Difference between revisions of "National Politics:NSA Surveillance"
Jump to navigation
Jump to search
(→News) |
(→News) |
||
Line 26: | Line 26: | ||
* Washington Post: [http://articles.washingtonpost.com/2013-06-15/world/39993848_1_e-mail-addresses-paula-broadwell-sabbath Metadata reveals the secrets of social position, company hierarchy, terrorist cells], by Ellen Nakashima (June 15, 2013) | * Washington Post: [http://articles.washingtonpost.com/2013-06-15/world/39993848_1_e-mail-addresses-paula-broadwell-sabbath Metadata reveals the secrets of social position, company hierarchy, terrorist cells], by Ellen Nakashima (June 15, 2013) | ||
* Washington Post: [http://articles.washingtonpost.com/2013-06-15/news/39993852_1_comey-national-intelligence-intelligence-collection U.S. surveillance architecture includes collection of revealing Internet, phone metadata], by Barton Gellman (June 15, 2013) | * Washington Post: [http://articles.washingtonpost.com/2013-06-15/news/39993852_1_comey-national-intelligence-intelligence-collection U.S. surveillance architecture includes collection of revealing Internet, phone metadata], by Barton Gellman (June 15, 2013) | ||
8 Ars Technica: [http://arstechnica.com/security/2013/06/nsa-gets-early-access-to-zero-day-data-from-microsoft-others/ NSA gets early access to zero-day data from Microsoft, others], by Sean Gallagher (June 14 2013) | |||
* Wired: [http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/all The Secret War], by James Bamford (June 12, 2013) | * Wired: [http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/all The Secret War], by James Bamford (June 12, 2013) | ||
* Ars Technica: [http://arstechnica.com/security/2013/06/guardian-reporter-delayed-e-mailing-nsa-source-because-crypto-is-a-pain/ Guardian reporter delayed e-mailing NSA source because crypto is a pain], by Dan Goodin (June 11 2013) | * Ars Technica: [http://arstechnica.com/security/2013/06/guardian-reporter-delayed-e-mailing-nsa-source-because-crypto-is-a-pain/ Guardian reporter delayed e-mailing NSA source because crypto is a pain], by Dan Goodin (June 11 2013) |
Revision as of 16:57, 25 June 2013
This is a collection of news articles and commentary on the NSA warrantless surveillance, the MAINWAY NSA call database, the PRISM surveillance program and revelations made public by Bradley Manning, Edward Snowden and other people who shared classified intelligence material.
Data Sources
Newspapers
- www.washingtonpost.com - The Washington Post (requires subscription)
- www.nytimes.com - The New York Times (requires paid subscription)
News aggregation
- www.realclearpolitics.com - Real Clear Politics
Announcement mailing lists and blogs
- pfir.org, People For Internet Responsibility list run by Lauren Weinstein. Here is Lauren's blog: lauren.vortex.com.
News
- New York Times: Kerry Softens Tone with Russia in Snowden Dispute, by Michael R. Gordon (June 26, 2013)
- The Daily Beast: Greenwald: Snowden’s Files Are Out There if ‘Anything Happens’ to Him, by Eli Lake (Jun 25, 2013)
- New York Times: China Brushes Aside U.S. Warnings on Snowden, by Jane Perlez (June 25th, 2013)
- CNN: In high-stakes hide-and-seek, Snowden keeps much of the world guessing, by Jethro Mullen and Michael Pearson (June 25th, 2013)
- The New York Times blog: Excerpts From Snowden’s Letter Requesting Asylum in Ecuador, by Robert Mackey (June 24, 2013)
- The New York Times blog: Flight Departs for Cuba, but No Sign of Snowden, by Jennifer Preston (june 24, 2013)
- New York Times: Offering Snowden Aid, WikiLeaks Gets Back in the Game, by Scott Shane (June 23, 2013)
- New York Times: U.S. Rebukes China, Russia and Ecuador Over Snowden, by Peter Baker and Rick Gladstone (June 24, 2013)
- New York Times: Plane for Havana Leaves Moscow Without Snowden, by David M. Herszenhorn, Ellen Barry and Peter Baker (June 24, 2013)
- New York Times: Hasty Exit Started With Pizza Inside a Hong Kong Hideout, by Keyth Bradsher (June 24, 2013)
- ABC News: Kerry: Deeply Troubling If Snowden Allowed to Flee, by Deb Reichman, Associated Press (June 24, 2013)
- Washington Post: Metadata reveals the secrets of social position, company hierarchy, terrorist cells, by Ellen Nakashima (June 15, 2013)
- Washington Post: U.S. surveillance architecture includes collection of revealing Internet, phone metadata, by Barton Gellman (June 15, 2013)
8 Ars Technica: NSA gets early access to zero-day data from Microsoft, others, by Sean Gallagher (June 14 2013)
- Wired: The Secret War, by James Bamford (June 12, 2013)
- Ars Technica: Guardian reporter delayed e-mailing NSA source because crypto is a pain, by Dan Goodin (June 11 2013)
- Ars Technica: NSA leaker’s girlfriend blogged about “feeling alone” when he left, by Joe Mullin (June 11 2013)
- Ars Technica: What the NSA can do with “big data”, by Joe Mullin (June 10, 2013)
- Ars Technica: Poll: Most Americans not worried about gov’t phone tracking, by Joe Mullin (June 10, 2013)
- The New York Times blog: N.S.A. Whistle-Blower Revealed in Video, by Robert Mackey (June 10, 2013)
- Ars Technica: Whistleblower who exposed NSA mass-surveillance revealed by The Guardian, by Megan Geuss (June 9, 2013)
- Washington Post: U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program, by Barton Gellman and Laura Poitras (June 6, 2013)
- Ars Technica: Espionage malware infects raft of governments, industries around the world, by Dan Goodin (June 4, 2013)
- Wired: Shady Companies With Ties to Israel Wiretap the U.S. for the NSA, by James Bamford (Apr 3, 2012)
- Wired: The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say), by James Bamford (March 15, 2012)
- The Tech Herald: Data intelligence firms proposed a systematic attack against WikiLeaks, by Steve Ragan (Feb 9, 2011)
Commentary
- The Fiscal Times: What’s at Stake in the 21st Century Cold War, by David Francis (June 25, 2013)
- CNN: Why Ecuador might shelter Snowden, by Steve Striffler (June 25, 2013)
- Steve Striffler holds the Doris Zemurray Stone Chair in Latin American Studies and is a professor of anthropology and geography at the University of New Orleans.
- The New York Times blog: Why Snowden Asked Visitors in Hong Kong to Refrigerate Their Phones, by Heather Murphy (June 25, 2013)
- The Washington Post: Through Snowden, Ecuador seeks fight with U.S., by Juan Forero (June 24, 2013)
- The Washington Post: U.S. worried about security of files Snowden is thought to have, by Ellen Nakashima and Greg Miller (June 24, 2013)
- The New York Times: The Other Snowden Drama: Impugning the Messenger, by David Carr (June 24, 2013)
- The Nation blog: Glenn Greenwald Is 'Aiding and Abetting' Democracy, by John Nichols (June 24, 2013)
- The Washington Post: On NSA disclosures, has Glenn Greenwald become something other than a reporter?, by Paul Farhi (June 23, 2013)
- Washington Post: NSA surveillance may be legal — but it’s unconstitutional, by Laura K. Donohue (June 23, 2013)
- Laura K. Donohue is a professor at Georgetown University Law Center and director of Georgetown’s Center on National Security and the Law.
- New York Times: Privacy and the Threat to the Self, by Michael P. Lynch (June 22, 2013)
- Michael P. Lynch is a professor of philosophy at the University of Connecticut and the author of "In Praise of Reason", ISBN 978-0262017220, and "Truth as One and Many," ISBN 978-0199596300. He is at work on a new book, "Prisoners of Babel: Knowledge in the Datasphere."
- mediamatters4america: FOX's Hannity: Then and Now on NSA programs (June 12, 2013)
- The New York Times blog: The Stickers on Edward Snowden’s Laptop, by John Schwartz (June 10, 2013)
- The New York Times blog: David Simon, Creator of ‘The Wire,’ Debates N.S.A. Surveillance With Readers of His Blog, by Robert Mackey (June 7, 2013)