Difference between revisions of "National Politics:NSA Surveillance"
Jump to navigation
Jump to search
(→News) |
|||
Line 24: | Line 24: | ||
* Washington Post: [http://articles.washingtonpost.com/2013-06-15/news/39993852_1_comey-national-intelligence-intelligence-collection U.S. surveillance architecture includes collection of revealing Internet, phone metadata], by Barton Gellman (June 15, 2013) | * Washington Post: [http://articles.washingtonpost.com/2013-06-15/news/39993852_1_comey-national-intelligence-intelligence-collection U.S. surveillance architecture includes collection of revealing Internet, phone metadata], by Barton Gellman (June 15, 2013) | ||
* Wired: [http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/all The Secret War], by James Bamford (June 12, 2013) | * Wired: [http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/all The Secret War], by James Bamford (June 12, 2013) | ||
* The New York Times blog: [http://thelede.blogs.nytimes.com/2013/06/10/n-s-a-whistle-blower-revealed-in-video/ N.S.A. Whistle-Blower Revealed in Video], by Robert Mackey (June 10, 2013) | |||
* Washington Post: [http://articles.washingtonpost.com/2013-06-06/news/39784046_1_prism-nsa-u-s-servers U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program], by Barton Gellman and Laura Poitras (June 6, 2013) | * Washington Post: [http://articles.washingtonpost.com/2013-06-06/news/39784046_1_prism-nsa-u-s-servers U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program], by Barton Gellman and Laura Poitras (June 6, 2013) | ||
* Wired: [http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/ Shady Companies With Ties to Israel Wiretap the U.S. for the NSA], by James Bamford (Apr 3, 2012) | * Wired: [http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/ Shady Companies With Ties to Israel Wiretap the U.S. for the NSA], by James Bamford (Apr 3, 2012) |
Revision as of 13:02, 25 June 2013
This is a collection of news articles and commentary on the NSA warrantless surveillance, the MAINWAY NSA call database, the PRISM surveillance program and revelations made public by Bradley Manning, Edward Snowden and other people who shared classified intelligence material.
Data Sources
Newspapers
- www.washingtonpost.com - The Washington Post (requires subscription)
- www.nytimes.com - The New York Times (requires paid subscription)
News aggregation
- www.realclearpolitics.com - Real Clear Politics
Announcement mailing lists and blogs
- pfir.org, People For Internet Responsibility list run by Lauren Weinstein. Here is Lauren's blog: lauren.vortex.com.
News
- New York Times: Kerry Softens Tone with Russia in Snowden Dispute, by Michael R. Gordon (June 26, 2013)
- New York Times: China Brushes Aside U.S. Warnings on Snowden, by Jane Perlez (June 25th, 2013)
- CNN: In high-stakes hide-and-seek, Snowden keeps much of the world guessing, by Jethro Mullen and Michael Pearson (June 25th, 2013)
- New York Times: Offering Snowden Aid, WikiLeaks Gets Back in the Game, by Scott Shane (June 23, 2013)
- New York Times: U.S. Rebukes China, Russia and Ecuador Over Snowden, by Peter Baker and Rick Gladstone (June 24, 2013)
- New York Times: Plane for Havana Leaves Moscow Without Snowden, by David M. Herszenhorn, Ellen Barry and Peter Baker (June 24, 2013)
- New York Times: Hasty Exit Started With Pizza Inside a Hong Kong Hideout, by Keyth Bradsher (June 24, 2013)
- ABC News: Kerry: Deeply Troubling If Snowden Allowed to Flee, by Deb Reichman, Associated Press (June 24, 2013)
- Washington Post: Metadata reveals the secrets of social position, company hierarchy, terrorist cells, by Ellen Nakashima (June 15, 2013)
- Washington Post: U.S. surveillance architecture includes collection of revealing Internet, phone metadata, by Barton Gellman (June 15, 2013)
- Wired: The Secret War, by James Bamford (June 12, 2013)
- The New York Times blog: N.S.A. Whistle-Blower Revealed in Video, by Robert Mackey (June 10, 2013)
- Washington Post: U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program, by Barton Gellman and Laura Poitras (June 6, 2013)
- Wired: Shady Companies With Ties to Israel Wiretap the U.S. for the NSA, by James Bamford (Apr 3, 2012)
- Wired: The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say), by James Bamford (March 15, 2012)
- The Tech Herald: Data intelligence firms proposed a systematic attack against WikiLeaks, by Steve Ragan (Feb 9, 2011)
Commentary
- The New York Times blog: Why Snowden Asked Visitors in Hong Kong to Refrigerate Their Phones, by Heather Murphy (June 25, 2013)
- The New York Times: The Other Snowden Drama: Impugning the Messenger, by David Carr (June 24, 2013)
- The Nation blog: Glenn Greenwald Is 'Aiding and Abetting' Democracy, by John Nichols (June 24, 2013)
- The Washington Post: On NSA disclosures, has Glenn Greenwald become something other than a reporter?, by Paul Farhi (June 23, 2013)
- Washington Post: NSA surveillance may be legal — but it’s unconstitutional, by Laura K. Donohue (June 23, 2013)
- Laura K. Donohue is a professor at Georgetown University Law Center and director of Georgetown’s Center on National Security and the Law.
- New York Times: Privacy and the Threat to the Self, by Michael P. Lynch (June 22, 2013)
- Michael P. Lynch is a professor of philosophy at the University of Connecticut and the author of "In Praise of Reason", ISBN 978-0262017220, and "Truth as One and Many," ISBN 978-0199596300. He is at work on a new book, "Prisoners of Babel: Knowledge in the Datasphere."
- mediamatters4america: FOX's Hannity: Then and Now on NSA programs (June 12, 2013)
- The New York Times blog: The Stickers on Edward Snowden’s Laptop, by John Schwartz (June 10, 2013)
- The New York Times blog: David Simon, Creator of ‘The Wire,’ Debates N.S.A. Surveillance With Readers of His Blog, by Robert Mackey (June 7, 2013)