warrant-no-problem-how-the-government-can-still-get-your-digital-data
2014-01-21 20:51:21
attachment
Snapshot
2014-01-21 20:51:21
http://www.propublica.org/special/no-warrant-no-problem-how-the-government-can-still-get-your-digital-data?utm_campaign=sprout&utm_medium=social&utm_source=twitter&utm_content=1389981661
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Schmitt
Eric
Sanger
David E.
Classified Information and State Secrets
Espionage and Intelligence Services
Federal Security Service
Feinstein, Dianne
National Security Agency
Rogers, Michael J (1963- )
russia
Snowden, Edward J
Surveillance of Citizens by Government
Congressional Leaders Suggest Earlier Snowden Link to Russia
Edward J. Snowden may have worked with Russian spy agencies while he was still a contractor for the National Security Agency, Representative Mike Rogers said.
2014-01-19
http://www.nytimes.com/2014/01/20/us/politics/congressional-leaders-suggest-snowden-was-working-for-russia.html
2014-01-21 20:52:38
NYTimes.com
attachment
New York Times Snapshot
2014-01-21 20:52:38
http://www.nytimes.com/2014/01/20/us/politics/congressional-leaders-suggest-snowden-was-working-for-russia.html?_r=0
text/html
utf-8
magazineArticle
Newman
Abraham
Obama administration
Science & Technology
United States
Privacy Pretense
Last month, Silicon Valley purported to be shocked by revelations that the NSA had routinely accessed the servers of some tech giants and vowed to step up privacy protections. There is only one problem: that would run counter to the public policy agenda that tech companies have pursued for decades -- and that has made them so successful.
2013-11-06
http://www.foreignaffairs.com/articles/140246/abraham-newman/privacy-pretense
2014-01-21 20:57:58
Foreign Affairs
Foreign Affairs
ISSN 0015-7120
attachment
Foreign Affairs Printable
2014-01-21 20:58:00
http://www.foreignaffairs.com/articles/140246/abraham-newman/www.foreignaffairs.com/print/137385
attachment
Foreign Affairs Snapshot
2014-01-21 20:58:02
http://www.foreignaffairs.com/articles/140246/abraham-newman/privacy-pretense
text/html
utf-8
blogPost
Washington Journal - Corporate Intelligence
Gara
Tom
Skype’s Incredible Rise, in One Image
2014-01-15
http://blogs.wsj.com/corporate-intelligence/2014/01/15/skypes-incredible-rise-in-one-image/
2014-01-21 20:58:36
attachment
WSJ-Blogs Snapshot
2014-01-21 20:58:39
http://blogs.wsj.com/corporate-intelligence/2014/01/15/skypes-incredible-rise-in-one-image/
text/html
utf-8
webpage
ABC News
Kahen-Kashi
Freda
Rep. Michael McCaul Believes Edward Snowden 'Cultivated by a Foreign Power' - ABC News
2014-01-19
http://abcnews.go.com/m/blogEntry?id=21590950&sid=77&cid=77
2014-01-21 21:07:38
attachment
Rep. Michael McCaul Believes Edward Snowden 'Cultivated by a Foreign Power' - ABC News
2014-01-21 21:07:39
http://abcnews.go.com/m/blogEntry?id=21590950&sid=77&cid=77
text/html
utf-8
webpage
Opinionator
Ludlow
Peter
Fear (Emotion)
Philosophy
Surveillance of Citizens by Government
terrorism
Fifty States of Fear
Is our government trying to minimize our worries about terrorism, or manipulating them to consolidate its power?
2014-01-19
http://opinionator.blogs.nytimes.com/2014/01/19/fifty-states-of-fear/
2014-01-21 21:12:22
attachment
Snapshot
2014-01-21 21:12:22
http://opinionator.blogs.nytimes.com/2014/01/19/fifty-states-of-fear/?_php=true&_type=blogs&_r=0
text/html
utf-8
blogPost
Pew Research Center for the People and the Press
Research
Pew
Featured Report
national security
Presidential Approval
Privacy and Safety
Publications
Surveillance
Survey Reports
Obama’s NSA Speech Has Little Impact on Skeptical Public
Survey Report President Obama’s speech on Friday outlining changes to the National Security Agency’s collection of telephone and internet data did not reg
1/20/2014
http://www.people-press.org/2014/01/20/obamas-nsa-speech-has-little-impact-on-skeptical-public/
2014-01-21 21:14:32
attachment
Snapshot
2014-01-21 21:14:32
http://www.people-press.org/2014/01/20/obamas-nsa-speech-has-little-impact-on-skeptical-public/
text/html
utf-8
webpage
Truthdig
McCoy
Alfred
Edward Snowden
empire
National Security Agency
NSA
political warfare
Privacy
Surveillance
Surveillance and Scandal
The NSA’s global panopticon fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders—who are the foundation for imperial rule—by ferreting out crucial, often scurrilous, information to make them more malleable.
- 2014/01/20
2014-01-20
http://www.truthdig.com/report/item/surveillance_and_scandal_20140120
2014-01-21 21:15:19
en-US
CC-BY-SA 2.0
attachment
Snapshot
2014-01-21 21:15:19
http://www.truthdig.com/report/item/surveillance_and_scandal_20140120#.Ut1fsky0iV0.twitter
text/html
utf-8
attachment
Surveillance and Scandal - Truthdig
2014-01-21 21:16:12
http://www.truthdig.com/report/page2/surveillance_and_scandal_20140120
text/html
utf-8
attachment
Surveillance and Scandal - Truthdig
2014-01-21 21:16:16
http://www.truthdig.com/report/page3/surveillance_and_scandal_20140120
text/html
utf-8
attachment
Surveillance and Scandal - Truthdig
2014-01-21 21:16:26
http://www.truthdig.com/report/page4/surveillance_and_scandal_20140120
text/html
utf-8
attachment
Surveillance and Scandal - Truthdig
2014-01-21 21:16:30
http://www.truthdig.com/report/page5/surveillance_and_scandal_20140120
text/html
utf-8
newspaperArticle
Spiegel Online
Staff
SPIEGEL
NSA Syping Scandal
Germany and the US appear to be edging closer to political confrontation. The Federal Prosecutor says there is sufficient evidence to open a politically explosive investigation into NSA spying on Chancellor Angela Merkel's mobile phone.
20.01.2014
http://www.spiegel.de/international/europe/nsa-syping-scandal-a-944415.html
2014-01-21 21:17:34
Spiegel Online
attachment
NSA Syping Scandal - SPIEGEL ONLINE
2014-01-21 21:17:36
http://www.spiegel.de/international/europe/nsa-syping-scandal-a-944415.html
text/html
windows-1252
webpage
chicagotribune.com
Meisner
Jason
Judge rejects looking into if surveillance program led to terrorism charge
Lawyers for a west suburban man charged with plotting to set off a bomb outside a Chicago bar won't be able to probe whether investigators used information collected from controversial government surveillance programs to launch the terrorism sting operation that led to the man's arrest, a federal judge has ruled.
2014-01-20
http://www.chicagotribune.com/news/local/breaking/chi-adel-daoud-hillside-bomb-plot-terrorism-20140120,0,4782659.story
2014-01-21 21:17:45
attachment
Snapshot
2014-01-21 21:17:45
http://www.chicagotribune.com/news/local/breaking/chi-adel-daoud-hillside-bomb-plot-terrorism-20140120,0,4782659.story
text/html
utf-8
webpage
USA Today
Page
Susan
Poll: Most Americans now oppose the NSA program
Most Americans disapprove of the NSA's collection of phone metadata, a USA TODAY/Pew Research Center Poll finds, and they're inclined to think there aren't adequate safeguards in place.
2014-01-20
Poll
http://www.usatoday.com/story/news/politics/2014/01/20/poll-nsa-surveillance/4638551/
2014-01-21 21:23:29
attachment
Snapshot
2014-01-21 21:23:29
http://www.usatoday.com/story/news/politics/2014/01/20/poll-nsa-surveillance/4638551/
text/html
utf-8
webpage
Ars Technica
Farivar
Cyrus
fbi-2
FISA
fisc
foreign-intelligence-surveillance-court
NSA
New documents: NSA provided 2-3 daily “tips” to FBI for at least 3 years
Secret 2007 court order mentions "approximately three telephone identifiers."
1/20/2014
New documents
http://arstechnica.com/tech-policy/2014/01/new-documents-nsa-provided-2-3-daily-tips-to-fbi-for-at-least-3-years/
2014-01-21 21:27:14
attachment
Snapshot
2014-01-21 21:27:14
http://arstechnica.com/tech-policy/2014/01/new-documents-nsa-provided-2-3-daily-tips-to-fbi-for-at-least-3-years/
text/html
utf-8
blogPost
Technology - Telegraph Blogs
Bartlett
Jamie
crypto-war
GCHQ
Internet
NSA
Philip Zimmerman
Politics and tech
Smari McCarthy
tor
A new 'crypto-war' breaks out, as citizens and criminals learn to hide from government
How do you protect yourself from this? Throughout the 1980s the US government was increasingly worried about a new, ungovernable public space. Although
2014-01-21 15:00:53
http://blogs.telegraph.co.uk/technology/jamiebartlett/100012121/a-new-crypto-war-breaks-out-as-citizens-and-criminals-learn-to-hide-from-government/
2014-01-21 21:27:26
attachment
Snapshot
2014-01-21 21:27:26
http://blogs.telegraph.co.uk/technology/jamiebartlett/100012121/a-new-crypto-war-breaks-out-as-citizens-and-criminals-learn-to-hide-from-government/
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Bruni
Frank
Bush, George W
Obama, Barack
Presidents and Presidency (US)
Remnick, David
United States Politics and Government
The Obama-Bush Nexus
Our last two presidents entered a profession of crowds and commotion without a robust appetite for either.
2014-01-20
http://www.nytimes.com/2014/01/21/opinion/bruni-the-obama-bush-nexus.html
2014-01-21 21:30:17
NYTimes.com
attachment
New York Times Snapshot
2014-01-21 21:30:17
http://www.nytimes.com/2014/01/21/opinion/bruni-the-obama-bush-nexus.html
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Sanger
David E.
Miller
Claire Cain
Corporations
Data-Mining and Database Marketing
National Security Agency
Obama, Barack
Reform Government Surveillance
Surveillance of Citizens by Government
In Keeping Grip on Data Pipeline, Obama Does Little to Reassure Industry
While President Obama bolstered some protections for citizens, he did nothing, at least yet, to address the data security concerns of U.S. technology companies.
2014-01-17
http://www.nytimes.com/2014/01/18/technology/in-keeping-grip-on-data-pipeline-obama-does-little-to-reassure-industry.html
2014-01-21 21:31:36
NYTimes.com
attachment
New York Times Snapshot
2014-01-21 21:31:36
http://www.nytimes.com/2014/01/18/technology/in-keeping-grip-on-data-pipeline-obama-does-little-to-reassure-industry.html?hp&referrer=
text/html
utf-8
webpage
Motherboard
Merchant
Brian
Maybe the Most Orwellian Text Message a Government's Ever Sent
“Dear subscriber, you are registered as a participant in a mass disturbance.”
2014-01-21
http://motherboard.vice.com/en_ca/blog/maybe-the-most-orwellian-text-message-ever-sent
2014-01-22 16:27:19
attachment
Snapshot
2014-01-22 16:27:19
http://motherboard.vice.com/en_ca/blog/maybe-the-most-orwellian-text-message-ever-sent
text/html
utf-8
webpage
Forbes
Coleman
Alison
Berlin
Business
Entrepreneurs
Europe
tech start ups
Germany's Privacy Stance Boosts Berlin's Tech Startups
With hundreds of millions of Euros invested in its tech start ups the city of Berlin is a hotspot for innovative entrepreneurs looking to create the next big thing. Among the savviest are those with their head around Germany's preoccupation for privacy. The country takes privacy very seriously, as FaceBook discovered [...]
2014-01-20
http://www.forbes.com/sites/alisoncoleman/2014/01/20/germanys-privacy-stance-boosts-berlins-tech-start-ups/
2014-01-22 16:36:37
attachment
Snapshot
2014-01-22 16:36:37
http://www.forbes.com/sites/alisoncoleman/2014/01/20/germanys-privacy-stance-boosts-berlins-tech-start-ups/
text/html
utf-8
blogPost
Washington Post
Barnett
Randy
Knowledge is Power: How the NSA bulk data seizure program is like gun registration
2014-01-21
http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/01/21/knowledge-is-power-how-the-nsa-bulk-data-seizure-program-is-like-gun-registration/
2014-01-22 17:13:58
Knowledge is Power
attachment
Snapshot
2014-01-22 17:13:58
http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/01/21/knowledge-is-power-how-the-nsa-bulk-data-seizure-program-is-like-gun-registration/
text/html
utf-8
blogPost
Davidson
Dana
cnn's dana davidsen
NSA
Obama administration
Poll: Majority oppose NSA, Obama's address had little impact
(CNN) -- President Barack Obama's proposed reforms to the National Security Agency have done little to change public opinion about its controversial telephone metadata collection practices, with a new national survey showing a majority of Americans oppose the agency's collection programs.
2014-01-20
http://politicalticker.blogs.cnn.com/2014/01/20/poll-majority-oppose-nsa-obamas-address-had-little-impact/
2014-01-22 17:16:27
Poll
attachment
Snapshot
2014-01-22 17:16:27
http://politicalticker.blogs.cnn.com/2014/01/20/poll-majority-oppose-nsa-obamas-address-had-little-impact/
text/html
utf-8
newspaperArticle
Technology
The Guardian
ISSN 0261-3077
Arthur
Charles
editor
technology
Data and computer security
Data protection
Eric Schmidt
GCHQ
Google
Internet
Media
NSA
technology
Television
The Guardian
UK news
United States
US national security
World news
Google's Eric Schmidt denies knowledge of NSA data tapping of firm
Executive chairman says search company has 'complained at great length' to the US government over intrusion
2014-01-21T17:30EST
en-GB
http://www.theguardian.com/technology/2014/jan/21/google-eric-schmidt-nsa-tapping-knowledge
2014-01-22 17:18:48
The Guardian
attachment
Guardian Snapshot
2014-01-22 17:18:52
http://www.theguardian.com/technology/2014/jan/21/google-eric-schmidt-nsa-tapping-knowledge
text/html
utf-8
newspaperArticle
Reuters
Berlin
Martin
Michelle
Barack Obama
Dinah PoKempner
Edward Snowden
Kenneth Roth
United States
Human Rights Watch says Obama not gone far enough on NSA reforms
BERLIN (Reuters) - U.S. President Barack Obama has not gone far enough in reforming the monitoring activities of the National Security Agency (NSA) and is continuing to violate the privacy rights of individuals,
Tue Jan 21 12:26:16 UTC 2014
http://www.reuters.com/article/2014/01/21/us-usa-security-rights-idUSBREA0K0BA20140121
2014-01-22 17:20:20
Reuters
attachment
Snapshot
2014-01-22 17:20:20
http://www.reuters.com/article/2014/01/21/us-usa-security-rights-idUSBREA0K0BA20140121
text/html
utf-8
webpage
FOX News Insider
Fox News
Fox News Channel
Fox News Insider
headlines
news
Official Blog
politics
Judge Napolitano: Obama's NSA Reforms Don't Stop 'Fundamental' Violations of Privacy Rights
Judge Andrew Napolitano joined Steve Doocy this morning to react to Friday's speech by President Obama proposing curbs on the NSA's ability to collect massive amounts of cell phone data.
Text.Article
2014-01-22T12:04
Judge Napolitano
http://foxnewsinsider.com/2014/01/21/judge-napolitano-obamas-nsa-reforms-dont-stop-fundamental-violations-privacy-rights
2014-01-22 17:28:18
attachment
Snapshot
2014-01-22 17:28:18
http://foxnewsinsider.com/2014/01/21/judge-napolitano-obamas-nsa-reforms-dont-stop-fundamental-violations-privacy-rights
text/html
utf-8
webpage
Project On Government Oversight
Brian
Danielle
What the President Didn’t Say in His Speech on Surveillance Reform
Statement of Danielle Brian, Executive Director, Project On Government Oversight
We’re encouraged that President Obama today acknowledged the dangers posed to our civil liberties by unchecked and overreaching intelligence gathering. His speech sets the stage for important reforms.
2014-01-17
http://www.pogo.org/blog/2014/01/what-the-president-didnt-say.html
2014-01-22 17:28:47
attachment
Snapshot
2014-01-22 17:28:47
http://www.pogo.org/blog/2014/01/what-the-president-didnt-say.html
text/html
utf-8
webpage
Huffington Post
Brandeisky
Kara
Four Questionable Claims Obama Has Made On NSA Surveillance
Today President Obama plans to announce some reportedly limited reforms to National Security Agency surveillance programs. Since the first disclosures based on documents provided by former NSA contractor Edward Snowden, Obama has offered his own defenses of the programs.
01/17/2014
http://www.huffingtonpost.com/2014/01/17/obama-nsa-surveillance_n_4616506.html
2014-01-22 17:29:16
attachment
Huffington Post
2014-01-22 17:29:22
http://www.huffingtonpost.com/2014/01/17/obama-nsa-surveillance_n_4616506.html?view=print&comm_ref=false
text/html
utf-8
webpage
FAIR Blog
Hart
Peter
It's Sunday and It's Snowden
It's Sunday, and that means time for the network chat shows to present one-sided discussions about the NSA, Edward Snowden and mass surveillance.
2014-01-21
http://www.fair.org/blog/2014/01/21/its-sunday-and-its-snowden/
2014-01-22 17:30:56
attachment
Snapshot
2014-01-22 17:30:56
http://www.fair.org/blog/2014/01/21/its-sunday-and-its-snowden/
text/html
utf-8
webpage
Freedom of the Press Foundation
Timm
Trevor
Before Snowden, Nixon Admin Pioneered Evidence-Free 'Russian Spy' Smears Against Daniel Ellsberg
The New Yorker published an interview with NSA whistleblower Edward Snowden last night in which he explains why recent claims by Rep. Mike Rogers that he is a Russian spy are “absurd.” Rep.
2014-01-22
https://pressfreedomfoundation.org/blog/2014/01/russian-spy-tactics-used-rep-rogers-snowden-were-pioneered-nixon-admin-against-daniel
2014-01-22 17:39:35
attachment
Snapshot
2014-01-22 17:39:35
https://pressfreedomfoundation.org/blog/2014/01/russian-spy-tactics-used-rep-rogers-snowden-were-pioneered-nixon-admin-against-daniel
text/html
utf-8
webpage
CNET
McCullagh
Declan
at&t
Keith Alexander
National Security Agency
NSA
Surveillance
verizon
Surveillance 'partnership' between NSA and telcos points to AT&T, Verizon
Newly disclosed classified document suggests firms allowed spy agency to access e-mail and phone call data by tapping into their 'fiber-optic cables, gateway switches, and data networks.' Read this article by Declan McCullagh on CNET News.
2013-06-27
http://news.cnet.com/8301-13578_3-57591391-38/surveillance-partnership-between-nsa-and-telcos-points-to-at-t-verizon/
2014-01-22 17:40:07
attachment
Snapshot
2014-01-22 17:40:07
http://news.cnet.com/8301-13578_3-57591391-38/surveillance-partnership-between-nsa-and-telcos-points-to-at-t-verizon/
text/html
utf-8
webpage
Verizon
Verizon Transparency Report
In 2013, Verizon received approximately 320,000 requests for customer information from federal, state or local law enforcement in the United States. We do not release customer information unless authorized by law, such as a valid law enforcement demand or an appropriate request in an emergency involving the danger of death or serious physical injury.
The table below sets out the number of subpoenas, orders, and warrants we received from law enforcement in the United States last year. We also received emergency requests and National Security Letters. The vast majority of these various types of demands relate to our consumer customers; we receive relatively few demands regarding our enterprise customers.
Overall, we saw an increase in the number of demands we received in 2013, as compared to 2012.
2014-01-22
http://transparency.verizon.com/us-data
2014-01-22 17:40:41
en-US
attachment
Verizon Transparency Report
2014-01-22 17:40:42
http://transparency.verizon.com/us-data
text/html
utf-8
webpage
Radack
Jesselyn
Daily Kos: The Shadowy Ugly Truth About Espionage Act Prosecutions & the Inflammatory Lies About Snowden
Most Americans oppose the NSA's vast mass surveillance phone records program , but the whistleblower who told Americans about the program - Edward Snowden - has been forced to seek political asylum ...
2014-01-22
Daily Kos
http://www.dailykos.com/story/2014/01/22/1271627/-The-Shadowy-Ugly-Truth-About-Espionage-Act-Prosecutions-the-Inflammatory-Lies-About-Snowden
2014-01-22 17:42:05
en
attachment
Snapshot
2014-01-22 17:42:05
http://www.dailykos.com/story/2014/01/22/1271627/-The-Shadowy-Ugly-Truth-About-Espionage-Act-Prosecutions-the-Inflammatory-Lies-About-Snowden
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Horwitz
Sari
Nakashima
Ellen
Obama goal for quick revamp of NSA program may be unworkable, some U.S. officials fear
Some fear the president’s push to quickly revamp the phone-data collection program is unworkable.
2014-01-22
en-US
http://www.washingtonpost.com/world/national-security/obama-goal-for-quick-revamp-of-nsa-program-may-be-unworkable-some-us-officials-fear/2014/01/21/dfb16892-82ca-11e3-8099-9181471f7aaf_story.html
2014-01-22 17:43:16
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-22 17:43:18
http://www.washingtonpost.com/world/national-security/obama-goal-for-quick-revamp-of-nsa-program-may-be-unworkable-some-us-officials-fear/2014/01/21/dfb16892-82ca-11e3-8099-9181471f7aaf_print.html
text/html
utf-8
blogPost
Washington Post
Baker
Stewart
The third grade and third-party doctrine
Short summary of story
2014-01-22
http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/01/22/the-third-grade-and-third-party-doctrine/
2014-01-22 17:49:17
en-US
attachment
Snapshot
2014-01-22 17:49:17
http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/01/22/the-third-grade-and-third-party-doctrine/
text/html
utf-8
webpage
Washington Post
aberdeen
aerostat
aircraft
army
blimp
grounds
proving
radar
Surveillance
threat
Surveillance aircraft floating high above Maryland
Later this year, a pair of unmanned, blimplike aircraft carrying military radar equipment will rise above suburban Baltimore to watch a 340-mile radius of the East Coast. The Army plans to test the surveillance system for three years.
2014-01-21
http://www.washingtonpost.com/world/national-security/surveillance-aircraft-floating-high-above-maryland/2014/01/21/3bc771a6-830e-11e3-bbe5-6a2a3141e3a9_graphic.html
2014-01-22 18:33:23
attachment
Snapshot
2014-01-22 18:33:23
http://www.washingtonpost.com/world/national-security/surveillance-aircraft-floating-high-above-maryland/2014/01/21/3bc771a6-830e-11e3-bbe5-6a2a3141e3a9_graphic.html
text/html
utf-8
webpage
Baudis
Bogdan
Barack Obama
big data analysis
FBI
Federal Intelligence Surveillance Court FISC
National Security Agency
NSA
White House
Obama's NSA Telecom Surveillance Reforms Really Won't Change Much
It appears the White House made major concessions in the government's surveillance practices to bolster U.S. citizens' privacy. But the changes are few in substance.
2014-01-18
http://www.eweek.com/security/obamas-nsa-telecom-surveillance-reforms-really-wont-change-much.html
2014-01-22 18:35:27
attachment
Snapshot
2014-01-22 18:35:27
http://www.eweek.com/security/obamas-nsa-telecom-surveillance-reforms-really-wont-change-much.html
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Ackerman
Spencer
Barack Obama
Fisa court
Law
NSA
Obama administration
Privacy
Surveillance
United States
US constitution and civil liberties
World news
US withholding Fisa court orders on NSA bulk collection of Americans' data
Justice Department refuses to turn over 'certain other' documents in ACLU lawsuit meant to shed light on surveillance practices
2014-01-21T13:16EST
en-GB
http://www.theguardian.com/world/2014/jan/21/us-withholding-fisa-court-orders-nsa-bulk-collection
2014-01-22 18:35:46
The Guardian
attachment
Guardian Snapshot
2014-01-22 18:35:51
http://www.theguardian.com/world/2014/jan/21/us-withholding-fisa-court-orders-nsa-bulk-collection
text/html
utf-8
newspaperArticle
Politics
The New York Times
ISSN 0362-4331
Schmitt
Eric
Defense Advanced Research Projects Agency
Defense Department
Suspensions, Dismissals and Resignations
terrorism
Poindexter Will Be Quitting Over Terrorism Betting Plan
John M. Poindexter, the official who oversaw a plan for the Pentagon to run a terrorist futures-trading market, is resigning under pressure.
2003-08-01
http://www.nytimes.com/2003/08/01/politics/01POIN.html
2014-01-22 18:47:06
NYTimes.com
attachment
New York Times Snapshot
2014-01-22 18:47:06
http://www.nytimes.com/2003/08/01/politics/01POIN.html
text/html
utf-8
blogPost
Washington Post
Andrea Peterson
Ukraine’s 1984 moment: Government using cellphones to track protesters
"Dear subscriber, you are registered as a participant in a mass disturbance."
2014-01-21
http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/21/ukraines-1984-moment-government-using-cellphones-to-track-protesters/
2014-01-22 18:47:21
Ukraine’s 1984 moment
attachment
Snapshot
2014-01-22 18:47:21
http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/21/ukraines-1984-moment-government-using-cellphones-to-track-protesters/
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Savage
Charlie
Classified Information and State Secrets
Espionage and Intelligence Services
House Committee on Intelligence
National Security Agency
Snowden, Edward J
Surveillance of Citizens by Government
United States Politics and Government
Snowden Denies Suggestions That He Was a Spy for Russia
He called the accusation by congressional leaders “false,” saying he had “clearly and unambiguously acted alone, with no assistance from anyone, much less a government.”
2014-01-21
http://www.nytimes.com/2014/01/22/world/snowden-denies-suggestions-that-he-was-a-spy-for-russia.html
2014-01-22 19:00:37
NYTimes.com
attachment
New York Times Snapshot
2014-01-22 19:00:37
http://www.nytimes.com/2014/01/22/world/snowden-denies-suggestions-that-he-was-a-spy-for-russia.html?_r=0
text/html
utf-8
blogPost
Huffington Post
Edwards
Bea
Feinstein and Rogers Blame Boris and Natasha
Let's give the two of them the benefit of the doubt and inspect the plausibility of their quasi-allegations. What on earth would the Russians gain from forcing the US to dial back its purportedly essential and effective dragnet surveillance of the world's peoples? That's a tough one, but the obvious answer is "nothing," because we are not at war with Russia.
22 Jan 2014 10:06:23 -0500
http://www.huffingtonpost.com/bea-edwards/feinstein--rogers-blame-b_b_4644100.html
2014-01-22 19:43:44
attachment
Huffington Post
2014-01-22 19:43:50
http://www.huffingtonpost.com/bea-edwards/feinstein--rogers-blame-b_b_4644100.html?view=print&comm_ref=false
text/html
utf-8
newspaperArticle
Reuters
Washington
Holland
Steve
Hosenball
Mark
Mason
Jeff
Angela Merkel
Barack Obama
Brazil
David Segal
Dianne Feinstein
Dilma Rousseff
Edward Snowden
Eric Holder
Germany
Kevin Lamarque
Larry Downing
United States
Obama bans spying on leaders of U.S. allies, scales back NSA program
WASHINGTON (Reuters) - President Barack Obama banned U.S. eavesdropping on the leaders of close friends and allies on Friday and began reining in the vast collection of Americans' phone data in a series
Fri Jan 17 22:09:33 UTC 2014
http://www.reuters.com/article/2014/01/17/us-usa-security-obama-idUSBREA0G0JI20140117
2014-01-22 20:28:42
Reuters
attachment
Snapshot
2014-01-22 20:28:42
http://www.reuters.com/article/2014/01/17/us-usa-security-obama-idUSBREA0G0JI20140117
text/html
utf-8
webpage
Singer
P. W.
Friedman
Allan
Cult of the Cyber Offensive
2014-01-15
http://www.foreignpolicy.com/articles/2014/01/15/cult_of_the_cyber_offensive_first_strike_advantage
2014-01-22 20:31:57
attachment
Cult of the Cyber Offensive
2014-01-22 20:31:58
http://www.foreignpolicy.com/articles/2014/01/15/cult_of_the_cyber_offensive_first_strike_advantage
text/html
utf-8
webpage
Foreign Policy
Harris
Shane
What Was Edward Snowden Doing in India?
2014-01-13
http://www.foreignpolicy.com/articles/2014/01/12/what_was_edward_snowden_doing_in_india
2014-01-22 20:47:08
attachment
What Was Edward Snowden Doing in India?
2014-01-22 20:47:09
http://www.foreignpolicy.com/articles/2014/01/12/what_was_edward_snowden_doing_in_india
text/html
utf-8
webpage
Ars Technica
Farivar
Cyrus
India
NSA
Spying
Worried about snooping, India won’t partner with Google for elections
Anonymous official tells Reuters that the country is concerned about NSA spying.
1/9/2014
http://arstechnica.com/tech-policy/2014/01/worried-about-snooping-india-wont-parter-with-google-for-elections/
2014-01-22 20:52:52
attachment
Snapshot
2014-01-22 20:52:52
http://arstechnica.com/tech-policy/2014/01/worried-about-snooping-india-wont-parter-with-google-for-elections/
text/html
utf-8
blogPost
UNREDACTED
Harper
Lauren
Powerful National Security Letters Continue to Go Largely Unchecked
The intelligence review group President Obama created to address surveillance concerns recently submitted 46 recommendations for improving the federal government’s surveillance programs. FBI direct...
2014-01-10
http://nsarchive.wordpress.com/2014/01/10/powerful-national-security-letters-continue-to-go-largely-unchecked/
2014-01-22 21:05:44
attachment
Snapshot
2014-01-22 21:05:44
http://nsarchive.wordpress.com/2014/01/10/powerful-national-security-letters-continue-to-go-largely-unchecked/
text/html
utf-8
presentation
Hamburg, Germany
Greenwald
Glenn
Glenn Grennwald 30C3 keynote: Transcript
Speech
2013-12-28
Chaos Communication Congress
https://ia701200.us.archive.org/30/items/Greenwald30C3/30c3-keynote-trans.html
2014-01-22 21:15:30
en
Keynote speech at 30C3: 30th Chaos Communication Congress
attachment
Glenn Grennwald 30C3 keynote: Transcript
2014-01-22 21:15:31
https://ia701200.us.archive.org/30/items/Greenwald30C3/30c3-keynote-trans.html
text/html
utf-8
webpage
BelfastTelegraph.co.uk
Central Intelligence Agency
George Orwell
Great Britain
Tim Berners-Lee
Internet founder hails Snowden
Edward Snowden did the world a favour by revealing the scale of surveillance by governments, according to the inventor of the internet.
2013-12-26
http://www.belfasttelegraph.co.uk/news/local-national/uk/internet-founder-hails-snowden-29867759.html
2014-01-22 21:23:06
attachment
Snapshot
2014-01-22 21:23:06
http://www.belfasttelegraph.co.uk/news/local-national/uk/internet-founder-hails-snowden-29867759.html
text/html
utf-8
newspaperArticle
Feuilleton
Morozov
Evgeny
Information Consumerism The Price of Hypocrisy
24.07.2013 · Even the best laws will not lead to a safer internet. We need a sharper picture of the information apocalypse that awaits us in a world where personal data is traded to avert the catastrophy.
24.07.2013
en
http://www.faz.net/aktuell/feuilleton/debatten/ueberwachung/information-consumerism-the-price-of-hypocrisy-12292374.html?printPagedArticle=true
2014-01-22 21:36:14
FAZ.NET
FAZ.NETISSN 0174-4909
attachment
FAZ.NET Article Snapshot
2014-01-22 21:36:19
http://www.faz.net/aktuell/feuilleton/debatten/ueberwachung/information-consumerism-the-price-of-hypocrisy-12292374.html?printPagedArticle=true
text/html
utf-8
radioBroadcast
PBS
Woodruff
Judy
Bamford
James
Hayden
Michael
Alperovitch
Dmitri
abuse
constitutional
Government programs
National Security Agency
NewsHour
North America
NSA
Oversight
PBS
Privacy
Spying
Surveillance
How have surveillance practices impacted cyber security agenda, private sector? | PBS NewsHour | Dec. 26, 2013
To review what we've learned about the National Security Agency's spying practices -- and the ramifications of those revelations -- since leaks began in the summer, Judy Woodruff consults James Bamford, author of "The Shadow Factory," retired Gen. Michael Hayden, former director of the NSA, and Dmitri Alperovitch of CrowdStrike.
2013-12026
en-US
How have surveillance practices impacted cyber security agenda, private sector?
http://www.pbs.org/newshour/bb/government_programs/july-dec13/surveillance2_12-26.html
2014-01-22 21:38:42
attachment
Looking back at the Snowden leaks that sparked U.S. surveillance revelations | PBS NewsHour | Dec. 26, 2013 | PBS
2014-01-22 21:41:31
http://www.pbs.org/newshour/bb/government_programs/july-dec13/surveillance1_12-26.html
text/html
utf-8
attachment
Snapshot
2014-01-22 21:38:42
http://www.pbs.org/newshour/bb/government_programs/july-dec13/surveillance2_12-26.html
text/html
utf-8
newspaperArticle
Los Angeles Times
ISSN 0458-3035
Turley
Jonathan
Why Obama should pardon Snowden
The current thinking in D.C. is reform for the NSA and the rope for Edward Snowden. No.
2013-12-22
en-US
http://www.latimes.com/opinion/commentary/la-oe-turley-pardon-snowden-20131222,0,4287598.story#axzz2o8y7uCy1
2014-01-22 21:42:23
LA Times
attachment
LA Times Snapshot
2014-01-22 21:42:29
http://www.latimes.com/opinion/commentary/la-oe-turley-pardon-snowden-20131222,0,4287598.story#axzz2o8y7uCy1
text/html
utf-8
webpage
Foreign Policy
Simpson
Emile
The Panopticon Paradox
2013-12-24
http://www.foreignpolicy.com/articles/2013/12/24/the_panopticon_paradox_nsa_war_on_terror
2014-01-22 21:43:59
attachment
The Panopticon Paradox
2014-01-22 21:44:00
http://www.foreignpolicy.com/articles/2013/12/24/the_panopticon_paradox_nsa_war_on_terror
text/html
utf-8
newspaperArticle
U.S. / Politics
The New York Times
ISSN 0362-4331
Sanger
David E.
Savage
Charlie
Computers and the Internet
Cyberwarfare
Espionage and Intelligence Services
National Security Agency
Obama, Barack
Privacy
Surveillance of Citizens by Government
terrorism
United States Defense and Military Forces
Obama Is Urged to Sharply Curb N.S.A. Data Mining
A panel of advisers urged President Obama to change the way the National Security Agency collects the telephone data of Americans, spies on foreign leaders and prepares for cyberattacks abroad.
2013-12-18
http://www.nytimes.com/2013/12/19/us/politics/report-on-nsa-surveillance-tactics.html
2014-01-22 21:50:25
NYTimes.com
attachment
New York Times Snapshot
2014-01-22 21:50:25
http://www.nytimes.com/2013/12/19/us/politics/report-on-nsa-surveillance-tactics.html?hp&_r=2&
text/html
utf-8
newspaperArticle
Politics
The Washington Post
ISSN 0190-8286
Davidson
Joe
Could better whistleblower protections prevent another Snowden from happening?
Some say that better protections for employees and contractors would give them another route to speak up.
2014-01-22
en-US
http://www.washingtonpost.com/politics/federal_government/could-better-whistleblower-protections-prevent-another-snowden-from-happening/2014/01/21/324b392e-82d1-11e3-bbe5-6a2a3141e3a9_story.html?tid=hpModule_308f7142-9199-11e2-bdea-e32ad90da239
2014-01-22 22:03:16
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-22 22:03:18
http://www.washingtonpost.com/politics/federal_government/could-better-whistleblower-protections-prevent-another-snowden-from-happening/2014/01/21/324b392e-82d1-11e3-bbe5-6a2a3141e3a9_print.html?tid=hpModule_308f7142-9199-11e2-bdea-e32ad90da239
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Ackerman
Spencer
CBS
Fisa court
Media
NSA
Obama administration
Privacy
Surveillance
United States
World news
NSA goes on 60 Minutes: the definitive facts behind CBS's flawed report
Our take on five things the spy agency would like the public to believe about its vast surveillance powers• Tech firms meet Obama to press case for NSA surveillance reform
2013-12-16T13:56EST
en-GB
NSA goes on 60 Minutes
http://www.theguardian.com/world/2013/dec/16/nsa-surveillance-60-minutes-cbs-facts
2014-01-22 22:03:50
The Guardian
attachment
Guardian Snapshot
2014-01-22 22:03:56
http://www.theguardian.com/world/2013/dec/16/nsa-surveillance-60-minutes-cbs-facts
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Wheeler
Marcy
Barack Obama
NSA
Obama administration
The NSA files
United States
US foreign policy
US politics
President Obama's NSA review group is typical administration whitewash
Notice how the White House moved quickly to thwart the only substantive NSA changes the review group was making
2013-12-16T12:40EST
en-GB
http://www.theguardian.com/commentisfree/2013/dec/16/obama-nsa-review-group-whitewash
2014-01-22 22:07:37
The Guardian
attachment
Guardian Snapshot
2014-01-22 22:07:41
http://www.theguardian.com/commentisfree/2013/dec/16/obama-nsa-review-group-whitewash
text/html
utf-8
blogPost
PandoDaily
6
Charles Seife On December
2013
Twenty years ago the NSA tried to protect you from spies, not spy on you
There's a crushing monotony to stories on how the National Security Agency has been bending and breaking every rule to crack open your mail. Each new revelation that hits the news -- that the agenc...
12/6/2013
http://pando.com/2013/12/06/twenty-years-ago-the-nsa-tried-to-protect-you-from-spies-not-spy-on-you/
2014-01-22 22:13:01
attachment
Snapshot
2014-01-22 22:13:01
http://pando.com/2013/12/06/twenty-years-ago-the-nsa-tried-to-protect-you-from-spies-not-spy-on-you/
text/html
utf-8
webpage
ReadWrite
Editors
ReadWrite
microsoft
NSA
Microsoft Will Allow Foreign Customers To Store Data Outside The U.S.
The move is a response to concerns over NSA snooping.
1/22/2014
http://readwrite.com/2014/01/22/microsoft-to-allow-foreign-customers-to-store-data-outside-the-us
2014-01-23 18:06:48
attachment
Snapshot
2014-01-23 18:06:48
http://readwrite.com/2014/01/22/microsoft-to-allow-foreign-customers-to-store-data-outside-the-us#awesm=~otJ7TE3LCfD4tp
text/html
utf-8
webpage
ITProPortal
Cuthbertson
Anthony
NSA
pclob
Prism
review
snowden
NSA surveillance programme deemed illegal by independent review
A report by the Privacy and Civil Liberties Oversight Board has condemned the practices of the US National Security Agency and called for an end to...
2014-01-23
http://www.itproportal.com/2014/01/23/nsa-surveillance-programme-deemed-illegal-independent-review/
2014-01-23 18:13:41
attachment
Snapshot
2014-01-23 18:13:41
http://www.itproportal.com/2014/01/23/nsa-surveillance-programme-deemed-illegal-independent-review/
text/html
utf-8
blogPost
emptywheel
Wheeler
Marcy
Project Minaret 2.0: Now, with 58% More Illegal Targeting! | emptywheel
2014-01-22
http://www.emptywheel.net/2014/01/22/project-minaret-2-0-now-with-58-more-illegal-targeting/
2014-01-23 18:27:08
attachment
Project Minaret 2.0: Now, with 58% More Illegal Targeting! | emptywheel
2014-01-23 18:27:09
http://www.emptywheel.net/2014/01/22/project-minaret-2-0-now-with-58-more-illegal-targeting/
text/html
utf-8
webpage
Bits Blog
Computer Security
CrowdStrike
Cyberattacks and Hackers
Mandiant Corp
new york times
Syrian Electronic Army
New Security Report Confirms Everyone Is Spying on Everyone
A new security report confirms previous findings that Chinese hackers are hard at work, the Syrian Electronic Army is getting better and hackers in the Middle East and North Africa are ramping up their capabilities. Needless to say, the National Security Agency is in good company.
2014-01-22
http://bits.blogs.nytimes.com/2014/01/22/new-security-report-confirms-everyone-is-spying-on-everyone/
2014-01-23 18:28:02
attachment
Snapshot
2014-01-23 18:28:02
http://bits.blogs.nytimes.com/2014/01/22/new-security-report-confirms-everyone-is-spying-on-everyone/?_php=true&_type=blogs&smid=tw-share&_r=0
text/html
utf-8
webpage
National Security Agency
Inglis
Chris
Deputy Director's Core Values Message - Video Transcripts - NSA/CSS
Hello, I'm Chris Inglis, the Deputy Director of the National Security Agency. Thank you for visiting with us on NSA.gov. I'd like to spend a moment talking about NSA's core values – core values that are important to us because, as federal servants, we know that at the end of the day, it's not simply important that we deliver something of value to the nation, but it's also very, very important that we've done it exactly the right way.
Our core values, I hope you wouldn't be surprised, are respect for the law, honesty, integrity, and transparency.
Those values are important to us, public servants, members of the NSA workforce, because each of us takes an oath of office to the Constitution, and the Constitution that we take an oath of office to is one, as you know, that speaks not simply to national security, but to all the values that we hold near and dear – privacy, civil liberties, the right to free speech. All of those values are things that then govern the way we do our business as much as what we deliver at the end of the day. Because we're Americans too – we come from the same communities, we go to the same schools, we raise our families in the same communities that you live in. And what you care about, we do as well.
2009-01-15
http://www.nsa.gov/public_info/speeches_testimonies/nsa_videos/core_values.shtml
2014-01-23 18:30:07
en-US
attachment
Deputy Director's Core Values Message - Video Transcripts - NSA/CSS
2014-01-23 18:30:08
http://www.nsa.gov/public_info/speeches_testimonies/nsa_videos/core_values.shtml
text/html
windows-1252
newspaperArticle
The New York Times
ISSN 0362-4331
Savage
Charlie
electronic communications privacy act
Justice Department
National Security Agency
Obama, Barack
Privacy
Surveillance of Citizens by Government
United States Politics and Government
USA PATRIOT Act
Watchdog Report Says N.S.A. Program Is Illegal and Should End
The 238-page report is likely to inject a significant new voice into the debate over surveillance, underscoring that the issue was not settled by a speech President Obama gave last week.
2014-01-23
http://www.nytimes.com/2014/01/23/us/politics/watchdog-report-says-nsa-program-is-illegal-and-should-end.html
2014-01-23 19:35:23
NYTimes.com
attachment
New York Times Snapshot
2014-01-23 19:35:23
http://www.nytimes.com/2014/01/23/us/politics/watchdog-report-says-nsa-program-is-illegal-and-should-end.html?partner=rss&emc=rss&smid=tw-nytimes
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Nakashima
Ellen
Independent review board says NSA phone data program is illegal and should end
Panel says Section 215 of Patriot Act “does not provide adequate basis to support this program.”
2014-01-23
en-US
http://www.washingtonpost.com/world/national-security/independent-review-board-says-nsa-phone-data-program-is-illegal-and-should-end/2014/01/22/4cebd470-83dd-11e3-bbe5-6a2a3141e3a9_story.html
2014-01-23 19:36:17
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-23 19:36:19
http://www.washingtonpost.com/world/national-security/independent-review-board-says-nsa-phone-data-program-is-illegal-and-should-end/2014/01/22/4cebd470-83dd-11e3-bbe5-6a2a3141e3a9_print.html
text/html
utf-8
webpage
ProPublica
Meyer
Theodoric
Maass
Peter
No Warrant, No Problem: How the Government Can Get Your Digital Data
From subpoenas to secret court orders, the government has an arsenal of legal tools for sweeping up your personal data.
2014-01-08
No Warrant, No Problem
http://www.propublica.org/special/no-warrant-no-problem-how-the-government-can-still-get-your-digital-data
2014-01-23 19:36:47
attachment
Snapshot
2014-01-23 19:36:47
http://www.propublica.org/special/no-warrant-no-problem-how-the-government-can-still-get-your-digital-data?utm_campaign=sprout&utm_medium=social&utm_source=twitter&utm_content=1390481791
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Apuzzo
Matt
Alexis, Aaron
Defense Contracts
Frauds and Swindling
Justice Department
Office of Personnel Management
Snowden, Edward J
US Investigations Services LLC (USIS)
Security Check Firm Said to Have Defrauded U.S.
The company that conducted a background investigation of Edward J. Snowden fraudulently signed off on hundreds of thousands of incomplete security checks in recent years, the Justice Department said.
2014-01-23
http://www.nytimes.com/2014/01/23/us/security-check-firm-said-to-have-defrauded-us.html
2014-01-23 20:09:32
NYTimes.com
attachment
New York Times Snapshot
2014-01-23 20:09:32
http://www.nytimes.com/2014/01/23/us/security-check-firm-said-to-have-defrauded-us.html
text/html
utf-8
webpage
Fusion
Ramos
Jorge
bill and melinda gates foundation
bill gates
gates foundation
NSA
poverty
Privacy
terrorism
Bill Gates Says Government Spying Isn’t Always Bad
Bill Gates has strong opinions when it comes to world poverty, but the tech titan-turned-philanthropist takes the middle ground when it comes to government spying.
2014-01-21
http://fusion.net/justice/story/bill-gates-government-spying-isnt-bad-396916
2014-01-23 20:10:11
attachment
Snapshot
2014-01-23 20:10:11
http://fusion.net/justice/story/bill-gates-government-spying-isnt-bad-396916
text/html
utf-8
blogPost
Washington Post
Peterson
Andrea
Half of Americans heard ‘nothing at all’ about the president’s NSA speech
The public's complicated relationship with NSA snooping.
2014-01-22
http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/22/half-of-americans-heard-nothing-at-all-about-the-presidents-nsa-speech/
2014-01-23 20:15:14
attachment
Snapshot
2014-01-23 20:15:14
http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/22/half-of-americans-heard-nothing-at-all-about-the-presidents-nsa-speech/
text/html
utf-8
webpage
The Brookings Institution
Singer
Peter W.
Wallace
Ian
Brazil
computer
cyber
National Security Agency
online
Secure the Future of the Internet
In 2014, President Obama should pursue policies guaranteeing an open, free-market Internet, write Peter W. Singer and Ian Wallace. Instead of waiting out the international blowback from Edward Snowden’s NSA revelations, the president needs to lead a new strategy against those governments who want to regulate the way the global Internet is run.
2014-01-23
http://www.brookings.edu/research/papers/2014/01/secure-future-internet-singer-wallace
2014-01-23 20:18:17
attachment
Snapshot
2014-01-23 20:18:17
http://www.brookings.edu/research/papers/2014/01/secure-future-internet-singer-wallace
text/html
utf-8
webpage
Foreign Policy
Groll
Elias
Does Edward Snowden Really Exist?
2014-01-22
http://blog.foreignpolicy.com/posts/2014/01/22/does_edward_snowden_really_exist
2014-01-23 20:20:57
attachment
Does Edward Snowden Really Exist?
2014-01-23 20:20:58
http://blog.foreignpolicy.com/posts/2014/01/22/does_edward_snowden_really_exist
text/html
utf-8
blogPost
Just Security
Vladeck
Steve
Does “Espionage Porn” Make Us Stronger?
A Forum on Law, Rights, and U.S. National Security
2014-01-23
http://justsecurity.org/2014/01/23/espionage-porn-stronger/
2014-01-23 20:24:57
attachment
Snapshot
2014-01-23 20:24:57
http://justsecurity.org/2014/01/23/espionage-porn-stronger/
text/html
utf-8
newspaperArticle
Reuters
Washington
Selyukh
Alina
Barack Obama
David Medine
Edward Snowden
Elisebeth Collins Cook
James Dempsey
United States
U.S. privacy board says NSA phone program illegal, should end
WASHINGTON (Reuters) - The U.S. National Security Agency's bulk collection of phone records provides only minimal benefits to countering terrorism, is illegal and should end, a federal privacy watchdog
Thu Jan 23 22:57:34 UTC 2014
http://www.reuters.com/article/2014/01/23/us-usa-security-privacy-idUSBREA0M0TI20140123
2014-01-24 16:39:57
Reuters
attachment
Snapshot
2014-01-24 16:39:57
http://www.reuters.com/article/2014/01/23/us-usa-security-privacy-idUSBREA0M0TI20140123
text/html
utf-8
interview
Snowden
Edward
Live Q&A with Edward Snowden: Thursday 23rd January, 8pm GMT, 3pm EST | Free Snowden
2014-01-23
Online
en-US
Live Q&A with Edward Snowden
http://freesnowden.is/asksnowden/
2014-01-24 16:40:43
attachment
Snapshot
2014-01-24 16:40:43
http://freesnowden.is/asksnowden/
text/html
utf-8
webpage
Chaos Computer Club
stefan
British government to answer fast-track spy challenge
2014-01-23
http://ccc.de/en/updates/2014/gchq-egmr
2014-01-24 16:49:08
attachment
CCC | British government to answer fast-track spy challenge
2014-01-24 16:49:09
http://ccc.de/en/updates/2014/gchq-egmr
text/html
utf-8
newspaperArticle
Business
The Guardian
ISSN 0261-3077
Treanor
Jill
BT
Business
Davos
Davos 2014
Internet
Privacy
technology
Telecommunications industry
BT boss says customers cannot be guaranteed 100% online privacy
Gavin Patterson tells World Economic Forum in Davos that 'murky' data collection laws should be changed
2014-01-22T08:05EST
en-GB
http://www.theguardian.com/business/2014/jan/22/davos-bt-boss-cannot-guarantee-online-mobile-privacy
2014-01-24 16:51:37
The Guardian
attachment
Guardian Snapshot
2014-01-24 16:51:39
http://www.theguardian.com/business/2014/jan/22/davos-bt-boss-cannot-guarantee-online-mobile-privacy
text/html
utf-8
newspaperArticle
UK news
The Guardian
ISSN 0261-3077
Hopkins
Nick
Data protection
European court of human rights
GCHQ
Human rights
Law
NSA
Privacy
The NSA files
UK news
UK security and counter-terrorism
World news
Justify GCHQ mass surveillance, European court tells ministers
Judges order government to provide submission about whether spying activities violated European convention on human rights
2014-01-23
en-GB
http://www.theguardian.com/uk-news/2014/jan/24/justify-gchq-mass-surveillance-european-court-human-rights
2014-01-24 16:52:07
The Guardian
attachment
Guardian Snapshot
2014-01-24 16:52:09
http://www.theguardian.com/uk-news/2014/jan/24/justify-gchq-mass-surveillance-european-court-human-rights
text/html
utf-8
webpage
CNN
Labott
Elise
Castillo
Mariano
Davos
Edward Snowden Russia
intelligence leaker
NSA
Whistle-blower
Edward Snowden won't be pressured to end asylum, Russia says
Edward Snowden says the time isn't right to return to the United States, and his current host, Russia, on Friday said it will not pressure him.
2014-01-24
http://www.cnn.com/2014/01/24/world/europe/russia-snowden/index.html
2014-01-24 16:54:43
en-US
attachment
Snapshot
2014-01-24 16:54:43
http://www.cnn.com/2014/01/24/world/europe/russia-snowden/index.html
text/html
utf-8
webpage
POLITICO
Byers
Dylan
Jill Abramson: 'This is the most secretive White House I have ever dealt with'
New York Times Executive Editor Jill Abramson says that President Obama's White House is the "most secretive White House" that she's covered during her long tenure as a political journalist. "I would say it is the most secretive White House that I have ever been involved in covering, and that includes — I spent 22 years...
2014-01-23
Jill Abramson
http://www.politico.com/blogs/media/2014/01/jill-abramson-this-is-the-most-secretive-white-house-181742.html
2014-01-24 17:04:29
attachment
Snapshot
2014-01-24 17:04:29
http://www.politico.com/blogs/media/2014/01/jill-abramson-this-is-the-most-secretive-white-house-181742.html
text/html
utf-8
webpage
Threat Level
Kravets
David
Censorship
Media
President Barack Obama
secrecy
Obama's Efforts to Control Media Are 'Most Aggressive' Since Nixon, Report Says | Threat Level | Wired.com
The President Barack Obama administration has “chilled the flow of information on issues of great public interest,” according to a Thursday report that amounts to an indictment of the president’s campaign pledge of a more open government.
2013-10-10
http://www.wired.com/threatlevel/2013/10/obama-nixon-media-war/
2014-01-24 17:04:56
attachment
Snapshot
2014-01-24 17:04:56
http://www.wired.com/threatlevel/2013/10/obama-nixon-media-war/
text/html
utf-8
webpage
The Washingtion Times
Wolfgang
Ben
Obama administration most secretive since Nixon: Report
The Obama White House’s war against leaks, and its penchant for secrecy and noted lack of transparency, are the worst “since the Nixon administration,” according to a major new study that relied on interviews from leading Washington reporters and news organization chiefs.
2013-10-10
Obama administration most secretive since Nixon
http://www.washingtontimes.com/news/2013/oct/10/report-obama-administration-most-secretive-nixon/
2014-01-24 17:05:25
attachment
Snapshot
2014-01-24 17:05:25
http://www.washingtontimes.com/news/2013/oct/10/report-obama-administration-most-secretive-nixon/
text/html
utf-8
webpage
Mass Surveillance
Abadi
Martín
Abelson
Hal
Acquisti
Alessandro
Barak
Boaz
Bellare
Mihir
Bellovin
Steven
Camp
L. Jean
Canetti
Ran
Cranor
Lorrie Faith
Dwork
Cynthia
Feigenbaum
Joan
Felten
Edward
Ferguson
Niels
Fischer
Michael
Ford
Bryan
Franklin
Matthew
Garay
Juan
Halevi
Shai
Jha
Somesh
Juels
Ari
Kaashoek
M. Frans
Krawczyk
Hugo
Landau
Susan
Lee
Wenke
Lysyanskaya
Anna
Malkin
Tal
Mazières
David
McCurley
Kevin
McDaniel
Patrick
Micciancio
Daniele
Myers
Andrew
Paxson
Vern
Peha
Jon
Ristenpart
Thomas
Rivest
Ronald
Rogaway
Phillip
Rose
Greg
Sahai
Amit
Schneier
Bruce
Shacham
Hovav
Shelat
Abhi
Shrimpton
Thomas
Silberschatz
Avi
Smith
Adam
Song
Dawn
Tsudik
Gene
Vadhan
Salil
Wright
Rebecca
Yung
Moti
Zeldovich
Nickolai
An Open Letter from US Researchers in Cryptography and Information Security
2014-01-24
http://masssurveillance.info/
2014-01-24 17:07:36
attachment
An Open Letter from US Researchers in Cryptography and Information Security
2014-01-24 17:07:37
http://masssurveillance.info/
text/html
windows-1252
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Nakashima
Ellen
Soltani
Ashkan
Panel urges new curbs on surveillance by U.S.
Among the recommendations are an end to NSA collection and storage of Americans’ phone records.
2013-12-19
en-US
http://www.washingtonpost.com/world/national-security/nsa-shouldnt-keep-phone-database-review-board-recommends/2013/12/18/f44fe7c0-67fd-11e3-a0b9-249bbb34602c_story.html
2014-01-24 17:56:54
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-24 17:56:56
http://www.washingtonpost.com/world/national-security/nsa-shouldnt-keep-phone-database-review-board-recommends/2013/12/18/f44fe7c0-67fd-11e3-a0b9-249bbb34602c_print.html
text/html
utf-8
email
McCullagh
Declan
Jacking in from the "Keys to the Kingdom" Port
Washington, DC -- This is a tale of broken codes, betrayal of a social
contract, morality run amuck, and a kind of twisted John Le Carre
meets the Crying Game encounter.
1996-07-03
http://www.mccullagh.org/misc/articles/cwd.keys.to.the.kingdcom.1996.txt
2014-01-24 17:57:34
en-US
attachment
2014-01-24 17:57:35
http://www.mccullagh.org/misc/articles/cwd.keys.to.the.kingdcom.1996.txt
text/plain
utf-8
blogPost
Time - Swampland
Miller
Zeke J.
Exclusive: Republican Party Calls For End To NSA Domestic Phone Records Program | TIME.com
2014-01-24
http://swampland.time.com/2014/01/24/exclusive-republican-party-calls-for-investigation-into-nsa-snooping/
2014-01-24 18:42:43
attachment
Exclusive: Republican Party Calls For End To NSA Domestic Phone Records Program | TIME.com
2014-01-24 18:42:44
http://swampland.time.com/2014/01/24/exclusive-republican-party-calls-for-investigation-into-nsa-snooping/
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Nakashima
Ellen
Obama disagrees with watchdog group’s conclusion that NSA phone program is illegal
The president cites federal court rulings that upheld the program’s constitutionality.
2014-01-24
en-US
http://www.washingtonpost.com/world/national-security/obama-disagrees-with-watchdog-groups-conclusion-that-nsa-phone-program-is-illegal/2014/01/23/7a945564-8464-11e3-8099-9181471f7aaf_story.html
2014-01-24 18:43:57
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-24 18:43:59
http://www.washingtonpost.com/world/national-security/obama-disagrees-with-watchdog-groups-conclusion-that-nsa-phone-program-is-illegal/2014/01/23/7a945564-8464-11e3-8099-9181471f7aaf_print.html
text/html
utf-8
blogPost
The Raw Story
Agence France-Presse
Tech leaders at Davos: Mass Internet surveillance is bad for business | The Raw Story
2014-01-22
http://www.rawstory.com/rs/2014/01/22/tech-leaders-at-davos-mass-internet-surveillance-is-bad-for-business/
2014-01-24 20:07:50
Tech leaders at Davos
attachment
Snapshot
2014-01-24 20:07:50
http://www.rawstory.com/rs/2014/01/22/tech-leaders-at-davos-mass-internet-surveillance-is-bad-for-business/
text/html
utf-8
webpage
Mihai
Cătălina
Michael Hayden: Hackers Are Greatest Danger
2014-01-24
http://cryptome.org/2014/01/hayden-hackers.htm
2014-01-24 20:11:42
attachment
Fostul director al NSA şi CIA: Statele Unite fură informaţii pentru a-şi proteja cetăţenii, China pentru a-i îmbogăţi - Gandul
2014-01-24 20:12:04
http://www.gandul.info/stiri/fostul-director-al-nsa-si-cia-statele-unite-fura-informatii-pentru-a-si-proteja-cetatenii-china-pentru-a-i-imbogati-11961098
text/html
utf-8
attachment
Michael Hayden: Hackers Are Greatest Danger
2014-01-24 20:11:43
http://cryptome.org/2014/01/hayden-hackers.htm
text/html
utf-8
webpage
Gandul.info
Mihai
Cătălina
Fostul director al NSA şi CIA: Statele Unite fură informaţii pentru a-şi proteja cetăţenii, China pentru a-i îmbogăţi
Fostul director al NSA şi CIA Michael Hayden a declarat, vineri, la Bucureşti, că SUA fură informaţii pentru a asigura securitatea cetăţenilor săi, nu pentru a-i îmbogăţi, aşa cum face Beijingul.
2014-01-24
Fostul director al NSA şi CIA
http://www.gandul.info/stiri/fostul-director-al-nsa-si-cia-statele-unite-fura-informatii-pentru-a-si-proteja-cetatenii-china-pentru-a-i-imbogati-11961098
2014-01-24 20:13:30
hun
attachment
Snapshot
2014-01-24 20:13:30
http://www.gandul.info/stiri/fostul-director-al-nsa-si-cia-statele-unite-fura-informatii-pentru-a-si-proteja-cetatenii-china-pentru-a-i-imbogati-11961098
text/html
utf-8
webpage
Ars Technica
Farivar
Cyrus
FISA
fisc
NSA
pclob
Watchdog report offers harshest critique of NSA metadata program to date
Group fights gov't claim that "essentially all telephone records are relevant."
1/23/2014
http://arstechnica.com/tech-policy/2014/01/watchdog-report-offers-harshest-critique-of-nsa-metadata-program-to-date/
2014-01-24 20:15:23
attachment
Snapshot
2014-01-24 20:15:23
http://arstechnica.com/tech-policy/2014/01/watchdog-report-offers-harshest-critique-of-nsa-metadata-program-to-date/?utm_content=buffer2066e&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
text/html
utf-8
webpage
Forbes
Granick
Jennifer
Sprigman
Christopher Jon
Law
Policy
politics
Security
Tech
Washington
Told Ya So: NSA's Collection Of Metadata Is Screamingly Illegal
This post is coauthored by Christopher Sprigman. We told you so. This week’s report from the independent Privacy and Civil Liberties Oversight Board, or PCLOB, confirms what we said back in June of last year in our New York Times Op Ed “The Criminal NSA”. The NSA’s telephone record metadata program, in [...]
2014-01-24
Told Ya So
http://www.forbes.com/sites/jennifergranick/2014/01/24/told-ya-so-nsas-collection-of-metadata-is-screamingly-illegal/
2014-01-27 17:24:00
attachment
Snapshot
2014-01-27 17:24:00
http://www.forbes.com/sites/jennifergranick/2014/01/24/told-ya-so-nsas-collection-of-metadata-is-screamingly-illegal/
text/html
utf-8
webpage
Tom's Dispatch
Engelhardt
Tom
Tomgram: Alfred McCoy, It's About Blackmail, Not National Security
2014-01-19
http://www.tomdispatch.com/post/175795/tomgram%3A_alfred_mccoy,_it%27s_about_blackmail,_not_national_security/
2014-01-27 18:38:13
attachment
Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch
2014-01-27 18:38:14
http://www.tomdispatch.com/post/175795/tomgram%3A_alfred_mccoy,_it%27s_about_blackmail,_not_national_security/
text/html
windows-1252
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Whitlock
Craig
Military brass, behaving badly: Files detail a spate of misconduct dogging armed forces
Previously undisclosed documents detail a series of inquiries into high-ranking commanders’ misconduct.
2014-01-27
en-US
Military brass, behaving badly
http://www.washingtonpost.com/world/national-security/military-brass-behaving-badly-files-detail-a-spate-of-misconduct-dogging-armed-forces/2014/01/26/4d06c770-843d-11e3-bbe5-6a2a3141e3a9_story.html
2014-01-27 18:43:09
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-27 18:43:11
http://www.washingtonpost.com/world/national-security/military-brass-behaving-badly-files-detail-a-spate-of-misconduct-dogging-armed-forces/2014/01/26/4d06c770-843d-11e3-bbe5-6a2a3141e3a9_print.html
text/html
utf-8
blogPost
Big Brother Watch
Does Dishfire circumvent British law? | Big Brother Watch
If GCHQ or any other agency is obtaining mobile phone data through the Dishfire programme without a RIPA notice, that is circumventing British law. The statements made have sought to only address questions about content being accessed, not metadata. This confusion should be urgently addressed. Under UK law, if an agency or police force want access to details of who you have texted, where you were when you sent or received a text or the dates and times of your … →
2014-01-27
http://www.bigbrotherwatch.org.uk/home/2014/01/dishfire-circumvents-british-law.html
2014-01-27 18:43:52
Does Dishfire circumvent British law?
attachment
Snapshot
2014-01-27 18:43:52
http://www.bigbrotherwatch.org.uk/home/2014/01/dishfire-circumvents-british-law.html
text/html
utf-8
blogPost
POLITICO
EST
MANU RAJU | 1/26/14 11:22 PM EST Updated: 1/27/14 11:59 AM
2014 Elections
Edward Snowden
Elections
Manu Raju
national security
NSA
Candidates of both parties run vs. NSA
Edward Snowden’s leaks didn’t just cause turmoil in the U.S. intelligence community, prompt international backlash toward President Barack Obama and revive a debate in Congress over civil liberties. They spawned a whole new breed on the 2014 campaign trail: The anti-National Security Agency candidate. Take Shenna Bellows in Maine. The Democratic...
2014-01-26
http://www.politico.com/story/2014/01/candidates-of-both-parties-run-vs-nsa-102628.html
2014-01-27 18:44:40
en-US
attachment
Snapshot
2014-01-27 18:44:40
http://www.politico.com/story/2014/01/candidates-of-both-parties-run-vs-nsa-102628.html
text/html
utf-8
webpage
Just Security
Daskal
Jennifer
Counterterrorism Under the Radar: A Notable No Fly List Case and its Broader Implications
A Forum on Law, Rights, and U.S. National Security
2014-01-27
Counterterrorism Under the Radar
http://justsecurity.org/2014/01/27/fly-list-future/
2014-01-27 18:46:10
en-US
attachment
Snapshot
2014-01-27 18:46:10
http://justsecurity.org/2014/01/27/fly-list-future/
text/html
utf-8
report
Rochester, NY
Social Science Research Network
Daskal
Jennifer C.
due process
equal protection
No Fly List
pre-crime
prevention
punishment
sanctions
sex offenders
terrorism
Pre-Crime Restraints: The Explosion of Targeted, Non-Custodial Prevention
This Article exposes the ways in which noncustodial pre-crime restraints have proliferated over the past decade, focusing in particular on three notable examples — terrorism-related financial sanctions, the No Fly List, and the array of residential, employment, and related restrictions imposed on sex offenders. Because such restraints do not involve physical incapacitation, they are rarely deemed to infringe core liberty interests. Because they are preventive, not punitive, criminal law procedural protections do not apply. They have exploded largely unchecked — subject to little more than bare rationality review and negligible procedural protections — and without any coherent theory as to their appropriate limits. The Article examines this category of noncustodial pre-crime restraints as a whole and develops a framework for evaluating, limiting, and legitimizing their use. It accepts the preventive frame in which they operate but argues that in some instances, noncustodial restraints can so thoroughly constrain an individual’s functioning that they are equivalent to de facto imprisonment and ought to be treated as such. Even in the more common case of partial restraints, enhanced substantive and procedural safeguards are needed to preserve the respect for individuals’ equal dignity, freedom of choice, and moral autonomy at the heart of the liberty interest that the Constitution and a just society protect.
ID 2290334
SSRN Scholarly Paper
2013/07/05
Pre-Crime Restraints
http://papers.ssrn.com/abstract=2290334
2014-01-27 18:46:44
papers.ssrn.com
attachment
Snapshot
2014-01-27 18:46:44
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290334
text/html
utf-8
attachment
SSRN-id2290334.pdf
application/pdf
webpage
The Independent
Milmo
Cahal
Annual Report
Diplomacy
Law
Liberal Democrat Party
Phone Hacking
Security
USA
Exclusive: Peers call for proper scrutiny of American military bases in UK used for drone strikes and mass spying
Scrutiny of American military bases in Britain could be increased dramatically for the first time in more than 60 years under cross-party proposals provoked by evidence that the installations are being used for drone strikes and mass spying activities.
2014-01-25
Exclusive
http://www.independent.co.uk/news/uk/home-news/exclusive-peers-call-for-proper-scrutiny-of-american-military-bases-in-uk-used-for-drone-strikes-and-mass-spying-9084126.html
2014-01-27 18:50:35
attachment
Snapshot
2014-01-27 18:50:35
http://www.independent.co.uk/news/uk/home-news/exclusive-peers-call-for-proper-scrutiny-of-american-military-bases-in-uk-used-for-drone-strikes-and-mass-spying-9084126.html
text/html
utf-8
webpage
Foreign Policy
Groll
Elias
Why Is Edward Snowden on a PR Blitz?
2014-01-24
http://blog.foreignpolicy.com/posts/2014/01/24/why_is_edward_snowden_on_a_pr_blitz
2014-01-27 18:55:14
en
attachment
Why Is Edward Snowden on a PR Blitz?
2014-01-27 18:55:15
http://blog.foreignpolicy.com/posts/2014/01/24/why_is_edward_snowden_on_a_pr_blitz
text/html
utf-8
blogPost
Observations on Credit and Surveillance
Stoller
Matthew
The Secret Government Problem and Congressional Committees
Marcy Wheeler and Steve Vladeck both pointed out something the Snowden revelations have brought into the light - the lack of oversight by Congress over the NSA and the intelligence community. Vladeck...
2014-01-24
http://mattstoller.tumblr.com/post/74403978441/the-secret-government-problem-and-congressional
2014-01-27 18:56:22
attachment
Snapshot
2014-01-27 18:56:22
http://mattstoller.tumblr.com/post/74403978441/the-secret-government-problem-and-congressional
text/html
utf-8
webpage
Circa News
circa
Tim Cook says Apple wants to be 'totally transparent' about surveillance
Many of the biggest technology firms in the U.S. are wrestling with the federal government's various surveillance programs.
2014-01-25
http://cir.ca/news/tech-companies-push-back-against-fisa
2014-01-27 18:57:25
attachment
Snapshot
2014-01-27 18:57:25
http://cir.ca/news/tech-companies-push-back-against-fisa
text/html
utf-8
webpage
POLITICO
Samuelson
Darren
Edward Snowden
geoffrey stone
National Security Agency
review group
Surveillance
Geoffrey Stone: White House viewed surveillance report as 'liberal'
A member of President Barack Obama’s hand-picked surveillance review group said Friday the White House was swayed by U.S. intelligence officials sympathetic to the National Security Agency and ultimately viewed the group’s findings “as a liberal report.” University of Chicago law professor Geoffrey Stone said that, after receiving...
2014-01-24
Geoffrey Stone
http://www.politico.com/blogs/under-the-radar/2014/01/stone-white-house-viewed-surveillance-report-as-liberal-181849.html
2014-01-27 18:58:49
attachment
Snapshot
2014-01-27 18:58:49
http://www.politico.com/blogs/under-the-radar/2014/01/stone-white-house-viewed-surveillance-report-as-liberal-181849.html
text/html
utf-8
webpage
Center for Public Integrity
Smith
R. Jeffery
Aaron Alexis
Academi
Alabama
Assistant
attorney general
Business_Finance
Center for public integrity
Chairman
chief financial officer
Civil service in the United States
Congress
Department of Justice
director of fieldwork services
Edward Snowden
executive
Falls Church
federal contractor
fieldwork services
government
improved control protocols
Law_Crime
national security
NSA contractor
Office of Personnel Management
Pennsylvania
Public administration
Security
Security clearance
security clearance applications
spokeswoman
supervisor
the filing
United States
United States Office of Personnel Management
U.S. Attorney
USD
US Investigative Services
Virginia
Washington
Western Pennsylvania
work
Workload Leader
Justice Department says federal contractor routinely faked security clearance reviews
A court filing alleges that a Virginia firm failed to vet files properly for hundreds of thousands of federal clearance-holders
2014-01-24T04:10:00+00:00
http://www.publicintegrity.org/2014/01/23/14155/justice-department-says-federal-contractor-routinely-faked-security-clearance
2014-01-27 19:00:15
attachment
Snapshot
2014-01-27 19:00:15
http://www.publicintegrity.org/2014/01/23/14155/justice-department-says-federal-contractor-routinely-faked-security-clearance?utm_source=publicintegrity&utm_medium=social_media&utm_campaign=twitter
text/html
utf-8
webpage
ProPublica
Larson
Jeff
Glanz
James
Lehren
Andrew W.
Spy Agencies Probe Angry Birds and Other Apps for Personal Data
New documents show the NSA and its British counterpart have access to advertiser data on smartphone apps, which can include your gender, income, and even whether you're a
2014-01-27
http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data
2014-01-27 19:04:48
en-US
attachment
Snapshot
2014-01-27 19:04:48
http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Larson
James Glanz, Jeff
Lehren
Andrew W.
Government Communications Headquarters (Great Britain)
Mobile Applications
National Security Agency
Snowden, Edward J
Surveillance of Citizens by Government
Wireless Communications
Spy Agencies Scour Phone Apps for Personal Data
As personal data pours onto mobile networks, American and British eavesdroppers are prying into so-called leaky apps to extract geographical data, address books and phone logs, secret documents show.
2014-01-27
en-US
http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html
2014-01-27 19:05:34
NYTimes.com
attachment
New York Times Snapshot
2014-01-27 19:05:34
http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Ball
James
Android
Angry Birds
Apps
GCHQ
iPhone
Mobile phones
NSA
Obama administration
Privacy
Smartphones
Surveillance
technology
UK news
United States
World news
NSA and GCHQ target 'leaky' phone apps like Angry Birds to scoop user data
• US and UK spy agencies piggyback on commercial data• Details can include age, location and sexual orientation • Documents also reveal targeted tools against individual phones
2014-01-27T12:30EST
en-GB
http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data
2014-01-27 19:05:47
The Guardian
attachment
02b15d97-32b0-44aa-82e4-7f4d9776fb0d-460x345.jpeg (JPEG Image, 460 × 345 pixels)
2014-01-27 19:16:00
https://image.guim.co.uk/sys-images/Guardian/Pix/pictures/2014/1/27/1390841077123/02b15d97-32b0-44aa-82e4-7f4d9776fb0d-460x345.jpeg
image/jpeg
windows-1252
attachment
a52c2207-36f5-4b6f-8a78-609bd44db0fd-460x345.jpeg (JPEG Image, 460 × 345 pixels)
2014-01-27 19:15:57
https://image.guim.co.uk/sys-images/Guardian/Pix/pictures/2014/1/27/1390841102999/a52c2207-36f5-4b6f-8a78-609bd44db0fd-460x345.jpeg
image/jpeg
windows-1252
attachment
Guardian Snapshot
2014-01-27 19:05:49
http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Nakashima
Ellen
Obama signs off on nomination of Rogers as NSA director
Vice Admiral Michael S. Rogers would succeed Gen. Keith Alexander, who is retiring this year.
2014-01-25
en-US
http://www.washingtonpost.com/world/national-security/obama-signs-off-on-nomination-of-rogers-as-nsa-director/2014/01/25/bc54378c-85f7-11e3-801f-e3ff2ca3fab6_story.html
2014-01-27 19:05:57
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-27 19:05:59
http://www.washingtonpost.com/world/national-security/obama-signs-off-on-nomination-of-rogers-as-nsa-director/2014/01/25/bc54378c-85f7-11e3-801f-e3ff2ca3fab6_print.html
text/html
utf-8
webpage
The Wall Street Journal
What They Know - Mobile - WSJ
2010-12-18
http://blogs.wsj.com/wtk-mobile/
2014-01-27 19:06:33
attachment
Screenshot - 01272014 - 021200 PM--blogs_wsj_com--wtk-mobile__Android.png
image/png
attachment
Screenshot - 01272014 - 021200 PM--blogs_wsj_com--wtk-mobile__iPhone.png
image/png
attachment
The Journal's Cellphone Testing Methodolgy - WSJ.com
2014-01-27 19:07:06
http://online.wsj.com/news/articles/SB10001424052748704034804576025951767626460?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052748704034804576025951767626460.html
text/html
utf-8
blogPost
PandoDaily
Levine
Yasha
Google and encryption: why true user privacy is Google's biggest enemy
After hamming it up at a fireless "fireside chat" last week in Davos, Google chairman Eric Schmidt talked to the Wall Street Journal about encryption, privacy and government surveillance. He told t...
1/27/2014
http://pando.com/2014/01/27/google-and-encryption-why-true-user-privacy-is-googles-biggest-enemy/
2014-01-27 19:14:45
Google and encryption
attachment
Snapshot
2014-01-27 19:14:45
http://pando.com/2014/01/27/google-and-encryption-why-true-user-privacy-is-googles-biggest-enemy/
text/html
utf-8
newspaperArticle
Los Angeles Times
ISSN 0458-3035
Ackerman
Bruce
Obama's NSA blind spot
The president has no right to sit on the sidelines waiting for the Supreme Court to tell him what the Constitution means.
2014-01-26
en-US
http://www.latimes.com/opinion/commentary/la-oe-adv-ackerman-nsa-obama-20140126,0,2145502.story
2014-01-27 19:41:37
LA Times
attachment
LA Times Snapshot
2014-01-27 19:41:39
http://www.latimes.com/opinion/commentary/la-oe-adv-ackerman-nsa-obama-20140126,0,2145502.story
text/html
utf-8
webpage
Channel 4 News
White
Geoff
Channel 4 News
GCHQ
Geoff White
technology
Three rounds on government over text message snooping
The mobile network Three has become the latest phone company to demand answers from the government over GCHQ's use of a text message snooping system run by US intelligence.
2014-01-24
http://www.channel4.com/news/three-gchq-dishfire-vodafone-european-court-nsa-snowden
2014-01-27 19:44:11
attachment
Snapshot
2014-01-27 19:44:11
http://www.channel4.com/news/three-gchq-dishfire-vodafone-european-court-nsa-snowden
text/html
windows-1252
blogPost
Medium
Claudio
The Internet is compromised
A lot of documents have been published revealing the incredibly diversified endeavors of the NSA and its partners, GCHQ and the other…
2014-01-25
https://medium.com/p/4c66984abd7d
2014-01-27 19:45:21
attachment
Snapshot
2014-01-27 19:45:21
https://medium.com/p/4c66984abd7d
text/html
utf-8
magazineArticle
BusinessWeek: technology
Miller
Hugo
AJ Byers
Canada
Communications Security Establishment
Edward Snowden
guardian
Lloyd Switzer
National Security Agency
NSA
Rogers Communicadtions
Solium Capital
Telus
NSA Spying Sends Data to Canada
In Kamloops, B.C., cool overnight temperatures in summer mean Telus needs to run its air conditioning for only about 40 hours a year to keep its computer servers from overheating. Lower cooling costs are part of the Canadian telecommunications company’s sales pitch to businesses looking to store
2014-01-23
http://www.businessweek.com/articles/2014-01-23/nsa-spying-sends-data-to-canada
2014-01-27 19:50:09
BusinessWeek
webpage
Foreign Policy
Zenko
Micah
The True Forever War
2014-01-24
http://www.foreignpolicy.com/articles/2014/01/24/the_true_forever_war_technology_aumf
2014-01-27 19:50:21
attachment
The True Forever War
2014-01-27 19:50:22
http://www.foreignpolicy.com/articles/2014/01/24/the_true_forever_war_technology_aumf
text/html
utf-8
blogPost
A Few Thoughts on Cryptographic Engineering
Green
Matthew
A Few Thoughts on Cryptographic Engineering: A letter from US security researchers
2014-01-25
http://blog.cryptographyengineering.com/2014/01/a-letter-from-us-security-researchers.html
2014-01-27 19:51:04
A Few Thoughts on Cryptographic Engineering
attachment
Snapshot
2014-01-27 19:51:04
http://blog.cryptographyengineering.com/2014/01/a-letter-from-us-security-researchers.html
text/html
utf-8
blogPost
POLITICO
Glueck
Katie
Katie Glueck
National Security Agency
Peter King
Privacy
Surveillance
Peter King slams RNC on NSA resolution
Rep. Peter King on Saturday blasted a new resolution from the Republican National Committee concerning the National Security Agency, charging that the “hysterical” measure could be a “death warrant” for the GOP. The RNC on Friday called the NSA surveillance program “unconstitutional” in a resolution, urging a “halt”...
2014-01-25
http://www.politico.com/story/2014/01/peter-king-rnc-nsa-resolution-102611.html
2014-01-27 19:53:25
attachment
Snapshot
2014-01-27 19:53:25
http://www.politico.com/story/2014/01/peter-king-rnc-nsa-resolution-102611.html
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Schmidt
Michael S.
Children and Childhood
Computers and the Internet
National Security Agency
Snowden, Edward J
Surveillance of Citizens by Government
United States Defense and Military Forces
On Children’s Website, N.S.A. Puts a Furry, Smiley Face on Its Mission
The National Security Agency uses cartoon characters to try to teach young people about its work, and to encourage them to someday join the agency.
2014-01-24
http://www.nytimes.com/2014/01/25/us/on-childrens-website-nsa-puts-a-furry-smiley-face-on-its-mission.html
2014-01-27 19:53:58
NYTimes.com
attachment
New York Times Snapshot
2014-01-27 19:53:58
http://www.nytimes.com/2014/01/25/us/on-childrens-website-nsa-puts-a-furry-smiley-face-on-its-mission.html
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Miller
Greg
Democrat Dianne Feinstein proves an obstacle to Obama’s push for changes at spy agencies
Sen. Dianne Feinstein has opposed the president’s efforts to revamp U.S. drone and data-collection programs.
2014-01-25
en-US
http://www.washingtonpost.com/world/national-security/democrat-dianne-feinstein-proves-an-obstacle-to-obamas-push-for-changes-at-spy-agencies/2014/01/25/34f61118-8532-11e3-9dd4-e7278db80d86_story.html
2014-01-27 19:54:13
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-27 19:54:28
http://www.washingtonpost.com/world/national-security/democrat-dianne-feinstein-proves-an-obstacle-to-obamas-push-for-changes-at-spy-agencies/2014/01/25/34f61118-8532-11e3-9dd4-e7278db80d86_print.html
text/html
utf-8
magazineArticle
Slate
ISSN 1091-2339
Abdo
Alex
Three Things to Know About the Government Privacy Report on NSA Spying
Jan. 24 2014
en-US
http://www.slate.com/blogs/future_tense/2014/01/24/pclob_nsa_surveillance_report_three_things_you_need_to_know.html
2014-01-27 19:58:04
Slate
attachment
Slate Snapshot
2014-01-27 19:58:06
http://www.slate.com/blogs/future_tense/2014/01/24/pclob_nsa_surveillance_report_three_things_you_need_to_know.single.html
text/html
utf-8
blogPost
Washington Post
Peterson
Andrea
Some of the biggest names in cryptography condemn NSA spying in open letter
An open letter from major players in the computer science and cryptography fields urges the government to reconsider its approach to surveillance.
2014-01-24
http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/24/some-of-the-biggest-names-in-cryptography-condemn-nsa-spying-in-open-letter/
2014-01-27 19:58:12
attachment
Snapshot
2014-01-27 19:58:12
http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/24/some-of-the-biggest-names-in-cryptography-condemn-nsa-spying-in-open-letter/
text/html
utf-8
magazineArticle
BusinessWeek: technology
Lawrence
Dune
cover story
National Security Agency
NSA
the onion router
tor
The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built
2014-01-23
http://www.businessweek.com/printer/articles/179773-the-inside-story-of-tor-the-best-internet-anonymity-tool-the-government-ever-built
2014-01-27 19:58:36
BusinessWeek
newspaperArticle
World
Wall Street Journal
ISSN 0099-9660
Davos
Rebecca Blumenstein in
Switzerland
Paulo
Loretta Chao in São
Brazil
Brazil's Rousseff Pressures U.S. on Data Collection
President reiterates Brazil's desire to claim control over data collection on its citizens. Outrage over NSA leaks has enabled Brazil to demand more cooperation.
2014-01-25T05:17:00.000Z
http://online.wsj.com/news/articles/SB10001424052702304632204579341183665708524?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702304632204579341183665708524.html
2014-01-27 20:04:18
Wall Street Journal
attachment
Wall Street Journal Snapshot
2014-01-27 20:04:21
http://online.wsj.com/news/articles/SB10001424052702304632204579341183665708524?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702304632204579341183665708524.html
text/html
utf-8
webpage
NBC News
Esposito
Richard
Cole
Matthew
Schone
Mark
Greenwald
Glenn
Snowden docs reveal British spies snooped on YouTube and Facebook
By Richard Esposito, Matthew Cole and Mark Schone, with Glenn Greenwald, Special Contributor The British government can tap into the cables carrying the world’s web traffic at will and spy on what people are doing on some of the world’s most popular social media site …
2014-01-27T19:37:25-05:00
http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reveal-british-spies-snooped-on-youtube-and-facebook
2014-01-28 16:27:06
en-US
attachment
Microsoft PowerPoint - readfiles_109.ppt [Compatibility Mode] - snowden_youtube_nbc_document.pdf
2014-01-28 16:29:10
http://msnbcmedia.msn.com/i/msnbc/Sections/NEWS/snowden_youtube_nbc_document.pdf
application/pdf
utf-8
attachment
Snapshot
2014-01-28 16:27:06
http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reveal-british-spies-snooped-on-youtube-and-facebook
text/html
utf-8
webpage
Engadget
Seppala
Timothy J.
facebook
GCHQ
Google
NSA
Prism
Privacy
squeakydolphin
YouTube
British government reportedly tracking YouTube and Facebook data without permission
While the NSA has been busy scouring the Angry Birds leaderboards, newly leaked documents report that its British counterpart -- the GCHQ -- has been
2014-01-28
http://www.engadget.com/2014/01/28/gchq-squeaky-dolphin-youtube-facebook-snoop/
2014-01-28 16:30:07
attachment
Snapshot
2014-01-28 16:30:07
http://www.engadget.com/2014/01/28/gchq-squeaky-dolphin-youtube-facebook-snoop/
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Apuzzo
Matt
Perlroth
Nicole
Surveillance of Citizens by Government
U.S. Relaxes Some Data Disclosure Rules
The Obama administration will allow Internet companies to talk more specifically about when they are forced to turn over customer data to the government, the Justice Department said.
2014-01-27
http://www.nytimes.com/2014/01/28/business/government-to-allow-technology-companies-to-disclose-more-data-on-surveillance-requests.html
2014-01-28 16:33:19
NYTimes.com
attachment
fisa-notice-1.pdf
2014-01-28 17:25:29
http://legaltimes.typepad.com/files/fisa-notice-1.pdf
application/pdf
utf-8
attachment
New York Times Snapshot
2014-01-28 16:33:19
http://www.nytimes.com/2014/01/28/business/government-to-allow-technology-companies-to-disclose-more-data-on-surveillance-requests.html?smid=re-share&_r=0
text/html
utf-8
webpage
Wired UK
Powles
Julia
Scottish company Maidsafe claims to have built a Bitcloud-like system (Wired UK)
The theoretical peer-to-peer network project Bitcloud has recently captured media attention. A Scottish company, MaidSafe, claims that it has already built a system that does what Bitcloud is proposing
2014-01-27
http://www.wired.co.uk/news/archive/2014-01/27/maidsafe-bitcloud
2014-01-28 16:33:53
attachment
Snapshot
2014-01-28 16:33:53
http://www.wired.co.uk/news/archive/2014-01/27/maidsafe-bitcloud
text/html
utf-8
webpage
Marketing Magazine
Chapman
Matthew
Half of UK concerned internet is eroding personal privacy | Marketing Magazine
2014-01-28
http://www.marketingmagazine.co.uk/article/1228766/half-uk-concerned-internet-eroding-personal-privacy
2014-01-28 16:34:33
attachment
Half of UK concerned internet is eroding personal privacy | Marketing Magazine
2014-01-28 16:34:34
http://www.marketingmagazine.co.uk/article/1228766/half-uk-concerned-internet-eroding-personal-privacy
text/html
utf-8
blogPost
TechCrunch
Etherington
Darrell
Rovio Denies Providing Angry Birds User Data To The NSA, Points Finger At Third-Party Ad Networks
A new report originating from the ongoing Snowden document trove presents the terrifying possibility that our casual gaming habits offer government..
2014-01-28
http://techcrunch.com/2014/01/28/rovio-denies-providing-angry-birds-user-data-to-the-nsa-points-finger-at-third-party-ad-networks/
2014-01-28 17:23:20
attachment
Snapshot
2014-01-28 17:23:20
http://techcrunch.com/2014/01/28/rovio-denies-providing-angry-birds-user-data-to-the-nsa-points-finger-at-third-party-ad-networks/
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Ball
James
Android
Angry Birds
Apps
GCHQ
iPhone
Mobile phones
NSA
Obama administration
Privacy
Smartphones
Surveillance
technology
UK news
United States
World news
Angry Birds and 'leaky' phone apps targeted by NSA and GCHQ for user data
• US and UK spy agencies piggyback on commercial data• Details can include age, location and sexual orientation • Documents also reveal targeted tools against individual phones
2014-01-28T02:51EST
en-GB
http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data
2014-01-28 17:23:53
The Guardian
attachment
Guardian Snapshot
2014-01-28 17:23:55
http://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Larson
James Glanz, Jeff
Lehren
Andrew W.
Angry Birds (Video Game)
Google Maps
Government Communications Headquarters (Great Britain)
Great Britain
Millennial Media Inc.
Mobile Applications
National Security Agency
Rovio Mobile Ltd
Smartphones
Snowden, Edward J
Surveillance of Citizens by Government
United States
Spy Agencies Tap Data Streaming From Phone Apps
As personal data pour onto mobile networks, American and British eavesdroppers are prying into so-called leaky apps to extract geographical data, address books and phone logs, secret documents show.
2014-01-27
http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html#document/p10/a142016
2014-01-28 17:24:39
NYTimes.com
attachment
New York Times Snapshot
2014-01-28 17:24:39
http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html#document/p10/a142016
text/html
utf-8
webpage
Opinionator
Koopman
Colin
Identification Devices
Philosophy
Surveillance of Citizens by Government
The Age of 'Infopolitics'
As digital persons, we’re vulnerable to new, digital injustices.
2014-01-26
http://opinionator.blogs.nytimes.com/2014/01/26/the-age-of-infopolitics/
2014-01-28 17:25:01
attachment
Snapshot
2014-01-28 17:25:01
http://opinionator.blogs.nytimes.com/2014/01/26/the-age-of-infopolitics/
text/html
utf-8
webpage
Threat Level
Zetter
Kim
Judge Enforces Spy Orders Despite Ruling Them Unconstitutional | Threat Level | Wired.com
A federal judge in California who ruled last year that the government's use of National Security Letters is unconstitutional has defied her own ruling by enforcing three NSLs in the wake of that judgment, according to newly unsealed documents.
2014-01-23
http://www.wired.com/threatlevel/2014/01/judge-nsl/
2014-01-28 17:28:28
attachment
Snapshot
2014-01-28 17:28:28
http://www.wired.com/threatlevel/2014/01/judge-nsl/
text/html
utf-8
webpage
Threat Level
Zetter
Kim
Federal Judge Finds National Security Letters Unconstitutional, Bans Them | Threat Level | Wired.com
Ultra-secret national security letters that come with a gag order on the recipient are an unconstitutional impingement on free speech, a federal judge ruled Friday.
2013-03-15
http://www.wired.com/threatlevel/2013/03/nsl-found-unconstitutional/
2014-01-28 17:28:53
attachment
Snapshot
2014-01-28 17:28:53
http://www.wired.com/threatlevel/2013/03/nsl-found-unconstitutional/
text/html
utf-8
webpage
Princeton Alumni Weekly
Perlroth
Nicole
Princeton Alumni Weekly: Who's Afraid of Jonathan Mayer?
2014-01-08
http://paw.princeton.edu/issues/2014/01/08/pages/7823/index.xml
2014-01-28 17:30:39
attachment
Princeton Alumni Weekly: Who's Afraid of Jonathan Mayer?
2014-01-28 17:30:40
http://paw.princeton.edu/issues/2014/01/08/pages/7823/index.xml
text/html
windows-1252
webpage
Bits Blog
Perlroth
Nicole
Computers and the Internet
Facebook Inc
Foreign Intelligence Surveillance Act (FISA)
Foreign Intelligence Surveillance Court
Google Inc
Industrial Espionage
Lavabit LLC
Levison Ladar
Microsoft Corporation
Obama Barack
San Francisco (Calif)
Search engines
Snowden Edward J
Start-ups
Surveillance of Citizens by Government
Yahoo! Inc
Did Big Internet Companies Handicap Start-Ups in FISA Rule Changes?
A small but significant caveat, in a new agreement brokered between the Obama administration and Google, Facebook, Yahoo and Microsoft could cast a long shadow over America’s technology start-ups.
2014-01-27
http://bits.blogs.nytimes.com/2014/01/27/did-big-internet-companies-handicap-start-ups-in-fisa-rule-changes/
2014-01-28 17:31:28
attachment
Snapshot
2014-01-28 17:31:28
http://bits.blogs.nytimes.com/2014/01/27/did-big-internet-companies-handicap-start-ups-in-fisa-rule-changes/
text/html
utf-8
webpage
CSO
Bradley
Tony
TrustyCon rises from the NSA/RSA ashes and sells out
TrustyCon has reached capacity—in both presenters and attendees--for its RSA Conference alternative.
2014-01-27T16:00-05:00
http://blogs.csoonline.com/security-industry/2955/trustycon-rises-nsarsa-ashes-and-sells-out
2014-01-28 17:31:54
attachment
Snapshot
2014-01-28 17:31:54
http://blogs.csoonline.com/security-industry/2955/trustycon-rises-nsarsa-ashes-and-sells-out
text/html
utf-8
webpage
European Union Agency for Fundamental Rights
Access to data protection remedies in EU Member States
Technological advances make it ever more important to safeguard the right to personal data, which is enshrined in the Charter of Fundamental Rights of the European Union. Data protection violations arise principally from internet‑based activities, direct marketing and video surveillance, perpetrated by, for example, government bodies or financial and health institutions, research by the European Union Fundamental Rights Agency (FRA) shows.
2014-01
http://fra.europa.eu/en/publication/2014/access-data-protection-remedies-eu-member-states
2014-01-28 17:33:24
attachment
Access to data protection remedies in EU Member States - fra-2014-access-data-protection-remedies_en.pdf
2014-01-28 17:34:02
http://fra.europa.eu/sites/default/files/fra-2014-access-data-protection-remedies_en.pdf
application/pdf
utf-8
attachment
Access to data protection remedies in EU Member States – Summary - fra-2014-access-data-protection-remedies-summary_en.pdf
2014-01-28 17:34:09
http://fra.europa.eu/sites/default/files/fra-2014-access-data-protection-remedies-summary_en.pdf
application/pdf
utf-8
attachment
Handbook on European data protection law - fra-2014-handbook-data-protection-law_en.pdf
2014-01-28 17:34:12
http://fra.europa.eu/sites/default/files/fra-2014-handbook-data-protection-law_en.pdf
application/pdf
utf-8
attachment
Snapshot
2014-01-28 17:33:24
http://fra.europa.eu/en/publication/2014/access-data-protection-remedies-eu-member-states
text/html
utf-8
webpage
Lawfare
Rozenzweig
Paul
NSA Privacy Officer Selected
Late last year, as one of the fall outs from the Snowden disclosures, the NSA announced its intention to fill a completely new office -- a civil liberties and privacy officer who would serve as a direct adviser to the Director of NSA. Civil libertarians a
2014-01-28
http://www.lawfareblog.com/2014/01/nsa-privacy-officer-selected/
2014-01-28 17:34:37
attachment
Snapshot
2014-01-28 17:34:37
http://www.lawfareblog.com/2014/01/nsa-privacy-officer-selected/#.UuewEGQo4b0
text/html
utf-8
webpage
Ars Technica
Anderson
Nate
eff
Law
NSA
Privacy
verizon
Verizon says phone record disclosure is protected free speech
Verizon has responded to the lawsuit against it for cooperating with the US …
5/7/2007
http://arstechnica.com/tech-policy/2007/05/verizon-says-phone-record-disclosure-is-protected-free-speech/
2014-01-28 17:36:28
attachment
Snapshot
2014-01-28 17:36:28
http://arstechnica.com/tech-policy/2007/05/verizon-says-phone-record-disclosure-is-protected-free-speech/
text/html
utf-8
webpage
Sunlight Foundation
Washington
1818 N. Street NW Suite 300
Skype
DC 20036 202-742-1520 Call with
Encrypting our Congress API and protecting your location
[Sunlight's Congress API](http://sunlightlabs.github.io/congress/) receives millions of requests every month for data about all things Congress. Many of these requests include information about a user's location, generally to look up which members of Congress [represent a given zip code or latitude/longitude pair](http://sunlightlabs.github.io/congress/legislators.html#legislatorslocate). Since June 2013, Sunlight's Congress API has supported the ...
2014-01-28
http://sunlightfoundation.com/blog/2014/01/28/encrypting-our-congress-api-and-protecting-your-location/
2014-01-28 18:08:26
attachment
Snapshot
2014-01-28 18:08:26
http://sunlightfoundation.com/blog/2014/01/28/encrypting-our-congress-api-and-protecting-your-location/
text/html
utf-8
webpage
The Verge
Souppouris
Aaron
ISPs say blocking The Pirate Bay doesn't affect P2P traffic
It's been two months since governments in the Netherlands and UK ordered ISPs to block BitTorrent search engine The Pirate Bay. Now, the service providers have revealed that the block has done very...
2012-07-16
http://www.theverge.com/2012/7/16/3161967/isp-blocking-pirate-bay-no-affect-p2p-traffic
2014-01-28 18:16:47
attachment
Snapshot
2014-01-28 18:16:47
http://www.theverge.com/2012/7/16/3161967/isp-blocking-pirate-bay-no-affect-p2p-traffic
text/html
utf-8
newspaperArticle
UK news
The Guardian
ISSN 0261-3077
MacAskill
Ewen
defence
correspondent
intelligence
Edward Snowden
Foreign policy
GCHQ
james clapper
NSA
politics
UK news
UK security and counter-terrorism
United States
US national security
World news
GCHQ head Sir Iain Lobban stands down
Foreign Office claims 53-year-old spy chief's departure part of long-planned move and nothing to do with Edward Snowden revelations
2014-01-28T12:15EST
en-GB
http://www.theguardian.com/uk-news/2014/jan/28/gchq-head-sir-iain-lobban-stands-down
2014-01-28 19:54:08
The Guardian
attachment
Guardian Snapshot
2014-01-28 19:54:10
http://www.theguardian.com/uk-news/2014/jan/28/gchq-head-sir-iain-lobban-stands-down
text/html
utf-8
webpage
the Guardian
Francisco
Dominic Rushe in San
Data protection
facebook
Mark Zuckerberg
NSA
Privacy
Surveillance
technology
United States
World news
Yahoo
Zuckerberg: US government 'blew it' on NSA surveillance
Facebook CEO joins Yahoo's Marissa Mayer in saying the US did 'bad job' of balancing people's privacy and duty to protect
2013-09-11
Zuckerberg
http://www.theguardian.com/technology/2013/sep/11/yahoo-ceo-mayer-jail-nsa-surveillance
2014-01-28 20:00:24
attachment
Snapshot
2014-01-28 20:00:24
zotero://attachment/1192/
text/html
utf-8
blogPost
Foreign Policy Blogs
Harris
Shane
Hudson
John
'We're Really Screwed Now': NSA's Best Friend Just Shivved The Spies
October 28, 2013 - 03:21 Pm
http://thecable.foreignpolicy.com/posts/2013/10/28/were_really_screwed_now_nsas_best_friend_just_shivved_the_spies
2014-01-28 20:18:03
'We're Really Screwed Now'
attachment
Foreign Policy Snapshot
2014-01-28 20:18:05
http://thecable.foreignpolicy.com/posts/2013/10/28/were_really_screwed_now_nsas_best_friend_just_shivved_the_spies
text/html
utf-8
webpage
MuckRock
MuckRock
Vupen Contracts with NSA | Muckrock
2013-09-11
https://www.muckrock.com/foi/united-states-of-america-10/vupen-contracts-with-nsa-6593/
2014-01-28 20:31:00
attachment
Vupen Contracts with NSA | Muckrock
2014-01-28 20:31:01
https://www.muckrock.com/foi/united-states-of-america-10/vupen-contracts-with-nsa-6593/
text/html
utf-8
report
European Parliment
Bowden
Caspar
Bigo
Didier
Scherrer
Amandine
Grossman
Wendy
The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens' fundamental rights
In light of the recent PRISM- related revelations, this briefing note analyzes the impact of US surveillance programmes on European citizens’ rights. The note explores the scope of surveillance that can be carried out under the US FISA Amendment Act 2008, and related practices of the US authorities which have very strong implications for EU data sovereignty and the protection of European citizens’ rights.
2013-09
en
http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dv/briefingnote_/briefingnote_en.pdf
2013-09-24 15:45:54
attachment
The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens' fundamental rights - briefingnote_en.pdf
2013-09-24 15:45:54
http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dv/briefingnote_/briefingnote_en.pdf
application/pdf
utf-8
blogPost
Foreign Policy Blogs
Aid
Matthew M.
The U.S. Has Been Spying on France Since Before the NSA Existed
October 22, 2013 - 05:32 Pm
http://complex.foreignpolicy.com/posts/2013/10/22/nsa_spying_france_secret_documents
2014-01-28 21:34:43
attachment
Foreign Policy Snapshot
2014-01-28 21:34:45
http://complex.foreignpolicy.com/posts/2013/10/22/nsa_spying_france_secret_documents
text/html
utf-8
attachment
The U.S. Has Been Spying on France Since Before the NSA Existed | Killer Apps
2013-11-16 21:01:25
http://killerapps.foreignpolicy.com/posts/2013/10/22/nsa_spying_france_secret_documents
text/html
utf-8
webpage
Daily Intelligencer
Roose
Kevin
Business
Edward Snowden
NSA
Tech
the surveillance-free day
The Surveillance-Free Day (Part II)
Kevin continues his quest to leave the grid for 24 hours.
2013-07-31
http://nymag.com/daily/intelligencer/2013/07/surveillance-free-day-part-ii.html
2014-01-28 21:36:46
attachment
Snapshot
2014-01-28 21:36:46
http://nymag.com/daily/intelligencer/2013/07/surveillance-free-day-part-ii.html
text/html
utf-8
webpage
The National Security Agency: Missions, Authorities, Oversight, and Partnerships
2013-08-09
https://s3.amazonaws.com/s3.documentcloud.org/documents/750226/the-nsa-story.pdf
2013-09-23 15:58:03
attachment
The National Security Agency: Missions, Authorities, Oversight, and Partnerships
2013-09-23 15:58:03
https://s3.amazonaws.com/s3.documentcloud.org/documents/750226/the-nsa-story.pdf
application/pdf
utf-8
magazineArticle
The Atlantic
Miller
Arthur R.
The National Data Bank
1967-11
http://blog.modernmechanix.com/mags/TheAtlantic/11-1967/national_databank/national_databank_0.jpg
2014-01-28 21:48:52
attachment
national_databank_0.jpg (JPEG Image, 2478 × 3255 pixels) - Scaled (23%)
2014-01-28 21:48:53
http://blog.modernmechanix.com/mags/TheAtlantic/11-1967/national_databank/national_databank_0.jpg
image/jpeg
windows-1252
attachment
national_databank_1.jpg (JPEG Image, 2337 × 3275 pixels) - Scaled (23%)
2014-01-28 21:51:25
http://blog.modernmechanix.com/mags/TheAtlantic/11-1967/national_databank/national_databank_1.jpg
image/jpeg
windows-1252
attachment
national_databank_2.jpg (JPEG Image, 2306 × 3263 pixels) - Scaled (23%)
2014-01-28 21:51:36
http://blog.modernmechanix.com/mags/TheAtlantic/11-1967/national_databank/national_databank_2.jpg
image/jpeg
windows-1252
attachment
national_databank_3.jpg (JPEG Image, 2327 × 3254 pixels) - Scaled (23%)
2014-01-28 21:51:44
http://blog.modernmechanix.com/mags/TheAtlantic/11-1967/national_databank/national_databank_3.jpg
image/jpeg
windows-1252
attachment
national_databank_4.jpg (JPEG Image, 2300 × 3247 pixels) - Scaled (23%)
2014-01-28 21:51:52
http://blog.modernmechanix.com/mags/TheAtlantic/11-1967/national_databank/national_databank_4.jpg
image/jpeg
windows-1252
attachment
national_databank_5.jpg (JPEG Image, 2356 × 3265 pixels) - Scaled (23%)
2014-01-28 21:52:01
http://blog.modernmechanix.com/mags/TheAtlantic/11-1967/national_databank/national_databank_5.jpg
image/jpeg
windows-1252
blogPost
Foreign Policy Blogs
Kozlowska
Hanna
Team Putin Says They Don't Mind The Latest NSA Scandal One Bit
October 25, 2013 - 01:13 Pm
http://blog.foreignpolicy.com/posts/2013/10/25/russia-nsa-scandal
2014-01-28 22:19:35
attachment
Foreign Policy Snapshot
2014-01-28 22:19:39
http://blog.foreignpolicy.com/posts/2013/10/25/russia-nsa-scandal#.Umq-Pc3WYrA.twitter
text/html
utf-8
attachment
Team Putin Says They Don't Mind The Latest NSA Scandal One Bit | FP Passport
2013-11-16 21:08:43
http://blog.foreignpolicy.com/posts/2013/10/25/russia-nsa-scandal#.Umq-Pc3WYrA.twitter
text/html
utf-8
journalArticle
Stanford Technology Law Review
3
Stan. Tech. L. Rev.
Lerner
Jack I.
Mulligan
Deirdre K.
Taking the “Long View” on the Fourth Amendment: Stored Records and the Sanctity of the Home
2008
http://stlr.stanford.edu/pdf/lerner-mulligan-long-view.pdf
2013-07-01 19:44:13
attachment
Taking the “Long View” on the Fourth Amendment: Stored Records and the Sanctity of the Home
2013-07-01 19:44:13
http://stlr.stanford.edu/pdf/lerner-mulligan-long-view.pdf
application/pdf
utf-8
letter
Access
Advocacy for Principled Action in Government
AIDS Policy Project
American
Association of Law Libraries
American Booksellers Foundation for Free Expression
American Library Association
American Civil Liberties Union
Arab American Institute
Association of Research Libraries
Center for Democracy and Technology
Center for Financial Privacy and Human Rights
Center for National Security Studies
Citizens for Responsibility and Ethics in Washington
Coalition Against Unsolicited E-Mail
Competitive Enterprise Institute
The Constitution Project
Consumer Action
Council on American-Islamic Relations
Cyber Privacy Project
Defending
Dissent Foundation
Demand Progress
DownsizeDC.org
Electronic Frontier Foundation
First Amendment Coalition
Freedom House
Free Press Action Fund
Freedom of the Press Foundation
Freedom to Read Foundation
FreedomWorks
Foundation for Innovation and Internet Freedom
Global Network Initiative
Government Accountability Project
Human Rights Watch
Liberty Coalition
OpenTheGovernment.org
Open Technology Institute
National Association of Criminal Defense Lawyers
National Coalition Against Censorship
National Security Counselors
Public Knowledge
OpenMedia.org
Personal Democracy Media
Project on Government Oversight
Reporters Without Borders
Republican Liberty Caucus
Rutherford Institute
TechFreedom
Texas Liberty Foundation
World Press Freedom Committee
Automattic Inc.
CloudFlare
Computer and Communications Industry Assoc
CREDO Mobile
Data Foundry
DreamHost
Dropbox
DuckDuckGo
Evoca
Golden Frog
Hewlett-Packard Company
Internet Infrastructure Coalition
Meetup
Mozilla
NetChoice
NY Tech Meetup
Reddit
ServInt
Sonic.net
SpiderOak
Tumblr
Twilio
Domini Social Investments
New Atlantic Ventures
surveillance sign on final 11-21-13 - surveillance-sign-on-final-11-21-13.pdf
We the undersigned civil society groups, trade associations, companies and investors are supporters of the free and open Internet. We are writing to urge that intelligence surveillance practices be reformed by limiting the scope of surveillance and by substantially enhancing the privacy protections, oversight, and
accountability mechanisms that govern that surveillance.
2013-11-21
en-US
https://www.cdt.org/files/pdfs/surveillance-sign-on-final-11-21-13.pdf
2013-11-21 21:36:11
attachment
surveillance sign on final 11-21-13 - surveillance-sign-on-final-11-21-13.pdf
2013-11-21 21:36:11
https://www.cdt.org/files/pdfs/surveillance-sign-on-final-11-21-13.pdf
application/pdf
utf-8
webpage
TheHill
Hattem
Julian
Darrell Issa
james clapper
National Security Agency
Lawmakers demand Obama dump Clapper
His continued role is "incompatible" with restoring trust to the NSA, House members wrote.
Text
2014-01-27T14:14-05:00
http://thehill.com/blogs/hillicon-valley/technology/196508-house-lawmakers-ask-obama-to-dump-clapper
2014-01-28 23:00:50
und
attachment
Snapshot
2014-01-28 23:00:50
http://thehill.com/blogs/hillicon-valley/technology/196508-house-lawmakers-ask-obama-to-dump-clapper
text/html
utf-8
blogPost
Washington Post
Kamen
Al
Al Kamen
In the Loop
National Security Agency
NSA
Privacy
Rebecca Richards
The NSA has a new, first time ever, privacy officer
The NSA, reeling from Eric Snowden's revelations of the agency's international snooping, has named a new privacy officer.
2014-01-28
http://www.washingtonpost.com/blogs/in-the-loop/wp/2014/01/28/the-nsa-has-a-new-first-time-ever-privacy-officer/
2014-01-28 23:01:07
attachment
Snapshot
2014-01-28 23:01:07
http://www.washingtonpost.com/blogs/in-the-loop/wp/2014/01/28/the-nsa-has-a-new-first-time-ever-privacy-officer/?Post+generic=%3Ftid%3Dsm_twitter_washingtonpost
text/html
utf-8
newspaperArticle
UK news
The Guardian
ISSN 0261-3077
Hopkins
Nick
GCHQ
Human rights
Law
politics
Privacy
Surveillance
UK news
UK security and counter-terrorism
United States
World news
Huge swath of GCHQ mass surveillance is illegal, says top lawyer
Legal advice given to MPs warns that British spy agency is 'using gaps in regulation to commit serious crime with impunity'
2014-01-28T15:01EST
en-GB
http://www.theguardian.com/uk-news/2014/jan/28/gchq-mass-surveillance-spying-law-lawyer
2014-01-28 23:01:34
The Guardian
attachment
Guardian Snapshot
2014-01-28 23:01:36
http://www.theguardian.com/uk-news/2014/jan/28/gchq-mass-surveillance-spying-law-lawyer
text/html
utf-8
blogPost
Solhjell
Bård Vegar
Valen
Snorre
Solhjell og Valen nominerer Edward Snowden til Nobels fredspris | SV
2014-01-29
http://www.sv.no/blog/2014/01/29/solhjell-og-valen-nominerer-edward-snowden-til-nobels-fredspris/
2014-01-29 15:47:12
attachment
Snapshot
2014-01-29 15:47:12
http://www.sv.no/blog/2014/01/29/solhjell-og-valen-nominerer-edward-snowden-til-nobels-fredspris/
text/html
utf-8
webpage
World Socialist Web Site
London
Eric
NSA, GCHQ mapping “political alignment” of cellphone users - World Socialist Web Site
2014-01-28
https://www.wsws.org/en/articles/2014/01/28/nsar-j28.html
2014-01-29 15:47:44
attachment
NSA, GCHQ mapping “political alignment” of cellphone users - World Socialist Web Site
2014-01-29 15:47:45
https://www.wsws.org/en/articles/2014/01/28/nsar-j28.html
text/html
utf-8
blogPost
Washington Post
Peterson
Andrea
Here’s why tech companies’ NSA ‘transparency reports’ are mostly a PR stunt
Ultimately, the only entities who can supply comprehensive reporting on these issues are governments themselves.
2014-01-28
http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/28/heres-why-tech-companies-nsa-transparency-reports-are-mostly-a-pr-stunt/
2014-01-29 15:48:14
attachment
Snapshot
2014-01-29 15:48:14
http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/28/heres-why-tech-companies-nsa-transparency-reports-are-mostly-a-pr-stunt/
text/html
utf-8
webpage
Bloomberg
Robertson
Jordan
Google+, ‘Candy Crush’ Show Risk of Leakiest Aps: Tech
Revelations that the National Security Agency is tapping smartphone applications to mine personal information highlight the risk millions take every day when they play games, schedule lunch or check the weather.
Jan 29, 2014 12:01 AM ET
Google+, ‘Candy Crush’ Show Risk of Leakiest Aps
http://www.bloomberg.com/news/2014-01-29/nsa-spying-on-apps-shows-perils-of-google-candy-crush-.html
2014-01-29 15:48:44
attachment
Bloomberg Printable
2014-01-29 15:48:46
http://www.bloomberg.com/news/print/2014-01-29/nsa-spying-on-apps-shows-perils-of-google-candy-crush-.html
text/html
utf-8
webpage
American Civil Liberties Union
Toomey
Patrick C.
The NSA's Shadow Database
Last week saw the release of yet another independent report condemning the NSA's bulk collection of Americans' phone records. In its report, the Privacy and Civil Liberties Oversight Board (PCLOB) called for an end to the program, concluding that it is unlawful, threatens the privacy of ...
2014-01-28
https://www.aclu.org/blog/national-security/nsas-shadow-database
2014-01-29 15:48:52
attachment
Snapshot
2014-01-29 15:48:52
https://www.aclu.org/blog/national-security/nsas-shadow-database
text/html
utf-8
interview
Snowden
Edward
Seipel
Hubert
Edward Snowden
Fernsehen
GCHQ
Gesellschaft und Soziales
Journalismus
Medien
NSA
Politik
Protest / Initiativen
whistleblower
Snowden-Interview: Transcript
What did he say exactly? About industrial espionage, German Secret Service BND and Merkel's phone. Transcript of NDR interview here.
2014-01-26
TV
en-US
Snowden-Interview
https://www.ndr.de/ratgeber/netzwelt/snowden277.html
2014-01-29 17:04:41
attachment
Snapshot
2014-01-29 17:04:41
https://www.ndr.de/ratgeber/netzwelt/snowden277.html
text/html
utf-8
attachment
Snowden-Interview: Transcript (Seite 3)| NDR.de - Ratgeber - Netzwelt
2014-01-29 17:06:05
https://www.ndr.de/ratgeber/netzwelt/snowden277_page-3.html
text/html
utf-8
attachment
Snowden-Interview: Transcript (Seite 4)| NDR.de - Ratgeber - Netzwelt
2014-01-29 17:06:08
https://www.ndr.de/ratgeber/netzwelt/snowden277_page-4.html
text/html
utf-8
attachment
Snowden-Interview: Transcript (Seite 5)| NDR.de - Ratgeber - Netzwelt
2014-01-29 17:06:12
https://www.ndr.de/ratgeber/netzwelt/snowden277_page-5.html
text/html
utf-8
attachment
Snowden-Interview: Transcript (Seite 6)| NDR.de - Ratgeber - Netzwelt
2014-01-29 17:06:16
https://www.ndr.de/ratgeber/netzwelt/snowden277_page-6.html
text/html
utf-8
attachment
Snowden-Interview: Transcript (Seite 7)| NDR.de - Ratgeber - Netzwelt
2014-01-29 17:06:20
https://www.ndr.de/ratgeber/netzwelt/snowden277_page-7.html
text/html
utf-8
webpage
Forbes
Greenberg
Andy
CIO Network
Intelligent Tech
Mobile
On Demand
Security
social media
Tech
Leaked NSA Doc Says It Can Collect And Keep Your Encrypted Data As Long As It Takes To Crack It
If you use privacy tools, according to the apparent logic of the National Security Agency, it doesn't much matter if you're a foreigner or an American: Your communications are subject to an extra dose of surveillance. Since 29-year-old systems administrator Edward Snowden began leaking secret documentation of the NSA's broad surveillance [...]
2013-06-20
http://www.forbes.com/sites/andygreenberg/2013/06/20/leaked-nsa-doc-says-it-can-collect-and-keep-your-encrypted-data-as-long-as-it-takes-to-crack-it/
2014-01-29 17:07:35
attachment
Snapshot
2014-01-29 17:07:35
http://www.forbes.com/sites/andygreenberg/2013/06/20/leaked-nsa-doc-says-it-can-collect-and-keep-your-encrypted-data-as-long-as-it-takes-to-crack-it/
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Oltermann
Philip
Angela Merkel
Europe
Germany
NSA
Surveillance
Tobin tax
United States
World news
Angela Merkel warns US over surveillance in first speech of third term
'A programme in which the end justifies all means … violates trust,' German chancellor says
2014-01-29T09:05EST
en-GB
http://www.theguardian.com/world/2014/jan/29/angela-merkel-us-surveillance-speech-germany-chancellor
2014-01-29 17:11:46
The Guardian
attachment
Guardian Snapshot
2014-01-29 17:11:48
http://www.theguardian.com/world/2014/jan/29/angela-merkel-us-surveillance-speech-germany-chancellor
text/html
utf-8
newspaperArticle
UK news
The Guardian
ISSN 0261-3077
Hopkins
Nick
GCHQ
Human rights
Law
politics
Privacy
Surveillance
UK news
UK security and counter-terrorism
United States
World news
Huge swath of GCHQ mass surveillance is illegal, says top lawyer
Legal advice given to MPs warns that British spy agency is 'using gaps in regulation to commit serious crime with impunity'
2014-01-28T15:01EST
en-GB
http://www.theguardian.com/uk-news/2014/jan/28/gchq-mass-surveillance-spying-law-lawyer
2014-01-29 17:11:58
The Guardian
attachment
APPG_Final_(2).pdf
2014-01-29 17:12:38
http://www.brickcourt.co.uk/news-attachments/APPG_Final_(2).pdf
application/pdf
utf-8
attachment
Guardian Snapshot
2014-01-29 17:12:00
http://www.theguardian.com/uk-news/2014/jan/28/gchq-mass-surveillance-spying-law-lawyer
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Press
Associated
Edward Snowden
Europe
Nobel peace prize
Norway
NSA
United States
US national security
World news
Edward Snowden nominated for Nobel peace prize
Two Norwegian politicians say NSA whistleblower's actions have led to a 'more stable and peaceful world order'
2014-01-29T06:23EST
en-GB
http://www.theguardian.com/world/2014/jan/29/edward-snowden-nominated-nobel-peace-prize
2014-01-29 17:12:19
The Guardian
attachment
Guardian Snapshot
2014-01-29 17:12:21
http://www.theguardian.com/world/2014/jan/29/edward-snowden-nominated-nobel-peace-prize
text/html
utf-8
newspaperArticle
Reuters
Washington
Hosenball
Mark
Dianne Feinstein
Edward Snowden
Mike Rogers
russia
Susan Phalen
United States
No evidence Russia helped Snowden to steal U.S. secrets: Feinstein
WASHINGTON (Reuters) - The chairwoman of the Senate Intelligence Committee, Senator Dianne Feinstein, said on Tuesday she has seen no evidence that Russian spies helped former National Security Agency
Tue Jan 28 23:57:09 UTC 2014
No evidence Russia helped Snowden to steal U.S. secrets
http://www.reuters.com/article/2014/01/28/us-usa-security-snowden-feinstein-idUSBREA0R20G20140128
2014-01-29 19:32:48
Reuters
attachment
Snapshot
2014-01-29 19:32:48
http://www.reuters.com/article/2014/01/28/us-usa-security-snowden-feinstein-idUSBREA0R20G20140128
text/html
utf-8
webpage
Washington Examiner
Pollock
Richard
Accountability
CFPB
Credit Cards
NSA
Privacy
Richard Pollock
Watchdog
Federal consumer bureau data-mining hundreds of millions of consumer credit card accounts, mortgages | WashingtonExaminer.com
Officials at the Consumer Financial Protection Bureau are conducting a massive, NSA-esque data-mining project collecting account information on an estimated 991 million American credit card accounts. It was also learned at a Congressional hearing Tuesday that CFPB officials are working with the Federal Housing Finance Agency on a second data-mining effort, this one focused on the 53 million residential mortgages taken out by Americans since 1998. “ The NSA does not ask Americans' permission to collect their phone records and emails and texts. The CFPB does not ask permission to collect information on America's financial consumers. ”
2014-01-28
http://washingtonexaminer.com/federal-consumer-bureau-data-mining-hundreds-of-millions-of-consumer-credit-card-accounts-mortgages/article/2543039
2014-01-29 19:34:11
attachment
Snapshot
2014-01-29 19:34:11
http://washingtonexaminer.com/consumer-bureau-data-mining-hundreds-of-millions-of-consumer-credit-card-accounts-mortgages/article/2543039
text/html
utf-8
webpage
Texas Public Radio
Flahive
Paul
Barack Obama
Law
NSA
Privacy
The Source: Signing Away Your Right To Trial | Privacy Board Calls For End Of NSA Surveillance
In the first segment: Signing up for a credit card or car loan can mean signing away your right to a civil trial if you get taken advantage of. Forced
2014-01-23
The Source
http://tpr.org/post/source-signing-away-your-right-trial-privacy-board-calls-end-nsa-surveillance
2014-01-29 19:37:34
attachment
Snapshot
2014-01-29 19:37:34
http://tpr.org/post/source-signing-away-your-right-trial-privacy-board-calls-end-nsa-surveillance?utm_content=buffere7678&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
text/html
utf-8
webpage
NationalJournal.com
Sasso
Brendan
Obama's Spying Has a Bigger Problem Than Public Outcry
Despite the attempt to calm privacy fears, lawsuits against the NSA are moving ahead.
2014-01-27
http://www.nationaljournal.com/technology/obama-s-spying-has-a-bigger-problem-than-public-outcry-20140127
2014-01-29 19:39:37
attachment
Snapshot
2014-01-29 19:39:37
http://www.nationaljournal.com/technology/obama-s-spying-has-a-bigger-problem-than-public-outcry-20140127
text/html
utf-8
webpage
National Security Agency
National Security Agency
2014 Press Release - NSA Announces New Civil Liberties and Privacy Officer"
2014-01-29
http://www.nsa.gov/public_info/press_room/2014/civil_liberties_privacy_officer.shtml
2014-01-29 19:40:39
attachment
2014 Press Release - NSA Announces New Civil Liberties and Privacy Officer"
2014-01-29 19:40:40
http://www.nsa.gov/public_info/press_room/2014/civil_liberties_privacy_officer.shtml
text/html
windows-1252
webpage
Mashable
Franceschi-Bicchierai
Lorenzo
Internal - Editorial Series
Internal - Editorial Series - NSA-leaks
Topics - edward snowden
Topics - James Clapper
Topics - NSA
Topics - Uncategorized
Topics - U.S.
Topics - US & World
Intelligence Chief: Snowden and 'Accomplices' Should Return 'Stolen' NSA Documents
The Director of National Intelligence James Clapper asked Edward Snowden and "his accomplices" to return the documents he "stole" from the NSA.
1/29/2014
Intelligence Chief
http://mashable.com/2014/01/29/clapper-snowden-and-accomplices-should-return-stolen-documents/
2014-01-29 20:15:39
attachment
Snapshot
2014-01-29 20:15:39
http://mashable.com/2014/01/29/clapper-snowden-and-accomplices-should-return-stolen-documents/
text/html
utf-8
blogPost
Washington Post
Fung
Brian
Edward Snowden has been nominated for a Nobel Peace Prize
The NSA leaker has been nominated for the honor by two Norwegian politicians.
2014-01-29
http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/29/edward-snowden-has-been-nominated-for-a-nobel-peace-prize/
2014-01-29 20:17:33
attachment
Snapshot
2014-01-29 20:17:33
http://www.washingtonpost.com/blogs/the-switch/wp/2014/01/29/edward-snowden-has-been-nominated-for-a-nobel-peace-prize/?wprss=rss_social-postbusinessonly
text/html
utf-8
webpage
POLITICO
Est
Josh Gerstein | 1/28/14 5:06 Pm
Dianne Feinstein
Edward Snowden
intelligence
Mike Rogers
National Security Agency
russia
Senate Intelligence Committee
Surveillance
Dianne Feinstein sees no evidence Edward Snowden spying for Russia
Senate Intelligence Committee Chairwoman Dianne Feinstein (D-Calif.) said Tuesday that she is not aware of any evidence that National Security Agency leaker Edward Snowden was acting on behalf of Russian intelligence. "I have no information to that effect. I’ve never seen anything to that effect," Feinstein said on MSNBC's "Andrea...
2014-01-28
http://www.politico.com/blogs/under-the-radar/2014/01/feinstein-sees-no-evidence-snowden-spying-for-russia-182104.html
2014-01-29 20:19:42
attachment
Snapshot
2014-01-29 20:19:42
http://www.politico.com/blogs/under-the-radar/2014/01/feinstein-sees-no-evidence-snowden-spying-for-russia-182104.html
text/html
utf-8
blogPost
Huffington Post
Shihab-Eldin
Ahmed
Davos to Detention: Why I Hate Coming Home to America
It's not easy coming back home to America when your name is Ahmed. I want to look forward to returning home from a trip abroad, but thanks to my name or as the TSA officer put it -- my "profile" -- I've come to dread it.
28 Jan 2014 17:20:17 -0500
http://www.huffingtonpost.com/ahmed-shihabeldin/why-i-hate-coming-home-to_b_4676404.html
2014-01-29 22:14:03
Davos to Detention
attachment
Huffington Post
2014-01-29 22:14:05
http://www.huffingtonpost.com/ahmed-shihabeldin/why-i-hate-coming-home-to_b_4676404.html?view=print&comm_ref=false
text/html
utf-8
magazineArticle
Slate
ISSN 1091-2339
Gangadharan
Seeta
Sprague
Aleta
Poor People Deserve Digital Privacy, Too
Dec. 11 2013
en-US
http://www.slate.com/blogs/future_tense/2013/12/11/low_income_people_forced_to_use_insecure_digital_systems_to_apply_for_government.html
2014-01-31 01:39:01
Slate
attachment
Slate Snapshot
2014-01-31 01:39:05
http://www.slate.com/blogs/future_tense/2013/12/11/low_income_people_forced_to_use_insecure_digital_systems_to_apply_for_government.single.html
text/html
utf-8
newspaperArticle
Nation
The Washington Post
ISSN 0190-8286
Pincus
Walter
Prosecution of Journalists Is Possible in NSA Leaks
Attorney General Alberto R. Gonzales raised the possibility yesterday that New York Times journalists could be prosecuted for publishing classified information based on the outcome of the criminal investigation underway into leaks to the Times of data about the National Security Agency's...
2006-05-22
en-US
http://www.washingtonpost.com/wp-dyn/content/article/2006/05/21/AR2006052100348.html
2014-01-31 01:39:57
washingtonpost.com
attachment
Washington Post Snapshot
2014-01-31 01:39:59
http://www.washingtonpost.com/wp-dyn/content/article/2006/05/21/AR2006052100348_pf.html
text/html
utf-8
webpage
Huffington Post
Sheppard
Kate
Grim
Ryan
Snowden Docs: U.S. Spied On Negotiators At 2009 Climate Summit
WASHINGTON -- The National Security Agency monitored the communications of other governments ahead of and during the 2009 United Nations climate negotiations in Copenhagen, Denmark, according to the latest document from whistleblower Edward Snowden. The document, with portions marked "top secret," indicates that the NSA was monitoring the communications of other countries ahead of the conference, and intended to continue doing so throughout the meeting.
01/29/2014
Snowden Docs
http://www.huffingtonpost.com/2014/01/29/snowden-nsa-surveillance-_n_4681362.html
2014-01-31 01:40:12
attachment
Huffington Post
2014-01-31 01:40:15
http://www.huffingtonpost.com/2014/01/29/snowden-nsa-surveillance-_n_4681362.html?view=print&comm_ref=false
text/html
utf-8
attachment
UN Climate Change Conference in Copenhagen -- Will the Developed and Developing World Agree on Climate Change? - unclimatechangeconference.pdf
2014-01-31 01:40:21
http://big.assets.huffingtonpost.com/unclimatechangeconference.pdf
application/pdf
utf-8
newspaperArticle
Environment
The Guardian
ISSN 0261-3077
Carrington
Damian
Climate change
Copenhagen climate change conference 2009
Environment
espionage
Global climate talks
science
The US embassy cables
United States
US foreign policy
US national security
World news
WikiLeaks cables reveal how US manipulated climate accord
Embassy dispatches show America used spying, threats and promises of aid to get support for Copenhagen accord- WikiLeaks cables: Cancún climate talks doomed to fail, says EU president- Cancún climate change summit: Week one in pictures
2010-12-03T16:30EST
en-GB
http://www.theguardian.com/environment/2010/dec/03/wikileaks-us-manipulated-climate-accord
2014-01-31 01:40:30
The Guardian
attachment
Guardian Snapshot
2014-01-31 01:40:32
http://www.theguardian.com/environment/2010/dec/03/wikileaks-us-manipulated-climate-accord
text/html
utf-8
webpage
Ars Technica
Goodin
Dan
cellphones
kiev
location
Privacy
Ukrainian police use cellphones to track protesters, court order shows
"Tower dumps" help government profile people attending demonstrations.
1/30/2014
http://arstechnica.com/tech-policy/2014/01/ukrainian-police-use-cellphones-to-track-protestors-court-order-shows/
2014-01-31 01:40:38
attachment
Snapshot
2014-01-31 01:40:38
http://arstechnica.com/tech-policy/2014/01/ukrainian-police-use-cellphones-to-track-protestors-court-order-shows/
text/html
utf-8
blogPost
Privacy SOS
sosadmin
FBI Director admits to warrantless cell phone location tracking, citing 'relevance' standard | Privacy SOS
After dodging the question for months and flat out refusing to answer the ACLU's public records requests seeking clarity on it, the FBI has finally ‘fessed up and admitted that it does not obtain a probab
2014-01-30T00:00:00Z
http://privacysos.org/node/1316
2014-01-31 01:40:46
After dodging the question for months and flat out refusing to answer the ACLU's public records requests seeking clarity on it, the FBI has finally ‘fessed up and admitted that it does not obtain a probab
attachment
Snapshot
2014-01-31 01:40:46
http://privacysos.org/node/1316
text/html
utf-8
newspaperArticle
Politics
The Guardian
ISSN 0261-3077
Wintour
Patrick
editor
political
Conservatives
Data protection
David Cameron
Edward Snowden
GCHQ
Liberal Democrats
NSA
politics
Surveillance
Telecoms
The NSA files
UK news
UK security and counter-terrorism
United States
World news
Cameron says he failed to make case for mass surveillance after Snowden leaks
Files from analyst showed need to update communication laws, says PM, also claiming civil liberties must be held 'in proportion'
2014-01-30T14:56EST
en-GB
http://www.theguardian.com/politics/2014/jan/30/cameron-failed-mass-surveillance-snowden-communication-laws?utm_source=twitterfeed&utm_medium=twitter
2014-01-31 01:41:20
The Guardian
attachment
Guardian Snapshot
2014-01-31 01:41:22
http://www.theguardian.com/politics/2014/jan/30/cameron-failed-mass-surveillance-snowden-communication-laws?utm_source=twitterfeed&utm_medium=twitter
text/html
utf-8
webpage
Wyden
Ron
Wyden Statement at Senate Intelligence Committee’s Open Hearing | Senator Ron Wyden
WASHINGTON U.S. Senator Ron Wyden (D-Ore.) delivered the following statement prior to questioning senior Intelligence Co
2014-01-29
http://www.wyden.senate.gov/news/press-releases/wyden-statement-at-senate-intelligence-committees-open-hearing
2014-01-31 01:41:27
attachment
Snapshot
2014-01-31 01:41:27
http://www.wyden.senate.gov/news/press-releases/wyden-statement-at-senate-intelligence-committees-open-hearing
text/html
utf-8
webpage
United States Department of Defense
Defense.gov News Release: Statement by Secretary of Defense Chuck Hagel on NSA/CYBERCOM Announcement Thursday, January 30, 2014
2014-01-30
http://www.defense.gov/Releases/Release.aspx?ReleaseID=16515
2014-01-31 01:42:02
attachment
Defense.gov News Release: Statement by Secretary of Defense Chuck Hagel on NSA/CYBERCOM Announcement Thursday, January 30, 2014
2014-01-31 01:42:03
http://www.defense.gov/Releases/Release.aspx?ReleaseID=16515
text/html
utf-8
webpage
Just Security
Granick
Jennifer
Reforming The Section 702 Dragnet (Part 1)
A Forum on Law, Rights, and U.S. National Security
2014-01-30
http://justsecurity.org/2014/01/30/reforming-section-702-dragnet-1/
2014-01-31 01:42:29
attachment
Snapshot
2014-01-31 01:42:29
http://justsecurity.org/2014/01/30/reforming-section-702-dragnet-1/
text/html
utf-8
blogPost
Foreign Policy Blogs
Harris
Shane
Obama's Likely Pick for NSA Chief Is a Master Spy. It May Not Be Enough.
October 17, 2013 - 06:23 Pm
http://complex.foreignpolicy.com/posts/2013/10/17/obamas_likely_pick_for_nsa_chief_is_a_master_spy_it_may_not_be_enough
2014-01-31 01:42:52
attachment
Foreign Policy Snapshot
2014-01-31 01:42:57
http://complex.foreignpolicy.com/posts/2013/10/17/obamas_likely_pick_for_nsa_chief_is_a_master_spy_it_may_not_be_enough
text/html
utf-8
webpage
Weston
Greg
Greenwald
Glenn
Gallagher
Ryan
CSEC used airport Wi-Fi to track Canadian travellers: Edward Snowden documents
Canada's international spy agency, CSEC, tapped into the free Wi-Fi service at a major Canadian airport to track the comings and goings of cellphone-carrying travellers for two weeks, according to documents obtained by CBC News. It was apparently part of a trial run to see how wide an electronic net could be cast.
2014-01-30
CSEC used airport Wi-Fi to track Canadian travellers
http://www.cbc.ca/1.2517881
2014-01-31 17:04:52
attachment
CSEC Snowden docs: No sign spy agency targets Canadians, minister insists - Politics - CBC News
2014-01-31 21:14:48
http://www.cbc.ca/news/politics/csec-snowden-docs-no-sign-spy-agency-targets-canadians-minister-insists-1.2518564
text/html
utf-8
attachment
Snapshot
2014-01-31 17:04:52
http://www.cbc.ca/news/politics/csec-used-airport-wi-fi-to-track-canadian-travellers-edward-snowden-documents-1.2517881
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Ackerman
Spencer
Keith Alexander
NSA
Obama administration
Privacy
Surveillance
The NSA files
United States
US Congress
US domestic policy
US foreign policy
US military
US politics
Vice-admiral Michael Rogers to take command of embattled NSA
Rogers is currently commander of navy Fleet Cyber CommandRichard Ledgett will become the NSA's new deputy director New leaders to face ongoing fallout from Snowden disclosures
2014-01-30T18:15EST
en-GB
http://www.theguardian.com/world/2014/jan/30/nsa-michael-rogers-to-comman-keith-alexander?CMP=twt_fd&CMP=SOCxx2I2
2014-01-31 17:05:46
The Guardian
attachment
Guardian Snapshot
2014-01-31 17:05:48
http://www.theguardian.com/world/2014/jan/30/nsa-michael-rogers-to-comman-keith-alexander?CMP=twt_fd&CMP=SOCxx2I2
text/html
utf-8
newspaperArticle
Los Angeles Times
ISSN 0458-3035
Snepp
Frank
Edward Snowden's weasel ways
I was the Snowden of my day, a disaffected ex-spy who rocked the security community. But I took my lumps.
2014-01-31
en-US
http://www.latimes.com/opinion/commentary/la-oe-snepp-snowden-nsa-20140131,0,2997528.story
2014-01-31 17:06:52
LA Times
attachment
LA Times Snapshot
2014-01-31 17:06:54
http://www.latimes.com/opinion/commentary/la-oe-snepp-snowden-nsa-20140131,0,2997528.story
text/html
utf-8
webpage
POLITICO Magazine
Harrington
Jason Edward
Airport Security
Jason Edward Harrington
Primary Source
TSA
Dear America, I Saw You Naked
On Jan. 4, 2010, when my boss saw my letter to the editor in the New York Times, we had a little chat. It was rare for the federal security director at Chicago O’Hare to sit down with her floor-level Transportation Security Administration officers—it usually presaged a termination—and so I was nervous as I settled in across the desk...
2014-01-30
http://www.politico.com/magazine/story/2014/01/tsa-screener-confession-102912.html
2014-01-31 17:21:39
attachment
Snapshot
2014-01-31 17:21:39
http://www.politico.com/magazine/story/2014/01/tsa-screener-confession-102912.html
text/html
utf-8
newspaperArticle
Opinion
The New York Times
ISSN 0362-4331
Central Intelligence Agency
Feinstein, Dianne
Homeland Security Department
Inspectors General
Obama, Barack
Security and Warning Systems
terrorism
Transportation Security Administration
Yemen
To Stop a Terrorist: No Lack of Ideas
To the Editor:.
2010-01-05
To Stop a Terrorist
http://www.nytimes.com/2010/01/05/opinion/l05terror.html
2014-01-31 17:22:08
NYTimes.com
attachment
New York Times Snapshot
2014-01-31 17:22:08
http://www.nytimes.com/2010/01/05/opinion/l05terror.html?_r=0
text/html
windows-1252
newspaperArticle
The New York Times
ISSN 0362-4331
Sanger
David E.
Shanker
Thom
Appointments and Executive Changes
National Security Agency
Obama, Barack
Rogers, Michael S
N.S.A. Choice Is Navy Expert on Cyberwar
Vice Adm. Michael S. Rogers, a cryptologist by training, will become the public face of the N.S.A. at a moment that it is caught in the cross hairs of a roiling debate.
2014-01-30
http://www.nytimes.com/2014/01/31/world/vice-admiral-to-be-named-nsa-director.html
2014-01-31 20:35:55
NYTimes.com
attachment
New York Times Snapshot
2014-01-31 20:35:55
http://www.nytimes.com/2014/01/31/world/vice-admiral-to-be-named-nsa-director.html
text/html
utf-8
webpage
MIT Technology Review
Talbot
David
Carnegie Mellon University
Google
When Other Apps Track Your Location, This App Tells
Researchers find a way to give Android users prominent warnings when apps are tracking their location.
1/30/2014
http://www.technologyreview.com/news/523981/android-app-warns-when-youre-being-watched/
2014-01-31 20:42:23
attachment
Snapshot
2014-01-31 20:42:23
http://www.technologyreview.com/news/523981/android-app-warns-when-youre-being-watched/
text/html
utf-8
newspaperArticle
UK news
The Guardian
ISSN 0261-3077
Harding
Luke
Data protection
Edward Snowden
espionage
GCHQ
Media
National newspapers
Newspapers
Newspapers & magazines
NSA
politics
The Guardian
The NSA files
UK news
UK security and counter-terrorism
United States
World news
Footage released of Guardian editors destroying Snowden hard drives
GCHQ technicians watched as journalists took angle grinders and drills to computers after weeks of tense negotiations• Watch the footage of the hard drives being destroyed
2014-01-31T07:55EST
en-GB
http://www.theguardian.com/uk-news/2014/jan/31/footage-released-guardian-editors-snowden-hard-drives-gchq?CMP=twt_gu
2014-01-31 20:45:08
The Guardian
attachment
Guardian Snapshot
2014-01-31 20:45:10
http://www.theguardian.com/uk-news/2014/jan/31/footage-released-guardian-editors-snowden-hard-drives-gchq?CMP=twt_gu
text/html
utf-8
attachment
Revealed_ the day Guardian destroyed Snowden hard .mp4
video/mp4
webpage
Ann Cavoukia
Brazil
Canada
CSEC
Edward Snowden
NSA mass spying
Ronald Deibert
spy
Airport Wi-Fi used to track Canadians
Canada's spy agency has spied on travelers at a major airport via the wireless Internet service.
2014-01-31
http://www.presstv.ir/detail/2014/01/31/348559/airport-wifi-used-to-track-canadians/
2014-01-31 20:45:28
attachment
Snapshot
2014-01-31 20:45:28
http://www.presstv.ir/detail/2014/01/31/348559/airport-wifi-used-to-track-canadians/
text/html
utf-8
newspaperArticle
Reuters
San Francisco
Randewich
Noel
CHARLIE ROSE
Edward Snowden
Larry Ellison
United States
Oracle's Ellison downplays threat of NSA database snooping
SAN FRANCISCO (Reuters) - Oracle Corp CEO Larry Ellison played down concerns on Wednesday about possible government snooping in his business customers' private data.At an industry conference in San Francisco,
Thu Jan 30 04:58:22 UTC 2014
http://www.reuters.com/article/2014/01/30/us-oracle-nsa-idUSBREA0T05U20140130
2014-01-31 20:47:46
Reuters
attachment
Snapshot
2014-01-31 20:47:46
http://www.reuters.com/article/2014/01/30/us-oracle-nsa-idUSBREA0T05U20140130
text/html
utf-8
webpage
Lawfare
Catalog of the Snowden Revelations
This page catalogs various revelations by Edward Snowden, regarding the United States' surveillance activities.
Each disclosure is assigned to one of the following categories: tools and methods, overseas USG locations from which operations are undertake
2014-01-31
http://www.lawfareblog.com/catalog-of-the-snowden-revelations/
2014-01-31 20:48:43
attachment
Snapshot
2014-01-31 20:48:43
http://www.lawfareblog.com/catalog-of-the-snowden-revelations/
text/html
utf-8
webpage
Motherboard
Neal
Meghan
The App That Tracks Who's Tracking You
Now that leaking apps are spilling your location and personal info to the NSA, might as well know what's being revealed.
2014-01-30
http://motherboard.vice.com/blog/the-app-that-tracks-whos-tracking-you
2014-01-31 20:50:16
attachment
Snapshot
2014-01-31 20:50:16
http://motherboard.vice.com/blog/the-app-that-tracks-whos-tracking-you
text/html
utf-8
webpage
Infosecurity Magazine
Infosecurity Magazine
Infosecurity - Plummeting Online Privacy Confidence Spells Business Losses
2014-01-30
http://www.infosecurity-magazine.com/view/36666/plummeting-online-privacy-confidence-spells-business-losses/
2014-01-31 20:53:51
attachment
Infosecurity - Plummeting Online Privacy Confidence Spells Business Losses
2014-01-31 20:53:52
http://www.infosecurity-magazine.com/view/36666/plummeting-online-privacy-confidence-spells-business-losses/
text/html
utf-8
blogPost
Sullivan
Eileen
Agiesta
Jennifer
American
Ap-Gfk Poll
ASSOCIATED PRESS
Barack Obama
Boomers
Congress
culture
Democrat
Democrats
Dogs
Economy
Election
Elections
Geoff Feinberg
GfK Public Affairs & Corporate Communications
Gfk Roper
GfK Roper Public Affairs
GfK Roper Public Affairs & Media
House
Lifestyle
Market Research
Medicare
news
Obama
Pet
Petside.com
Politicians
politics
President Obama
Public Affairs
Public Opinion
Republican
Republicans
Retirement
right direction
wrong direction
AP-GfK poll: Americans value privacy over security | Associated Press GfK Poll
2014-01-27
http://ap-gfkpoll.com/featured/ap-gfk-poll-americans-value-privacy-over-security
2014-01-31 20:54:59
AP-GfK poll
attachment
Snapshot
2014-01-31 20:54:59
http://ap-gfkpoll.com/featured/ap-gfk-poll-americans-value-privacy-over-security
text/html
utf-8
webpage
ZDNet
AAP
Merkel rebukes US, UK over surveillance
German Chancellor Angela Merkel has issued a strong rebuke to the United States and Britain over the sweeping digital spying revealed by fugitive IT contractor Edward Snowden.
2014-01-29
http://www.zdnet.com/merkel-rebukes-us-uk-over-surveillance-7000025762/
2014-01-31 20:57:11
attachment
Snapshot
2014-01-31 20:57:11
http://www.zdnet.com/merkel-rebukes-us-uk-over-surveillance-7000025762/
text/html
utf-8
webpage
ABC News
Braun
Stephen
crime
Ed
election news
espionage
general news
Government and Politics
Government surveillance
Human rights and civil liberties
Intelligence agencies
James R. Clapper
Jr.
Military and defense
national security
Political issues
political news
political news articles
politics news
Social affairs
Social issues
FACT CHECK: NSA Leaks Worst Intelligence Breach?
The U.S. intelligence chief, James Clapper, said this week that the loss of state secrets as a result of leaks by former National Security Agency analyst Edward Snowden was the worst in American history. Clapper backed up his assertion with dire forecasts about emboldened enemies abroad, but...
2014-01-31
FACT CHECK
http://abcnews.go.com/Politics/wireStory/fact-check-nsa-leaks-worst-intelligence-breach-22309087
2014-01-31 21:01:06
attachment
Snapshot
2014-01-31 21:01:06
http://abcnews.go.com/Politics/wireStory/fact-check-nsa-leaks-worst-intelligence-breach-22309087?singlePage=true
text/html
utf-8
webpage
The Center for Internet and Society
Xynou
Maria
India's Central Monitoring System (CMS): Something to Worry About?
In this article, Maria Xynou presents new information about India's controversial Central Monitoring System (CMS) based on official documents which were shared with the Centre for Internet and Society (CIS). Read this article and gain an insight on how the CMS actually works!
2014-01-30
India's Central Monitoring System (CMS)
http://cis-india.org/internet-governance/blog/india-central-monitoring-system-something-to-worry-about
2014-01-31 21:02:20
attachment
Snapshot
2014-01-31 21:02:20
http://cis-india.org/internet-governance/blog/india-central-monitoring-system-something-to-worry-about
text/html
utf-8
webpage
National Security Agency
National Security Agency
2014 Press Release - NSA's New Deputy Director
2014-01-31
http://www.nsa.gov/public_info/press_room/2014/new_deputy_director_rick_ledgett.shtml
2014-01-31 21:12:27
attachment
2014 Press Release - NSA's New Deputy Director
2014-01-31 21:12:28
http://www.nsa.gov/public_info/press_room/2014/new_deputy_director_rick_ledgett.shtml
text/html
windows-1252
webpage
1776 DC
Lougee
Peter
1776 - Non-U.S.-Based Cloud Storage Industry Emerges Amidst NSA Spying Concerns
Since revelations about the domestic reach and activities of the National Security Agency began last June, concern within the global community has continued to mount. Just today, it was rev...
2014-01-29
http://1776dc.com/news/2014/01/29/non-u-s-based-cloud-storage-industry-emerges-amidst-nsa-spying-concerns?year=2014&monthnum=01&day=29&name=non-u-s-based-cloud-storage-industry-emerges-amidst-nsa-spying-concerns&category_name=news
2014-01-31 21:14:56
attachment
Snapshot
2014-01-31 21:14:56
http://1776dc.com/news/2014/01/29/non-u-s-based-cloud-storage-industry-emerges-amidst-nsa-spying-concerns/
text/html
utf-8
newspaperArticle
Media
The Guardian
ISSN 0261-3077
Bowcott
Owen
correspondent
legal affairs
BSkyB
Kenneth Clarke
London
Media
Metropolitan police
Oliver Letwin
Police
politics
Sky News
Television industry
TV news
UK news
Secret hearings could allow police to seize journalists' notes if bill passes
Requests for notebooks and files must currently be made in open court – but clause in deregulation bill could change that
2014-01-31T14:33EST
en-GB
http://www.theguardian.com/media/2014/jan/31/secret-hearings-police-journalists-deregulation-bill?CMP=twt_fd
2014-01-31 23:00:56
The Guardian
attachment
Guardian Snapshot
2014-01-31 23:00:58
http://www.theguardian.com/media/2014/jan/31/secret-hearings-police-journalists-deregulation-bill?CMP=twt_fd
text/html
utf-8
blogPost
Schneier on Security
Schneier
Bruce
Schneier on Security: CSEC Surveillance Analysis of IP and User Data
2014-02-03
https://www.schneier.com/blog/archives/2014/02/csec_surveillan.html
2014-02-03 17:11:53
attachment
Schneier on Security: CSEC Surveillance Analysis of IP and User Data
2014-02-03 17:11:54
https://www.schneier.com/blog/archives/2014/02/csec_surveillan.html
text/html
utf-8
blogPost
Nullify NSA!
Turn It Off
The Plan
There are 5 key areas to focus on in the plan to Nullify NSA spying. None of them rely on the federal government to stop the federal agency.
2013-12-13
http://offnow.org/plan/
2014-02-03 17:19:59
attachment
Snapshot
2014-02-03 17:19:59
http://offnow.org/plan/
text/html
utf-8
webpage
Threat Level
Poulsen
Kevin
Judges Poised to Hand U.S. Spies the Keys to the Internet | Threat Level | Wired.com
Why the appellate court challenge pitting encrypted email provider Lavabit against the Justice Department is so important? It’s the only publicly documented case where a district judge has ordered an internet company to hand over its SSL key to the U.S. government — in this case, the FBI.
2014-02-03
http://www.wired.com/threatlevel/2014/02/courtint/
2014-02-03 17:21:01
attachment
Snapshot
2014-02-03 17:21:01
http://www.wired.com/threatlevel/2014/02/courtint/
text/html
utf-8
webpage
The Wall Street Journal
Gorman
Siobhan
Barack Obama
domestic politics
general news
international relations
political
politics
privacy issues
The day before Obama spoke on the NSA, White House officials rushed to add restrictions
The day before President Obama gave his speech on the NSA, White House officials rushed to include additional surveillance restrictions to address concerns of privacy advocates and the president's own review panel.
2014-01-31
http://online.wsj.com/news/article_email/SB10001424052702303743604579355221879331080-lMyQjAxMTA0MDMwMTEzNDEyWj
2014-02-03 17:24:56
attachment
Snapshot
2014-02-03 17:24:56
http://online.wsj.com/news/article_email/SB10001424052702303743604579355221879331080-lMyQjAxMTA0MDMwMTEzNDEyWj
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Harding
Luke
CIA
Edward Snowden
Media
Newspapers
Newspapers & magazines
NSA
The Guardian
The NSA files
United States
US national security
World news
How Edward Snowden went from loyal NSA contractor to whistleblower
He was politically conservative, a gun owner, a geek – and the man behind the biggest intelligence leak in history. In this exclusive extract from his new book, Luke Harding looks at Edward Snowden's journey from patriot to America's most wanted
2014-01-31
en-GB
http://www.theguardian.com/world/2014/feb/01/edward-snowden-intelligence-leak-nsa-contractor-extract
2014-02-03 17:34:20
The Guardian
attachment
Guardian Snapshot
2014-02-03 17:34:22
http://www.theguardian.com/world/2014/feb/01/edward-snowden-intelligence-leak-nsa-contractor-extract
text/html
utf-8
blogPost
WSJ Blogs - Digits
Yadron
Danny
The Wall Street Journal
Feb 3, 2014
http://blogs.wsj.com/digits/2014/02/03/microsoft-obama-didnt-go-far-enough-in-nsa-reforms/
2014-02-03 21:20:49
attachment
WSJ-Blogs Snapshot
2014-02-03 21:20:51
http://blogs.wsj.com/digits/2014/02/03/microsoft-obama-didnt-go-far-enough-in-nsa-reforms/
text/html
utf-8
webpage
Payton
Laura
Canada
Communications Security Establishment
Communications Security Establishment Canada
Conservative government
CSE
CSEC
David Christopherson
Edward Snowden
electronic surveillance
general news
Global positioning systems
Greg Weston
House Of Commons
Law and order
Law enforcement technology
New Democratic Party
Rob Nicholson
sig int
signals intelligence
Spying
technology
tracking
United States
CSEC Snowden docs: MPs grill defence minister on spying revelation
Opposition MPs say the government has to do more to reassure Canadians after a document newly released by former NSA contractor Edward Snowden suggested Canada's communications spy agency tracked people through free airport Wi-Fi.
2014-01-31
CSEC Snowden docs
http://www.cbc.ca/1.2518564
2014-02-03 21:21:55
attachment
Snapshot
2014-02-03 21:21:55
http://www.cbc.ca/news/politics/csec-snowden-docs-mps-grill-defence-minister-on-spying-revelation-1.2518564
text/html
utf-8
blogPost
Nullify NSA!
Turn It Off
Twelve and counting: Vermont legislation takes on NSA spying
On Tuesday, Rep. Teo Zagar (D-Windsor-4-1), along with co-sponsor Reps. Susan Davis (P/D-Orange-1), Patricia Komline (R-Bennington-Rutland) and William Stevens (I-Addison-Rutland) introduced the Fourth Amendment Protection Act to prohibit any state support of the NSA.
2014-01-31
http://offnow.org/2014/01/31/twelve-counting-vermont-legislation-takes-nsa-spying/
2014-02-04 19:48:39
Twelve and counting
attachment
Snapshot
2014-02-04 19:48:39
http://offnow.org/2014/01/31/twelve-counting-vermont-legislation-takes-nsa-spying/
text/html
utf-8
webpage
International Business Times
Brown
Eric
The NSA Has A Civil Liberties And Privacy Officer
The agency caught spying on Americans announced that it has a new Civil Liberties and Privacy Officer, but who is she?
2014-01-30T15:04:17-05:00
http://www.ibtimes.com/who-rebecca-richards-nsas-new-civil-liberties-privacy-officer-1551862
2014-02-04 19:49:22
attachment
Snapshot
2014-02-04 19:49:22
http://www.ibtimes.com/who-rebecca-richards-nsas-new-civil-liberties-privacy-officer-1551862
text/html
utf-8
webpage
TheHill
Sink
Justin
Barack Obama
james clapper
Obama: Clapper ‘should have been more careful’ in congressional testimony
President Obama said Friday that Director of National Intelligence James Clapper “should have been more careful” when he testified to a Senate panel last year that the National Security Agency did not collect data on millions of Americans.
Text
2014-01-31T06:43-05:00
Obama
http://thehill.com/blogs/hillicon-valley/technology/197060-obama-clapper-should-have-been-more-careful-in-congressional
2014-02-04 19:49:48
und
attachment
Snapshot
2014-02-04 19:49:48
http://thehill.com/blogs/hillicon-valley/technology/197060-obama-clapper-should-have-been-more-careful-in-congressional
text/html
utf-8
newspaperArticle
US & Canada
BBC
Canada 'spied on airport travellers'
Canada's spy agency collected data from travellers using an airport's wi-fi system, CBC reports, quoting documents leaked by Edward Snowden.
2014/01/31
http://www.bbc.co.uk/news/world-us-canada-25977620
2014-02-04 19:49:57
bbc.co.uk
attachment
BBC News Snapshot
2014-02-04 19:49:59
http://www.bbc.co.uk/news/world-us-canada-25977620
text/html
utf-8
webpage
The Huffington Post
Taibi
Catherine
abramson:
crackdown
created
'freeze'
has
jill
Media
ny
Obama
on
reporting
times'
NY Times Editor: Obama Crackdown Has Created 'Freeze' On Reporting
New York Times editor Jill Abramson once again condemned the Obama administration's crackdown on leaks, saying that the government's treatment of Edward Snowden has scared potential sources and created a "real freeze" on reporting.
Abra...
2014-01-31
Obama Crackdown Has Created 'Freeze' On Reporting
http://www.huffingtonpost.com/2014/01/31/jill-abramson-obama-journalism-columbia-edward-snowden-nsa_n_4702759.html
2014-02-04 19:50:19
attachment
Snapshot
2014-02-04 19:50:19
http://www.huffingtonpost.com/2014/01/31/jill-abramson-obama-journalism-columbia-edward-snowden-nsa_n_4702759.html
text/html
utf-8
webpage
Techdirt.
Masnick
Mike
Canadian Gov't Responds To Spying Revelations By Saying It's All A Lie And Calling Glenn Greenwald A 'Porn Spy' | Techdirt
We've seen various government officials act in all sorts of bizarre ways after revelations of illegal spying on their own people (and foreigners), but none may be quite as bizarre as the response from the Canadian government, following the...
2014-01-31
https://www.techdirt.com/articles/20140131/12542726062/canadian-govt-responds-to-spying-revelations-its-all-lie-calling-glenn-greenwald-porn-spy.shtml
2014-02-04 19:52:04
attachment
Snapshot
2014-02-04 19:52:04
https://www.techdirt.com/articles/20140131/12542726062/canadian-govt-responds-to-spying-revelations-its-all-lie-calling-glenn-greenwald-porn-spy.shtml
text/html
windows-1252
webpage
ProPublica
Angwin
Julia
Privacy Tools: Opting Out from Data Brokers - ProPublica
2014-01-30
http://www.propublica.org/article/privacy-tools-opting-out-from-data-brokers?utm_campaign=sprout&utm_medium=social&utm_source=twitter&utm_content=1391203624
2014-02-04 19:54:32
attachment
Privacy Tools: Opting Out from Data Brokers - ProPublica
2014-02-04 19:54:33
http://www.propublica.org/article/privacy-tools-opting-out-from-data-brokers?utm_campaign=sprout&utm_medium=social&utm_source=twitter&utm_content=1391203624
text/html
utf-8
webpage
American Civil Liberties Union
Greene
Robyn
Are CIA Cyber-Spooks Hacking Americans' Computers?
At Wednesday's Senate Intelligence Committee hearing, titled
2014-01-31
https://www.aclu.org/blog/national-security/are-cia-cyber-spooks-hacking-americans-computers
2014-02-04 19:56:10
attachment
Snapshot
2014-02-04 19:56:10
https://www.aclu.org/blog/national-security/are-cia-cyber-spooks-hacking-americans-computers
text/html
utf-8
blogPost
New York Post
Walsh
Michael
Barack Obama
NSA
Surveillance
‘Welcome to the United States of paranoia’
Feel like Big Brother is watching you these days? You’re not alone. “This is not some far-out Orwellian scenario,” wrote the late William Safire of The New York Times in…
2/1/2014
http://nypost.com/2014/02/01/welcome-to-the-united-states-of-paranoia/
2014-02-04 19:57:21
attachment
Snapshot
2014-02-04 19:57:21
http://nypost.com/2014/02/01/welcome-to-the-united-states-of-paranoia/
text/html
utf-8
webpage
DW.DE
Knigge
Michael
BND
cell phone
Germany
intelligence
Michael Hayden
NSA
Spying
Surveillance
us
Hayden: Every agency wants to do what the NSA does | Transatlantic Voices | DW.DE | 01.02.2014
Michael Hayden, a former director of the NSA, CIA and US national intelligence, tells DW he sees German anger at US spying as genuine and says the NSA shouldn't have got caught tapping Chancellor Merkel's phone.
2014-02-01
Hayden
http://www.dw.de/hayden-every-agency-wants-to-do-what-the-nsa-does/a-17403330
2014-02-04 19:57:49
attachment
Snapshot
2014-02-04 19:57:49
http://www.dw.de/hayden-every-agency-wants-to-do-what-the-nsa-does/a-17403330
text/html
utf-8
interview
Eng
Karen
Potter
Will
activists
animal rights
domestic terrorism
environmental activism
FBI
green is the new red
Law
ted fellow
will potter
Green is the new red: The problem of treating activists as terrorists | TED Blog
Will Potter investigates how and why environmental activists are considered United States' number-one domestic terrorism threat.
2014-01-31
Web
en-US
Green is the new red
http://blog.ted.com/2014/01/31/will-potter-on-of-treating-environmentalists-like-terrorists/
2014-02-04 20:02:08
attachment
Snapshot
2014-02-04 20:02:08
http://blog.ted.com/2014/01/31/will-potter-on-of-treating-environmentalists-like-terrorists/
text/html
utf-8
blogPost
notes
Gallagher
Ryan
culture
current affairs
home affairs
investigative journalism
journalist
New Statesman
open democracy
politics
reporter
R.J. Gallagher
Ryan Gallagher
Scotland
Scottish
Slate
Society
the big issue
The Guardian
writer
Ryan Gallagher | RJGallagher.co.uk: Canada's WiFi Surveillance and CSEC's Non-Denial Denials
Online home of Scottish journalist Ryan Gallagher
2014-02-01
http://notes.rjgallagher.co.uk/2014/02/canada-wifi-airports-surveillance-denial-csec-snowden.html
2014-02-04 20:04:38
Ryan Gallagher | RJGallagher.co.uk
attachment
Snapshot
2014-02-04 20:04:38
http://notes.rjgallagher.co.uk/2014/02/canada-wifi-airports-surveillance-denial-csec-snowden.html
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
The Editorial Board
Computers and the Internet
Foreign Intelligence Surveillance Act (FISA)
Obama, Barack
Privacy
Surveillance of Citizens by Government
Telephones and Telecommunications
Making Surveillance a Little Less Opaque
Communications companies should be allowed to disclose government demands for private data.
2014-02-01
http://www.nytimes.com/2014/02/02/opinion/sunday/making-surveillance-a-little-less-opaque.html
2014-02-04 20:06:23
NYTimes.com
attachment
New York Times Snapshot
2014-02-04 20:06:23
http://www.nytimes.com/2014/02/02/opinion/sunday/making-surveillance-a-little-less-opaque.html?hpw&rref=opinion&_r=0&referrer=
text/html
utf-8
webpage
Montreal Gazette
Batrawy
Aya
New Saudi counterterrorism law alarms human rights activists; 'A catastrophe'
2014-02-02
http://www.montrealgazette.com/touch/story.html?id=9459639
2014-02-04 20:11:09
attachment
New Saudi counterterrorism law alarms human rights activists; 'A catastrophe'
2014-02-04 20:11:10
http://www.montrealgazette.com/touch/story.html?id=9459639
text/html
utf-8
newspaperArticle
Los Angeles Times
ISSN 0458-3035
Dilanian
Ken
Several cybersecurity initiatives lost after Snowden's NSA leaks
Experts say several cybersecurity initiatives have been halted by Snowden's leaks of NSA data, leaving the U.S. more vulnerable.
2014-02-01
en-US
http://www.latimes.com/nation/la-na-snowden-cyber-20140202,0,5845248.story
2014-02-04 20:17:34
LA Times
attachment
LA Times Snapshot
2014-02-04 20:17:36
http://www.latimes.com/nation/la-na-snowden-cyber-20140202,0,5845248.story
text/html
utf-8
webpage
The Atlantic
Friedersdorf
Conor
How Dianne Feinstein Exaggerates Global Terrorism
A lesson in how to hype an unquantifiable threat with bogus numbers
Jan 30 2014, 10:30 AM ET
http://www.theatlantic.com/politics/archive/2014/01/how-dianne-feinstein-exaggerates-global-terrorism/283461/
2014-02-04 20:23:45
attachment
The Atlantic Print View
2014-02-04 20:23:47
http://www.theatlantic.com/politics/print/2014/01/how-dianne-feinstein-exaggerates-global-terrorism/283461/
text/html
utf-8
webpage
The Atlantic
Friedersdorf
Conor
John Brennan Dodges a Question About CIA Spying on Americans
Once again, a national-security official is asked a question with just one defensible answer. And he doesn't give it.
Jan 30 2014, 12:00 PM ET
http://www.theatlantic.com/politics/archive/2014/01/john-brennan-dodges-a-question-about-cia-spying-on-americans/283459/
2014-02-04 20:24:05
attachment
The Atlantic Print View
2014-02-04 20:24:07
http://www.theatlantic.com/politics/print/2014/01/john-brennan-dodges-a-question-about-cia-spying-on-americans/283459/
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Harding
Luke
Books
culture
Data protection
david miranda
Edward Snowden
espionage
NSA
Surveillance
The NSA files
UK news
UK security and counter-terrorism
United States
US national security
World news
David Miranda's detention: a chilling attack on journalism
When the partner of journalist Glenn Greenwald was detained at Heathrow airport last August under the Terrorism Act, MI5 were pulling the strings and knew full well that he wasn't a terrorist
2014-02-02T14:01EST
en-GB
David Miranda's detention
http://www.theguardian.com/world/2014/feb/02/david-miranda-detention-chilling-attack-journalism
2014-02-04 20:24:50
The Guardian
attachment
Guardian Snapshot
2014-02-04 20:24:52
http://www.theguardian.com/world/2014/feb/02/david-miranda-detention-chilling-attack-journalism
text/html
utf-8
blogPost
California Lawyer
Blum
Bill
Reining in the NSA
2014-02-01
http://callawyer.com/clstory.cfm?eid=933196&wteid=933196_Reining_in_the_NSA
2014-02-04 20:25:29
attachment
Reining in the NSA
2014-02-04 20:25:30
http://callawyer.com/clstory.cfm?eid=933196&wteid=933196_Reining_in_the_NSA
text/html
utf-8
webpage
Council of Europe
Brown
Ian
Transparency to protect Internet freedom: a shared commitment
2013-12
http://www.coe.int/t/dghl/standardsetting/media/cdmsi/CDMSI(2013)misc21E_CoE%20Transparency_Conf_Report.pdf
2014-02-04 20:47:23
attachment
CDMSI(2013)misc21E_CoE Transparency_Conf_Report.pdf
2014-02-04 20:47:23
http://www.coe.int/t/dghl/standardsetting/media/cdmsi/CDMSI(2013)misc21E_CoE%20Transparency_Conf_Report.pdf
application/pdf
utf-8
webpage
The New Yorker
Hersh
Joshua
Journalism Becomes a Crime in Egypt : The New Yorker
2014-01-31
http://www.newyorker.com/online/blogs/newsdesk/2014/01/journalism-becomes-a-crime-in-egypt.html?mbid=social_retweet
2014-02-04 21:10:14
attachment
Journalism Becomes a Crime in Egypt : The New Yorker
2014-02-04 21:10:15
http://www.newyorker.com/online/blogs/newsdesk/2014/01/journalism-becomes-a-crime-in-egypt.html?mbid=social_retweet
text/html
windows-1252
webpage
TNS Global
Green
Sarah
Public Opinion Monitor: Britons give safeguarding security a higher priority than protecting privacy | TNS Global
2014-02-03
http://www.tnsglobal.com/uk/press-release/public-opinion-monitor-britons-give-safeguarding-security-higher-priority-protecting-p
2014-02-04 21:17:17
attachment
Public Opinion Monitor: Britons give safeguarding security a higher priority than protecting privacy | TNS Global
2014-02-04 21:17:18
http://www.tnsglobal.com/uk/press-release/public-opinion-monitor-britons-give-safeguarding-security-higher-priority-protecting-p
text/html
utf-8
webpage
MuckRock
Musgrave
Shawn
DEA teaches agents to recreate evidence chains to hide methods | Muckrock
2014-02-03
https://www.muckrock.com/news/archives/2014/feb/03/dea-parallel-construction-guides/
2014-02-04 21:17:54
attachment
DEA teaches agents to recreate evidence chains to hide methods | Muckrock
2014-02-04 21:17:55
https://www.muckrock.com/news/archives/2014/feb/03/dea-parallel-construction-guides/
text/html
utf-8
blogPost
Official Blog
Salgado
Richard
Shedding some light on Foreign Intelligence Surveillance Act (FISA) requests
2014-02-03
http://googleblog.blogspot.com/2014/02/shedding-some-light-on-foreign.html
2014-02-04 21:18:34
attachment
Snapshot
2014-02-04 21:18:34
http://googleblog.blogspot.com/2014/02/shedding-some-light-on-foreign.html
text/html
utf-8
webpage
Yahoo News
Braun
Stephen
US looks at ways to prevent spying on its spying
WASHINGTON (AP) — The U.S. government is looking at ways to prevent anyone from spying on its own surveillance of Americans' phone records.
2014-01-27
http://news.yahoo.com/us-looks-ways-prevent-spying-spying-201245107--finance.html
2014-02-04 21:19:19
attachment
Snapshot
2014-02-04 21:19:19
http://news.yahoo.com/us-looks-ways-prevent-spying-spying-201245107--finance.html
text/html
utf-8
webpage
RT
WikiLeaks, Greenwald blast Guardian journalist’s book on ‘FSB prisoner’ Snowden
Whistleblowing project WikiLeaks has excoriated a new book by Guardian foreign correspondent Luke Harding, who claims former NSA contractor Edward Snowden is being kept hostage by the Russian security agency, the FSB.
2014-02-04
http://rt.com/news/harding-book-snowden-prisoner-588/
2014-02-04 21:20:30
attachment
Snapshot
2014-02-04 21:20:30
http://rt.com/news/harding-book-snowden-prisoner-588/
text/html
utf-8
webpage
Ars Technica
Mullin
Joe
Google, Yahoo, Microsoft reveal how many accounts are snooped by gov’t
A little more detail on government's 0-999 info grabs from big tech companies.
2/3/2014
http://arstechnica.com/tech-policy/2014/02/google-yahoo-microsoft-reveal-how-many-accounts-are-snooped-by-govt/
2014-02-04 21:22:40
attachment
Snapshot
2014-02-04 21:22:40
http://arstechnica.com/tech-policy/2014/02/google-yahoo-microsoft-reveal-how-many-accounts-are-snooped-by-govt/
text/html
utf-8
webpage
The Institute of Art and Ideas
Biznazz
Noneya
Under Surveillance » IAI TV
2014-01-26
http://iainews.iai.tv/articles/under-surveillance-auid-298
2014-02-04 21:30:13
attachment
Under Surveillance » IAI TV
2014-02-04 21:30:14
http://iainews.iai.tv/articles/under-surveillance-auid-298
text/html
utf-8
blogPost
Microsoft - Technet
Smith
Brad
Providing additional transparency on US government requests for customer data - Microsoft on the Issues - Site Home - TechNet Blogs
2014-02-03
https://blogs.technet.com/b/microsoft_on_the_issues/archive/2014/02/03/providing-additional-transparency-on-us-government-requests-for-customer-data.aspx
2014-02-04 21:33:16
attachment
Providing additional transparency on US government requests for customer data - Microsoft on the Issues - Site Home - TechNet Blogs
2014-02-04 21:33:17
https://blogs.technet.com/b/microsoft_on_the_issues/archive/2014/02/03/providing-additional-transparency-on-us-government-requests-for-customer-data.aspx
text/html
utf-8
webpage
Tumblr
tumblr
national security issues
trnsprncy2013
Tumblr's Transparency Report
2014-02-03
http://transparency.tumblr.com/?og=1
2014-02-04 21:33:57
attachment
Snapshot
2014-02-04 21:33:57
http://transparency.tumblr.com/tagged/national-security-issues
text/html
utf-8
webpage
Rushing
Conrad
Tumblr Staff
You can now take extra precaution against hackers and snoops by enabling SSL security on your Tumblr Dashboard. Just head over to your Account Settings and flip the switch.
"Any reason I shouldn’t do...
2014-02-03
http://staff.tumblr.com/post/75482980993/you-can-now-take-extra-precaution-against-hackers
2014-02-04 21:35:09
attachment
Snapshot
2014-02-04 21:35:09
http://staff.tumblr.com/post/75482980993/you-can-now-take-extra-precaution-against-hackers
text/html
utf-8
blogPost
Emptywheel
Wheeler
Marcy
Were the 58-61,000 Internet Targets Part of NSA’s 73,000 Targets? | emptywheel
2014-02-03
http://www.emptywheel.net/2014/02/03/were-the-58-61000-internet-targets-part-of-nsas-73000-targets/
2014-02-04 21:36:32
attachment
Were the 58-61,000 Internet Targets Part of NSA’s 73,000 Targets? | emptywheel
2014-02-04 21:36:33
http://www.emptywheel.net/2014/02/03/were-the-58-61000-internet-targets-part-of-nsas-73000-targets/
text/html
utf-8
newspaperArticle
Tech
The Washington Post
ISSN 0190-8286
Timberg
Craig
Rein
Lisa
Senate cybersecurity report finds agencies often fail to take basic preventive measures
A study by GOP Senate staffers finds that federal officials repeatedly fail to take basic preventive actions.
2014-02-04
en-US
http://www.washingtonpost.com/business/technology/senate-cybersecurity-report-finds-agencies-often-fail-to-take-basic-preventive-measures/2014/02/03/493390c2-8ab6-11e3-833c-33098f9e5267_story.html
2014-02-04 21:39:10
washingtonpost.com
attachment
Washington Post Snapshot
2014-02-04 21:39:12
http://www.washingtonpost.com/business/technology/senate-cybersecurity-report-finds-agencies-often-fail-to-take-basic-preventive-measures/2014/02/03/493390c2-8ab6-11e3-833c-33098f9e5267_print.html
text/html
utf-8
webpage
Brewster
Tom
Cryptography Legend Quisquater: No Proof I Was Targeted By NSA Or GCHQ
2014-02-03
http://www.techweekeurope.co.uk/news/quisquater-nsa-gchq-malware-attacks-137990
2014-02-04 21:40:03
attachment
Cryptography Legend Quisquater: No Proof I Was Targeted By NSA Or GCHQ
2014-02-04 21:40:04
http://www.techweekeurope.co.uk/news/quisquater-nsa-gchq-malware-attacks-137990
text/html
utf-8
blogPost
Gigaom
Meyer
David
belgium
cryptography
GCHQ
Jean-Jacques Quisquater
NSA
Privacy
Surveillance
NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor
Jean-Jacques Quisquater says the Belgian federal police tipped him off that he had been hacked in an attack related to that on telco Belgacom, which fell victim to GCHQ last year.
2014-02-01
http://gigaom.com/2014/02/01/nsa-and-gchq-hacked-belgian-cryptographer-report/
2014-02-04 21:45:54
attachment
Snapshot
2014-02-04 21:45:54
http://gigaom.com/2014/02/01/nsa-and-gchq-hacked-belgian-cryptographer-report/
text/html
utf-8
blogPost
BGR
Kuittinen
Tero
NSA spying has triggered a crazy chain reaction of countermeasures
Countries ranging from France to Finland have started responding to NSA revelations in different ways, ranging from new fiber optic cables to government-backed industrial espionage. By 2015, some E...
2013-12-16
http://bgr.com/2013/12/16/nsa-spying-finland-fiber/
2014-02-04 21:47:03
attachment
Snapshot
2014-02-04 21:47:03
http://bgr.com/2013/12/16/nsa-spying-finland-fiber/
text/html
utf-8
webpage
Medium
Norton
Quinn
NSA Reform — Notes from a Strange World
The revelations, leaks, and laws of the last few years, from warrantless wiretapping and Edward Snowden to laws like SOPA, ACTA, and now…
2014-02-04
https://medium.com/quinn-norton/b9253a123859
2014-02-04 21:53:08
attachment
Snapshot
2014-02-04 21:53:08
https://medium.com/quinn-norton/b9253a123859
text/html
utf-8
blogPost
/dev/stdout
Zimmerle
Felipe
/dev/stdout: Exploring GSM Vulnerabilities to Assess Mobile Users' Location
2014-01-29
http://blog.zimmerle.org/2013/01/exploring-gsm-vulnerabilities-to-assess.html
2014-02-04 21:54:28
/dev/stdout
attachment
Snapshot
2014-02-04 21:54:28
http://blog.zimmerle.org/2013/01/exploring-gsm-vulnerabilities-to-assess.html
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
MacAskill
Ewen
Australia
Ban Ki-moon
espionage
Indonesia
Julie Bishop
Kevin Rudd
NSA
The NSA files
World news
NSA: Australia and US used climate change conference to spy on Indonesia
Australian agency helped carry out mass surveillance of hosts as Kevin Rudd walked world stage at 2007 Bali conference
2013-11-02T15:21EDT
en-GB
NSA
http://www.theguardian.com/world/2013/nov/02/nsa-australia-bali-conference-spy-indonesia
2014-02-04 21:56:05
The Guardian
attachment
Guardian Snapshot
2014-02-04 21:56:07
http://www.theguardian.com/world/2013/nov/02/nsa-australia-bali-conference-spy-indonesia
text/html
utf-8
webpage
De Standaard
Eeckhaut
Mark
Vanhecke
Nikolas
ENGLISH SUMMARY – Belgian professor in cryptography hacked
This is an English summary of an article published in today's edition of Belgian newspaper De Standaard. The article concerns the hacking of the computer o...
2014-02-01
http://www.standaard.be/cnt/dmf20140201_011
2014-02-04 21:58:09
attachment
Snapshot
2014-02-04 21:58:09
http://www.standaard.be/cnt/dmf20140201_011
text/html
utf-8
newspaperArticle
Environment
The Guardian
ISSN 0261-3077
Vidal
John
Goldenberg
Suzanne
Copenhagen climate change conference 2009
Edward Snowden
Environment
Global climate talks
NSA
United States
US national security
World news
Snowden revelations of NSA spying on Copenhagen climate talks spark anger
Documents leaked by Edward Snowden show NSA kept US negotiators abreast of their rivals' positions at 2009 summit
2014-01-30T12:54EST
en-GB
http://www.theguardian.com/environment/2014/jan/30/snowden-nsa-spying-copenhagen-climate-talks
2014-02-04 21:59:47
The Guardian
attachment
Guardian Snapshot
2014-02-04 21:59:49
http://www.theguardian.com/environment/2014/jan/30/snowden-nsa-spying-copenhagen-climate-talks
text/html
utf-8
webpage
ABC News
ABC News
Brazil
Dilma Rousseff
Edward Snowden
events
foreign news
general news
Government and Politics
Intelligence agencies
International news
Latin America and
Military and defense
national security
Nobel Prizes
South America
United States government
U.S. National Security Agency
World news
Brazilian Nominates Snowden for Nobel Peace Prize
A Brazilian senator has nominated National Security Agency contractor Edward Snowden for the 2014 Nobel Peace Prize. Sen. Vanessa Grazziotin heads the Senate panel investigating U.S. espionage in Brazil. She says in a Tuesday statement that Snowden's revelations contribute to a more "stable...
2014-02-04
http://abcnews.go.com/International/wireStory/brazilian-nominates-snowden-nobel-peace-prize-22363513
2014-02-04 22:33:38
attachment
Snapshot
2014-02-04 22:33:38
http://abcnews.go.com/International/wireStory/brazilian-nominates-snowden-nobel-peace-prize-22363513
text/html
utf-8
magazineArticle
The Nation
ISSN 0027-8378
Is Glenn Greenwald a Criminal?
http://www.thenation.com/blog/178228/glenn-greenwald-criminal
2014-02-04 22:39:33
The Nation
attachment
The Nation Snapshot
2014-02-04 22:39:35
http://www.thenation.com/print/blog/178228/glenn-greenwald-criminal
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Ackerman
Spencer
Edward Snowden
james clapper
Media
Newspapers & magazines
NSA
Obama administration
The NSA files
United States
US Congress
US House of Representatives
US politics
US press and publishing
Senior US congressman Mike Rogers: Glenn Greenwald 'a thief'
Rogers accused journalist of illegally selling NSA documentsCongressman is chairman of the House intelligence committee
2014-02-04T16:39EST
en-GB
Senior US congressman Mike Rogers
http://www.theguardian.com/world/2014/feb/04/us-congressman-mike-rogers-glenn-greenwald-thief-snowden-nsa?CMP=twt_fd&CMP=SOCxx2I2
2014-02-04 22:39:58
The Guardian
attachment
Guardian Snapshot
2014-02-04 22:40:00
http://www.theguardian.com/world/2014/feb/04/us-congressman-mike-rogers-glenn-greenwald-thief-snowden-nsa?CMP=twt_fd&CMP=SOCxx2I2
text/html
utf-8
magazineArticle
The Nation
ISSN 0027-8378
Niarchos
Nicolas
Has NSA Wiretapping Violated Attorney-Client Privilege?
February 4, 2014
http://www.thenation.com/article/178225/has-nsa-wiretapping-violated-attorney-client-privilege
2014-02-04 23:07:02
The Nation
attachment
The Nation Snapshot
2014-02-04 23:07:04
http://www.thenation.com/print/article/178225/has-nsa-wiretapping-violated-attorney-client-privilege
text/html
utf-8
webpage
MuckRock
Musgrave
Shawn
This method is so acceptable, the DEA won't even release its name | Muckrock
2014-02-04
https://www.muckrock.com/news/archives/2014/feb/04/method-so-acceptable-dea-cant-even-tell-you-its-na/
2014-02-05 17:37:09
attachment
This method is so acceptable, the DEA won't even release its name | Muckrock
2014-02-05 17:37:10
https://www.muckrock.com/news/archives/2014/feb/04/method-so-acceptable-dea-cant-even-tell-you-its-na/
text/html
utf-8
webpage
NBC News
Schone
Mark
Esposito
Richard
Cole
Matthew
Greenwald
Glenn
War on Anonymous: British Spies Attacked Hackers, Snowden Docs Show
A secret British spy unit created to mount cyber attacks on Britain’s enemies has waged war on the hacktivists of Anonymous and LulzSec, according to documen...
2014-02-04
War on Anonymous
http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361
2014-02-05 17:39:28
attachment
Snapshot
2014-02-05 17:39:28
http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361
text/html
utf-8
attachment
snowden_anonymous_nbc_document.pdf
2014-02-05 17:40:08
http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_anonymous_nbc_document.pdf
application/pdf
utf-8
webpage
World Policy Forum
Soldatov
Andrei
Borogan
Irina
Russia's Surveillance State | World Policy Institute
Fall 2013
http://www.worldpolicy.org/journal/fall2013/Russia-surveillance
2014-02-05 21:30:46
attachment
Russia's Surveillance State | World Policy Institute
2014-02-05 21:30:47
http://www.worldpolicy.org/journal/fall2013/Russia-surveillance
text/html
utf-8
webpage
Wired Opinion
Opinion
Wired
hacktivism
oh web we weave
politics
The New Snowden Revelation Is Dangerous for Anonymous — And for All of Us | Wired Opinion | Wired.com
Whether you agree with the activities of Anonymous or not -- there are many shades of gray around using DDoS attacks as a protest tactic -- the salient point is that democratic governments are now using their very tactics against them. The key difference, however, is that those involved in Anonymous can and have faced their day in court for those tactics ... while governments remain unchecked. And that power differential makes all the difference.
2014-02-04
http://www.wired.com/opinion/2014/02/comes-around-goes-around-latest-snowden-revelation-isnt-just-dangerous-anonymous-us/
2014-02-05 21:39:58
attachment
Snapshot
2014-02-05 21:39:58
http://www.wired.com/opinion/2014/02/comes-around-goes-around-latest-snowden-revelation-isnt-just-dangerous-anonymous-us/
text/html
utf-8
webpage
International Business Times
Jake Davis: Following Latest GCHQ Revelations, Who are the Real Criminals?
Following revelations that GCHQ used DDoS attacks against Anonymous, former LulzSec member Jake Davis asks "Who at the real criminals?"
2014-02-05
Jake Davis
http://www.ibtimes.co.uk/jake-davis-following-latest-gchq-revelations-who-are-real-criminals-1435193
2014-02-05 21:40:16
attachment
Snapshot
2014-02-05 21:40:16
http://www.ibtimes.co.uk/jake-davis-following-latest-gchq-revelations-who-are-real-criminals-1435193
text/html
utf-8
webpage
CSO
Ragan
Steve
Britain's GCHQ victimized Anonymous supporters with DDoS attack
The GCHQ broke their own nation's laws in order to target Anonymous
2014-02-05T03:43-05:00
http://blogs.csoonline.com/other/2976/britains-gchq-victimized-anonymous-supporters-ddos-attack
2014-02-05 21:46:48
attachment
Intelligence Services Act 1994
2014-02-05 21:46:57
http://www.legislation.gov.uk/ukpga/1994/13/section/3
application/xhtml+xml
utf-8
attachment
Snapshot
2014-02-05 21:46:48
http://blogs.csoonline.com/other/2976/britains-gchq-victimized-anonymous-supporters-ddos-attack
text/html
utf-8
webpage
Kovacs
Eduard
Edward Snowden
Enterprise Security
insider threat
report
ThreatTrack Security
Security Practices of Most Defense Contractors Impacted by Edward Snowden Incident
Ever since Edward Snowden pulled off what some call the biggest leak in history, defense contractors have started taking steps to ensure that the next...
2014-02-05
http://news.softpedia.com/news/Security-Practices-of-Most-Defense-Contractors-Impacted-by-Edward-Snowden-Incident-424123.shtml
2014-02-05 21:50:03
attachment
Snapshot
2014-02-05 21:50:03
http://news.softpedia.com/news/Security-Practices-of-Most-Defense-Contractors-Impacted-by-Edward-Snowden-Incident-424123.shtml
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Eddy
Melissa
Art
Berlin (Germany)
Cold War Era
Espionage and Intelligence Services
Germany
Graffiti
National Security Agency
Teufelsberg (Berlin, Germany)
United States Army
Where N.S.A. Kept Watch in Cold War, Artists Now Find Refuge
More than two decades after the United States pulled up its final cables from Field Station Berlin, the ruins of the complex still hold a mystical attraction for history buffs, artists and tourists.
2014-02-04
http://www.nytimes.com/2014/02/05/world/europe/where-nsa-kept-watch-in-cold-war-artists-now-find-refuge.html
2014-02-05 21:51:40
NYTimes.com
attachment
New York Times Snapshot
2014-02-05 21:51:40
http://www.nytimes.com/2014/02/05/world/europe/where-nsa-kept-watch-in-cold-war-artists-now-find-refuge.html
text/html
utf-8
blogPost
Privacy SOS
sosadmin
Former CIA director: In order to spy on domestic dissidents, just call them Terrorists | Privacy SOS
2014-01-31T00:00:00Z
http://privacysos.org/node/1318
2014-02-05 22:42:53
Former CIA director
attachment
Snapshot
2014-02-05 22:42:53
http://privacysos.org/node/1318
text/html
utf-8
magazineArticle
Foreign Policy
Berger
J. M.
War on Error
We're fighting al Qaeda like a terrorist group. They're fighting us as an army.
February 5, 2014
http://www.foreignpolicy.com/articles/2014/02/04/war_on_error_al_qaeda_terrorism
2014-02-05 22:55:35
Foreign Policy
attachment
Foreign Policy Snapshot
2014-02-05 22:55:37
http://www.foreignpolicy.com/articles/2014/02/04/war_on_error_al_qaeda_terrorism
text/html
utf-8
webpage
Freedom of the Press Foundation
Timm
Trevor
Mike Rogers' Comments Are Latest in Disturbing Pattern of Intelligence Officials Attacking the First Amendment
House Intelligence Committee chairman Rep. Mike Rogers (R-MI) accused a group of journalists of committing a crime yesterday, falsely stating at a committee hearing that NSA reporters are “selling” the leaked Snowden documents and are breaking the law.
2014-02-05
https://pressfreedomfoundation.org/blog/2014/02/mike-rogers-comments-are-latest-disturbing-pattern-intelligence-officials-attacking
2014-02-05 22:56:42
attachment
Snapshot
2014-02-05 22:56:42
https://pressfreedomfoundation.org/blog/2014/02/mike-rogers-comments-are-latest-disturbing-pattern-intelligence-officials-attacking
text/html
utf-8
webpage
TheHill
Swanson
Ian
Bob Goodlatte
House Judiciary
James Sensenbrenner
Jerrold Nadler
Jim Sensenbrenner
John Conyers
National Security Agency
NSA
Section 215
Panel to NSA: Change your ways — or else
Rep. Sensenbrenner warned the sweeping powers of the Patriot Act might not be renewed.
Text
2014-02-04T13:13-05:00
Panel to NSA
http://thehill.com/blogs/hillicon-valley/technology/197404-panel-nsa-powers-must-be-changed
2014-02-05 22:57:29
en-US
attachment
Snapshot
2014-02-05 22:57:29
http://thehill.com/blogs/hillicon-valley/technology/197404-panel-nsa-powers-must-be-changed?utm_content=buffer76e18&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
text/html
utf-8
magazineArticle
Foreign Policy
Drezner
Daniel
Tone-Deaf at the Listening Post
My day at the National Security Agency
headquarters at Fort Meade.
December 16, 2013
http://www.foreignpolicy.com/articles/2013/12/16/tone_deaf_at_the_listening_post_my_day_at_the_NSA
2014-02-05 22:58:47
Foreign Policy
attachment
Foreign Policy Snapshot
2014-02-05 22:58:49
http://www.foreignpolicy.com/articles/2013/12/16/tone_deaf_at_the_listening_post_my_day_at_the_NSA
text/html
utf-8
newspaperArticle
Politics
Stuff.co.nz
New Zealand
HEATHER
BEN
Move to alter privacy laws to help US
The Government wants to override privacy laws to supply the US Government with private details about Americans living in New Zealand.
Feb 04, 2014
English
Comments
http://www.stuff.co.nz/national/politics/9681670/Move-to-alter-privacy-laws-to-help-US
2014-02-05 23:00:11
Stuff.co.nz
attachment
Stuff.co.nz Snapshot
2014-02-05 23:00:11
http://www.stuff.co.nz/national/politics/9681670/Move-to-alter-privacy-laws-to-help-US
text/html
utf-8
newspaperArticle
Tech
The Washington Post
ISSN 0190-8286
Timberg
Craig
New surveillance technology can track everyone in an area for several hours at a time
Ohio company uses cameras on planes to monitor every vehicle and person in an area to help police.
2014-02-05
en-US
http://www.washingtonpost.com/business/technology/new-surveillance-technology-can-track-everyone-in-an-area-for-several-hours-at-a-time/2014/02/05/82f1556e-876f-11e3-a5bd-844629433ba3_story.html
2014-02-05 23:03:21
washingtonpost.com
attachment
Washington Post Snapshot
2014-02-05 23:03:23
http://www.washingtonpost.com/business/technology/new-surveillance-technology-can-track-everyone-in-an-area-for-several-hours-at-a-time/2014/02/05/82f1556e-876f-11e3-a5bd-844629433ba3_print.html
text/html
utf-8
webpage
Just Security
Jaffer
Jameel
“The NSA Doesn’t Spy On Americans”
A Forum on Law, Rights, and U.S. National Security
2014-02-05
http://justsecurity.org/2014/02/05/nsa-doesnt-spy-americans/
2014-02-05 23:04:27
attachment
Snapshot
2014-02-05 23:04:33
http://justsecurity.org/2014/02/05/nsa-doesnt-spy-americans/
text/html
utf-8
newspaperArticle
US
Wall Street Journal
ISSN 0099-9660
SMith
Rebecca
Assault on California Power Station Raises Alarm on Potential for Terrorism
A sniper attack in April that knocked out an electrical substation near San Jose, Calif., has raised fears that the country's power grid is vulnerable to terrorism.
2014-02-05T03:30:00.000Z
http://online.wsj.com/news/articles/SB10001424052702304851104579359141941621778?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702304851104579359141941621778.html
2014-02-05 23:04:48
Wall Street Journal
attachment
Wall Street Journal Snapshot
2014-02-05 23:04:51
http://online.wsj.com/news/articles/SB10001424052702304851104579359141941621778?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702304851104579359141941621778.html
text/html
utf-8
webpage
onthemedia
Goldman
Alex
analysis
Bob Garfield
Brooke Gladstone
Media
NPR
On The Media
public
radio
WNYC
The British Government DDOS'd Anonymous, and I Don't Think It's a Big Deal (UPDATED)
Update: Journalist Quinn Norton strongly disagreed with me on Twitter, so I asked her to write something about why she disagreed. I have attached her response to the bottom of the article. One of the favorite tools of the internet hacker/troll collective Anonymous is the denial of service attack, or DDOS. Basically it works by flooding a site with so many queries that it becomes overwhelmed, and the rest of the internet can't access it. I've compared it in the past to the online equivalent of a sit-in - when deployed correctly, it disrupts business but causes no lasting damage. According ...
2014-02-05
http://www.onthemedia.org/story/british-government-ddosd-anonymous-and-i-dont-think-its-big-deal/?utm_source=sharedUrl&utm_media=metatag&utm_campaign=sharedUrl
2014-02-05 23:09:06
attachment
Snapshot
2014-02-05 23:09:06
http://www.onthemedia.org/story/british-government-ddosd-anonymous-and-i-dont-think-its-big-deal/
text/html
utf-8
webpage
Ars Technica
Mullin
Joe
Senior Congressman calls Greenwald a “thief” who sold NSA documents
Greenwald: Tough talk aims to instill "climate of fear for journalism."
2/4/2014
http://arstechnica.com/tech-policy/2014/02/senior-congressman-calls-greenwald-a-thief-who-sold-nsa-documents/
2014-02-05 23:14:32
attachment
Snapshot
2014-02-05 23:14:32
http://arstechnica.com/tech-policy/2014/02/senior-congressman-calls-greenwald-a-thief-who-sold-nsa-documents/
text/html
utf-8
blogPost
PandoDaily
ago
Mark Ames a day
The first congressman to battle the NSA is dead. No-one noticed, no-one cares.
Last month, former Congressman Otis Pike died, and no one seemed to notice or care. That’s scary, because Pike led the House’s most intensive and threatening hearings into US intelligence community...
2/4/2014
http://pando.com/2014/02/04/the-first-congressman-to-battle-the-nsa-is-dead-no-one-noticed-no-one-cares/
2014-02-05 23:18:18
attachment
Snapshot
2014-02-05 23:18:18
http://pando.com/2014/02/04/the-first-congressman-to-battle-the-nsa-is-dead-no-one-noticed-no-one-cares/
text/html
utf-8
webpage
American Civil Liberties Union
Toomey
Patrick C.
Who Did the NSA's Illegal Spying Put in Jail?
Last week, the ACLU joined a constitutional challenge to the FISA Amendments Act of 2008 (FAA), the statute that allows the NSA to engage in dragnet surveillance of Americans' international phone calls and emails. With the Federal Defenders Office, we filed a motion on behalf of Jamshid ...
2014-02-05
https://www.aclu.org/blog/national-security/who-did-nsas-illegal-spying-put-jail
2014-02-06 16:40:45
attachment
Snapshot
2014-02-06 16:40:45
https://www.aclu.org/blog/national-security/who-did-nsas-illegal-spying-put-jail
text/html
utf-8
newspaperArticle
Lifestyle
The Washington Post
ISSN 0190-8286
Zimmer
Michael
Mark Zuckerberg’s theory of privacy
ESSAY | We can discern three principles that appear to be at the core of his philosophy of privacy.
2014-02-04
en-US
http://www.washingtonpost.com/lifestyle/style/mark-zuckerbergs-theory-of-privacy/2014/02/03/2c1d780a-8cea-11e3-95dd-36ff657a4dae_story.html
2014-02-06 16:42:38
washingtonpost.com
attachment
Washington Post Snapshot
2014-02-06 16:42:42
http://www.washingtonpost.com/lifestyle/style/mark-zuckerbergs-theory-of-privacy/2014/02/03/2c1d780a-8cea-11e3-95dd-36ff657a4dae_print.html
text/html
utf-8
blogPost
Fourth Estate Watch
fourthestatewatch
On NSA Reform & The Media: Have we Learned Nothing?
“POLITICS, noun—a strife of interests masquerading as a contest of principles. The conduct of public affairs for private advantage.” —Ambrose Bierce, The Devil’s Dictionary We’ve long since lost co...
2014-02-05
http://fourthestatewatch.com/2014/02/05/on-nsa-reform-the-media-have-we-learned-nothing/
2014-02-06 16:49:56
On NSA Reform & The Media
attachment
Snapshot
2014-02-06 16:49:56
http://fourthestatewatch.com/2014/02/05/on-nsa-reform-the-media-have-we-learned-nothing/
text/html
utf-8
blogPost
People's Blog for the Constitution
Berlin
Sarah
People's Blog for the Constitution » The intelligence-industrial complex and the persistence of mass surveillance
2014-02-03
http://www.constitutioncampaign.org/blog/?p=16317#.UvEiKRNdA-4.reddit
2014-02-07 17:19:55
en-US
attachment
Snapshot
2014-02-07 17:19:55
http://www.constitutioncampaign.org/blog/?p=16317#.UvEiKRNdA-4.reddit
text/html
utf-8
webpage
NPR.org
Peralta
Eyder
Lawmaker Says Snowden Leaks Will Cost Country 'Billions To Repair'
Lawmakers said most of the information taken by Edward Snowden had nothing to do with surveillance.
2014-02-05
http://www.npr.org/blogs/thetwo-way/2014/02/05/272151126/lawmaker-say-snowden-leaks-will-cost-country-billions-to-repair
2014-02-07 17:22:53
attachment
Snapshot
2014-02-07 17:22:53
http://www.npr.org/blogs/thetwo-way/2014/02/05/272151126/lawmaker-say-snowden-leaks-will-cost-country-billions-to-repair
text/html
utf-8
webpage
The Daily Beast
Lake
Eli
Edward Snowden
Google
U.S. News
U.S. Politics
World news
Yahoo
Snowden Keeps Outwitting U.S. Spies
A new assessment of the damage caused by his breach of classified U.S. intelligence networks looks catastrophic at first glance. But impressions can be deceiving.
02.06.14
http://www.thedailybeast.com/articles/2014/02/06/snowden-still-outwitting-u-s-spies.html
2014-02-07 17:26:05
attachment
Daily Beast Snapshot
2014-02-07 17:26:08
http://www.thedailybeast.com/articles/2014/02/06/snowden-still-outwitting-u-s-spies.print.html
text/html
utf-8
webpage
CNET
Nieva
Richard
apple
NSA
Privacy
Steve Wozniak
Wozniak criticizes cloud dependence in light of NSA
Apple's outspoken co-founder cuts to the chase on tech firms' cloud reliance: systems just aren't safe from spying eyes. Read this article by Richard Nieva on CNET News.
2014-02-05
http://news.cnet.com/8301-13579_3-57618399-37/wozniak-criticizes-cloud-dependence-in-light-of-nsa/
2014-02-07 17:26:47
attachment
Snapshot
2014-02-07 17:26:47
http://news.cnet.com/8301-13579_3-57618399-37/wozniak-criticizes-cloud-dependence-in-light-of-nsa/
text/html
utf-8
newspaperArticle
The Toronto Star
ISSN 0319-0781
Walkom
Thomas
Canada's electronic spy agency says it has the legal right to monitor all of us. The government agrees.
Canada's electronic spy agency says it has the legal right to monitor all of us. The government agrees.
Tue Feb 04 2014
http://www.thestar.com/news/canada/2014/02/04/canadas_notsosecret_plan_to_spy_on_everyone_walkom.html
2014-02-07 17:31:27
Toronto Star
attachment
Toronto Star Snapshot
2014-02-07 17:31:27
http://www.thestar.com/news/canada/2014/02/04/canadas_notsosecret_plan_to_spy_on_everyone_walkom.html
text/html
utf-8
webpage
QuakeNet
QuakeNet IRC Network- Article - PRESS RELEASE: IRC NETWORKS UNDER SYSTEMATIC ATTACK FROM GOVERNMENTS
2014-02-06
https://www.quakenet.org/articles/102-press-release-irc-networks-under-systematic-attack-from-governments
2014-02-07 17:32:39
attachment
QuakeNet IRC Network- Article - PRESS RELEASE: IRC NETWORKS UNDER SYSTEMATIC ATTACK FROM GOVERNMENTS
2014-02-07 17:32:40
https://www.quakenet.org/articles/102-press-release-irc-networks-under-systematic-attack-from-governments
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Letsch
Constanze
Censorship
Internet
technology
Turkey
World news
Turkey pushes through new raft of 'draconian' internet restrictions
New law requiring ISPs to make web user data available to authorities is threat to democracy, says opposition party
2014-02-06T06:49EST
en-GB
http://www.theguardian.com/world/2014/feb/06/turkey-internet-law-censorship-democracy-threat-opposition
2014-02-07 17:33:10
The Guardian
attachment
Guardian Snapshot
2014-02-07 17:33:12
http://www.theguardian.com/world/2014/feb/06/turkey-internet-law-censorship-democracy-threat-opposition
text/html
utf-8
blogPost
Souciant
Stoakes
Emanuel
Britain's Troubled Media
The Glenn Greenwald Interview
2014-02-06
http://bit.ly/1e5CNzI
2014-02-07 17:37:34
attachment
Snapshot
2014-02-07 17:37:34
http://souciant.com/2014/02/britains-troubled-media/
text/html
utf-8
webpage
Bloomberg
Carter
Stephen L.
Hackers Have Rights, Too
Why an anti-hacking operation called "Rolling Thunder" should worry us all.
Feb 7, 2014 9:00 AM ET
http://www.bloomberg.com/news/2014-02-06/hackers-have-rights-too.html
2014-02-07 17:39:23
attachment
Bloomberg Printable
2014-02-07 17:39:25
http://www.bloomberg.com/news/print/2014-02-06/hackers-have-rights-too.html
text/html
utf-8
webpage
NBC News
Cole
Matthew
Esposito
Richard
Schone
Mark
Greenwald
Glenn
Snowden Docs: British Spies Used Sex and 'Dirty Tricks'
British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing comp...
2014-02-07
Snowden Docs
http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091
2014-02-07 17:39:34
attachment
Snapshot
2014-02-07 17:39:34
http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091
text/html
utf-8
attachment
snowden_cyber_offensive1_nbc_document.pdf
2014-02-07 17:40:12
http://msnbcmedia.msn.com/i/msnbc/sections/news/snowden_cyber_offensive1_nbc_document.pdf
application/pdf
utf-8
webpage
Business Insider
Kelley
Michael
Defense
Features
Michael Kelley
Military
Tech
CIA Chief Tech Officer: Big Data Is The Future And We Own It
Soon "able to compute on all human generated information."
2013-03-21
CIA Chief Tech Officer
http://www.businessinsider.com/cia-presentation-on-big-data-2013-3
2014-02-07 17:40:50
attachment
Snapshot
2014-02-07 17:40:50
http://www.businessinsider.com/cia-presentation-on-big-data-2013-3?op=1#ixzz2scE8lGnN
text/html
utf-8
newspaperArticle
US
Wall Street Journal
ISSN 0099-9660
NSA Collects 20% or Less of U.S. Call Data
The National Security Agency's phone-data program has been described by lawmakers as collecting records on virtually every phone call placed in the U.S. In fact, it collects data for about 20% or less of that data.
2014-02-07T17:17:00.000Z
http://online.wsj.com/news/articles/SB10001424052702304680904579368831632834004?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702304680904579368831632834004.html
2014-02-07 17:59:35
Wall Street Journal
attachment
Wall Street Journal Snapshot
2014-02-07 17:59:37
http://online.wsj.com/news/articles/SB10001424052702304680904579368831632834004?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702304680904579368831632834004.html
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Nakashima
Ellen
NSA is collecting less than 30 percent of U.S. call data, officials say
The amount of phone records gathered has plummeted as cellphone use has increased.
2014-02-07
en-US
http://www.washingtonpost.com/world/national-security/nsa-is-collecting-less-than-30-percent-of-us-call-data-officials-say/2014/02/07/234a0e9e-8fad-11e3-b46a-5a3d0d2130da_story.html
2014-02-07 21:02:59
washingtonpost.com
attachment
Washington Post Snapshot
2014-02-07 21:03:01
http://www.washingtonpost.com/world/national-security/nsa-is-collecting-less-than-30-percent-of-us-call-data-officials-say/2014/02/07/234a0e9e-8fad-11e3-b46a-5a3d0d2130da_print.html
text/html
utf-8
webpage
American Civil Liberties Union
U.S. Considering Targeted Killing of American
FOR IMMEDIATE RELEASE
CONTACT: media@aclu.org
NEW YORK – The U.S. government is considering whether to kill an American abroad suspected of planning terrorist attacks, according to an article published today by The Associated Press. A separate story by The Intercept reported that the ...
2014-02-10
https://www.aclu.org/national-security/us-considering-targeted-killing-american
2014-02-10 20:57:04
attachment
Snapshot
2014-02-10 20:57:04
https://www.aclu.org/national-security/us-considering-targeted-killing-american
text/html
utf-8
webpage
Al Jazaara America
Harwood
Matthew
Edward Snowden
Law & Justice
NSA Leaks
Privacy
U.S.
The terrifying surveillance case of Brandon Mayfield | Al Jazeera America
2014-02-08
http://america.aljazeera.com/opinions/2014/2/the-terrifying-surveillancecaseofbrandonmayfield.html
2014-02-10 20:57:57
attachment
Snapshot
2014-02-10 20:57:57
http://america.aljazeera.com/opinions/2014/2/the-terrifying-surveillancecaseofbrandonmayfield.html
text/html
utf-8
webpage
Freedom of the Press Foundation
Leopold
Jason
NSA Refuses to Confirm or Deny Whether It Has Documents on Spy Program It Already Talked About
I’m getting a kick out of the letters the National Security Agency (NSA) has been sending me in response to my Freedom of Information Act (FOIA) requests. A couple of weeks ago, the NSA refused to release 156 pages of draft talking points the agency created in the wake of the Edward Snowden leak, citing a “grave threat” to national security if any portion of the documents were declassified and released. Now, the NSA is refusing to confirm or deny whether it has documents on a top-secret surveillance program the agency has acknowledged exists and discussed publicly.
2014-02-09
https://pressfreedomfoundation.org/blog/2014/02/nsa-refuses-confirm-or-deny-whether-it-has-documents-spy-program-it-already-talked
2014-02-10 20:58:50
attachment
Snapshot
2014-02-10 20:58:50
https://pressfreedomfoundation.org/blog/2014/02/nsa-refuses-confirm-or-deny-whether-it-has-documents-spy-program-it-already-talked
text/html
utf-8
webpage
IC ON THE RECORD
Clapper
James R.
PPD-28
proliferation
statement
terrorism
transnational crime
IC ON THE RECORD • List of Permissible Uses of Signals Intelligence...
List of Permissible Uses of Signals Intelligence Collected in Bulk
February 10, 2014
Presidential Policy Directive/PPD-28 – Signals Intelligence Activities establishes a process for determining the permissible uses of nonpublicly available signals intelligence that the United States collects in bulk. It also directs the Director of National Intelligence to “maintain a list of permissible uses of signals intelligence collected in bulk” and make the list “publicly available to the maximum extent feasible, consistent with the national security.”
Consistent with that directive, I am hereby releasing the current list of permissible uses of nonpublicly available signals intelligence that the United States collects in bulk.
Signals intelligence collected in “bulk” is defined as “the authorized collection of large quantities of signals intelligence data which, due to technical or operational considerations, is acquired without the use of discriminants (e.g., specific identifiers, selection terms, etc.).” As of Jan. 17, 2014, nonpublicly available signals intelligence collected by the United States in bulk may be used by the United States “only for the purposes of detecting and countering:
Espionage and other threats and activities directed by foreign powers or their intelligence services against the United States and its interests;
Threats to the United States and its interests from terrorism;
Threats to the United States and its interests from the development, possession, proliferation, or use of weapons of mass destruction;
Cybersecurity threats;
Threats to U.S. or allied Armed Forces or other U.S. or allied personnel; and
Transnational criminal threats, including illicit finance and sanctions evasion related to the other purposes named above.”
Further, as prescribed in PPD-28, “in no event may signals intelligence collected in bulk be used for the purpose of suppressing or burdening criticism or dissent; disadvantaging persons based on their ethnicity, race, gender, sexual orientation, or religion; affording a competitive advantage to U.S. companies and U.S. business sectors commercially;” or achieving any purpose other than those identified above.
James R. Clapper, Director of National Intelligence
2014-02-10
http://icontherecord.tumblr.com/post/76245354008/list-of-permissible-uses-of-signals-intelligence
2014-02-10 20:59:22
attachment
Snapshot
2014-02-10 20:59:22
http://icontherecord.tumblr.com/post/76245354008/list-of-permissible-uses-of-signals-intelligence
text/html
utf-8
blogPost
The Intercept
Scahill
Jeremy
Greenwald
Glenn
Drones
metadata
NSA
The NSA's Secret Role in the U.S. Assassination Program
The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people.
2014-02-10
https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/
2014-02-11 00:30:01
attachment
Snapshot
2014-02-11 00:30:01
https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Sanger
David E.
Schmitt
Eric
Classified Information and State Secrets
Computer Security
Cyberattacks and Hackers
National Security Agency
Snowden, Edward J
Surveillance of Citizens by Government
wikileaks
Snowden Used Low-Cost Tool to Best N.S.A.
Edward J. Snowden gathered National Security Agency secrets using cheap and widely available “web crawler” software, a breach that should have easily been detected, investigators say.
2014-02-08
http://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html
2014-02-11 00:36:25
NYTimes.com
attachment
New York Times Snapshot
2014-02-11 00:36:25
http://www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html
text/html
utf-8
newspaperArticle
Technology
The Guardian
ISSN 0261-3077
Kiss
Jemima
Drones
facebook
Google
google glass
Google Street View
Internet
Mark Zuckerberg
Media
Privacy
Privacy & the media
Social networking
technology
Worried about your privacy? Wait until the drones start stalking you
Google's Street View and Facebook push the private into the public. Now watch out for tiny flying cameras
2014-02-08
en-GB
Worried about your privacy?
http://www.theguardian.com/technology/2014/feb/09/privacy-concerns-google-streetview-facebook-drones?CMP=twt_gu
2014-02-11 00:36:53
The Guardian
attachment
Guardian Snapshot
2014-02-11 00:36:56
http://www.theguardian.com/technology/2014/feb/09/privacy-concerns-google-streetview-facebook-drones?CMP=twt_gu
text/html
utf-8
blogPost
Emptywheel
Wheeler
Marcy
NSA’s Latest Claim: It Only Gets 30% of “Substantially All” the Hay in the Haystack | emptywheel
2014-02-08
http://www.emptywheel.net/2014/02/08/nsas-latest-claim-it-only-gets-30-of-substantially-all-the-hay-in-the-haystack/
2014-02-11 00:38:13
attachment
NSA’s Latest Claim: It Only Gets 30% of “Substantially All” the Hay in the Haystack | emptywheel
2014-02-11 00:38:14
http://www.emptywheel.net/2014/02/08/nsas-latest-claim-it-only-gets-30-of-substantially-all-the-hay-in-the-haystack/
text/html
utf-8
webpage
Lowell
Abbe D.
Press statement by Abbe D. Lowell, Counsel to Stephen J. Kim
2014-02-07
https://dl.dropboxusercontent.com/u/61010074/AbbeLowell.txt
2014-02-11 00:39:46
attachment
2014-02-11 00:39:47
https://dl.dropboxusercontent.com/u/61010074/AbbeLowell.txt
text/plain
utf-8
webpage
POLITICO
Samuelsohn
Darren
EST
DYLAN BYERS | 2/7/14 5:03 AM EST Updated: 2/7/14 2:42 PM
Darren Samuelsohn and Dylan Byers
Edward Snowden
journalism
Media
National Security Agency
Surveillance
The Snowden era of journalism
Welcome to the Edward Snowden-era of national security journalism — a time when no scoop is too small, no detail too minor, and revelations about government surveillance pour forth on an almost daily basis. It’s a significant departure from the way things used to be. After Sept. 11, reporters and editors often heeded tremendous pressure...
2014-02-07
http://www.politico.com/story/2014/02/nsa-media-edward-snowden-103240.html
2014-02-11 00:41:12
attachment
Snapshot
2014-02-11 00:41:12
http://www.politico.com/story/2014/02/nsa-media-edward-snowden-103240.html
text/html
utf-8
newspaperArticle
Opinion
The New York Times
ISSN 0362-4331
Calame
Byron
Justice Department
National Security Agency
new york times
Behind the Eavesdropping Story, a Loud Silence
The New York Times's explanation of its decision to report, after what it said was a one-year delay, that the National Security Agency is eavesdropping domestically without court-approved warrants was woefully inadequate.
2006-01-01
http://www.nytimes.com/2006/01/01/opinion/01publiceditor.html
2014-02-11 16:37:20
NYTimes.com
attachment
New York Times Snapshot
2014-02-11 16:37:20
http://www.nytimes.com/2006/01/01/opinion/01publiceditor.html?pagewanted=print
text/html
windows-1252
webpage
RT
RT
Stallman: ‘We’ve got to limit surveillance to keep democracy’
We need to change a lot of things about digital technology so that they're not surveillance engines. The idea is that human rights should be respected in digital activities as in non-digital life, software freedom activist Richard Stallman told RT.
2014-02-06
Stallman
http://rt.com/op-edge/stallman-surveillance-keep-democracy-894/
2014-02-11 19:57:05
attachment
Snapshot
2014-02-11 19:57:05
http://rt.com/op-edge/stallman-surveillance-keep-democracy-894/
text/html
utf-8
webpage
Techdirt.
Masnick
Mike
Orwell Would Be Proud: NSA Defender Explains How Even Though NSA Spies On Americans, It's OK To Say They Don't | Techdirt
Benjamin Wittes of the Brooking Institution has become the go-to non-government NSA apologist. One of his most recent articles is a true work of rhetorical artistry, in which he tries to explain why saying "the NSA doesn't spy on...
2014-02-06
Orwell Would Be Proud
http://www.techdirt.com/articles/20140205/22492826105/orwell-would-be-proud-nsa-defender-explains-how-even-though-nsa-spies-americans-its-ok-to-say-they-dont.shtml
2014-02-11 19:58:13
attachment
Snapshot
2014-02-11 19:58:13
http://www.techdirt.com/articles/20140205/22492826105/orwell-would-be-proud-nsa-defender-explains-how-even-though-nsa-spies-americans-its-ok-to-say-they-dont.shtml
text/html
windows-1252
webpage
Liberty Crier
Queally
John
Drones
eye in the sky
Liberty Crier: Police State
police chief
Richard Biehl
total surveillance
Police Chief Richard Biehl: ‘I Want Them (You) To Be Worried We’re Watching… To Never Know When We’re Overhead.’
“I want them to be worried that we’re watching. I want them to be worried that they never know when we’re overhead.” That’s what Police Chief Richard Biehl of Dayton, Ohio told the Washington Post while referring to the people of his […]
2014-02-10
Police Chief Richard Biehl
http://libertycrier.com/police-chief-richard-biehl-want-worried-watching-never-know-overhead/
2014-02-11 20:03:58
attachment
Snapshot
2014-02-11 20:03:58
http://libertycrier.com/police-chief-richard-biehl-want-worried-watching-never-know-overhead/
text/html
utf-8
webpage
Bloomberg
the Editors
How U.S. Spying Is Killing Free Trade
All around the world, governments are devising creative ways to torment American technology companies. It started last year after leaks revealed that the U.S. government basically uses services like Google and Facebook as arms of the surveillance state. In response, some countries - - including Germany, Brazil and now France -- have toyed with the idea of forcing Internet companies to route traffic or store data locally.
Feb 9, 2014 6:00 PM ET
http://www.bloomberg.com/news/2014-02-09/how-u-s-spying-is-killing-free-trade.html
2014-02-11 20:10:48
attachment
Bloomberg Printable
2014-02-11 20:10:50
http://www.bloomberg.com/news/print/2014-02-09/how-u-s-spying-is-killing-free-trade.html
text/html
utf-8
webpage
American Civil Liberties Union
Stanley
Jay
Persistent Aerial Surveillance: Do We Want To Go There, America?
The Washington Post ran a story Thursday on a technology that I've been very concerned about for a while: persistent aerial surveillance. Specifically, it profiled a company, Persistent Surveillance Solutions, that has been deploying this panoptic video technology over American cities, a...
2014-02-07
Persistent Aerial Surveillance
https://www.aclu.org/blog/technology-and-liberty-national-security-free-speech/persistent-aerial-surveillance-do-we-want
2014-02-11 20:11:08
attachment
Snapshot
2014-02-11 20:11:08
https://www.aclu.org/blog/technology-and-liberty-national-security-free-speech/persistent-aerial-surveillance-do-we-want
text/html
utf-8
webpage
Pogue
David
American
Scientific
apple
Google
microsoft
Privacy
Salon.com
Scientific American
technology
The Cloud
user data
Why you shouldn’t trust your data to “the cloud”
In the guise of convenience, tech giants are making it harder to keep data between just you and your hard drive
2014-02-05
http://www.salon.com/2014/02/05/why_you_shouldnt_trust_your_data_to_the_cloud_partner/
2014-02-11 20:13:01
attachment
Snapshot
2014-02-11 20:13:01
http://www.salon.com/2014/02/05/why_you_shouldnt_trust_your_data_to_the_cloud_partner/
text/html
utf-8
webpage
Freedom of the Press Foundation
Timm
Trevor
Guilty Plea In Fox News Leak Case Shows Why Espionage Act Prosecutions Are Inherently Unfair to Sources
Former State Department official Stephen Kim announced today he will plead guilty to leaking classified information to Fox News journalist James Rosen and will serve 13 months in jail.
2014-02-07
https://pressfreedomfoundation.org/blog/2014/02/guilty-plea-fox-news-leak-case-shows-why-espionage-act-prosecutions-are-inherently
2014-02-11 20:17:00
attachment
Snapshot
2014-02-11 20:17:00
https://pressfreedomfoundation.org/blog/2014/02/guilty-plea-fox-news-leak-case-shows-why-espionage-act-prosecutions-are-inherently
text/html
utf-8
blogPost
Re/code
Cooley
Rob
ad targeting
ad value measurement
advertisers
commentary
data mining
digital privacy
general
Media
Mobile
NSA
online privacy
Privacy
Security
social
tracking
voices
website personalization
An Open Letter to Advertisers in the NSA Era
Dear advertisers, we are currently guilty by association.
2014-02-07
http://recode.net/2014/02/07/an-open-letter-to-advertisers-in-the-nsa-era/
2014-02-11 20:17:49
attachment
Snapshot
2014-02-11 20:17:49
http://recode.net/2014/02/07/an-open-letter-to-advertisers-in-the-nsa-era/
text/html
utf-8
webpage
Mother Jones
Chatterjee
Pratap
How hackers and software companies are beefing up NSA surveillance
Companies like Endgame Systems have for years sold information and digital loopholes to the NSA to help bolster spying.
2014-02-07
http://www.motherjones.com/politics/2014/02/tom-dispatch-nsa-surveillance-software-company-hacker
2014-02-11 20:22:41
attachment
How Hackers and Software Companies are Beefing Up NSA Surveillance | Mother Jones
2014-02-11 20:23:32
http://www.motherjones.com/politics/2014/02/tom-dispatch-nsa-surveillance-software-company-hacker?page=2
text/html
utf-8
attachment
Snapshot
2014-02-11 20:22:41
http://www.motherjones.com/politics/2014/02/tom-dispatch-nsa-surveillance-software-company-hacker?utm_content=buffer90687&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
text/html
utf-8
webpage
RT
RT
Google, Facebook, Microsoft hire first anti-NSA lobbyist in Washington
Technology powers like Apple and Google have coalesced to register a lobbyist in Washington to focus on government surveillance reform in an effort to maintain credibility following NSA spying disclosures that often implicated them as accomplices.
2014-02-07
http://rt.com/usa/surveillance-reform-technology-companies-101/
2014-02-11 20:24:13
attachment
Snapshot
2014-02-11 20:24:13
http://rt.com/usa/surveillance-reform-technology-companies-101/
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Savage
Charlie
Classified Information and State Secrets
Fox News Channel
Kim, Stephen Jin-Woo
News and News Media
North Korea
State Department
Ex-Contractor at State Dept. Pleads Guilty in Leak Case
Stephen J. Kim agreed to serve a 13-month prison sentence for leaking classified C.I.A. information on North Korea to a Fox News reporter.
2014-02-07
http://www.nytimes.com/2014/02/08/us/politics/ex-state-department-contractor-pleads-guilty-in-leak-case.html
2014-02-11 20:26:03
NYTimes.com
attachment
New York Times Snapshot
2014-02-11 20:26:03
http://www.nytimes.com/2014/02/08/us/politics/ex-state-department-contractor-pleads-guilty-in-leak-case.html?ref=us
text/html
utf-8
blogPost
JONATHAN TURLEY
Turley
Jonathan
House Members Renew Call For The Capture Of Snowden As "Traitor" and Spy
Members of Congress are shocked, shocked this week. No this Claude Rains moment was not over the hundreds of billions spent on unpopular wars or the creeping economy or the evisceration of civil li...
2014-02-07
http://jonathanturley.org/2014/02/07/house-members-renew-call-for-the-capture-of-snowden-as-traitor-and-spy/
2014-02-11 20:27:20
attachment
Snapshot
2014-02-11 20:27:20
http://jonathanturley.org/2014/02/07/house-members-renew-call-for-the-capture-of-snowden-as-traitor-and-spy/
text/html
utf-8
blogPost
The Intercept
Paglen
Trevor
New Photos of the NSA and Other Top Intelligence Agencies Revealed for First Time
What does a surveillance state look like?
Over the past eight months, classified documents provided by Edward Snowden have exposed scores of secret government surveillance programs. Yet there is little visual material among the blizzard of code names, PowerPoint slides, court rulings and spreadsheets that have emerged from the National Security Agency’s files.
2014-02-10
https://firstlook.org/theintercept/article/2014/02/10/new-photos-of-nsa-and-others/
2014-02-11 20:29:20
attachment
Snapshot
2014-02-11 20:29:20
https://firstlook.org/theintercept/article/2014/02/10/new-photos-of-nsa-and-others/
text/html
utf-8
webpage
ProPublica
Zivkovic
Yvonne
Burnett
David
You Know Who Else Collected Metadata? The Stasi
Files obtained from the archives of the East German secret police show how far technology of spycraft has come.
2014-02-11
You Know Who Else Collected Metadata?
http://www.propublica.org/article/how-the-stasi-spied-on-social-networks
2014-02-11 20:35:40
attachment
Snapshot
2014-02-11 20:35:40
http://www.propublica.org/article/how-the-stasi-spied-on-social-networks
text/html
utf-8
blogPost
Washington Post
Wemple
Erik
drone strikes
First Look Media
Glenn Greenwald
guardian
new york times
President Obama
Washington Post
Glenn Greenwald and the U.S. ‘assassination’ program
A disagreement on anti-terrorism terminology.
2014-02-10
http://www.washingtonpost.com/blogs/erik-wemple/wp/2014/02/10/glenn-greenwald-and-the-u-s-assassination-program/
2014-02-11 20:39:58
attachment
Snapshot
2014-02-11 20:39:58
http://www.washingtonpost.com/blogs/erik-wemple/wp/2014/02/10/glenn-greenwald-and-the-u-s-assassination-program/
text/html
utf-8
magazineArticle
Basken
Paul
Shunned as NSA Advisers, Academics Question Their Ties to the Agency
February 10, 2014
https://chronicle.com/article/Shunned-as-NSA-Advisers/144639/?key=TT93JQU5ZXVNNns1YD4RYDxUa3BkN011Y3IeYyohbl5UFw==
2014-02-11 20:41:59
The Chronicle of Higher Education
The Chronicle of Higher Education
ISSN 0009-5982
attachment
Chronicle of Higher Education Snapshot
2014-02-11 20:42:01
https://chronicle.com/article/Shunned-as-NSA-Advisers/144639/?key=TT93JQU5ZXVNNns1YD4RYDxUa3BkN011Y3IeYyohbl5UFw==
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
MacAskill
Ewen
Edward Snowden
NSA
Surveillance
United States
US national security
World news
Snowden plea bargain speculation played down by ex-CIA and NSA chief
Michael Hayden says he sees little appetite for deal with whistleblower, and portrays US surveillance reforms as limited
2014-02-10T18:36EST
en-GB
http://www.theguardian.com/world/2014/feb/10/edward-snowden-plea-bargain-cia-nsa?CMP=twt_gu
2014-02-11 20:43:13
The Guardian
attachment
Guardian Snapshot
2014-02-11 20:43:15
http://www.theguardian.com/world/2014/feb/10/edward-snowden-plea-bargain-cia-nsa?CMP=twt_gu
text/html
utf-8
webpage
TheHill
Richardson
Michelle
Reform the NSA now
The time for Congress to take on the National Security Agency has come. There’s nothing left to wait for.
Text
2014-02-10T16:00-05:00
http://thehill.com/blogs/congress-blog/civil-rights/197803-reform-the-nsa-now
2014-02-11 20:44:14
en-US
attachment
Snapshot
2014-02-11 20:44:14
http://thehill.com/blogs/congress-blog/civil-rights/197803-reform-the-nsa-now
text/html
utf-8
webpage
DW.DE
Appelbaum
data
FBI
intelligence
NSA
Obama
Security
Surveillance
Appelbaum: 'No belief that president has control' | World | DW.DE | 11.02.2014
Jacob Appelbaum is one of the leading US computer security activists and, along with Laura Poitras, a confidant of former NSA contractor Edward Snowden. DW spoke to Appelbaum about the NSA and living in exile.
2014-02-11
Appelbaum
http://www.dw.de/appelbaum-no-belief-that-president-has-control/a-17422189
2014-02-11 20:44:52
attachment
Appelbaum: 'No belief that president has control' | World | DW.DE | 11.02.2014
2014-02-11 20:47:43
http://www.dw.de/appelbaum-no-belief-that-president-has-control/a-17422189-2
text/html
utf-8
attachment
Appelbaum: 'No belief that president has control' | World | DW.DE | 11.02.2014
2014-02-11 20:47:46
http://www.dw.de/appelbaum-no-belief-that-president-has-control/a-17422189-2
text/html
utf-8
attachment
Snapshot
2014-02-11 20:44:52
http://www.dw.de/appelbaum-no-belief-that-president-has-control/a-17422189
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Richardson
Michelle
council
legislative
Civil liberties - international
Edward Snowden
NSA
Surveillance
Five surveillance myths stalling NSA reform, debunked
The Day We Fight Back deserves truth amidst the administration’s half-truths and trolling. From thwarted attacks (zero) to President Obama’s new rules (not good enough), this is what you need to know to make real reform happen
2014-02-11T13:13EST
en-GB
http://www.theguardian.com/commentisfree/2014/feb/11/surveillance-myths-nsa-reform-freedom-act
2014-02-11 20:50:41
The Guardian
attachment
Guardian Snapshot
2014-02-11 20:50:43
http://www.theguardian.com/commentisfree/2014/feb/11/surveillance-myths-nsa-reform-freedom-act
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
Monbiot
George
Counter-terrorism policy
Europe
George Orwell
Middle East and North Africa
politics
Spain
Syria
UK news
UK security and counter-terrorism
World news
Orwell was hailed a hero for fighting in Spain. Today he'd be guilty of terrorism
The International Brigades are acclaimed for bravery. But British citizens who fight in Syria are damned. If only they did it for the money
2014-02-10T15:30EST
en-GB
http://www.theguardian.com/commentisfree/2014/feb/10/orwell-hero-terrorism-syria-british-fighters-damned?CMP=twt_gu
2014-02-11 20:50:57
The Guardian
attachment
Guardian Snapshot
2014-02-11 20:50:59
http://www.theguardian.com/commentisfree/2014/feb/10/orwell-hero-terrorism-syria-british-fighters-damned?CMP=twt_gu
text/html
utf-8
webpage
Reynolds
Glenn Harlan
NSA spying undermines separation of powers: Column
The program makes it easy for the president to spy on and blackmail his enemies.
2014-02-10
NSA spying undermines separation of powers
http://www.usatoday.com/story/opinion/2014/02/10/nsa-spying-surveillance-congress-column/5340281/
2014-02-11 20:51:40
attachment
Snapshot
2014-02-11 20:51:40
http://www.usatoday.com/story/opinion/2014/02/10/nsa-spying-surveillance-congress-column/5340281/
text/html
utf-8
webpage
World Socialist Web Site
Van Auken
Bill
Angela Merkel
asylum
Edward Snowden
Europe
European Parliament
Greens
National Security Agency
NSA
Socialist Party
Spying
European Parliament kills call to protect Edward Snowden - World Socialist Web Site
The Obama administration and European governments exerted intense pressure on the parliamentary committee to excise all references to Snowden from a report on NSA spying.
2014-02-13
https://www.wsws.org/en/articles/2014/02/13/snow-f13.html
2014-02-14 18:48:30
attachment
Snapshot
2014-02-14 18:48:30
https://www.wsws.org/en/articles/2014/02/13/snow-f13.html
text/html
utf-8
newspaperArticle
Comment is free
The Guardian
ISSN 0261-3077
MacKinnon
Rebecca
Bing
china
Dalai Lama
Google
Internet
microsoft
NSA
World news
Where is Microsoft Bing's transparency report?
Bing's search algorithm is failing to protect online freedom of expression. Microsoft can – and should – do better on China
2014-02-14T09:45EST
en-GB
http://www.theguardian.com/commentisfree/2014/feb/14/micorsoft-bing-china-censorship-transparency
2014-02-14 20:48:30
The Guardian
attachment
Guardian Snapshot
2014-02-14 20:48:32
http://www.theguardian.com/commentisfree/2014/feb/14/micorsoft-bing-china-censorship-transparency
text/html
utf-8
newspaperArticle
World
Wall Street Journal
ISSN 0099-9660
U.S.-South Korea Communications Won't Use Huawei Gear
South Korea agreed to route sensitive U.S.-South Korea communications over a separate network, addressing U.S. concerns over using Chinese company Huawei's equipment.
2014-02-14T04:36:00.000Z
http://online.wsj.com/news/articles/SB10001424052702303704304579381742601220138?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702303704304579381742601220138.html
2014-02-14 20:53:52
Wall Street Journal
attachment
Wall Street Journal Snapshot
2014-02-14 20:53:55
http://online.wsj.com/news/articles/SB10001424052702303704304579381742601220138?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702303704304579381742601220138.html
text/html
utf-8
webpage
Bits Blog
Perlroth
Nicole
Computers and the Internet
National Security Agency
Reform Government Surveillance
Surveillance of Citizens by Government
The Day the Internet Didn't Fight Back
A call for protests against the National Security Agency surveillance was largely ignored by big Internet companies.
2014-02-11
http://bits.blogs.nytimes.com/2014/02/11/the-day-the-internet-didnt-fight-back/
2014-02-20 19:02:34
attachment
Snapshot
2014-02-20 19:02:34
http://bits.blogs.nytimes.com/2014/02/11/the-day-the-internet-didnt-fight-back/?_php=true&_type=blogs&_php=true&_type=blogs&_php=true&_type=blogs&_r=2
text/html
utf-8
newspaperArticle
Technology
BBC
Huawei under closer UK scrutiny
The UK government has decided to give its intelligence agency GCHQ greater scrutiny of Chinese telecom firm Huawei.
2013/12/17
http://www.bbc.co.uk/news/technology-25417332
2014-02-20 19:36:13
bbc.co.uk
attachment
BBC News Snapshot
2014-02-20 19:36:15
http://www.bbc.co.uk/news/technology-25417332
text/html
utf-8
webpage
The Washingtion Times
Rogers
Mike
LETTER TO THE EDITOR: Leaking security information imperils lives
Like Andrew P. Napolitano, I cherish the First Amendment and the freedom of the press. However, Mr. Napolitano, a former judge, would do well to remember the words of another distinguished jurist, Justice Robert H. Jackson: The Bill of Rights is not a “suicide pact.”
2014-02-19
Leaking security information imperils lives
http://www.washingtontimes.com/news/2014/feb/19/letter-to-the-editor-leaking-security-information-/
2014-02-20 21:31:49
attachment
Snapshot
2014-02-20 21:31:49
http://p.washingtontimes.com/news/2014/feb/19/letter-to-the-editor-leaking-security-information-/
text/html
utf-8
newspaperArticle
Reuters
Ankara
Coskun
Orhan
Abdullah Gul
Barack Obama
Bulent Arinc
Engin Altay
Fethullah Gulen
Hakan Fidan
Tayyip Erdogan
Turkey
United States
Turkey's embattled Erdogan seeks wider powers for spy agency
ANKARA (Reuters) - Battling a corruption scandal, Turkish Prime Minister Tayyip Erdogan is seeking broader powers for his intelligence agency, including more scope for eavesdropping and legal immunity
Thu Feb 20 17:35:26 UTC 2014
http://www.reuters.com/article/2014/02/20/us-turkey-government-idUSBREA1J0S820140220
2014-02-20 21:32:25
Reuters
attachment
Snapshot
2014-02-20 21:32:25
http://www.reuters.com/article/2014/02/20/us-turkey-government-idUSBREA1J0S820140220
text/html
utf-8
webpage
Sibel Edmonds' Boiling Frogs
Edmonds
Sibel
DNI James Clapper: Mission Accomplished!
The US Should Have Told Americans They Were Being Surveilled Right from The Start After all the brouhaha and media sensationalism surrounding the NSA’s spy-on-all-and-everything operations the Unit...
2014-02-18
DNI James Clapper
http://www.boilingfrogspost.com/2014/02/18/dni-james-clapper-mission-accomplished/
2014-02-20 21:34:33
attachment
Snapshot
2014-02-20 21:34:33
http://www.boilingfrogspost.com/2014/02/18/dni-james-clapper-mission-accomplished/
text/html
utf-8
newspaperArticle
The New York Times
ISSN 0362-4331
Sanger
David E.
Schmitt
Eric
Clapper, James R Jr
Classified Information and State Secrets
Computers and the Internet
Computer Security
National Security Agency
Security and Warning Systems
Senate Committee on Armed Services
Snowden, Edward J
Surveillance of Citizens by Government
Spy Chief Says Snowden Took Advantage of ‘Perfect Storm’ of Security Lapses
James R. Clapper Jr., the director of national intelligence, said the technology was not yet fully in place to prevent another insider from stealing top-secret data, as Edward J. Snowden did.
2014-02-11
http://www.nytimes.com/2014/02/12/us/politics/spy-chief-says-snowden-took-advantage-of-perfect-storm-of-security-lapses.html
2014-02-20 21:40:33
NYTimes.com
attachment
New York Times Snapshot
2014-02-20 21:40:33
http://www.nytimes.com/2014/02/12/us/politics/spy-chief-says-snowden-took-advantage-of-perfect-storm-of-security-lapses.html?_r=0&referrer=
text/html
utf-8
webpage
The Wire
Bump
Philip
aggregation
Business
entertainment
global
national
news
opinion
politics
technology
The Wire
TheWire.com
Rand Paul Sues the NSA in the Most Elaborate Email Collection Scheme in History
Sen. Rand Paul will on Wednesday announce a class action suit against the NSA for scooping up Americans' telephone call data. Want to join in? Just give Paul your email address.
2/12/2014
http://www.thewire.com/politics/2014/02/rand-paul-sues-nsa-most-elaborate-email-collection-scheme-history/357986/
2014-02-20 21:41:22
attachment
Snapshot
2014-02-20 21:41:22
http://www.thewire.com/politics/2014/02/rand-paul-sues-nsa-most-elaborate-email-collection-scheme-history/357986/
text/html
utf-8
blogPost
Daily Kos
Radack
Jesselyn
Clapper's Spin Unravels in Congressional Testimony: Cannot Keep His Story Straight on Snowden
While thousands of Americans called and e-mailed Congress to object to the National Security Agency's (NSA) mass surveillance operations during yesterday's " Day We Fight Back, " Director of ...
2014-02-12
http://www.dailykos.com/story/2014/02/12/1276966/-Clapper-s-Spin-Unravels-in-Congressional-Testimony-Cannot-Keep-His-Story-Straight-on-Snowden
2014-02-20 21:41:31
en
Clapper's Spin Unravels in Congressional Testimony
attachment
Snapshot
2014-02-20 21:41:31
http://www.dailykos.com/story/2014/02/12/1276966/-Clapper-s-Spin-Unravels-in-Congressional-Testimony-Cannot-Keep-His-Story-Straight-on-Snowden
text/html
utf-8
blogPost
The Citizen Lab
Marczak
Bill
Guarnieri
Claudio
Marquis-Boire
Morgan
Scott-Railton
John
Ethiopia
Hacking Team
Hacking Team and the Targeting of Ethiopian Journalists
In this report, we identified instances where Ethiopian journalist group was targeted with spyware by Milan-based Hacking Team.
2014-02-12
https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/
2014-02-20 21:44:44
attachment
Snapshot
2014-02-20 21:44:44
https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/
text/html
utf-8
blogPost
The Citizen Lab
Marczak
Bill
Guarnieri
Claudio
Marquis-Boire
Morgan
Scott-Railton
John
Hacking Team
Mapping Hacking Team’s “Untraceable” Spyware
The second in a series of posts that focus on the global proliferation and use of Hacking Team RCS spyware, which is sold exclusively to governments.
2014-02-17
https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/
2014-02-20 21:45:39
attachment
Snapshot
2014-02-20 21:45:39
https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/
text/html
utf-8
webpage
POLITICO
Romm
Tony
Congress
Cyber Attacks
cybersecurity
hackers
Privacy
technology
Tony Romm
White House
Cybersecurity in slow lane one year after Obama order
Nearly a year after President Barack Obama issued an executive order to improve the cybersecurity of the nation’s vital assets, the administration doesn’t have much to show: The government is about to produce only some basic standards, with little incentive for the private sector to participate. The program’s early weaknesses are...
2014-02-09
http://www.politico.com/story/2014/02/cybersecurity-in-slow-lane-one-year-after-obama-order-103307.html
2014-02-20 21:48:57
attachment
Snapshot
2014-02-20 21:48:57
http://www.politico.com/story/2014/02/cybersecurity-in-slow-lane-one-year-after-obama-order-103307.html
text/html
utf-8
webpage
POLITICO
Romm
Tony
Barack Obama
cybersecurity
Tony Romm
White House
White House unveils cyber plan, implores Congress
The White House on Wednesday unveiled its best effort at a blueprint for power plants, top banks and other vital infrastructure to improve their cybersecurity, along with a message for Congress: Get it together. The program — commissioned by President Barack Obama through an executive order signed exactly one year ago to the day — steers...
2014-02-12
http://www.politico.com/story/2014/02/white-house-releases-cyber-guidance-103442.html
2014-02-20 21:49:23
attachment
Snapshot
2014-02-20 21:49:23
http://www.politico.com/story/2014/02/white-house-releases-cyber-guidance-103442.html?hp=l4
text/html
utf-8
webpage
USA Department of Defense
Garamone
Jim
Defense.gov News Article: Special Ops Forces in Transition, Pentagon Official Says
2014-02-12
http://www.defense.gov/news/newsarticle.aspx?id=121651
2014-02-20 21:50:47
attachment
Defense.gov News Article: Special Ops Forces in Transition, Pentagon Official Says
2014-02-20 21:50:48
http://www.defense.gov/news/newsarticle.aspx?id=121651
text/html
utf-8
newspaperArticle
Tech
The Washington Post
ISSN 0190-8286
Timberg
Craig
Foreign regimes use spyware against journalists, even in U.S.
The burgeoning surveillance industry is putting potent tools in the hands of intelligence services worldwide.
2014-02-13
en-US
http://www.washingtonpost.com/business/technology/foreign-regimes-use-spyware-against-journalists-even-in-us/2014/02/12/9501a20e-9043-11e3-84e1-27626c5ef5fb_story.html
2014-02-20 21:51:19
washingtonpost.com
attachment
Washington Post Snapshot
2014-02-20 21:51:33
http://www.washingtonpost.com/business/technology/foreign-regimes-use-spyware-against-journalists-even-in-us/2014/02/12/9501a20e-9043-11e3-84e1-27626c5ef5fb_print.html
text/html
utf-8
newspaperArticle
Soar
Daniel
Incendiary Devices
20 February 2014
9-10
http://www.lrb.co.uk/v36/n04/daniel-soar/incendiary-devices
2014-02-20 21:51:39
London Review of Books
London Review of Books
ISSN 0260-9592
attachment
LRB Printable
2014-02-20 21:51:41
http://www.lrb.co.uk/v36/n04/daniel-soar/incendiary-devices
text/html
utf-8
blogPost
Washington Post
Fung
Brian
Obama’s big plan to protect businesses from cyberattack
The new guidelines come a year after a White House executive order on the cyber-defense of critical infrastructure.
2014-02-12
http://www.washingtonpost.com/blogs/the-switch/wp/2014/02/12/obamas-big-plan-to-protect-businesses-from-cyberattack/
2014-02-20 21:57:05
attachment
Snapshot
2014-02-20 21:57:05
http://www.washingtonpost.com/blogs/the-switch/wp/2014/02/12/obamas-big-plan-to-protect-businesses-from-cyberattack/
text/html
utf-8
webpage
The Atlantic
Schneier
Bruce
Everything We Know About How the NSA Tracks People's Physical Location
With Monday's new revelation, we can see the NSA's two-pronged system for finding out where people are.
Feb 11 2014, 1:00 PM ET
http://www.theatlantic.com/technology/archive/2014/02/everything-we-know-about-how-the-nsa-tracks-peoples-physical-location/283745/
2014-02-20 21:58:43
attachment
The Atlantic Print View
2014-02-20 21:58:45
http://www.theatlantic.com/technology/print/2014/02/everything-we-know-about-how-the-nsa-tracks-peoples-physical-location/283745/
text/html
utf-8
blogPost
The Intercept
Greenwald
Glenn
Clapper Reads From the Bush/Cheney/Nixon Playbook to Fear-Monger Over Transparency
James Clapper, President Obama's top national security official, is probably best known for having been caught lying outright to Congress about NSA activities, behavior which (as some baseball players found out) happens to be a felony under federal law.
2014-02-12
https://firstlook.org/theintercept/2014/02/12/james-clapper-says-transparency-helps-terrorists-like/
2014-02-20 22:00:50
attachment
Snapshot
2014-02-20 22:00:50
https://firstlook.org/theintercept/2014/02/12/james-clapper-says-transparency-helps-terrorists-like/
text/html
utf-8
blogPost
Missing M
Lund
Joshua
Fighting DISHFIRE: The State of Mobile, Cross-Platform, Encrypted Messaging | MissingM
2014-02-11
http://missingm.co/2014/02/fighting-dishfire-the-state-of-mobile-cross-platform-encrypted-messaging/
2014-02-20 22:02:01
Fighting DISHFIRE
attachment
Snapshot
2014-02-20 22:02:01
http://missingm.co/2014/02/fighting-dishfire-the-state-of-mobile-cross-platform-encrypted-messaging/
text/html
utf-8
webpage
NBC News
Isikoff
Michael
Exclusive: Snowden Swiped Password From NSA Coworker
A civilian NSA employee recently resigned after being stripped of his security clearance for allowing former agency contractor Edward Snowden to use his pers...
2014-02-12
Exclusive
http://www.nbcnews.com/news/investigations/exclusive-snowden-swiped-password-nsa-coworker-n29006
2014-02-20 22:03:02
attachment
Snapshot
2014-02-20 22:03:02
http://www.nbcnews.com/news/investigations/exclusive-snowden-swiped-password-nsa-coworker-n29006
text/html
utf-8
webpage
FoxNews.com
Napolitano
Judge Andrew P.
Civil Liberties
FBI
First Amendment
FISA
Foreign Intelligence Surveillance
new york times
the nation
the Pentagon
United States
A new assault on freedom of the press
Last week, a little noticed clash took place on Capitol Hill involving the fundamental values underlying the First Amendment.
Text.Article
2014-02-13
http://www.foxnews.com/opinion/2014/02/13/new-assault-on-freedom-press/
2014-02-20 22:06:04
en-US
Last week, a little noticed clash took place on Capitol Hill involving the fundamental values underlying the First Amendment.
attachment
Snapshot
2014-02-20 22:06:04
http://www.foxnews.com/opinion/2014/02/13/new-assault-on-freedom-press/
text/html
utf-8
newspaperArticle
World news
The Guardian
ISSN 0261-3077
Pilkington
Ed
Chelsea Manning (formerly Bradley Manning)
Edward Snowden
Media
Newspapers
Newspapers & magazines
NSA
Obama administration
Privacy
Privacy & the media
Surveillance
United States
US politics
US press and publishing
NSA actions pose 'direct threat to journalism' leading watchdog warns
Agency’s dragnet of communications data threatens to destroy the confidence between reporter and source on which most investigations depend, Committee to Protect Journalists said
2014-02-12T18:24EST
en-GB
http://www.theguardian.com/world/2014/feb/12/nsa-direct-threat-journalism-cpj-report
2014-02-20 22:06:18
The Guardian
attachment
Guardian Snapshot
2014-02-20 22:06:20
http://www.theguardian.com/world/2014/feb/12/nsa-direct-threat-journalism-cpj-report
text/html
utf-8
webpage
The Atlantic
Friedersdorf
Conor
Behold the Selective Outrage Over National-Security Leaks
Whistleblowers are hounded for exposing classified information, but national-security insiders are allowed to do so with impunity.
Feb 13 2014, 7:00 AM ET
http://www.theatlantic.com/politics/archive/2014/02/behold-the-selective-outrage-over-national-security-leaks/283799/
2014-02-20 22:06:33
attachment
The Atlantic Print View
2014-02-20 22:06:35
http://www.theatlantic.com/politics/print/2014/02/behold-the-selective-outrage-over-national-security-leaks/283799/
text/html
utf-8
webpage
Counter Punch
Knapp
Thomas L.
The US’s Long and Sordid HIstory of Persecuting Journalists » CounterPunch: Tells the Facts, Names the Names
2014-02-13
http://www.counterpunch.org/2014/02/13/the-uss-long-and-sordid-history-of-persecuting-journalists/
2014-02-20 22:07:11
attachment
The US’s Long and Sordid HIstory of Persecuting Journalists » CounterPunch: Tells the Facts, Names the Names
2014-02-20 22:07:12
http://www.counterpunch.org/2014/02/13/the-uss-long-and-sordid-history-of-persecuting-journalists/
text/html
utf-8
webpage
Techdirt.
Cushing
Tim
District Court Says DEA's Warrantless Access Of Oregon's Prescription Database Is Unconstitutional | Techdirt
Early last year, the news surfaced that the DEA was bypassing Oregon state law by using administrative subpoenas to get around the state's warrant requirement for drug prescription database access. "Administrative subpoenas" are yet...
2014-02-13
http://www.techdirt.com/articles/20140212/10133626198/district-court-says-deas-warrantless-access-oregons-prescription-database-is-unconstitutional.shtml
2014-02-20 22:08:24
attachment
Snapshot
2014-02-20 22:08:24
http://www.techdirt.com/articles/20140212/10133626198/district-court-says-deas-warrantless-access-oregons-prescription-database-is-unconstitutional.shtml
text/html
windows-1252
blogPost
People's Blog for the Constitution
Sun
Rivera
People's Blog for the Constitution » Love Letters to the NSA
2014-02-14
http://www.constitutioncampaign.org/blog/?p=16425&utm_source=twitterfeed&utm_medium=twitter
2014-02-20 22:13:15
attachment
Snapshot
2014-02-20 22:13:15
http://www.constitutioncampaign.org/blog/?p=16425&utm_source=twitterfeed&utm_medium=twitter
text/html
utf-8
webpage
McAllister
Neil
Angela Merkel: Let US spies keep their internet. The EU will build its own
German Chancellor will talk data networks and privacy with Hollande this week
2014-02-17
Angela Merkel
http://www.theregister.co.uk/2014/02/17/angela_merkel_eu_internet_nsa_us/
2014-02-20 22:15:49
attachment
Snapshot
2014-02-20 22:15:49
http://www.theregister.co.uk/2014/02/17/angela_merkel_eu_internet_nsa_us/
text/html
utf-8
newspaperArticle
World
The Washington Post
ISSN 0190-8286
Goldman
Adam
Senior al-Qaeda figure leaves Iran amid a series of departures by terrorist suspects
Thirwat Shihata, an Egyptian close to al-Qaeda’s leader, may now be in Libya, officials said.
2014-02-15
en-US
http://www.washingtonpost.com/world/national-security/senior-al-qaeda-figure-leaves-iran-amid-a-series-of-departures-by-terrorist-suspects/2014/02/14/b3291eda-9429-11e3-83b9-1f024193bb84_story.html
2014-02-20 22:16:39
washingtonpost.com
attachment
Al-Qaeda figures or associates linked to Iran - The Washington Post
2014-02-20 22:16:45
http://apps.washingtonpost.com/g/page/world/al-qaeda-figures-or-associates-linked-to-iran/810/
text/html
utf-8
attachment
Washington Post Snapshot
2014-02-20 22:16:41
http://www.washingtonpost.com/world/national-security/senior-al-qaeda-figure-leaves-iran-amid-a-series-of-departures-by-terrorist-suspects/2014/02/14/b3291eda-9429-11e3-83b9-1f024193bb84_print.html
text/html
utf-8
blogPost
The Intercept
Greenwald
Glenn
Gallagher
Ryan
Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters
Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution.
2014-02-18
https://firstlook.org/theintercept/article/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/
2014-02-20 22:17:37
attachment
Snapshot
2014-02-20 22:17:37
https://firstlook.org/theintercept/article/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/
text/html
utf-8
webpage
US. Government Funded Your Favorite 'NSA-Proof' Apps
2014-04-06
http://revolution-news.com/us-government-funds-favorite-nsa-proof-apps/
2014-04-10
attachment
US. Government Funded Your Favorite 'NSA-Proof' Apps
text/html
utf-8
webpage
Eric Holder Admits That, If It Wanted, NSA Could Collect Internet Searches & Emails Just Like Phone Metadata \textbar Techdirt
http://www.techdirt.com/articles/20140408/16081926843/eric-holder-admits-that-if-it-wanted-nsa-could-collect-internet-searches-emails-just-like-phone-metadata.shtml
2014-04-10
attachment
Eric Holder Admits That, If It Wanted, NSA Could Collect Internet Searches & Emails Just Like Phone Metadata | Techdirt
text/html
windows-1252
webpage
Wright
Joe
Activist Post: NYPD Ends Surveillance of Muslims; Shifts to Surveillance of Everyone
2014-04-16
http://www.activistpost.com/2014/04/nypd-ends-surveillance-of-muslims.html?m=1
2014-04-17
attachment
Activist Post: NYPD Ends Surveillance of Muslims; Shifts to Surveillance of Everyone
text/html
utf-8
webpage
Silver
Joe
Lavabit held in contempt of court for printing crypto key in tiny font [Updated] \textbar Ars Technica
2014-04-16
http://arstechnica.com/tech-policy/2014/04/lavabit-held-in-contempt-of-court-for-printing-crypto-key-in-tiny-font/
2014-04-17
attachment
Lavabit held in contempt of court for printing crypto key in tiny font [Updated] | Ars Technica
text/html
utf-8
webpage
Gross
Doug
'Kill switch' will come to U.S. phones in 2015 - CNN.com
2014-04-16
http://www.cnn.com/2014/04/16/tech/mobile/ctia-phone-kill-switch/
2014-04-17
attachment
'Kill switch' will come to U.S. phones in 2015 - CNN.com
text/html
utf-8
webpage
Garzik
Jeff
Random blatherings by Jeff: Cost of a DIY NSA?
2014-04-17
http://garzikrants.blogspot.com/2014/04/cost-of-diy-nsa.html
2014-04-17
attachment
Random blatherings by Jeff: Cost of a DIY NSA?
text/html
utf-8
webpage
Cooper
Paul
Newspaper tycoon: Google is building a superstate that threatens the future of Europe \textbar ITProPortal.com
2014-04-17
http://www.itproportal.com/2014/04/17/newspaper-tycoon-google-is-building-a-superstate-that-threatens-the-future-of-europe/
2014-04-17
attachment
Newspaper tycoon: Google is building a superstate that threatens the future of Europe | ITProPortal.com
text/html
utf-8
webpage
Cooper
Daniel
There'll be no escape from the FBI's new facial recognition system
2014-04-15
http://www.engadget.com/2014/04/15/eff-fbi-ngi-facial-recognition-program-launches-summer/?ncid=txtlnkusaolp00000589
2014-04-17
attachment
There'll be no escape from the FBI's new facial recognition system
text/html
utf-8
webpage
Vilkas
Gediminas
Parliament supports life-saving eCall system in cars
2014-02-26
http://www.europarl.europa.eu/news/en/news-room/content/20140224IPR36860/html/Parliament-supports-life-saving-eCall-system-in-cars
2014-04-17
attachment
Parliament supports life-saving eCall system in cars
text/html
utf-8
journalArticle
Keys
Matthew
James Clapper Says Snowden Didn't Warn NSA Before Leaks \textbar TheBlot
http://theblot.com/snowden-bypass-nsa-warnings-ignored-7718249
2014-04-17
attachment
James Clapper Says Snowden Didn't Warn NSA Before Leaks | TheBlot
text/html
utf-8
webpage
Cushing
Tim
The FBI's Facial Recognition Database Combines Lo-Res Photos With Zero Civil Liberties Considerations \textbar Techdirt
2014-04-15
http://www.techdirt.com/articles/20140414/16045126909/fbis-facial-recognition-database-combines-lo-res-photos-with-zero-civil-liberties-considerations.shtml
2014-04-17
attachment
The FBI's Facial Recognition Database Combines Lo-Res Photos With Zero Civil Liberties Considerations | Techdirt
text/html
windows-1252
journalArticle
Goel
Vindu
Facebook Requires Users to Install Separate Messaging App - NYTimes.com - NYTimes.com
2014-04-15
http://bits.blogs.nytimes.com/2014/04/15/facebook-forces-users-to-install-separate-messaging-app/?_php=true&_type=blogs&_r=0
2014-04-17
attachment
Facebook Requires Users to Install Separate Messaging App - NYTimes.com - NYTimes.com
text/html
utf-8
webpage
Nagar
Mira
So schützen Sie Ihre Daten vor Google \textbar shz.de
2014-04-11
http://www.shz.de/nachrichten/deutschland-welt/netzwelt/so-schuetzen-sie-ihre-daten-vor-google-id6262811.html
2014-04-17
attachment
So schützen Sie Ihre Daten vor Google | shz.de
text/html
utf-8
manuscript
Hotel Pennsylvania
Rambam
Steve
▶ The Next HOPE: Privacy is Dead - Get Over It (Complete) - YouTube
2010-07-16
https://www.youtube.com/watch?v=DaYn_PkrfvQ
2014-04-17
The Next HOPE
attachment
▶ The Next HOPE: Privacy is Dead - Get Over It (Complete) - YouTube
text/html
utf-8
webpage
Viaggi
Olivier
Freebox OS passe en version 2.1 et apporte plusieurs nouveautés
2014-04-15
http://www.universfreebox.com/article/25425/Freebox-OS-passe-en-version-2-1-et-apporte-plusieurs-nouveautes
2014-04-17
attachment
Freebox OS passe en version 2.1 et apporte plusieurs nouveautés
text/html
windows-1252
webpage
mapi
MassPrivateI: Police begin spying on every citizen in real-time
2014-04-15
http://massprivatei.blogspot.com/2014/04/city-police-departments-begin-using.html
2014-04-17
attachment
MassPrivateI: Police begin spying on every citizen in real-time
text/html
utf-8
webpage
Kerr
Dara
Tax dodgers beware: IRS could be watching your social media - CNET
2014-04-15
http://www.cnet.com/news/tax-dodgers-beware-irs-could-be-watching-your-social-media/
2014-04-17
attachment
Tax dodgers beware: IRS could be watching your social media - CNET
text/html
utf-8
webpage
Cooper
Paul
Introducing AISight: The slightly scary CCTV network completely run by AI \textbar ITProPortal.com
2014-04-16
http://www.itproportal.com/2014/04/16/aisight-the-surveillance-network-completely-run-by-ai/
2014-04-17
attachment
Introducing AISight: The slightly scary CCTV network completely run by AI | ITProPortal.com
text/html
utf-8
webpage
Kaste
Martin
Apple iBeacon Upgrade Tracks Customers Even When Marketing Apps Are Off : All Tech Considered : NPR
2014-04-15
http://www.npr.org/blogs/alltechconsidered/2014/04/15/302990800/apple-upgrade-tracks-customers-even-when-marketing-apps-are-off?ft=3&f=1001
2014-04-17
attachment
Apple iBeacon Upgrade Tracks Customers Even When Marketing Apps Are Off : All Tech Considered : NPR
text/html
utf-8
webpage
Finley
Klint
It’s Time to Encrypt the Entire Internet \textbar Enterprise \textbar WIRED
2014-04-17
http://www.wired.com/2014/04/https/
2014-04-17
attachment
It’s Time to Encrypt the Entire Internet | Enterprise | WIRED
text/html
utf-8
webpage
Johnston
Casey
All sent and received e-mails in Gmail will be analyzed, says Google \textbar Ars Technica
2014-04-15
http://arstechnica.com/business/2014/04/google-adds-to-tos-yes-we-scan-all-your-e-mails/
2014-04-17
attachment
All sent and received e-mails in Gmail will be analyzed, says Google | Ars Technica
text/html
utf-8
webpage
Snowden Claims NSA Spied on Rights Groups \textbar Human Rights Watch
2014-04-08
http://www.hrw.org/node/124586
2014-04-17
attachment
Snowden Claims NSA Spied on Rights Groups | Human Rights Watch
text/html
utf-8
webpage
Rettman
Andrew
EUobserver / EU court scraps data surveillance law
2014-04-08
http://euobserver.com/justice/123785
2014-04-17
attachment
EUobserver / EU court scraps data surveillance law
text/html
utf-8
webpage
Abraham
Sunil
Who Governs the Internet? Implications for Freedom and National Security —
2014-04-04
http://cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security
2014-04-17
attachment
Who Governs the Internet? Implications for Freedom and National Security —
text/html
utf-8
webpage
Woollacott
Emma
Europe Votes For Net Neutrality In No Uncertain Terms - Forbes
2014-04-03
http://www.forbes.com/sites/emmawoollacott/2014/04/03/europe-votes-for-net-neutrality-in-no-uncertain-terms/
2014-04-17
attachment
Europe Votes For Net Neutrality In No Uncertain Terms - Forbes
text/html
utf-8
webpage
Horne
Felix
How Ethiopia Spies on Its Diaspora in Europe \textbar Human Rights Watch
2014-04-01
http://www.hrw.org/news/2014/04/01/how-ethiopia-spies-its-diaspora-europe
2014-04-17
attachment
How Ethiopia Spies on Its Diaspora in Europe | Human Rights Watch
text/html
utf-8
webpage
No Spyware for Dictators
https://no-spyware-for-dictators.eu/
2014-04-17
attachment
No Spyware for Dictators
text/html
utf-8
webpage
Coalition Against Unlawful Surveillance Exports \textbar CAUSE
http://www.globalcause.net/
2014-04-17
attachment
Coalition Against Unlawful Surveillance Exports | CAUSE
text/html
utf-8
webpage
Freedom House Endorses U.S. Plan to Alter Administration of Internet \textbar Freedom House
2014-04-02
http://freedomhouse.org/article/freedom-house-endorses-us-plan-alter-administration-internet#.U0_-fF5a7ml
2014-04-17
attachment
Freedom House Endorses U.S. Plan to Alter Administration of Internet | Freedom House
text/html
windows-1252
webpage
Felten
Ed
Secure protocols for accountable warrant execution
2014-04-02
https://freedom-to-tinker.com/blog/felten/secure-protocols-for-accountable-warrant-execution/
2014-04-17
attachment
Secure protocols for accountable warrant execution
text/html
utf-8
journalArticle
Mazzetti
Mark
F.B.I. Informant Is Tied to Cyberattacks Abroad - NYTimes.com
2014-04-23
http://mobile.nytimes.com/2014/04/24/world/fbi-informant-is-tied-to-cyberattacks-abroad.html?emc=edit_tnt_20140423&nlid=68829935&tntemail0=y&_r=1&utm_source=Sailthru&utm_medium=email&utm_term=%2ASituation%20Report&utm_campaign=SITREP%20APRIL%2024%202014&referrer=
2014-04-30
attachment
F.B.I. Informant Is Tied to Cyberattacks Abroad - NYTimes.com
text/html
utf-8
webpage
Lovett
Jon
The Culture of Shut Up - Jon Lovett - The Atlantic
2014-04-07
http://www.theatlantic.com/politics/archive/2014/04/the-culture-of-shut-up/360239/
2014-04-30
attachment
The Culture of Shut Up - Jon Lovett - The Atlantic
text/html
utf-8
journalArticle
Sanger
David
U.S. Tries Candor to Assure China on Cyberattacks - NYTimes.com
2014-04-06
http://www.nytimes.com/2014/04/07/world/us-tries-candor-to-assure-china-on-cyberattacks.html?_r=0
2014-04-30
attachment
U.S. Tries Candor to Assure China on Cyberattacks - NYTimes.com
text/html
utf-8
webpage
MacKinnon
Rebecca
News Challenge - How can we strengthen the Internet for free expression and innovation? - Ranking Digital Rights: Holding tech companies accountable on freedom of expression and privacy
2014-03-15
https://www.newschallenge.org/challenge/2014/submissions/ranking-digital-rights-holding-tech-companies-accountable-for-respecting-and-protecting-internet-users-freedom-of-expression-and-privacy
2014-04-18
attachment
News Challenge - How can we strengthen the Internet for free expression and innovation? - Ranking Digital Rights: Holding tech companies accountable on freedom of expression and privacy
text/html
utf-8
webpage
Henderson
Wade
Robinson
Rashad
Big Data Is A Civil Rights Issue
2014-04-08
http://talkingpointsmemo.com/cafe/big-data-is-a-civil-rights-issue
2014-04-18
attachment
Big Data Is A Civil Rights Issue
text/html
utf-8
webpage
Abrougui
Afef
Tunisian Blog Launches Whistleblowing Platform - Global Voices Advocacy
2014-04-15
http://advocacy.globalvoicesonline.org/2014/04/16/tunisian-blog-launches-whistleblowing-platform/
2014-04-18
attachment
Tunisian Blog Launches Whistleblowing Platform - Global Voices Advocacy
text/html
utf-8
webpage
Zetter
Kim
Obama: NSA Must Reveal Bugs Like Heartbleed, Unless They Help the NSA \textbar Threat Level \textbar WIRED
2014-04-15
http://www.wired.com/2014/04/obama-zero-day/
2014-04-18
attachment
Obama: NSA Must Reveal Bugs Like Heartbleed, Unless They Help the NSA | Threat Level | WIRED
text/html
utf-8
webpage
Ogrizek
Irene
Wikileaks and the Canadian Media \textbar Irene Ogrizek
2014-04-15
http://www.ireneogrizek.com/2014/04/15/15540/
2014-04-18
attachment
Wikileaks and the Canadian Media | Irene Ogrizek
text/html
utf-8
conferencePaper
Berlin
Institute of Cultural Inquiry
Christensen
Christian
Collateral Murder and the After-Life of Activist Imagery — Medium
2014-04-10
Medium
https://medium.com/p/3fc2accd82bb
2014-04-18
attachment
Collateral Murder and the After-Life of Activist Imagery — Medium
text/html
utf-8
journalArticle
Walker
Danielle
New Wisconsin law restricts employer access to personal accounts - SC Magazine
2014-04-14
http://www.scmagazine.com/new-wisconsin-law-restricts-employer-access-to-personal-accounts/article/342607/
2014-04-18
attachment
New Wisconsin law restricts employer access to personal accounts - SC Magazine
text/html
utf-8
webpage
Williams
Nicholas
Private surveillance firms: Profits before freedom - Index on Censorship \textbar Index on Censorship
2014-04-11
http://www.indexoncensorship.org/2014/04/private-surveillance-firms-profits-freedom/
2014-04-18
attachment
Private surveillance firms: Profits before freedom - Index on Censorship | Index on Censorship
text/html
utf-8
journalArticle
Sanger
David
Perlroth
Nicole
U.S. Denies It Knew of Heartbleed Bug on the Web - NYTimes.com
2014-04-11
http://www.nytimes.com/2014/04/12/us/us-denies-knowledge-of-heartbleed-bug-on-the-web.html?_r=0
2014-04-18
attachment
U.S. Denies It Knew of Heartbleed Bug on the Web - NYTimes.com
text/html
utf-8
webpage
Riley
Michael
NSA Said to Exploit Heartbleed Bug for Intelligence for Years - Bloomberg
2014-04-12
http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html
2014-04-18
attachment
NSA Said to Exploit Heartbleed Bug for Intelligence for Years - Bloomberg
text/html
utf-8
journalArticle
Ignatius
David
David Ignatius: A tortured debate between Congress and the CIA - The Washington Post
2014-04-01
http://www.washingtonpost.com/opinions/david-ignatius-a-tortured-debate-between-congress-and-the-cia/2014/04/01/3419fccc-b9d6-11e3-96ae-f2c36d2b1245_story.html
2014-04-30
attachment
David Ignatius: A tortured debate between Congress and the CIA - The Washington Post
text/html
utf-8
webpage
Zetter
Kim
Has the NSA Been Using the Heartbleed Bug as an Internet Peephole? \textbar Threat Level \textbar WIRED
2014-04-10
http://www.wired.com/2014/04/nsa-heartbleed/
2014-04-18
attachment
Has the NSA Been Using the Heartbleed Bug as an Internet Peephole? | Threat Level | WIRED
text/html
utf-8
webpage
Wemple
Erik
Bloomberg celebrates challenged story on the NSA and Heartbleed bug
2014-04-23
http://www.washingtonpost.com/blogs/erik-wemple/wp/2014/04/23/bloomberg-celebrates-challenged-story-on-the-nsa-and-heartbleed-bug/
2014-05-03
attachment
Bloomberg celebrates challenged story on the NSA and Heartbleed bug
text/html
utf-8
webpage
Masnick
Mike
Court Says FTC Can Go After Companies Who Get Hacked For Their Weak Security Practices \textbar Techdirt
2014-04-09
http://www.techdirt.com/articles/20140408/16472526845/court-says-ftc-can-go-after-companies-who-get-hacked-their-weak-security-practices.shtml
2014-04-18
attachment
Court Says FTC Can Go After Companies Who Get Hacked For Their Weak Security Practices | Techdirt
text/html
windows-1252
webpage
Merkel denied access to own NSA file - The Local
2014-04-09
http://www.thelocal.de/20140409/merkel-denied-access-to-own-nsa-file
2014-04-18
attachment
Merkel denied access to own NSA file - The Local
text/html
utf-8
webpage
Greenberg
Adam
Anonymous may be targeting educational institutions in 'OpSafeEdu' - SC Magazine
2014-04-08
http://www.scmagazine.com/anonymous-may-be-targeting-educational-institutions-in-opsafeedu/article/341856/
2014-04-18
attachment
Anonymous may be targeting educational institutions in 'OpSafeEdu' - SC Magazine
text/html
utf-8
webpage
Horn
Dottir
Metahaven @ Future Gallery reviewed \textbar atractivoquenobello
2014-02-04
http://www.aqnb.com/2014/04/02/metahaven-future-gallery-reviewed/
2014-04-18
attachment
Metahaven @ Future Gallery reviewed | atractivoquenobello
text/html
utf-8
webpage
Radicales bajo la firma 'Anonymous' destapan datos personales de los antidisturbios- elEconomista.es Edición Móvil
2014-04-06
http://www.elecodiario.mobi/sociedad/noticias/5683902/04/14/Radicales-bajo-la-firma-Anonymous-destapan-datos-personales-de-los-antidisturbios.html
2014-04-18
attachment
Radicales bajo la firma 'Anonymous' destapan datos personales de los antidisturbios- elEconomista.es Edición Móvil
text/html
utf-8
webpage
Traywick
Catherine
‘Cuban Twitter’ and Other Times USAID Pretended To Be an Intelligence Agency
2014-04-03
http://blog.foreignpolicy.com/posts/2014/04/03/cuban_twitter_and_other_times_usaid_pretended_to_be_an_intelligence_agency
2014-04-18
attachment
‘Cuban Twitter’ and Other Times USAID Pretended To Be an Intelligence Agency
text/html
utf-8
webpage
Masnick
Mike
State Department Official Freaks Out That Declassifying CIA Torture Report Might Make The World Angry \textbar Techdirt
2014-04-04
http://www.techdirt.com/articles/20140404/15140726804/state-department-official-freaks-out-that-declassifying-cia-torture-report-might-make-world-angry-us.shtml
2014-04-18
attachment
State Department Official Freaks Out That Declassifying CIA Torture Report Might Make The World Angry | Techdirt
text/html
windows-1252
webpage
Harris
Shane
It’s Not Beijing’s Hackers You Should Be Worried About, It’s Moscow’s
2014-04-22
http://complex.foreignpolicy.com/posts/2014/04/22/it_s_not_beijing_s_hackers_you_should_be_worried_about_it_s_moscow_s
2014-05-03
attachment
It’s Not Beijing’s Hackers You Should Be Worried About, It’s Moscow’s
text/html
utf-8
journalArticle
Miller
Greg
Goldman
Adam
Nakashima
Ellen
CIA misled on interrogation program, Senate report says - The Washington Post
2014-03-31
http://www.washingtonpost.com/world/national-security/cia-misled-on-interrogation-program-senate-report-says/2014/03/31/eb75a82a-b8dd-11e3-96ae-f2c36d2b1245_story.html
2014-04-18
attachment
CIA misled on interrogation program, Senate report says - The Washington Post
text/html
utf-8
webpage
Brewster
Tom
Trouble with Russia, trouble with the law: inside Europe’s digital crime unit \textbar Technology \textbar theguardian.com
2014-04-15
http://www.theguardian.com/technology/2014/apr/15/european-cyber-crime-unit-russia
2014-04-18
attachment
Trouble with Russia, trouble with the law: inside Europe’s digital crime unit | Technology | theguardian.com
text/html
utf-8
webpage
Price
Rob
These videos demonstrate exactly what is wrong with Google Glass
2014-03-28
http://www.dailydot.com/opinion/google-glass-surveillance-camera-man/
2014-04-18
attachment
These videos demonstrate exactly what is wrong with Google Glass
text/html
utf-8
webpage
Kroes
Neelie
My thoughts on NETmundial and the Future of Internet Governance - European Commission
2014-04-11
https://ec.europa.eu/commission_2010-2014/kroes/en/content/my-thoughts-netmundial-and-future-internet-governance
2014-04-18
attachment
My thoughts on NETmundial and the Future of Internet Governance - European Commission
text/html
utf-8
webpage
Tung
Liam
Four of Sweden's telcos stop storing customer data after EU retention directive overthrown \textbar ZDNet
2014-04-11
http://www.zdnet.com/four-of-swedens-telcos-stop-storing-customer-data-after-eu-retention-directive-overthrown-7000028341/
2014-04-18
attachment
Four of Sweden's telcos stop storing customer data after EU retention directive overthrown | ZDNet
text/html
utf-8
webpage
FTC to Examine Effects of Big Data on Low Income and Underserved Consumers at September Workshop \textbar Federal Trade Commission
2014-04-11
http://www.ftc.gov/news-events/press-releases/2014/04/ftc-examine-effects-big-data-low-income-underserved-consumers
2014-04-18
attachment
FTC to Examine Effects of Big Data on Low Income and Underserved Consumers at September Workshop | Federal Trade Commission
text/html
utf-8
webpage
Harris
Shane
In Break with Tradition, New British Surveillance Chief is an Intel Outsider
2014-04-18
http://complex.foreignpolicy.com/posts/2014/04/18/in_break_with_tradition_new_british_surveillance_chief_is_an_intel_outsider
2014-05-03
attachment
In Break with Tradition, New British Surveillance Chief is an Intel Outsider
text/html
utf-8
webpage
Moody
Glyn
USTR Warns That EU-Only Cloud To Avoid NSA Surveillance May Violate Trade Agreements \textbar Techdirt
2014-04-10
http://www.techdirt.com/articles/20140409/08121226855/ustr-makes-ill-judged-criticism-european-plans-to-create-eu-only-cloud-response-to-nsa-spying.shtml
2014-04-18
attachment
USTR Warns That EU-Only Cloud To Avoid NSA Surveillance May Violate Trade Agreements | Techdirt
text/html
windows-1252
webpage
Residents Shocked To Learn About Surveillance System That Was Tested In Compton « CBS Los Angeles
2014-04-16
http://losangeles.cbslocal.com/2014/04/16/residents-shocked-to-learn-about-surveillance-system-that-was-tested-in-compton/
2014-05-03
attachment
Residents Shocked To Learn About Surveillance System That Was Tested In Compton « CBS Los Angeles
text/html
utf-8
webpage
Maurer
Tim
Morgus
Robert
Stop calling decentralization of the Internet "balkanization."
2014-02-19
http://www.slate.com/blogs/future_tense/2014/02/19/stop_calling_decentralization_of_the_internet_balkanization.html
2014-04-18
attachment
Stop calling decentralization of the Internet "balkanization."
text/html
utf-8
webpage
Lamothe
Dan
Exclusive: Top Admiral Says China Likely to Keep Stealing Military Secrets
2014-04-18
http://complex.foreignpolicy.com/posts/2014/04/18/exclusive_top_admiral_says_china_likely_to_keep_stealing_military_secrets
2014-05-03
attachment
Exclusive: Top Admiral Says China Likely to Keep Stealing Military Secrets
text/html
utf-8
webpage
Essers
Loek
Swedish ISP deletes all retained customer data in wake of EU court ruling \textbar PCWorld
2014-04-10
http://www.pcworld.com/article/2142240/swedish-isp-deletes-all-retained-customer-data-in-wake-of-eu-court-ruling.html#tk.rss_all?utm_source=twitterfeed&utm_medium=twitter
2014-04-18
attachment
Swedish ISP deletes all retained customer data in wake of EU court ruling | PCWorld
text/html
utf-8
webpage
Killock
Jim
Open Rights Group - ISPs will break the law if they continue to retain our data
2014-04-09
https://www.openrightsgroup.org/blog/2014/are-the-government-and-isps-breaking-the-law-by-continuing-to-retain-our-data
2014-04-18
attachment
Open Rights Group - ISPs will break the law if they continue to retain our data
text/html
utf-8
webpage
Lake
Eli
Sorry Snowden, Putin Lied to You About His Surveillance State—And Made You a Pawn of It - The Daily Beast
2014-04-18
http://www.thedailybeast.com/articles/2014/04/17/sorry-snowden-putin-lied-to-you-about-his-surveillance-state-and-made-you-a-pawn-of-it.html
2014-05-03
attachment
Sorry Snowden, Putin Lied to You About His Surveillance State—And Made You a Pawn of It - The Daily Beast
text/html
utf-8
webpage
Prantl
Heribert
Vorratsdatenspeicherung: EuGH urteilt für den Bürger - Politik - Süddeutsche.de
2014-04-08
http://www.sueddeutsche.de/politik/urteil-zur-vorratsdatenspeicherung-ende-der-masslosigkeit-1.1932057
2014-04-18
attachment
Vorratsdatenspeicherung: EuGH urteilt für den Bürger - Politik - Süddeutsche.de
text/html
utf-8
webpage
Gentleman
Amelia
Hopkins
Nick
Putin tells Edward Snowden: Russia doesn't carry out mass surveillance \textbar World news \textbar theguardian.com
2014-04-17
http://www.theguardian.com/world/2014/apr/17/putin-edward-snowden-russia-mass-surveillance?CMP=twt_gu
2014-05-03
attachment
Putin tells Edward Snowden: Russia doesn't carry out mass surveillance | World news | theguardian.com
text/html
utf-8
webpage
Peers
Steve
EU Law Analysis: The data retention judgment: The CJEU prohibits mass surveillance
2014-04-08
http://eulawanalysis.blogspot.co.uk/2014/04/the-data-retention-judgment-cjeu.html
2014-04-18
attachment
EU Law Analysis: The data retention judgment: The CJEU prohibits mass surveillance
text/html
utf-8
webpage
MacDonald
Angus
Edward Snowden testifies by video-link at hearing on 'mass surveillance'
2014-04-07
http://assembly.coe.int/nw/xml/News/News-View-EN.asp?newsid=4960&lang=2&cat=5
2014-04-18
attachment
PACE: News
text/html
utf-8
webpage
European Court invalidates Data Retention Directive, says mass surveillance of metadata interferes with right to privacy \textbar Privacy International
2014-04-08
https://www.privacyinternational.org/press-releases/european-court-invalidates-data-retention-directive-says-mass-surveillance-of
2014-04-18
attachment
European Court invalidates Data Retention Directive, says mass surveillance of metadata interferes with right to privacy | Privacy International
text/html
utf-8
webpage
ECJ Press Release in Digital Rights Ireland Data Retention case
http://www.scribd.com/doc/216978759/ECJ-Press-Release-in-Digital-Rights-Ireland-Data-Retention-case
2014-04-18
attachment
ECJ Press Release in Digital Rights Ireland Data Retention case
text/html
utf-8
journalArticle
Marcus
Gary
Davis
Ernest
Eight (No, Nine!) Problems With Big Data - NYTimes.com
2014-04-06
http://www.nytimes.com/2014/04/07/opinion/eight-no-nine-problems-with-big-data.html?_r=2
2014-04-18
attachment
Eight (No, Nine!) Problems With Big Data - NYTimes.com
text/html
utf-8
webpage
Harford
Tim
Big data: are we making a big mistake? - FT.com
2014-03-28
http://www.ft.com/cms/s/2/21a6e7d8-b479-11e3-a09a-00144feabdc0.html#ixzz2xYrFd3vv
2014-04-18
attachment
Big data: are we making a big mistake? - FT.com
text/html
utf-8
journalArticle
Sanger
David
U.S. Tries Candor to Assure China on Cyberattacks - NYTimes.com
2014-04-06
http://www.nytimes.com/2014/04/07/world/us-tries-candor-to-assure-china-on-cyberattacks.html
2014-04-18
attachment
U.S. Tries Candor to Assure China on Cyberattacks - NYTimes.com
text/html
utf-8
webpage
Hemming
Sarah
New stage dramas tackle online privacy - FT.com
2014-04-04
http://www.ft.com/intl/cms/s/2/fd2314e8-b993-11e3-b74f-00144feabdc0.html#axzz2zGIMcTBa
2014-04-18
attachment
New stage dramas tackle online privacy - FT.com
text/html
utf-8
journalArticle
Zhang
Hong
China to work with EU on cybersecurity as Xi wraps up Europe tour \textbar South China Morning Post
2014-04-04
http://www.scmp.com/news/china/article/1464552/china-co-operate-eu-cybersecurity
2014-04-18
attachment
China to work with EU on cybersecurity as Xi wraps up Europe tour | South China Morning Post
text/html
utf-8
webpage
Foster
Peter
Tony Blair 'knew all about CIA secret kidnap programme’ - Telegraph
2014-04-05
http://www.telegraph.co.uk/news/politics/tony-blair/10747166/Tony-Blair-knew-all-about-CIA-secret-kidnap-programme.html
2014-04-18
attachment
Tony Blair 'knew all about CIA secret kidnap programme’ - Telegraph
text/html
utf-8
webpage
Herold
Benjamin
Google Amends Its Terms on Scanning User Data for Ads - Digital Education - Education Week
2014-04-04
http://blogs.edweek.org/edweek/DigitalEducation/2014/04/google_amends_its_terms_on_sca.html
2014-04-18
attachment
Google Amends Its Terms on Scanning User Data for Ads - Digital Education - Education Week
text/html
utf-8
webpage
Stevens
Toby
Taking a punt on Identity Assurance - Identity, Privacy and Trust
2014-04-04
http://www.computerweekly.com/blogs/the-data-trust-blog/2014/04/taking-a-punt-on-identity-assu.html
2014-04-18
attachment
Taking a punt on Identity Assurance - Identity, Privacy and Trust
text/html
utf-8
webpage
Hosenball
Mark
Selyukh
Alina
Obama's NSA overhaul may require phone carriers to store more data \textbar Reuters
2014-04-03
http://www.reuters.com/article/2014/04/03/us-usa-security-obama-idUSBREA3228O20140403
2014-04-18
attachment
Obama's NSA overhaul may require phone carriers to store more data | Reuters
text/html
utf-8
webpage
Walker
Shaun
Russian ambassadors: 'next we'll take Catalonia, Venice, Scotland and Alaska' \textbar World news \textbar theguardian.com
2014-04-04
http://www.theguardian.com/world/2014/apr/04/russian-ambassadors-catalonia-venice-scotland-alaska-annex-crimea
2014-04-18
attachment
Russian ambassadors: 'next we'll take Catalonia, Venice, Scotland and Alaska' | World news | theguardian.com
text/html
utf-8
webpage
Masnick
Mike
Building A More Decentralized Internet: It's Happening Faster Than People Realize \textbar Techdirt
2014-04-04
http://www.techdirt.com/articles/20131215/23380325573/building-more-decentralized-internet-its-happening-faster-than-people-realize.shtml
2014-04-18
attachment
Building A More Decentralized Internet: It's Happening Faster Than People Realize | Techdirt
text/html
windows-1252
webpage
Paglen
Trevor
Inlichtingendienst faalde bij in kaart brengen NSA-spionage - De Standaard Mobile
2014-04-03
http://m.standaard.be/cnt/dmf20140402_056
2014-04-18
attachment
Inlichtingendienst faalde bij in kaart brengen NSA-spionage - De Standaard Mobile
text/html
utf-8
webpage
Wesolowski
Brian
Government Mass Surveillance to Go on Trial in Europe \textbar Center for Democracy & Technology
2014-04-03
https://cdt.org/press/government-mass-surveillance-go-trial-europe/?utm_content=buffer33a43&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
2014-04-18
attachment
Government Mass Surveillance to Go on Trial in Europe | Center for Democracy & Technology
text/html
utf-8
webpage
Perera
David
Big data need not end Americans' privacy, argues CDT - FierceGovernmentIT
2014-04-02
http://www.fiercegovernmentit.com/story/big-data-need-not-end-americans-privacy-argues-cdt/2014-04-02
2014-04-18
attachment
Big data need not end Americans' privacy, argues CDT - FierceGovernmentIT
text/html
utf-8
webpage
Fisher
Dennis
Cyberespionage, Not Cyber Terror, is the Major Threat, Former NSA Director Says \textbar Threatpost \textbar The first stop for security news
2014-04-03
http://threatpost.com/cyberespionage-not-cyber-terror-is-the-major-threat-former-nsa-director-says/105223
2014-04-18
attachment
Cyberespionage, Not Cyber Terror, is the Major Threat, Former NSA Director Says | Threatpost | The first stop for security news
text/html
utf-8
journalArticle
Faiola
Anthony
Germany opens hearings on U.S. spying - The Washington Post
2014-04-03
http://www.washingtonpost.com/world/germany-opens-hearings-on-us-spying/2014/04/03/cf58f2d0-b42b-4e59-a403-75f968d6edb0_story.html
2014-04-18
attachment
Germany opens hearings on U.S. spying - The Washington Post
text/html
utf-8
webpage
zu Guttenberg
Karl-Theodor
European Legislators Face "Data Secessionism" » Techonomy
2014-04-01
http://techonomy.com/2014/04/european-legislators-face-data-secessionism/
2014-04-18
attachment
European Legislators Face "Data Secessionism" » Techonomy
text/html
utf-8
webpage
#Bigtrust for #Bigdata and the Cloud? EU Data Protection Reform and the EU-US Safe Harbour - Thursday 26 June 2014, London
2014-06-26
https://www.scl.org/site.aspx?i=ev36722
2014-04-18
attachment
#Bigtrust for #Bigdata and the Cloud? EU Data Protection Reform and the EU-US Safe Harbour - Thursday 26 June 2014, London
text/html
utf-8
webpage
Surprise! DOJ IG’s 1,403 Day Old Section 215 Investigation Had a Baby! \textbar emptywheel
2014-04-18
http://www.emptywheel.net/2014/04/18/surprise-doj-igs-1403-day-old-section-215-investigation-had-a-baby/
2014-04-18
attachment
Surprise! DOJ IG’s 1,403 Day Old Section 215 Investigation Had a Baby! | emptywheel
text/html
utf-8
webpage
Gosztola
Kevin
In Defense of Snowden’s Question & How He Responded to Putin’s Answer Denying Mass Surveillance \textbar The Dissenter
2014-04-18
http://dissenter.firedoglake.com/2014/04/18/in-defense-of-snowdens-question-as-well-as-his-response-to-putin-denying-russia-engages-in-mass-surveillance/
2014-04-18
attachment
In Defense of Snowden’s Question & How He Responded to Putin’s Answer Denying Mass Surveillance | The Dissenter
text/html
utf-8
webpage
Radack
Jesselyn
Media Humiliates Itself: WAPO Gives Platform to Shameless Anti-Snowden Smears
2014-04-18
http://www.dailykos.com/story/2014/04/18/1292917/-Media-Humiliates-Itself-WAPO-Gives-Platform-to-Shameless-Anti-Snowden-Smears#
2014-04-18
attachment
Media Humiliates Itself: WAPO Gives Platform to Shameless Anti-Snowden Smears
text/html
utf-8
webpage
Hurley
Lawrence
Justices Scalia and Ginsburg say Supreme Court will likely rule on NSA surveillance \textbar The Raw Story
2014-04-17
http://www.rawstory.com/rs/2014/04/17/justices-scalia-and-ginsburg-say-supreme-court-will-likely-rule-on-nsa-surveillance/
2014-04-18
attachment
Justices Scalia and Ginsburg say Supreme Court will likely rule on NSA surveillance | The Raw Story
text/html
utf-8
webpage
Snowden
Edward
Vladimir Putin must be called to account on surveillance just like Obama \textbar Edward Snowden \textbar Comment is free \textbar theguardian.com
2014-04-18
http://www.theguardian.com/commentisfree/2014/apr/18/vladimir-putin-surveillance-us-leaders-snowden
2014-04-18
attachment
Vladimir Putin must be called to account on surveillance just like Obama | Edward Snowden | Comment is free | theguardian.com
text/html
utf-8
webpage
Macri
Giuseppe
Creepy AI CCTV surveillance network watches all of Boston \textbar The Daily Caller
http://dailycaller.com/2014/04/17/creepy-autonomous-surveillance-network-watches-all-of-boston/?onswipe_redirect=no
2014-04-18
attachment
Creepy AI CCTV surveillance network watches all of Boston | The Daily Caller
text/html
utf-8
webpage
Former Drone Operators Reveal Air Force Plays Key Role in Secret CIA Assassination Campaign \textbar Democracy Now!
http://www.democracynow.org/2014/4/17/former_drone_operators_reveal_air_force
2014-04-18
attachment
Former Drone Operators Reveal Air Force Plays Key Role in Secret CIA Assassination Campaign | Democracy Now!
text/html
utf-8
webpage
Bloom
Dan
Edward Snowden on live phone-in with Vladimir Putin \textbar Mail Online
2014-04-17
http://www.dailymail.co.uk/news/article-2606846/From-one-spy-Putin-says-Russia-not-carrying-mass-surveillance-citizens-response-question-Edward-Snowden-live-televised-Q-A.html
2014-04-18
attachment
Edward Snowden on live phone-in with Vladimir Putin | Mail Online
text/html
utf-8
webpage
Groll
Elias
Snowden Called in to Putin’s Telethon. Does That Really Make Him a Kremlin Pawn?
2014-04-17
http://blog.foreignpolicy.com/posts/2014/04/17/snowden_called_in_to_putin_s_telethon_does_that_really_make_him_a_kremlin_pawn
2014-04-18
attachment
Snowden Called in to Putin’s Telethon. Does That Really Make Him a Kremlin Pawn?
text/html
utf-8
webpage
Buedel
Matt
Fake Peoria mayor Twitter account prompts real raid of West Bluff house - News - Journal Star - Peoria, IL
2014-04-16
http://www.pjstar.com/article/20140416/News/140419123#ixzz2zBERwLcb
2014-04-18
attachment
Fake Peoria mayor Twitter account prompts real raid of West Bluff house - News - Journal Star - Peoria, IL
text/html
windows-1252
webpage
Gosztola
Kevin
Nothing Will Ever Convince Most Shrill Critics of Snowden That He Is Not a Kremlin Tool \textbar The Dissenter
2014-04-17
http://dissenter.firedoglake.com/2014/04/17/nothing-will-ever-convince-most-shrill-critics-of-snowden-that-he-is-not-a-kremlin-tool/
2014-04-18
attachment
Nothing Will Ever Convince Most Shrill Critics of Snowden That He Is Not a Kremlin Tool | The Dissenter
text/html
utf-8
webpage
Friedersdorf
Conor
Exposing the NSA: A Public Service Worthy of a Pulitzer Prize - Conor Friedersdorf - The Atlantic
2014-04-16
http://www.theatlantic.com/politics/archive/2014/04/exposing-the-nsa-a-public-service-worthy-of-a-pulitzer-prize/360723/
2014-04-18
attachment
Exposing the NSA: A Public Service Worthy of a Pulitzer Prize - Conor Friedersdorf - The Atlantic
text/html
utf-8
webpage
Wittes
Benjamin
Lawfare › “The Anti-Democratic, Anti-Transparency Ideology that Prevails at Lawfare”
2014-04-17
http://www.lawfareblog.com/2014/04/the-anti-democratic-anti-transparency-ideology-that-prevails-at-lawfare/
2014-04-18
attachment
Lawfare › “The Anti-Democratic, Anti-Transparency Ideology that Prevails at Lawfare”
text/html
utf-8
journalArticle
Milbank
Dana
Dana Milbank: Away from The Post, a pro-NSA counterdemonstration - The Washington Post
2014-04-16
http://www.washingtonpost.com/opinions/dana-milbank-away-from-the-post-a-pro-nsa-counter-demonstration/2014/04/16/5a2b74b2-c5b2-11e3-bf7a-be01a9b69cf1_story.html
2014-04-18
attachment
Dana Milbank: Away from The Post, a pro-NSA counterdemonstration - The Washington Post
text/html
utf-8
webpage
Leyendecker
Hans
Mascolo
Georg
Fall Edward Snowden - Berlin hat Fragen an die US-Regierung - Politik - Süddeutsche.de
2014-04-17
http://www.sueddeutsche.de/politik/fall-edward-snowden-berlin-verlangt-antworten-von-der-us-regierung-1.1938567
2014-04-18
attachment
Fall Edward Snowden - Berlin hat Fragen an die US-Regierung - Politik - Süddeutsche.de
text/html
utf-8
webpage
Ackerman
Elise
Are Google and Facebook Just Pretending They Want Limits on NSA Surveillance? \textbar VICE United States
2014-04-11
http://www.vice.com/read/are-google-and-facebook-just-pretending-they-want-limits-on-nsa-surveillance
2014-04-18
attachment
Are Google and Facebook Just Pretending They Want Limits on NSA Surveillance? | VICE United States
text/html
utf-8
webpage
Gosztola
Kevin
The Bureau of Prisons Repeatedly Tried to Thwart CIA Whistleblower John Kiriakou’s Ability to Send Letters \textbar The Dissenter
2014-04-16
http://dissenter.firedoglake.com/2014/04/16/the-bureau-of-prisons-repeatedly-tried-to-thwart-cia-whistleblower-john-kiriakous-ability-to-send-letters/
2014-04-18
attachment
The Bureau of Prisons Repeatedly Tried to Thwart CIA Whistleblower John Kiriakou’s Ability to Send Letters | The Dissenter
text/html
utf-8
webpage
Peritz
Aki
Spies Like Us
2014-04-11
http://www.foreignpolicy.com/articles/2014/04/11/spies_like_us_the_americans_kgb_russia
2014-05-03
attachment
Spies Like Us
text/html
utf-8
webpage
Macri
Giuseppe
The USPS wants to mine and sell data about your mail \textbar The Daily Caller
2014-04-16
http://dailycaller.com/2014/04/16/the-usps-wants-to-mine-and-sell-data-gathered-from-your-mail/?onswipe_redirect=no
2014-04-18
attachment
The USPS wants to mine and sell data about your mail | The Daily Caller
text/html
utf-8
webpage
Currier
Cora
Another Pulitzer for reporting classified info : Columbia Journalism Review
2014-04-16
http://www.cjr.org/behind_the_news/pulitzers_nsa_snowden.php
2014-04-18
attachment
Another Pulitzer for reporting classified info : Columbia Journalism Review
text/html
utf-8
webpage
Poulsen
Kevin
Snowden’s Email Provider Loses Appeal Over Encryption Keys \textbar Threat Level \textbar WIRED
2014-04-16
http://www.wired.com/2014/04/lavabit-ruling/
2014-04-18
attachment
Snowden’s Email Provider Loses Appeal Over Encryption Keys | Threat Level | WIRED
text/html
utf-8
webpage
Masnick
Mike
The Most Bizarre Response To The Pulitzers Yet, From The Guy Who Authorized CIA Torture \textbar Techdirt
2014-04-15
http://www.techdirt.com/articles/20140415/01123026915/wackiest-response-to-pulitzers-yet-guy-who-authorized-cia-torture.shtml
2014-04-18
attachment
The Most Bizarre Response To The Pulitzers Yet, From The Guy Who Authorized CIA Torture | Techdirt
text/html
windows-1252
webpage
Gosztola
Kevin
TMZ: Only US Television Program to Cover Latest Report of CIA Using Music to Torture Detainees \textbar The Dissenter
2014-04-15
http://dissenter.firedoglake.com/2014/04/15/tmz-only-us-television-program-to-cover-latest-report-of-cia-using-music-to-torture-detainees/
2014-04-18
attachment
TMZ: Only US Television Program to Cover Latest Report of CIA Using Music to Torture Detainees | The Dissenter
text/html
utf-8
webpage
Pilkington
Ed
Guardian and Washington Post win Pulitzer prize for NSA revelations \textbar Media \textbar The Guardian
2014-04-14
http://www.theguardian.com/media/2014/apr/14/guardian-washington-post-pulitzer-nsa-revelations
2014-04-19
attachment
Guardian and Washington Post win Pulitzer prize for NSA revelations | Media | The Guardian
text/html
utf-8
webpage
Gosztola
Kevin
Chelsea Manning’s New Lawyers Will Challenge ‘Frightening’ Espionage Act Charges on Appeal \textbar The Dissenter
2014-04-14
http://dissenter.firedoglake.com/2014/04/14/chelsea-mannings-new-lawyers-to-challenge-espionage-act-convictions-they-consider-frightening/
2014-04-19
attachment
Chelsea Manning’s New Lawyers Will Challenge ‘Frightening’ Espionage Act Charges on Appeal | The Dissenter
text/html
utf-8
webpage
Masnick
Mike
FBI Abruptly Walks Out On Senate Briefing After Being Asked How 'Insider Threat' Program Avoids Whistleblowers \textbar Techdirt
2014-04-14
http://www.techdirt.com/articles/20140412/07290526888/fbi-abruptly-walks-out-senate-briefing-after-being-asked-how-insider-threat-program-avoids-whistleblowers.shtml
2014-04-19
attachment
FBI Abruptly Walks Out On Senate Briefing After Being Asked How 'Insider Threat' Program Avoids Whistleblowers | Techdirt
text/html
windows-1252
webpage
Finley
Klint
Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA \textbar Enterprise \textbar WIRED
2014-04-14
http://www.wired.com/2014/04/tails/
2014-04-21
attachment
Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA | Enterprise | WIRED
text/html
utf-8
webpage
Gerstein
Josh
New Chelsea (Bradley) Manning lawyer hits Espionage Act charges - POLITICO.com
2014-04-13
http://www.politico.com/blogs/under-the-radar/2014/04/new-manning-lawyer-hits-espionage-act-charges-186800.html
2014-04-21
attachment
New Chelsea (Bradley) Manning lawyer hits Espionage Act charges - POLITICO.com
text/html
utf-8
webpage
BBC News - Banksy thought to be behind Cheltenham artwork
2014-04-14
http://www.bbc.com/news/uk-england-gloucestershire-27021675
2014-04-21
attachment
BBC News - Banksy thought to be behind Cheltenham artwork
text/html
utf-8
journalArticle
Sanger
David
Obama Lets N.S.A. Exploit Some Internet Flaws, Officials Say - NYTimes.com
2014-04-12
http://www.nytimes.com/2014/04/13/us/politics/obama-lets-nsa-exploit-some-internet-flaws-officials-say.html?_r=0
2014-05-03
attachment
Obama Lets N.S.A. Exploit Some Internet Flaws, Officials Say - NYTimes.com
text/html
utf-8
webpage
Executive Order 13526- Classified National Security Information \textbar The White House
2009-12-09
http://m.whitehouse.gov/the-press-office/executive-order-classified-national-security-information
2014-04-21
attachment
Executive Order 13526- Classified National Security Information | The White House
text/html
utf-8
webpage
Eperjesi
John
From Pork Chop Hill to the Front Line: Peace As a Korean Human Right \textbar John R. Eperjesi
2014-04-10
http://www.huffingtonpost.com/john-r-eperjesi/from-pork-chop-hill-to-th_b_5116735.html
2014-04-21
attachment
From Pork Chop Hill to the Front Line: Peace As a Korean Human Right | John R. Eperjesi
text/html
utf-8
webpage
emptywheel
The Day After Government Catalogs Data NSA Collected on Tsarnaevs, DOJ Refuses to Give Dzhokhar Notice \textbar emptywheel
2014-04-12
http://www.emptywheel.net/2014/04/12/the-day-after-government-catalogs-data-nsa-collected-on-tsarnaevs-doj-refuses-to-give-dzhokhar-notice/
2014-04-21
attachment
The Day After Government Catalogs Data NSA Collected on Tsarnaevs, DOJ Refuses to Give Dzhokhar Notice | emptywheel
text/html
utf-8
webpage
Harris
Shane
The Military’s Top Spy Will Be a Woman
2014-05-01
http://complex.foreignpolicy.com/posts/2014/05/01/the_military_s_top_spy_will_be_a_woman
2014-05-03
attachment
The Military’s Top Spy Will Be a Woman
text/html
utf-8
journalArticle
Sanger
David
Obama Lets N.S.A. Exploit Some Internet Flaws, Officials Say - NYTimes.com
2014-04-12
http://mobile.nytimes.com/2014/04/13/us/politics/obama-lets-nsa-exploit-some-internet-flaws-officials-say.html?_r=0&referrer=
2014-04-21
attachment
Obama Lets N.S.A. Exploit Some Internet Flaws, Officials Say - NYTimes.com
text/html
utf-8
webpage
Turse
Nick
Behind the Veil of Secrecy Over US Military Operations in Africa \textbar Mother Jones
2014-04-14
http://www.motherjones.com/politics/2014/04/us-military-africa-secrecy-operations?utm_source=twitterfeed&utm_medium=twitter&utm_campaign=Feed%3A+motherjones%2Fmain+%28MotherJones.com+Main+Article+Feed%29
2014-04-21
attachment
Behind the Veil of Secrecy Over US Military Operations in Africa | Mother Jones
text/html
utf-8
webpage
Beckedahl
Markus
Asyl für Snowden – Oder warum könnte Deutschland ihn nicht schützen?
2014-04-15
https://netzpolitik.org/2014/asly-fuer-snowden-oder-warum-koennte-deutschland-ihn-nicht-schuetzen/
2014-04-21
attachment
Asyl für Snowden – Oder warum könnte Deutschland ihn nicht schützen?
text/html
utf-8
webpage
Van Buren
Peter
Torture and the Destruction of the Human Being Shaker Aamer by the United States \textbar The Dissenter
2014-04-15
http://dissenter.firedoglake.com/2014/04/15/torture-and-the-destruction-of-a-human-being-by-the-united-states/
2014-04-21
attachment
Torture and the Destruction of the Human Being Shaker Aamer by the United States | The Dissenter
text/html
utf-8
journalArticle
Apuzzo
Matt
Goldstein
Joseph
New York Drops Unit That Spied on Muslims - NYTimes.com
2014-04-15
http://mobile.nytimes.com/2014/04/16/nyregion/police-unit-that-spied-on-muslims-is-disbanded.html?referrer=
2014-04-21
attachment
New York Drops Unit That Spied on Muslims - NYTimes.com
text/html
utf-8
webpage
Davidson
Amy
The Snowden Pulitzer, Well-earned by The Guardian and Post : The New Yorker
2014-04-15
http://www.newyorker.com/online/blogs/closeread/2014/04/the-snowden-pulitzer.html?mobify=0
2014-04-21
attachment
The Snowden Pulitzer, Well-earned by The Guardian and Post : The New Yorker
text/html
windows-1252
webpage
Study: America is more like an oligarchy - WTOP Mobile
2014-04-16
http://www.wtop.com/?nid=893&sid=3603835
2014-04-21
attachment
Study: America is more like an oligarchy - WTOP Mobile
text/html
windows-1252
journalArticle
Rosenberg
Carol
GUANTANAMO BAY NAVY BASE, Cuba: Accusation of FBI spying stalls 9/11 hearing - Guantánamo - MiamiHerald.com
2014-04-14
http://www.miamiherald.com/2014/04/14/4059006/911-defense-lawyers-accuse-fbi.html
2014-04-21
attachment
GUANTANAMO BAY NAVY BASE, Cuba: Accusation of FBI spying stalls 9/11 hearing - Guantánamo - MiamiHerald.com
text/html
windows-1252
webpage
Gosztola
Kevin
FBI Thinks Whistleblowers Should ‘Register’ So They’re Not Targeted by Insider Threat Program \textbar The Dissenter
2014-04-11
http://dissenter.firedoglake.com/2014/04/11/fbi-thinks-whistleblowers-should-register-so-theyre-not-targeted-by-insider-threat-program/
2014-04-21
attachment
FBI Thinks Whistleblowers Should ‘Register’ So They’re Not Targeted by Insider Threat Program | The Dissenter
text/html
utf-8
webpage
emptywheel
Spy vs. Spy, Theresa Shea vs. Theresa Shea \textbar emptywheel
2014-04-12
http://www.emptywheel.net/2014/04/12/spy-v-spy-theresa-shea-v-theresa-shea/
2014-04-21
attachment
Spy vs. Spy, Theresa Shea vs. Theresa Shea | emptywheel
text/html
utf-8
webpage
Doyle
Jack
Spies cleared of Edward Snowden's claims of mass intrusion \textbar Mail Online
2014-04-08
http://www.dailymail.co.uk/news/article-2600239/Spies-cleared-Snowdens-claims-mass-intrusion-Communications-watchdog-says-did-not-break-laws.html
2014-04-21
attachment
Spies cleared of Edward Snowden's claims of mass intrusion | Mail Online
text/html
utf-8
webpage
Jardin
Xeni
LA Sheriffs launch crowdsourced crowd control: LEEDIR, a surveillance app that uses your photos and videos - Boing Boing
2014-04-11
http://boingboing.net/2014/04/11/leedir.html
2014-04-21
attachment
LA Sheriffs launch crowdsourced crowd control: LEEDIR, a surveillance app that uses your photos and videos - Boing Boing
text/html
utf-8
webpage
Hudson
John
Exclusive: New Bill Requires Voice of America to Toe U.S. Line
2014-04-29
http://thecable.foreignpolicy.com/posts/2014/04/29/exclusive_new_bill_requires_voice_of_america_to_toe_us_line
2014-05-03
attachment
Exclusive: New Bill Requires Voice of America to Toe U.S. Line
text/html
utf-8
webpage
Green
Matthew
A Few Thoughts on Cryptographic Engineering: How does the NSA break SSL?
2013-12-02
http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html
2014-04-21
attachment
A Few Thoughts on Cryptographic Engineering: How does the NSA break SSL?
text/html
utf-8
webpage
Gerstein
Josh
Judge rejects suit for Al-Awlaki legal memos - POLITICO.com
2014-04-11
http://www.politico.com/blogs/under-the-radar/2014/04/judge-rejects-suit-for-alawlaki-legal-memos-186758.html#.U0mqm7cJPuw.twitter
2014-04-21
attachment
Judge rejects suit for Al-Awlaki legal memos - POLITICO.com
text/html
utf-8
webpage
Harris
Shane
Exclusive: Meet the Fed's First Line of Defense Against Cyber Attacks
2014-04-28
http://www.foreignpolicy.com/articles/2014/04/28/exclusive_meet_the_secret_fed_cyber_security_unit_keeping_trillions_of_dollars_s
2014-05-03
attachment
Exclusive: Meet the Fed's First Line of Defense Against Cyber Attacks
text/html
utf-8
journalArticle
Goldman
Adam
Tate
Julie
Inside the FBI’s secret relationship with the military’s special operations - The Washington Post
2014-04-10
http://www.washingtonpost.com/world/national-security/inside-the-fbis-secret-relationship-with-the-militarys-special-operations/2014/04/10/dcca3460-be84-11e3-b195-dd0c1174052c_story.html
2014-04-21
attachment
Inside the FBI’s secret relationship with the military’s special operations - The Washington Post
text/html
utf-8
webpage
McCombs
Brady
Ex-NSA exec says spy programs violate Constitution - SFGate
2014-04-10
http://m.sfgate.com/news/article/Former-NSA-official-to-speak-in-Salt-Lake-City-5391197.php
2014-04-21
attachment
Ex-NSA exec says spy programs violate Constitution - SFGate
text/html
utf-8
webpage
Timm
Trevor
Silicon Valley could force NSA reform, tomorrow. What's taking so long? \textbar Trevor Timm \textbar Comment is free \textbar theguardian.com
2014-04-12
http://www.theguardian.com/commentisfree/2014/apr/12/silicon-valley-nsa-reform-taking-so-long
2014-04-22
attachment
Silicon Valley could force NSA reform, tomorrow. What's taking so long? | Trevor Timm | Comment is free | theguardian.com
text/html
utf-8
webpage
Harris
Shane
The Blue Screen of Death at 30,000 Feet
2014-04-24
http://www.foreignpolicy.com/articles/2014/04/24/the_blue_screen_of_death_at_30000_feet
2014-05-03
attachment
The Blue Screen of Death at 30,000 Feet
text/html
utf-8
webpage
Sanchez
Julian
NSA reforms: Obama’s playing a Fourth Amendment shell game.
http://www.slate.com/articles/technology/future_tense/2014/04/nsa_reforms_obama_s_playing_a_fourth_amendment_shell_game.html
2014-04-22
attachment
NSA reforms: Obama’s playing a Fourth Amendment shell game.
text/html
utf-8
webpage
Most Important Event Since Chelsea Manning’s Trial \textbar PopularResistance.Org
2014-04-11
http://www.popularresistance.org/most-important-event-since-chelsea-mannings-trial/
2014-04-22
attachment
Most Important Event Since Chelsea Manning’s Trial | PopularResistance.Org
text/html
utf-8
journalArticle
Fair
Eric
The U.S. must open the book on the use of torture to move forward - The Washington Post
2014-04-11
http://www.washingtonpost.com/opinions/the-us-must-open-the-book-on-the-use-of-torture-to-move-forward/2014/04/11/67925756-c18e-11e3-bcec-b71ee10e9bc3_story.html
2014-04-22
attachment
The U.S. must open the book on the use of torture to move forward - The Washington Post
text/html
utf-8
webpage
Silenced \textbar 2014 Tribeca Film Festival
http://tribecafilm.com/filmguide/53208997c07f5df7d2000113-silenced
2014-04-22
attachment
Silenced | 2014 Tribeca Film Festival
text/html
utf-8
webpage
Landay
Jonathan
WASHINGTON: Senate Intelligence Committee investigating leak to McClatchy, Feinstein says \textbar National Security & Defense \textbar McClatchy DC
2014-04-11
http://www.mcclatchydc.com/2014/04/11/224195/senate-intelligence-committee.html
2014-04-22
attachment
WASHINGTON: Senate Intelligence Committee investigating leak to McClatchy, Feinstein says | National Security & Defense | McClatchy DC
text/html
utf-8
webpage
Napolitano
Andrew
NSA Admits to Wrongdoing—What Now? - Reason.com
2014-04-10
http://reason.com/archives/2014/04/10/nsa-james-clapper-admit-to-wrongdoing
2014-04-22
attachment
NSA Admits to Wrongdoing—What Now? - Reason.com
text/html
utf-8
book
'A New Level of Secrecy and Control': Jill Abramson on the Obama White House - The Takeaway
2014-04-10
http://www.thetakeaway.org/story/new-level-secrecy-and-control-nytimes-chief-jill-abramson-obama-white-house/
2014-04-22
attachment
'A New Level of Secrecy and Control': Jill Abramson on the Obama White House - The Takeaway
text/html
utf-8
webpage
Urias
Gabriela
Counterfeit Electronic Parts Regulation Bogged Down
2014-04-09
http://www.pogo.org/blog/2014/04/20140409-counterfeit-electronic-parts-regulation-bogged-down.html
2014-04-22
attachment
Counterfeit Electronic Parts Regulation Bogged Down
text/html
utf-8
webpage
Biddle
Sam
Wiretapping Advocate Joins Dropbox Boardroom
2014-04-09
http://valleywag.gawker.com/wiretapping-advocate-joins-dropbox-boardroom-1561543380
2014-04-22
attachment
Wiretapping Advocate Joins Dropbox Boardroom
text/html
utf-8
webpage
CNN.com - Democrats call for investigation of NSA wiretaps - Dec 18, 2005
2005-12-19
http://www.cnn.com/2005/POLITICS/12/18/bush.nsa/index.html
2014-04-22
attachment
CNN.com - Democrats call for investigation of NSA wiretaps - Dec 18, 2005
text/html
windows-1252
webpage
Watch Chelsea's appeals team speak live from DC
2014-04-13
http://ymlp.com/z2UExt
2014-04-22
attachment
Watch Chelsea's appeals team speak live from DC
text/html
utf-8
webpage
Kayyali
Nadia
Why Fusion Centers Matter: FAQ \textbar Electronic Frontier Foundation
2014-04-07
https://www.eff.org//deeplinks/2014/04/why-fusion-centers-matter-faq
2014-04-22
attachment
Why Fusion Centers Matter: FAQ | Electronic Frontier Foundation
text/html
utf-8
webpage
Harris
Shane
Ukraine Boasts of Rounding Up Russian Spies. Will Washington Notice?
2014-04-10
http://complex.foreignpolicy.com/posts/2014/04/10/ukraine_boasts_of_rounding_up_russian_spies_will_washington_notice
2014-05-03
attachment
Ukraine Boasts of Rounding Up Russian Spies. Will Washington Notice?
text/html
utf-8
webpage
Panel on Whistle-blowing, with Legal Counsel for Chelsea Manning (Formerly Bradley Manning) — Georgetown Law
2014-04-09
http://www.law.georgetown.edu/news/press-releases/whistle-blowing-counsel-for-chelsea-manning.cfm
2014-04-23
attachment
Panel on Whistle-blowing, with Legal Counsel for Chelsea Manning (Formerly Bradley Manning) — Georgetown Law
text/html
utf-8
webpage
Caldwell
Leigh Ann
Bill Clinton on Snowden: An ‘imperfect messenger’ – CNN Political Ticker - CNN.com Blogs
2014-04-09
http://politicalticker.blogs.cnn.com/2014/04/09/bill-clinton-on-snowden-an-imperfect-messenger/?hpt=hp_t2
2014-04-23
attachment
Bill Clinton on Snowden: An ‘imperfect messenger’ – CNN Political Ticker - CNN.com Blogs
text/html
utf-8
webpage
Ucar
Ani
A conversation with NSA whistleblower Thomas Drake \textbar USC Annenberg Radio News
2014-04-08
http://www.annenbergradio.org/segments/2014/04/conversation-nsa-whistleblower-thomas-drake
2014-04-23
attachment
A conversation with NSA whistleblower Thomas Drake | USC Annenberg Radio News
text/html
utf-8
webpage
Kaye
Jeffrey
After 16 years, CIA declassifies new portions of "KUBARK" interrogation manual \textbar Muckrock
2014-04-08
https://www.muckrock.com/news/archives/2014/apr/08/cia-declassifies-additional-portions-kubark-interr/
2014-04-23
attachment
After 16 years, CIA declassifies new portions of "KUBARK" interrogation manual | Muckrock
text/html
utf-8
webpage
Hawkins
Katherine
"Waterboard Him Some More" \textbar Katherine Hawkins
2014-04-08
http://www.huffingtonpost.com/katherine-hawkins/waterboard-him-some-more_b_5108392.html
2014-04-23
attachment
"Waterboard Him Some More" | Katherine Hawkins
text/html
utf-8
webpage
Gosztola
Kevin
CIA Whistleblower John Kiriakou, in Latest ‘Letter from Loretto,’ Describes Work in Prison Chapel \textbar The Dissenter
2014-04-09
http://dissenter.firedoglake.com/2014/04/09/cia-whistleblower-john-kiriakou-in-latest-letter-from-loretto-describes-work-in-prison-chapel/
2014-04-23
attachment
CIA Whistleblower John Kiriakou, in Latest ‘Letter from Loretto,’ Describes Work in Prison Chapel | The Dissenter
text/html
utf-8
webpage
Zhu
Yan
Why the Web Needs Perfect Forward Secrecy More Than Ever \textbar Electronic Frontier Foundation
2014-04-08
https://www.eff.org/deeplinks/2014/04/why-web-needs-perfect-forward-secrecy
2014-04-23
attachment
Why the Web Needs Perfect Forward Secrecy More Than Ever | Electronic Frontier Foundation
text/html
utf-8
webpage
Moyer
Edward
Snowden to NSA: Go ahead, deny I tried to raise the alarm legally - CNET
2014-04-08
http://www.cnet.com/news/edward-snowden-challenges-nsa-to-deny-he-tried-to-raise-alarm-legally/
2014-04-23
attachment
Snowden to NSA: Go ahead, deny I tried to raise the alarm legally - CNET
text/html
utf-8
webpage
Moyer
Edward
Snowden to NSA: Go ahead, deny I tried to raise the alarm legally - CNET
2014-04-08
http://www.cnet.com/news/edward-snowden-challenges-nsa-to-deny-he-tried-to-raise-alarm-legally/
2014-04-23
attachment
Snowden to NSA: Go ahead, deny I tried to raise the alarm legally - CNET
text/html
utf-8
book
▶ Senator Feinstein on CIA detention and interrogation study - YouTube
2014-04-08
https://www.youtube.com/watch?v=7hpK2ra9e_0&feature=youtu.be
2014-04-23
attachment
▶ Senator Feinstein on CIA detention and interrogation study - YouTube
text/html
utf-8
webpage
Snowden Attorney Radack, Daniel Ellsberg, NSA Whistleblower Drake to Speak at USC Annenberg \textbar GAP
2014-04-08
http://whistleblower.org/press/snowden-attorney-radack-daniel-ellsberg-nsa-whistleblower-drake-speak-usc-annenberg
2014-04-23
attachment
Snowden Attorney Radack, Daniel Ellsberg, NSA Whistleblower Drake to Speak at USC Annenberg | GAP
text/html
utf-8
webpage
Aftergood
Steven
Countering CIA's Conflict of Interest in Declassification - Secrecy News
2014-04-08
http://blogs.fas.org/secrecy/2014/04/declass-conflict/
2014-04-23
attachment
Countering CIA's Conflict of Interest in Declassification - Secrecy News
text/html
utf-8
webpage
Harding
Luke
Edward Snowden: US government spied on human rights workers \textbar World news \textbar The Guardian
2014-04-08
http://www.theguardian.com/world/2014/apr/08/edwards-snowden-us-government-spied-human-rights-workers
2014-04-23
attachment
Edward Snowden: US government spied on human rights workers | World news | The Guardian
text/html
utf-8
webpage
emptywheel
SPCMA: The Other NSA Dragnet Sucking In Americans \textbar emptywheel
2014-02-17
http://www.emptywheel.net/2014/02/17/spcma-the-other-nsa-dragnet-sucking-in-americans/
2014-04-23
attachment
SPCMA: The Other NSA Dragnet Sucking In Americans | emptywheel
text/html
utf-8
webpage
emptywheel
Dianne Feinstein Invokes Torture’s Covert Status on Declassification \textbar emptywheel
2014-04-08
http://www.emptywheel.net/2014/04/08/dianne-feinstein-invokes-tortures-odd-covert-status-on-declassification/
2014-04-23
attachment
Dianne Feinstein Invokes Torture’s Covert Status on Declassification | emptywheel
text/html
utf-8
webpage
Feeney
Matthew
Clapper Signs Media Directive Gagging Intelligence Workers - Hit & Run : Reason.com
2014-04-22
http://reason.com/blog/2014/04/22/clapper-signs-media-directive-gagging-in
2014-04-23
attachment
Clapper Signs Media Directive Gagging Intelligence Workers - Hit & Run : Reason.com
text/html
utf-8
journalArticle
Radack
Jesselyn
When whistle-blowers suffer - Los Angeles Times
2010-04-27
http://articles.latimes.com/2010/apr/27/opinion/la-oe-radack-20100427
2014-04-23
attachment
When whistle-blowers suffer - Los Angeles Times
text/html
utf-8
journalArticle
Sullivan
Margaret
On Combating Government Secrecy: One Step Forward, One Leap Back - NYTimes.com - NYTimes.com
2014-04-23
http://publiceditor.blogs.nytimes.com/2014/04/23/on-combating-government-secrecy-one-step-forward-one-leap-back/?module=BlogPost-Title&version=Blog%20Main&contentCollection=Opinion&action=Click&pgtype=Blogs®ion=Body
2014-04-23
attachment
On Combating Government Secrecy: One Step Forward, One Leap Back - NYTimes.com - NYTimes.com
text/html
utf-8
webpage
Jones
Nate
Two and a Half Years Later, DOJ Forced to “Confirm or Deny” Existence of Memo Justifying Drone Assassinations of Americans \textbar UNREDACTED
2014-04-22
http://nsarchive.wordpress.com/2014/04/22/two-and-a-half-years-later-doj-forced-to-confirm-or-deny-existence-of-memo-justifying-drone-assassinations-of-americans/
2014-04-23
attachment
Two and a Half Years Later, DOJ Forced to “Confirm or Deny” Existence of Memo Justifying Drone Assassinations of Americans | UNREDACTED
text/html
utf-8
webpage
The Hacker Wars on Vimeo
http://vimeo.com/88297442
2014-04-23
attachment
The Hacker Wars on Vimeo
text/html
utf-8
webpage
Byrne
Sean
Microsoft OneDrive for Business modifies files as it syncs \textbar Myce.com
2014-04-17
http://www.myce.com/news/microsoft-onedrive-for-business-modifies-files-as-it-syncs-71168/
2014-04-23
attachment
Microsoft OneDrive for Business modifies files as it syncs | Myce.com
text/html
utf-8
webpage
Huergo
Jennifer
NIST Removes Cryptography Algorithm from Random Number Generator Recommendations
2014-04-21
http://www.nist.gov/itl/csd/sp800-90-042114.cfm
2014-04-23
attachment
NIST Removes Cryptography Algorithm from Random Number Generator Recommendations
text/html
utf-8
webpage
Cushing
Tim
Putin's 'Clapper' Moment: What He Said Vs. What Russian Intelligence Actually Does \textbar Techdirt
2014-04-21
https://www.techdirt.com/articles/20140420/15155326974/putins-clapper-moment-what-he-said-vs-what-russian-intelligence-actually-does.shtml
2014-04-23
attachment
Putin's 'Clapper' Moment: What He Said Vs. What Russian Intelligence Actually Does | Techdirt
text/html
windows-1252
webpage
Edmonds
Sibel
US Government’s Soft Spot for World Leaders with Hidden Treasure Boxes
2014-04-22
http://www.boilingfrogspost.com/2014/04/22/us-governments-soft-spot-for-world-leaders-with-hidden-treasure-boxes/
2014-04-23
attachment
US Government’s Soft Spot for World Leaders with Hidden Treasure Boxes
text/html
utf-8
webpage
Kayyali
Nadia
Opsahl
Kurt
In the One-sided Foreign Intelligence Surveillance Court, It's Hard to Get The Whole Story \textbar Electronic Frontier Foundation
2014-04-16
https://www.eff.org/deeplinks/2014/04/in-one-sided-foreign-intelligence-surveillance-court-its-hard-to-get-whole-story
2014-04-23
attachment
In the One-sided Foreign Intelligence Surveillance Court, It's Hard to Get The Whole Story | Electronic Frontier Foundation
text/html
utf-8
webpage
Join WashPost for a discussion on Pulitzer Prize-winning NSA coverage
2014-04-14
http://www.washingtonpost.com/pr/wp/2014/04/14/join-washpost-for-a-discussion-on-pulitzer-prize-winning-nsa-coverage/
2014-04-23
attachment
Join WashPost for a discussion on Pulitzer Prize-winning NSA coverage
text/html
utf-8
webpage
Reese
Frederick
CIA whistleblower John Kiriakou Denied Freedom Of Speech
2014-04-22
http://www.mintpressnews.com/incarcerated-cia-whistleblower-denied-freedom-of-speech/189350/
2014-04-23
attachment
CIA whistleblower John Kiriakou Denied Freedom Of Speech
text/html
utf-8
journalArticle
Gorman
Siobhan
Spy Agencies Told to Plug Media Leaks - WSJ.com
2014-04-21
http://online.wsj.com/news/article_email/SB10001424052702304049904579516103606857772-lMyQjAxMTA0MDIwMTEyNDEyWj
2014-04-23
attachment
Spy Agencies Told to Plug Media Leaks - WSJ.com
text/html
utf-8
webpage
Beyond Orwell: Surveillance, Secrets, and Whistleblowers in the Security State \textbar Lannan Center for Poetics and Social Practice
2014-04-22
http://lannan.georgetown.edu/2014/04/beyond-orwell-surveillance-secrets-and-whistleblowers-in-the-security-state/
2014-04-24
attachment
Beyond Orwell: Surveillance, Secrets, and Whistleblowers in the Security State | Lannan Center for Poetics and Social Practice
text/html
utf-8
webpage
Gosztola
Kevin
Bureau of Prisons Throws CIA Torture Whistleblower John Kiriakou’s Children Out of Visitors Room \textbar The Dissenter
2014-04-21
http://dissenter.firedoglake.com/2014/04/21/bureau-of-prisons-throws-cia-whistleblower-john-kiriakous-children-out-of-visitors-room/
2014-04-24
attachment
Bureau of Prisons Throws CIA Torture Whistleblower John Kiriakou’s Children Out of Visitors Room | The Dissenter
text/html
utf-8
webpage
Landay
Jonathan
U.S. intelligence chief bars unauthorized contacts with reporters on all intel-related matters \textbar National \textbar McClatchy DC
2014-04-21
http://www.mcclatchydc.com/2014/04/21/225055/us-intelligence-chief-bars-unauthorized.html
2014-04-24
attachment
U.S. intelligence chief bars unauthorized contacts with reporters on all intel-related matters | National | McClatchy DC
text/html
utf-8
book
Free Speech Zone with @AlyonaMink
2014-04-21
http://live.huffingtonpost.com/r/segment/free-speech-zone/53459b9f02a7600458000544
2014-04-24
attachment
Free Speech Zone with @AlyonaMink
text/html
utf-8
webpage
When is journalism tantamount to complicity? — Medium
https://medium.com/p/5640738c7891
2014-04-24
attachment
When is journalism tantamount to complicity? — Medium
text/html
utf-8
webpage
Gosztola
Kevin
When Americans Saw Injustice by the FBI and Did Something About It—A Review of the Film, ’1971′ \textbar The Dissenter
2014-04-21
http://dissenter.firedoglake.com/2014/04/21/when-americans-saw-injustice-by-the-fbi-did-something-about-it-a-review-of-the-film-1971/
2014-04-24
attachment
When Americans Saw Injustice by the FBI and Did Something About It—A Review of the Film, ’1971′ | The Dissenter
text/html
utf-8
webpage
Radack
Jesselyn
Clapper's Draconian Directive: I Will Choose Who is Allowed to Speak
2014-04-22
http://www.dailykos.com/story/2014/04/22/1293720/-Clapper-s-Draconian-Directive-I-Will-Choose-Who-is-Allowed-to-Speak
2014-04-24
attachment
Clapper's Draconian Directive: I Will Choose Who is Allowed to Speak
text/html
utf-8
webpage
Gerstein
Josh
Court: release legal memo on drone killing - POLITICO.com
2014-04-21
http://www.politico.com/blogs/under-the-radar/2014/04/court-release-legal-memo-on-drone-killing-187153.html
2014-04-25
attachment
Court: release legal memo on drone killing - POLITICO.com
text/html
utf-8
webpage
Napier
Mick
PE01515: Asylum in Scotland to Glasgow University Rector Edward Snowden - Getting Involved : Scottish Parliament
2014-04-19
https://www.scottish.parliament.uk/GettingInvolved/Petitions/asyluminscotlandforedwardsnowden
2014-04-25
attachment
PE01515: Asylum in Scotland to Glasgow University Rector Edward Snowden - Getting Involved : Scottish Parliament
text/html
utf-8
webpage
Sicherheitskreise zur NSA-Spionage: US-Regierung hält weiter hin - taz.de
http://www.taz.de/Sicherheitskreise-zur-NSA-Spionage/!137105/
2014-04-25
attachment
Sicherheitskreise zur NSA-Spionage: US-Regierung hält weiter hin - taz.de
text/html
utf-8
webpage
emptywheel
Henceforth All Published IC Comment Should Be Considered Propaganda \textbar emptywheel
2014-04-21
http://www.emptywheel.net/2014/04/21/henceforth-all-published-ic-comment-shall-be-considered-propaganda/
2014-04-25
attachment
Henceforth All Published IC Comment Should Be Considered Propaganda | emptywheel
text/html
utf-8
webpage
Aftergood
Steven
Intelligence Directive Bars Unauthorized Contacts with News Media - Secrecy News
2014-04-21
http://blogs.fas.org/secrecy/2014/04/media-contacts/
2014-04-25
attachment
Intelligence Directive Bars Unauthorized Contacts with News Media - Secrecy News
text/html
utf-8
webpage
Ribeiro
John
Activists want net neutrality, NSA spying debated at Internet governance conference \textbar PCWorld
2014-04-21
http://www.pcworld.com/article/2146100/activists-want-net-neutrality-nsa-spying-debated-at-brazil-internet-conference.html
2014-04-25
attachment
Activists want net neutrality, NSA spying debated at Internet governance conference | PCWorld
text/html
utf-8
webpage
Elbasri
Alcha
We Can't Say All That We See in Darfur
2014-04-09
http://www.foreignpolicy.com/articles/2014/04/09/we_can_t_say_all_that_we_see_in_darfur_sudan_united_nations
2014-05-03
attachment
We Can't Say All That We See in Darfur
text/html
utf-8
journalArticle
Gall
Carlotta
Glanz
James
U.S. Promotes Network to Foil Digital Spying - NYTimes.com
2014-04-20
http://www.nytimes.com/2014/04/21/us/us-promotes-network-to-foil-digital-spying.html?_r=2
2014-04-25
attachment
U.S. Promotes Network to Foil Digital Spying - NYTimes.com
text/html
utf-8
webpage
emptywheel
NSA’s New “Privacy Officer” Releases Her First Propaganda \textbar emptywheel
2014-04-21
http://www.emptywheel.net/2014/04/21/nsas-new-privacy-officer-releases-her-first-propaganda/
2014-04-25
attachment
NSA’s New “Privacy Officer” Releases Her First Propaganda | emptywheel
text/html
utf-8
webpage
From tragedy to farce - Editorials - MiamiHerald.com
2014-04-19
http://www.miamiherald.com/2014/04/19/4067653/from-tragedy-to-farce.html
2014-04-25
attachment
From tragedy to farce - Editorials - MiamiHerald.com
text/html
windows-1252
webpage
Anderson
Kenneth
Lawfare › Readings: NSA Report on the 702 Program
2014-04-19
http://www.lawfareblog.com/2014/04/readings-nsa-report-on-the-702-program/
2014-04-25
attachment
Lawfare › Readings: NSA Report on the 702 Program
text/html
utf-8
webpage
Timm
Trevor
The mentality of J Edgar Hoover’s FBI undergirds today’s surveillance state \textbar Trevor Timm \textbar Comment is free \textbar theguardian.com
2014-04-19
http://www.theguardian.com/commentisfree/2014/apr/19/hoovers-fbi-todays-surveillance-state
2014-04-25
attachment
The mentality of J Edgar Hoover’s FBI undergirds today’s surveillance state | Trevor Timm | Comment is free | theguardian.com
text/html
utf-8
webpage
emptywheel
Surprise! DOJ IG’s 1,403 Day Old Section 215 Investigation Had a Baby! \textbar emptywheel
2014-04-18
http://www.emptywheel.net/2014/04/18/surprise-doj-igs-1403-day-old-section-215-investigation-had-a-baby/
2014-04-25
attachment
Surprise! DOJ IG’s 1,403 Day Old Section 215 Investigation Had a Baby! | emptywheel
text/html
utf-8
webpage
van Buren
Peter
No-fly nightmare! Proof that American anti-terror strategy is an illogical, Kafkaesque quagmire - Salon.com
2014-04-07
http://www.salon.com/2014/04/07/no_fly_nightmare_proof_that_american_anti_terror_strategy_is_an_illogical_kafkaesque_quagmire_partner/
2014-04-25
attachment
No-fly nightmare! Proof that American anti-terror strategy is an illogical, Kafkaesque quagmire - Salon.com
text/html
utf-8
webpage
Gosztola
Kevin
American Muslims Sue FBI for Allegedly Placing Them on No Fly List After They Refused to Become Informants \textbar The Dissenter
2014-04-23
http://dissenter.firedoglake.com/2014/04/23/american-muslims-sue-fbi-for-allegedly-placing-them-on-no-fly-list-after-they-refused-to-become-informants/
2014-04-25
attachment
American Muslims Sue FBI for Allegedly Placing Them on No Fly List After They Refused to Become Informants | The Dissenter
text/html
utf-8
webpage
Lababidi
Yahia
Eyewear, THE BLOG: POEM FOR SNOWDEN #1: LABABIDI
2013-06-11
http://toddswift.blogspot.com/2013/06/poem-for-snowden-1-lababidi.html
2014-04-25
attachment
Eyewear, THE BLOG: POEM FOR SNOWDEN #1: LABABIDI
text/html
utf-8
webpage
Shachtman
Noah
Snowden’s Camp: Staged Putin Q&A Was a Screw-Up - The Daily Beast
2014-04-20
http://www.thedailybeast.com/articles/2014/04/20/snowden-s-camp-staged-putin-q-a-was-a-screw-up.html
2014-04-26
attachment
Snowden’s Camp: Staged Putin Q&A Was a Screw-Up - The Daily Beast
text/html
utf-8
webpage
Rosen
Jay
To the Snowden story system a crowning Pulitzer might have gone » Pressthink
2014-04-14
http://pressthink.org/2014/04/to-the-snowden-story-system-a-pulitzer-might-have-gone/
2014-04-26
attachment
To the Snowden story system a crowning Pulitzer might have gone » Pressthink
text/html
utf-8
journalArticle
Somaiya
Ravi
Cohen
Noam
Glenn Greenwald and Laura Poitras Are Among the Recipients of the Polk Award - NYTimes.com
2014-04-11
http://www.nytimes.com/2014/04/12/business/journalists-who-broke-news-on-nsa-surveillance-return-to-the-us.html?_r=0
2014-04-26
attachment
Glenn Greenwald and Laura Poitras Are Among the Recipients of the Polk Award - NYTimes.com
text/html
utf-8
webpage
Holpuch
Amanda
Journalists who broke NSA story in Guardian dedicate award to Snowden \textbar World news \textbar theguardian.com
2014-04-11
http://www.theguardian.com/world/2014/apr/11/journalists-nsa-guardian-polk-award-snowden
2014-04-26
attachment
Journalists who broke NSA story in Guardian dedicate award to Snowden | World news | theguardian.com
text/html
utf-8
webpage
Glenn Greenwald, Laura Poitras Returning To U.S. For First Time Since Snowden Revelations
http://www.huffingtonpost.com/2014/04/10/glenn-greenwald-return-laura-poitras-snowden_n_5125574.html?1397142943
2014-04-26
attachment
Glenn Greenwald, Laura Poitras Returning To U.S. For First Time Since Snowden Revelations
text/html
utf-8
webpage
Bombardieri
Marcella
Aaron Swartz and MIT: The inside story - Metro - The Boston Globe
2014-03-30
http://www.bostonglobe.com/metro/2014/03/29/the-inside-story-mit-and-aaron-swartz/YvJZ5P6VHaPJusReuaN7SI/story.html
2014-04-26
attachment
Aaron Swartz and MIT: The inside story - Metro - The Boston Globe
text/html
utf-8
webpage
Brodkin
Jon
Tech giants, chastened by Heartbleed, finally agree to fund OpenSSL \textbar Ars Technica
2014-04-24
http://arstechnica.com/information-technology/2014/04/tech-giants-chastened-by-heartbleed-finally-agree-to-fund-openssl/
2014-04-28
attachment
Tech giants, chastened by Heartbleed, finally agree to fund OpenSSL | Ars Technica
text/html
utf-8
webpage
Gosztola
Kevin
Bureau of Prisons Throws CIA Torture Whistleblower John Kiriakou’s Children Out of Visitors Room \textbar The Dissenter
2014-04-21
http://dissenter.firedoglake.com/2014/04/21/bureau-of-prisons-throws-cia-whistleblower-john-kiriakous-children-out-of-visitors-room/
2014-04-28
attachment
Bureau of Prisons Throws CIA Torture Whistleblower John Kiriakou’s Children Out of Visitors Room | The Dissenter
text/html
utf-8
webpage
Brandom
Russell
Google is working on end-to-end encryption for Gmail \textbar The Verge
2014-04-21
http://mobile.theverge.com/2014/4/21/5636384/google-is-working-on-end-to-end-encryption-for-gmail
2014-04-28
attachment
Google is working on end-to-end encryption for Gmail | The Verge
text/html
utf-8
webpage
Universities and the NSA: Time to Stop Collaborating? \textbar Human Rights Working Group at Johns Hopkins University
2014-04-12
http://hrwgjhu.wordpress.com/2014/04/12/universities-and-the-nsa-time-to-stop-collaborating/
2014-04-28
attachment
Universities and the NSA: Time to Stop Collaborating? | Human Rights Working Group at Johns Hopkins University
text/html
utf-8
webpage
Sanchez
Julian
The NSA's Heartbleed problem is the problem with the NSA \textbar Julian Sanchez \textbar Technology \textbar theguardian.com
2014-04-12
http://www.theguardian.com/commentisfree/2014/apr/12/the-nsas-heartbleed-problem-is-the-problem-with-the-nsa
2014-04-28
attachment
The NSA's Heartbleed problem is the problem with the NSA | Julian Sanchez | Technology | theguardian.com
text/html
utf-8
webpage
IC ON THE RECORD • Statement on Bloomberg News story that NSA knew...
2014-04-11
http://icontherecord.tumblr.com/post/82416436703/statement-on-bloomberg-news-story-that-nsa-knew
2014-04-28
attachment
IC ON THE RECORD • Statement on Bloomberg News story that NSA knew...
text/html
utf-8
webpage
emptywheel
DOJ Continues Its “Multi-Subject” Investigation of WikiLeaks \textbar emptywheel
2014-04-26
http://www.emptywheel.net/2014/04/26/doj-continues-its-multi-subject-investigation-of-wikileaks/
2014-04-29
attachment
DOJ Continues Its “Multi-Subject” Investigation of WikiLeaks | emptywheel
text/html
utf-8
webpage
BR 14 01 Opinion and Order
https://www.documentcloud.org/documents/1148902-br-14-01-opinion-and-order.html
2014-04-29
attachment
BR 14 01 Opinion and Order
text/html
utf-8
journalArticle
Savage
Charlie
Intelligence Chief Issues Limits on Press Contacts - NYTimes.com
2014-04-21
http://www.nytimes.com/2014/04/22/us/politics/intelligence-chief-issues-limits-on-press-contacts.html
2014-04-29
attachment
Intelligence Chief Issues Limits on Press Contacts - NYTimes.com
text/html
utf-8
webpage
Leopold
Jason
James Mitchell: 'I'm just a guy who got asked to do something for his country' \textbar World news \textbar theguardian.com
2014-04-18
http://www.theguardian.com/world/2014/apr/18/james-mitchell-cia-torture-interview
2014-04-29
attachment
James Mitchell: 'I'm just a guy who got asked to do something for his country' | World news | theguardian.com
text/html
utf-8
journalArticle
Rosenberg
Carol
GUANTANAMO BAY NAVY BASE, Cuba: Guantánamo judge to CIA: Disclose ‘black site’ details to USS Cole defense lawyers - Guantánamo - MiamiHerald.com
2014-04-17
http://www.miamiherald.com/2014/04/17/4064798/guantanamo-judge-to-cia-disclose.html
2014-04-29
attachment
GUANTANAMO BAY NAVY BASE, Cuba: Guantánamo judge to CIA: Disclose ‘black site’ details to USS Cole defense lawyers - Guantánamo - MiamiHerald.com
text/html
windows-1252
webpage
Greenwald
Glenn
Ackerman
Spencer
NSA collected Americans' email records in bulk for two years under Obama \textbar World news \textbar The Guardian
2013-06-27
http://www.theguardian.com/world/2013/jun/27/nsa-data-mining-authorised-obama
2014-04-29
attachment
NSA collected Americans' email records in bulk for two years under Obama | World news | The Guardian
text/html
utf-8
journalArticle
Johnston
David
Savage
Charlie
Obama Reluctant to Look Into Bush Programs - NYTimes.com
2009
http://www.nytimes.com/2009/01/12/us/politics/12inquire.html?pagewanted=all&_r=0
2014-04-29
attachment
Obama Reluctant to Look Into Bush Programs - NYTimes.com
text/html
windows-1252
webpage
Knight
Ethan
RK Notice 4 3 2014
2014-04-03
http://www.documentcloud.org/documents/1102567-rk-notice-4-3-2014.html
2014-04-29
attachment
RK Notice 4 3 2014
text/html
utf-8
webpage
Clapper
James
Unclassified 702 Response
2014-03-28
https://www.documentcloud.org/documents/1100298-unclassified-702-response.html
2014-04-29
attachment
Unclassified 702 Response
text/html
utf-8
journalArticle
Savage
Charlie
Terror Suit Against Jordanian Bank Tests U.S. Diplomacy and Secrecy Laws - NYTimes.com
2014-04-01
http://www.nytimes.com/2014/04/02/us/terror-suit-against-jordanian-bank-tests-us-diplomacy-and-secrecy-laws.html
2014-04-29
attachment
Terror Suit Against Jordanian Bank Tests U.S. Diplomacy and Secrecy Laws - NYTimes.com
text/html
utf-8
webpage
Lynch
Colum
'They Just Stood Watching'
2014-04-07
http://www.foreignpolicy.com/articles/2014/04/07/special_report_darfur_united_nations_peacekeeping_investigation
2014-05-03
attachment
'They Just Stood Watching'
text/html
utf-8
webpage
Hudson
John
Greystone Denies Russian Accusations of Meddling in Ukraine
2014-04-08
http://thecable.foreignpolicy.com/posts/2014/04/08/greystone_denies_russian_accusations_of_meddling_in_ukraine
2014-05-03
attachment
Greystone Denies Russian Accusations of Meddling in Ukraine
text/html
utf-8
webpage
Leher
Brian
The Brian Lehrer Show: An Update to Our List of What We Know the NSA Can Do (So Far) - WNYC
2014-04-08
http://www.wnyc.org/story/update-our-list-what-we-know-nsa-can-do-so-far/
2014-05-03
attachment
The Brian Lehrer Show: An Update to Our List of What We Know the NSA Can Do (So Far) - WNYC
text/html
utf-8
webpage
Avirgan
Jody
The Brian Lehrer Show: A Running List of What We Know the NSA Can Do. So Far. - WNYC
2014
http://www.wnyc.org/story/running-list-what-we-know-nsa-can-do-so-far/
2014-05-03
attachment
The Brian Lehrer Show: A Running List of What We Know the NSA Can Do. So Far. - WNYC
text/html
utf-8
webpage
Bennett
Wells
Lawfare › Lawfare Podcast, Episode #69: A Conversation with Former NSA Deputy Director Chris Inglis
2014-04-05
http://www.lawfareblog.com/2014/04/lawfare-podcast-episode-69-a-conversation-with-former-nsa-deputy-director-chris-inglis/
2014-05-03
attachment
Lawfare › Lawfare Podcast, Episode #69: A Conversation with Former NSA Deputy Director Chris Inglis
text/html
utf-8
webpage
Wittes
Benjamin
Lawfare › A Moment of Levity
2014-04-03
http://www.lawfareblog.com/2014/04/a-moment-of-levity/
2014-05-03
attachment
Lawfare › A Moment of Levity
text/html
utf-8
webpage
Hudson
John
Harris
Shane
Republicans Join Democrats in Vote to Declassify Senate Torture Report
2014-04-03
http://thecable.foreignpolicy.com/posts/2014/04/03/republicans_join_democrats_in_vote_to_declassify_senate_torture_report
2014-05-03
attachment
Republicans Join Democrats in Vote to Declassify Senate Torture Report
text/html
utf-8
webpage
Brilliant
Myron
Letter on the Need to Distinguish National Security from Commercial Issues \textbar U.S. Chamber of Commerce
2014-04-03
https://www.uschamber.com/letter/letter-need-distinguish-national-security-commercial-issues
2014-05-03
attachment
Letter on the Need to Distinguish National Security from Commercial Issues | U.S. Chamber of Commerce
text/html
utf-8
webpage
Chesney
Robert
Lawfare › The National Security Agency at the Crossroads: A Conference at UT—Livestream
2014-04-03
http://www.lawfareblog.com/2014/04/the-national-security-agency-at-the-crossroads-a-conference-at-ut-livestream/
2014-05-03
attachment
Lawfare › The National Security Agency at the Crossroads: A Conference at UT—Livestream
text/html
utf-8
webpage
Hudson
John
Democrats Solidify Support to Release CIA Torture Report
2014-04-02
http://thecable.foreignpolicy.com/posts/2014/04/02/democrats_solidify_support_to_release_cia_torture_report
2014-05-03
attachment
Democrats Solidify Support to Release CIA Torture Report
text/html
utf-8
webpage
'Anti-Drone' Hoodie – Privacy Gift Shop
http://privacygiftshop.com/products/anti-drone-hoodie
2014-05-03
attachment
'Anti-Drone' Hoodie – Privacy Gift Shop
text/html
utf-8
webpage
Bennett
Wells
Wittes
Benjamin
Lawfare › Exclusive: NSA Program Can Target Thoughts of Millions of Targets, Thousands of Americans
2014-04-01
http://www.lawfareblog.com/2014/04/exclusive-nsa-program-can-target-thoughts-of-millions-of-targets-thousands-of-americans/
2014-05-03
attachment
Lawfare › Exclusive: NSA Program Can Target Thoughts of Millions of Targets, Thousands of Americans
text/html
utf-8
webpage
Harris
Shane
Early Release
2014-03-21
http://www.foreignpolicy.com/articles/2014/03/31/early_release
2014-05-03
attachment
Early Release
text/html
utf-8
webpage
Stigall
Chris
Rob Schneider Tells Chris Stigall: We Are Sliding Very Fast Towards Fascism « CBS Philly
2014-05-02
http://philadelphia.cbslocal.com/2014/05/02/rob-schneider-tells-chris-stigall-we-are-sliding-very-fast-towards-fascism/
2014-05-03
attachment
Rob Schneider Tells Chris Stigall: We Are Sliding Very Fast Towards Fascism « CBS Philly
text/html
utf-8
webpage
Franceschi-Bicchierai
Lorenzo
Glenn Greenwald Faces Off Against Former NSA Chief Michael Hayden
2014-05-02
http://mashable.com/2014/05/02/glenn-greenwald-nsa-michael-hayden-debate/
2014-05-03
attachment
Glenn Greenwald Faces Off Against Former NSA Chief Michael Hayden
text/html
utf-8
webpage
Ackerman
Spencer
White House seeks legal immunity for firms that hand over customer data \textbar World news \textbar theguardian.com
2014-05-02
http://www.theguardian.com/world/2014/may/02/white-house-legal-immunity-telecoms-firms-bill?CMP=twt_fd&CMP=SOCxx2I2
2014-05-03
attachment
White House seeks legal immunity for firms that hand over customer data | World news | theguardian.com
text/html
utf-8
webpage
Baumann
Nick
This American Refused to Become an FBI Informant. Then the Government Made His Family's Life Hell. \textbar Mother Jones
2014-05-01
http://www.motherjones.com/politics/2014/05/sudan-fbi-informant-naji-mansour-terrorism
2014-05-03
attachment
This American Refused to Become an FBI Informant. Then the Government Made His Family's Life Hell. | Mother Jones
text/html
utf-8
journalArticle
Timberg
Craig
Apple, Facebook, others defy authorities, increasingly notify users of secret data demands after Snowden revelations - The Washington Post
2014-05-01
http://www.washingtonpost.com/business/technology/apple-facebook-others-defy-authorities-increasingly-notify-users-of-secret-data-demands-after-snowden-revelations/2014/05/01/b41539c6-cfd1-11e3-b812-0c92213941f4_story.html?hpid=z1
2014-05-03
attachment
Apple, Facebook, others defy authorities, increasingly notify users of secret data demands after Snowden revelations - The Washington Post
text/html
utf-8
webpage
Cushing
Tim
CISPA Take 3: Feinstein & Chambliss Draft Another Cybersecurity Bill, Designed To Wipe Out Your Privacy \textbar Techdirt
2014-04-29
http://www.techdirt.com/articles/20140429/07203227062/cispa-take-3-sens-feinstein-chambliss-draft-another-cybersecurity-bill-with-weak-privacy-protections-expansive-data-sharing.shtml
2014-05-03
attachment
CISPA Take 3: Feinstein & Chambliss Draft Another Cybersecurity Bill, Designed To Wipe Out Your Privacy | Techdirt
text/html
windows-1252
webpage
INET San Francisco 2014 \textbar INET San Francisco
2014-05-09
http://internetsociety.org/inet-san-francisco2014/
2014-05-03
attachment
INET San Francisco 2014 | INET San Francisco
text/html
utf-8
webpage
Cole
David
How Many Have We Killed? by David Cole \textbar NYRblog \textbar The New York Review of Books
2014-04-29
http://www.nybooks.com/blogs/nyrblog/2014/apr/29/how-many-have-we-killed/
2014-05-03
attachment
How Many Have We Killed? by David Cole | NYRblog | The New York Review of Books
text/html
utf-8
webpage
Rogin
Josh
Lake
Eli
Kerry: U.S. Taped Moscow’s Calls to Its Ukraine Spies - The Daily Beast
2014-04-29
http://www.thedailybeast.com/articles/2014/04/29/kerry-u-s-taped-moscow-s-calls-to-its-ukraine-spies.html
2014-05-03
attachment
Kerry: U.S. Taped Moscow’s Calls to Its Ukraine Spies - The Daily Beast
text/html
utf-8
webpage
Roller
Emma
Hillary Clinton: Edward Snowden's Leaks Helped Terrorists - NationalJournal.com
2014-04-25
http://www.nationaljournal.com/defense/hillary-clinton-edward-snowden-s-leaks-helped-terrorists-20140425
2014-05-03
attachment
Hillary Clinton: Edward Snowden's Leaks Helped Terrorists - NationalJournal.com
text/html
utf-8
webpage
Goodman
Amy
Gonzalez
Juan
How Refusing to Be an FBI Informant Can Get You Put on the No-Fly List \textbar Alternet
2014-04-24
http://www.alternet.org/news-amp-politics/four-muslim-americans-who-refused-be-informants-file-lawsuit-against-fbi-placing
2014-05-03
attachment
How Refusing to Be an FBI Informant Can Get You Put on the No-Fly List | Alternet
text/html
utf-8
webpage
Huntley
Shane
Marquis-Boire
Morgan
BH_Asia_2014_Boire_Huntley.pdf - Google Drive
https://docs.google.com/a/google.com/file/d/0B5MF2UA44-sabjljRlZWNktxZTg/edit?pli=1
2014-05-03
attachment
BH_Asia_2014_Boire_Huntley.pdf - Google Drive
text/html
utf-8
webpage
Schneier
Bruce
Schneier on Security: Tracking People from Smartphone Accelerometers
2014-04-30
https://www.schneier.com/blog/archives/2014/04/tracking_people_2.html?utm_medium=twitter&utm_source=twitterfeed
2014-05-03
attachment
Schneier on Security: Tracking People from Smartphone Accelerometers
text/html
utf-8
webpage
Schneier
Bruce
Schneier on Security: Conversnitch
2014-04-23
https://www.schneier.com/blog/archives/2014/04/conversnitch.html?utm_medium=twitter&utm_source=twitterfeed
2014-05-03
attachment
Schneier on Security: Conversnitch
text/html
utf-8
webpage
Soldatov
Andrei
Borogan
Irina
Russia's Surveillance State \textbar World Policy Institute
http://www.worldpolicy.org/journal/fall2013/Russia-surveillance
2014-05-03
attachment
Russia's Surveillance State | World Policy Institute
text/html
utf-8
webpage
Lewis
James
Reference Note on Russian Communications Surveillance \textbar Center for Strategic and International Studies
2014-04-18
http://csis.org/publication/reference-note-russian-communications-surveillance
2014-05-03
attachment
Reference Note on Russian Communications Surveillance | Center for Strategic and International Studies
text/html
utf-8
webpage
Schneier
Bruce
Schneier on Security: Metaphors of Surveillance
2014-04-18
https://www.schneier.com/blog/archives/2014/04/metaphors_of_su.html?utm_medium=twitter&utm_source=twitterfeed
2014-05-03
attachment
Schneier on Security: Metaphors of Surveillance
text/html
utf-8
webpage
Olukotun
Deji
Mapping Metaphors to Fight Surveillance \textbar PEN American Center
2014-04-11
http://www.pen.org/blog/mapping-metaphors-fight-surveillance
2014-05-03
attachment
Mapping Metaphors to Fight Surveillance | PEN American Center
text/html
utf-8
webpage
Schneier
Bruce
Schneier on Security: Police Disabling Their Own Voice Recorders
2014-04-11
https://www.schneier.com/blog/archives/2014/04/police_disablin.html?utm_medium=twitter&utm_source=twitterfeed
2014-05-03
attachment
Schneier on Security: Police Disabling Their Own Voice Recorders
text/html
utf-8
webpage
Farivar
Cyrus
LAPD officers monkey-wrenched cop-monitoring gear in patrol cars \textbar Ars Technica
2014-04-08
http://arstechnica.com/tech-policy/2014/04/lapd-officers-monkey-wrenched-cop-monitoring-gear-in-patrol-cars/
2014-05-03
attachment
LAPD officers monkey-wrenched cop-monitoring gear in patrol cars | Ars Technica
text/html
utf-8
webpage
Schneier
Bruce
Schneier on Security: Seventh Movie-Plot Threat Contest
2014-04-01
https://www.schneier.com/blog/archives/2014/04/seventh_movie-p.html?utm_medium=twitter&utm_source=twitterfeed
2014-05-03
attachment
Schneier on Security: Seventh Movie-Plot Threat Contest
text/html
utf-8
webpage
Robertson
Jordan
Riley
Michael
U.S. Contractors Scale Up Search for Heartbleed-Like Flaws - Bloomberg
2014-05-02
http://mobile.bloomberg.com/news/2014-05-02/us-contractors-scale-up-search-for-heartbleed-like-flaws.html
2014-05-05
attachment
U.S. Contractors Scale Up Search for Heartbleed-Like Flaws - Bloomberg
text/html
utf-8
webpage
How to tell if you have secure email \textbar Wise Bold
2014-03-15
https://www.wisebold.com/2014/how-to-tell-if-have-secure-email/
2014-05-05
attachment
How to tell if you have secure email | Wise Bold
text/html
utf-8
webpage
Team
Yahoo Privacy
Yahoo’s Default = A Personalized Experience \textbar Yahoo Global Public Policy
2014-04-30
http://yahoopolicy.tumblr.com/post/84363620568/yahoos-default-a-personalized-experience
2014-05-05
attachment
Yahoo’s Default = A Personalized Experience | Yahoo Global Public Policy
text/html
utf-8
journalArticle
Timberg
Craig
Apple, Facebook, others defy authorities, increasingly notify users of secret data demands after Snowden revelations - The Washington Post
2014-05-01
http://www.washingtonpost.com/business/technology/apple-facebook-others-defy-authorities-increasingly-notify-users-of-secret-data-demands-after-snowden-revelations/2014/05/01/b41539c6-cfd1-11e3-b812-0c92213941f4_story.html
2014-05-05
attachment
Apple, Facebook, others defy authorities, increasingly notify users of secret data demands after Snowden revelations - The Washington Post
text/html
utf-8
webpage
Higgins
Parker
The Supreme Court’s real technology problem \textbar parker higgins dot net
2014-04-30
http://parkerhiggins.net/2014/04/the-supreme-courts-real-technology-problem/
2014-05-05
attachment
The Supreme Court’s real technology problem | parker higgins dot net
text/html
utf-8
webpage
Auerbach
Dan
4 Simple Changes to Stop Online Tracking \textbar Electronic Frontier Foundation
2012-10-25
https://www.eff.org/deeplinks/2012/04/4-simple-changes-protect-your-privacy-online
2014-05-05
attachment
4 Simple Changes to Stop Online Tracking | Electronic Frontier Foundation
text/html
utf-8
webpage
Gallagher
Ryan
British Spy Chiefs Secretly Begged to Play in NSA's Data Pools - The Intercept
2014-04-30
https://firstlook.org/theintercept/article/2014/04/30/gchq-prism-nsa-fisa-unsupervised-access-snowden/
2014-05-05
attachment
British Spy Chiefs Secretly Begged to Play in NSA's Data Pools - The Intercept
text/html
utf-8
webpage
Rosenzweig
Paul
Soghoian
Chris
Vitkowsky
Vincent
Beyond Heartbleed: Encryption, Zero-Day Exploits, and The NSA - Podcast » Publications » The Federalist Society
2014-04-25
http://www.fed-soc.org/publications/detail/beyond-heartbleed-encryption-zero-day-exploits-and-the-nsa-podcast
2014-05-05
attachment
Beyond Heartbleed: Encryption, Zero-Day Exploits, and The NSA - Podcast » Publications » The Federalist Society
text/html
windows-1252
webpage
Gerstein
Josh
Justices appear open to limits on cellphone searches - Josh Gerstein and Tal Kopan - POLITICO.com
http://www.politico.com/story/2014/04/justices-cell-phone-searches-106149_Page2.html
2014-05-05
attachment
Justices appear open to limits on cellphone searches - Josh Gerstein and Tal Kopan - POLITICO.com
text/html
utf-8
webpage
Rice
Matthew
Monitoring centres: Force multipliers from the surveillance industry \textbar Privacy International
2014-04-30
https://www.privacyinternational.org/blog/monitoring-centres-force-multipliers-from-the-surveillance-industry
2014-05-05
attachment
Monitoring centres: Force multipliers from the surveillance industry | Privacy International
text/html
utf-8
webpage
secure-email/README.md at master · OpenTechFund/secure-email · GitHub
2014-04-30
https://github.com/OpenTechFund/secure-email/blob/master/README.md#startmail
2014-05-05
attachment
secure-email/README.md at master · OpenTechFund/secure-email · GitHub
text/html
utf-8
webpage
Soto
Alonso
Winter
Brian
Saab wins Brazil jet deal after NSA spying sours Boeing bid \textbar Reuters
2013-12-18
http://www.reuters.com/article/2013/12/18/us-brazil-jets-idUSBRE9BH11C20131218
2014-05-05
attachment
Saab wins Brazil jet deal after NSA spying sours Boeing bid | Reuters
text/html
utf-8
webpage
Meyers
Matthew
GPS “Bullets” and the Fourth Amendment – Wake Forest Law Review
2014-04-15
http://wakeforestlawreview.com/gps-bullets-and-the-fourth-amendment
2014-05-05
attachment
GPS “Bullets” and the Fourth Amendment – Wake Forest Law Review
text/html
utf-8
journalArticle
Nakashima
Ellen
Surveillance court rejected Verizon challenge to NSA calls program - The Washington Post
2014-04-25
http://www.washingtonpost.com/world/national-security/surveillance-court-rejected-verizon-challenge-to-nsa-calls-program/2014/04/25/78d430c2-ccc2-11e3-93eb-6c0037dde2ad_story.html
2014-05-05
attachment
Surveillance court rejected Verizon challenge to NSA calls program - The Washington Post
text/html
utf-8
book
The FRONTLINE Interview: Barton Gellman \textbar United States of Secrets \textbar FRONTLINE \textbar PBS
2014-03-07
http://www.pbs.org/wgbh/pages/frontline/government-elections-politics/united-states-of-secrets/the-frontline-interview-barton-gellman/
2014-05-16
attachment
The FRONTLINE Interview: Barton Gellman | United States of Secrets | FRONTLINE | PBS
text/html
utf-8
webpage
emptywheel
The Phone Dragnet Adopted “Selection Term” by 2013 \textbar emptywheel
2014-05-14
http://www.emptywheel.net/2014/05/14/the-phone-dragnet-adopted-selection-term-by-2013/
2014-05-16
attachment
The Phone Dragnet Adopted “Selection Term” by 2013 | emptywheel
text/html
utf-8
webpage
Taddonio
Patrice
Coming in May on FRONTLINE \textbar Inside FRONTLINE \textbar FRONTLINE \textbar PBS
2014-05-05
http://www.pbs.org/wgbh/pages/frontline/inside-frontline/coming-in-may-on-frontline/
2014-05-16
attachment
Coming in May on FRONTLINE | Inside FRONTLINE | FRONTLINE | PBS
text/html
utf-8
webpage
Sanchez
Julian
USA FREEDOM: How Many Hops? \textbar Just Security
2014-05-13
http://justsecurity.org/2014/05/13/usa-freedom-hops/
2014-05-16
attachment
USA FREEDOM: How Many Hops? | Just Security
text/html
utf-8
manuscript
Greenwald
Glenn
No Place to Hide (Glenn Greenwald) - YouTube
2014-05-15
http://www.youtube.com/watch?v=ApY7MVeoldo#t=1343
2014-05-16
attachment
No Place to Hide (Glenn Greenwald) - YouTube
text/html
utf-8
webpage
emptywheel
On USA Freedom: Heed Jan Schakowsky’s Warning \textbar emptywheel
2014-05-16
http://www.emptywheel.net/2014/05/16/on-usa-freedom-heed-jan-schakowskys-warning/
2014-05-16
attachment
On USA Freedom: Heed Jan Schakowsky’s Warning | emptywheel
text/html
utf-8
webpage
JOFFE V . GOOGLE , INC. NINTH CIRCUIT decision
2013-09-10
http://cdn.ca9.uscourts.gov/datastore/opinions/2013/09/10/11-17483.pdf
2013-09-11 19:32:14
attachment
11-17483.pdf
2013-09-11 19:32:14
http://cdn.ca9.uscourts.gov/datastore/opinions/2013/09/10/11-17483.pdf
application/pdf
utf-8
webpage
ABC News
Washington Post
Many View NSA Intrusions as Unjustified But More See Damage from Snowden Leaks
2013-11-21
http://www.langerresearch.com/uploads/1155a5NSAandSnowden.pdf
2013-11-21 22:44:34
attachment
1155a5NSAandSnowden.pdf
2013-11-21 22:44:34
http://www.langerresearch.com/uploads/1155a5NSAandSnowden.pdf
application/pdf
utf-8
webpage
SUPREME COURT OF THE UNITED STATES
FERNANDEZ v. CALIFORNIA - SCOTUS Decision
2013-11-13
http://www.supremecourt.gov/oral_arguments/argument_transcripts/12-7822_2co3.pdf
2013-11-17 03:46:08
attachment
12-7822.pdf - 12-7822_2co3.pdf
2013-11-17 03:46:08
http://www.supremecourt.gov/oral_arguments/argument_transcripts/12-7822_2co3.pdf
application/pdf
utf-8
webpage
The Reporters Committee for Freedom of the Press
American Society of News Editors
The Associated Press
The E.W. Scripps Company
The McClatchy Company
The New York Times Company
The New Yorker
Newspaper Association of America
ProPublica
The Seattle Times Company
Society of Professional Journalists
The Washington Post
World Association of Newspapers and News Publishers (WAN-IFRA)
OPEN LETTER TO THE HOUSE OF COMMONS HOME AFFAIRS COMMITTEE
2013-12-02
http://www.rcfp.org/sites/default/files/2013-12-02-Home_Affairs_Cmte_letter.pdf
2013-12-03 22:18:15
attachment
_ - 2013-12-02-Home_Affairs_Cmte_letter.pdf
2013-12-03 22:18:15
http://www.rcfp.org/sites/default/files/2013-12-02-Home_Affairs_Cmte_letter.pdf
application/pdf
utf-8
webpage
Walton
Reggie B.
FISA Court Supplemental Opinion Docket No. BR 08-13 (Redacted)
2008-12-12
https://www.eff.org/sites/default/files/filenode/4_february_2011_production_br10-82_final_redacted.ex_-_ocr_1.pdf
2013-09-11 19:45:33
attachment
4_february_2011_production_br10-82_final_redacted.ex_-_ocr_1.pdf
2013-09-11 19:45:33
https://www.eff.org/sites/default/files/filenode/4_february_2011_production_br10-82_final_redacted.ex_-_ocr_1.pdf
application/pdf
utf-8
webpage
Weich
Ronald
Non-compliance FISA review documents sent to House and Senate Intelligence Committees
2009-09-03
https://www.eff.org/sites/default/files/filenode/4_september_09_production_final_redacted.ex_-_ocr_1.pdf
2013-09-11 19:45:19
attachment
4_september_09_production_final_redacted.ex_-_ocr_1.pdf
2013-09-11 19:45:19
https://www.eff.org/sites/default/files/filenode/4_september_09_production_final_redacted.ex_-_ocr_1.pdf
application/pdf
utf-8
webpage
Burton
Faith
FISA order regarding compliance incident sent to House and Senate Intelligence Committees
2009-03-05
https://www.eff.org/sites/default/files/filenode/5_march_09_production-final_redacted.ex_-_ocr_1.pdf
2013-09-11 19:45:29
attachment
5_march_09_production-final_redacted.ex_-_ocr_1.pdf
2013-09-11 19:45:29
https://www.eff.org/sites/default/files/filenode/5_march_09_production-final_redacted.ex_-_ocr_1.pdf
application/pdf
utf-8
webpage
Pasdar
Babak
Affidavit-BP-Final.pdf
2008-02-29
http://www.wired.com/images_blogs/threatlevel/files/Affidavit-BP-Final.pdf
2013-09-16 19:46:45
attachment
Affidavit-BP-Final.pdf
2013-09-16 19:46:45
http://www.wired.com/images_blogs/threatlevel/files/Affidavit-BP-Final.pdf
application/pdf
utf-8
webpage
Bradley
Curtis A.
Cole
David
Dellinger
Walter
Dworkin
Ronald
Epstein
Richard
Hongju Koh
Harold
Heymann
Philip B.
Lederman
Martin S.
Nolan
Beth
Sessions
William S.
Stone
Geoffrey R.
Sullivan
Kathleen M.
Tribe
Laurence H.
Van Alstyne
William W.
A response to DoJ on warrantless surveillance - spying_doj-response.pdf
2006-01-09
http://emoglen.law.columbia.edu/CPC/spying_doj-response.pdf
2013-09-17 16:18:11
attachment
A response to DoJ on warrantless surveillance - spying_doj-response.pdf
2013-09-17 16:18:11
http://emoglen.law.columbia.edu/CPC/spying_doj-response.pdf
application/pdf
utf-8
webpage
Office of the Inspector General - Department of Justice
A Review of the FBI’s Use of National Security Letters - Assessment of Corrective Actions and Examination of NSL Usage in 2006
2008-03
http://www.justice.gov/oig/special/s0803b/final.pdf
2013-09-16 20:08:07
attachment
A Review of the FBI’s Use of National Security Letters - final.pdf
2013-09-16 20:08:07
http://www.justice.gov/oig/special/s0803b/final.pdf
application/pdf
utf-8
webpage
Walton
Reggie B.
FISA Court - Order Regarding Preliminary Notice of Compliance Incident Dated Januray 15, 2009 - Docket Number: BR 08-13
2009-01-28
https://www.eff.org/sites/default/files/filenode/br_08-13_alert_list_order_1-28-09_final_redacted1.ex_-_ocr_0.pdf
2013-09-11 19:45:31
attachment
br_08-13_alert_list_order_1-28-09_final_redacted1.ex_-_ocr_0.pdf
2013-09-11 19:45:31
https://www.eff.org/sites/default/files/filenode/br_08-13_alert_list_order_1-28-09_final_redacted1.ex_-_ocr_0.pdf
application/pdf
utf-8
webpage
Alexander
Keith B.
FISA Court - Supplemental Declaration of Lieutenant General Keith B. Alexander - Docket Number BR 08-13
2009-02-26
https://www.eff.org/sites/default/files/filenode/br_08-13_doj_notice_with_supp_decl_as_filed_26_feb_09_final_redacted.ex_-_ocr_1.pdf
2013-09-11 19:45:27
attachment
br_08-13_doj_notice_with_supp_decl_as_filed_26_feb_09_final_redacted.ex_-_ocr_1.pdf
2013-09-11 19:45:27
https://www.eff.org/sites/default/files/filenode/br_08-13_doj_notice_with_supp_decl_as_filed_26_feb_09_final_redacted.ex_-_ocr_1.pdf
application/pdf
utf-8
webpage
Walton
Reggie B.
FISA Court - Order - Docket Number 08-13
2009-03-02
https://www.eff.org/sites/default/files/filenode/br_08-13_order_3-2-09_final_redacted.ex_-_ocr_1.pdf
2013-09-11 19:45:25
attachment
br_08-13_order_3-2-09_final_redacted.ex_-_ocr_1.pdf
2013-09-11 19:45:25
https://www.eff.org/sites/default/files/filenode/br_08-13_order_3-2-09_final_redacted.ex_-_ocr_1.pdf
application/pdf
utf-8
webpage
Walton
Reggie B.
FISA Court - Order - Docket Number 09-06
2009-06-22
https://www.eff.org/sites/default/files/filenode/br_09-06_order_and_supplemental_order_6-22-09_final_redacted.ex_-_ocr_0.pdf
2013-09-11 19:45:23
attachment
br_09-06_order_and_supplemental_order_6-22-09_final_redacted.ex_-_ocr_0.pdf
2013-09-11 19:45:23
https://www.eff.org/sites/default/files/filenode/br_09-06_order_and_supplemental_order_6-22-09_final_redacted.ex_-_ocr_0.pdf
application/pdf
utf-8
webpage
Walton
Reggie B.
FISA Court - Order - Docket Number BR 09-13
2009-09-03
https://www.eff.org/sites/default/files/filenode/br_09-13_orders_signed_3_sept_09_final_redacted.ex_-_ocr_0.pdf
2013-09-11 19:45:15
attachment
br_09-13_orders_signed_3_sept_09_final_redacted.ex_-_ocr_0.pdf
2013-09-11 19:45:15
https://www.eff.org/sites/default/files/filenode/br_09-13_orders_signed_3_sept_09_final_redacted.ex_-_ocr_0.pdf
application/pdf
utf-8
webpage
Walton, Reggie B.
FISA Court - Order Regarding Further Compliance Incidents - Docket Number BR 09-13
2009-09-25
https://www.eff.org/sites/default/files/filenode/br_09-13_-_september_25_order_regarding_further_compliance_incidents_final_redacted.ex_-_ocr_0.pdf
2013-09-11 19:45:13
attachment
br_09-13_-_september_25_order_regarding_further_compliance_incidents_final_redacted.ex_-_ocr_0.pdf
2013-09-11 19:45:13
https://www.eff.org/sites/default/files/filenode/br_09-13_-_september_25_order_regarding_further_compliance_incidents_final_redacted.ex_-_ocr_0.pdf
application/pdf
utf-8
webpage
Walton
Reggie B.
FISA Court - Supplemental Opinion and Order - Docket Number BR 09-15
2009-11-05
https://www.eff.org/sites/default/files/filenode/br_09-15_supplemental_order_and_opinion_11-5-09_final_redacted.ex_-_ocr_0.pdf
2013-09-11 19:45:09
attachment
br_09-15_supplemental_order_and_opinion_11-5-09_final_redacted.ex_-_ocr_0.pdf
2013-09-11 19:45:09
https://www.eff.org/sites/default/files/filenode/br_09-15_supplemental_order_and_opinion_11-5-09_final_redacted.ex_-_ocr_0.pdf
application/pdf
utf-8
webpage
PEN American Center
Chilling Effects: NSA Surveillance Drives U.S. Writers to Self-Censor
2013-11-12
http://www.pen.org/sites/default/files/Chilling%20Effects_PEN%20American.pdf
2013-11-17 04:03:44
attachment
Chilling Effects_PEN American.pdf
2013-11-17 04:03:44
http://www.pen.org/sites/default/files/Chilling%20Effects_PEN%20American.pdf
application/pdf
utf-8
webpage
Steinberg
Michael J.
Beeson
Ann
Complaint - UNITED STATES DISTRICT COURT EASTERN DISTRICT OF MICHIGAN SOUTHERN DIVISION -
2006-01-17
http://emoglen.law.columbia.edu/CPC/spying_ACLU_Complaint.pdf
2013-09-17 16:18:15
attachment
Complaint - Final2 - spying_ACLU_Complaint.pdf
2013-09-17 16:18:15
http://emoglen.law.columbia.edu/CPC/spying_ACLU_Complaint.pdf
application/pdf
utf-8
webpage
doc 5 2008-021 Burr Release Document 2 - Part B.pdf
http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB441/docs/doc%205%202008-021%20Burr%20Release%20Document%202%20-%20Part%20B.pdf
2013-09-30 16:08:42
attachment
doc 5 2008-021 Burr Release Document 2 - Part B.pdf
2013-09-30 16:08:42
http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB441/docs/doc%205%202008-021%20Burr%20Release%20Document%202%20-%20Part%20B.pdf
application/pdf
utf-8
webpage
docket_06-05_1dec201_redacted.ex_-_ocr_0.pdf
https://www.eff.org/sites/default/files/filenode/docket_06-05_1dec201_redacted.ex_-_ocr_0.pdf
2013-09-11 19:45:35
attachment
docket_06-05_1dec201_redacted.ex_-_ocr_0.pdf
2013-09-11 19:45:35
https://www.eff.org/sites/default/files/filenode/docket_06-05_1dec201_redacted.ex_-_ocr_0.pdf
application/pdf
utf-8
webpage
DoJ Letter on Legal Authority for NSA Surveillance - spying_doj122205.pdf
http://emoglen.law.columbia.edu/CPC/spying_doj122205.pdf
2013-09-17 16:18:00
attachment
DoJ Letter on Legal Authority for NSA Surveillance - spying_doj122205.pdf
2013-09-17 16:18:00
http://emoglen.law.columbia.edu/CPC/spying_doj122205.pdf
application/pdf
utf-8
webpage
Grayson_Letter_to_Holder_on_Greenwald.pdf
http://www.freepress.net/sites/default/files/resources/Grayson_Letter_to_Holder_on_Greenwald.pdf
2013-11-17 04:23:39
attachment
Grayson_Letter_to_Holder_on_Greenwald.pdf
2013-11-17 04:23:39
http://www.freepress.net/sites/default/files/resources/Grayson_Letter_to_Holder_on_Greenwald.pdf
application/pdf
utf-8
webpage
Legal Authorities Supporting the Activities of the National Security Agency Described by the President - spying_doj011906.pdf
http://emoglen.law.columbia.edu/CPC/spying_doj011906.pdf
2013-09-17 16:18:28
attachment
Legal Authorities Supporting the Activities of the National Security Agency Described by the President - spying_doj011906.pdf
2013-09-17 16:18:28
http://emoglen.law.columbia.edu/CPC/spying_doj011906.pdf
application/pdf
utf-8
webpage
miami-dade.pdf
http://cdn.arstechnica.net/wp-content/uploads/2013/09/miami-dade.pdf
2013-09-26 12:38:05
attachment
miami-dade.pdf
2013-09-26 12:38:05
http://cdn.arstechnica.net/wp-content/uploads/2013/09/miami-dade.pdf
<p>Cell phone surveillance equipment purchased by the Miami police for use during the Free Trade Area of the Americas (FTAA) conference held November 16-21, 2003</p>
application/pdf
utf-8
webpage
Microsoft Word - 44883692-1A7D-28339B.doc - groundbreakerlawsuit.pdf
http://www.wired.com/images_blogs/threatlevel/files/groundbreakerlawsuit.pdf
2013-09-16 19:47:32
attachment
Microsoft Word - 44883692-1A7D-28339B.doc - groundbreakerlawsuit.pdf
2013-09-16 19:47:32
http://www.wired.com/images_blogs/threatlevel/files/groundbreakerlawsuit.pdf
application/pdf
utf-8
webpage
Microsoft Word - NSA complaint dr 9.doc - spying_CCR_Complaint.pdf
http://emoglen.law.columbia.edu/CPC/spying_CCR_Complaint.pdf
2013-09-17 16:18:21
attachment
Microsoft Word - NSA complaint dr 9.doc - spying_CCR_Complaint.pdf
2013-09-17 16:18:21
http://emoglen.law.columbia.edu/CPC/spying_CCR_Complaint.pdf
application/pdf
utf-8
webpage
Microsoft Word - terror72c.doc.doc - 20060203gonzalez.pdf
http://emoglen.law.columbia.edu/CPC/20060203gonzalez.pdf
2013-09-17 16:19:00
attachment
Microsoft Word - terror72c.doc.doc - 20060203gonzalez.pdf
2013-09-17 16:19:00
http://emoglen.law.columbia.edu/CPC/20060203gonzalez.pdf
application/pdf
utf-8
webpage
motion-declaratory-judgement-131002.pdf
http://www.uscourts.gov/uscourts/courts/fisc/motion-declaratory-judgement-131002.pdf
2013-10-02 16:17:35
attachment
motion-declaratory-judgement-131002.pdf
2013-10-02 16:17:35
http://www.uscourts.gov/uscourts/courts/fisc/motion-declaratory-judgement-131002.pdf
application/pdf
utf-8
webpage
nsa_business_records_fisa_redacted.ex_-_ocr_0.pdf
https://www.eff.org/sites/default/files/filenode/nsa_business_records_fisa_redacted.ex_-_ocr_0.pdf
2013-09-11 19:45:21
attachment
nsa_business_records_fisa_redacted.ex_-_ocr_0.pdf
2013-09-11 19:45:21
https://www.eff.org/sites/default/files/filenode/nsa_business_records_fisa_redacted.ex_-_ocr_0.pdf
application/pdf
utf-8
webpage
nsa-cia-berlin-spy-nest.pdf
http://cryptome.org/2013/10/nsa-cia-berlin-spy-nest.pdf
2013-10-28 22:41:37
attachment
nsa-cia-berlin-spy-nest.pdf
2013-10-28 22:41:37
http://cryptome.org/2013/10/nsa-cia-berlin-spy-nest.pdf
application/pdf
utf-8
webpage
nsa-close-access-sigads.pdf
http://cryptome.org/2013/10/nsa-close-access-sigads.pdf
2013-11-16 21:01:13
attachment
nsa-close-access-sigads.pdf
2013-11-16 21:01:13
http://cryptome.org/2013/10/nsa-close-access-sigads.pdf
application/pdf
utf-8
webpage
NSA IG Report.pdf
https://www.aclu.org/files/natsec/nsa/20130816/NSA%20IG%20Report.pdf
2013-11-19 17:50:33
attachment
NSA IG Report.pdf
2013-11-19 17:50:33
https://www.aclu.org/files/natsec/nsa/20130816/NSA%20IG%20Report.pdf
application/pdf
utf-8
webpage
nsas-talking-points-for-holiday-gatherings.pdf
https://s3.amazonaws.com/s3.documentcloud.org/documents/844508/nsas-talking-points-for-holiday-gatherings.pdf
2013-12-03 00:11:12
attachment
nsas-talking-points-for-holiday-gatherings.pdf
2013-12-03 00:11:12
https://s3.amazonaws.com/s3.documentcloud.org/documents/844508/nsas-talking-points-for-holiday-gatherings.pdf
application/pdf
utf-8
webpage
NSA-Surveillance-09-11-13-response-from-IG-to-intentional-misuse-of-NSA-authority.pdf
http://www.grassley.senate.gov/judiciary/upload/NSA-Surveillance-09-11-13-response-from-IG-to-intentional-misuse-of-NSA-authority.pdf
2013-09-27 16:36:45
attachment
NSA-Surveillance-09-11-13-response-from-IG-to-intentional-misuse-of-NSA-authority.pdf
2013-09-27 16:36:45
http://www.grassley.senate.gov/judiciary/upload/NSA-Surveillance-09-11-13-response-from-IG-to-intentional-misuse-of-NSA-authority.pdf
application/pdf
utf-8
webpage
Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information - spying_crs010506.pdf
http://emoglen.law.columbia.edu/CPC/spying_crs010506.pdf
2013-09-17 16:18:07
attachment
Presidential Authority to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence Information - spying_crs010506.pdf
2013-09-17 16:18:07
http://emoglen.law.columbia.edu/CPC/spying_crs010506.pdf
application/pdf
utf-8
webpage
pub_Dec 12 2008 Supplemental Opinions from the FISC.pdf
http://www.dni.gov/files/documents/section/pub_Dec%2012%202008%20Supplemental%20Opinions%20from%20the%20FISC.pdf
2013-09-11 19:32:05
attachment
pub_Dec 12 2008 Supplemental Opinions from the FISC.pdf
2013-09-11 19:32:05
http://www.dni.gov/files/documents/section/pub_Dec%2012%202008%20Supplemental%20Opinions%20from%20the%20FISC.pdf
application/pdf
utf-8
webpage
Soliciter General's Enforcement Standards for Lawful Interception of Telecommunications - Compliance Table (Full text)
2006-11-17
http://www.theglobeandmail.com/news/national/article14331614.ece/BINARY/SGES.pdf
2013-09-16 16:33:37
attachment
un-redacted
SGES.pdf
2013-09-16 16:33:37
http://www.theglobeandmail.com/news/national/article14331614.ece/BINARY/SGES.pdf
application/pdf
utf-8
webpage
Soliciter General's Enforcement Standards for Lawful Interception of Telecommunications - Compliance Table (Redacted)
2006-11-17
http://www.theglobeandmail.com/news/national/article14331613.ece/BINARY/SGES-redacted.pdf
2013-09-16 16:34:08
attachment
redacted
SGES-redacted.pdf
2013-09-16 16:34:08
http://www.theglobeandmail.com/news/national/article14331613.ece/BINARY/SGES-redacted.pdf
application/pdf
utf-8
undated