References

Thoughts – Not All Encryption Methods Live Up To Their Promises

  1. @The Heart of Big Brother Blog – Thoughts – Tortured Principles of U.S. Governance & Security – December 15th, 2014
  2. Appelbaum, Jacob, Aaron Gibson, Christian Grothoff, Andy Müller-Maguhn, Laura Poitras, Michael Sontheimer, and Christian Stöcker. “Prying Eyes: Inside The NSA’s War On Internet Security – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 28 Dec. 2014. Web. 1 Jan. 2015.
  3. Ibid
  4. Ibid
  5. Ibid
  6. Ibid
  7. Ibid
  8. Ibid
  9. Ibid
  10. Ibid
  11. Ibid
  12. Ibid
  13. Ibid
  14. NSA Source Document Excerp: Encryption Considered a Threat
  15. Appelbaum, Jacob, Aaron Gibson, Christian Grothoff, Andy Müller-Maguhn, Laura Poitras, Michael Sontheimer, and Christian Stöcker. “Prying Eyes: Inside The NSA’s War On Internet Security – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 28 Dec. 2014. Web. 1 Jan. 2015.
  16. Ibid
  17. Ibid
  18. Ibid
  19. Ibid
  20. Ibid
  21. Ibid
  22. Ibid
  23. Ibid
  24. Ibid
  25. Ibid
  26. Ibid
  27. Ibid
  28. Ibid
  29. Ibid
  30. Ibid
  31. Greenwald, Glenn, James Ball, and Julian Borger. “Revealed: How US and UK Spy Agencies Defeat Internet Privacy and Security.” The Gaurdian. The Gaurdian, 6 Sept. 2013. Web. 1 Jan. 2015.
  32. Perlroth, Nicole, Jeff Larson, and Scott Shane. “Secret Documents Reveal N.S.A. Campaign Against Encryption.” The New York Times. The New York Times, 04 Sept. 2013. Web. 1 Jan. 2015.
  33. Larson, Jeff, Nicole Perlroth, and Scott Shane. “Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security.” Pro Publica. Pro Publica, 05 Sept. 2013. Web. 1 Jan. 2015.
  34. Appelbaum, Jacob, Aaron Gibson, Christian Grothoff, Andy Müller-Maguhn, Laura Poitras, Michael Sontheimer, and Christian Stöcker. “Prying Eyes: Inside The NSA’s War On Internet Security – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 28 Dec. 2014. Web. 1 Jan. 2015.
  35. Ibid
  36. Ibid
  37. @The Heart of Big Brother – Part 1 – The Fifth Amendment and Artificial Intelligence – September 8th, 2014
  38. Appelbaum, Jacob, Aaron Gibson, Christian Grothoff, Andy Müller-Maguhn, Laura Poitras, Michael Sontheimer, and Christian Stöcker. “Prying Eyes: Inside The NSA’s War On Internet Security – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 28 Dec. 2014. Web. 1 Jan. 2015.
  39. Ibid
  40. Ibid
  41. Ibid
  42. Ibid
  43. Ibid
  44. Ibid
  45. Ibid
  46. Guide for Analysts on how to use the PRISM Skype Collection
  47. GCHQ Briefing on the BULLRUN Program
  48. GCHQ Presentation on the BULLRUN Programs Decryption Capabilities
  49. NSA LONGHAUL program for end-to-end attack orchestration and key recovery service
  50. BLUESNORT program on “Net Defense” from Encrypted Communications
  51. Presentation from the SIGDEV Conference 2012 explaining which encryption protocols and techniques can be attacked and which not
  52. NSA program SCARLETFEVER explaining how attacks on encrypted connections are orchestrated
  53. Description of VOIP Telephony Encryption methods and cryptanalytic and other ways to attack
  54. Appelbaum, Jacob, Aaron Gibson, Christian Grothoff, Andy Müller-Maguhn, Laura Poitras, Michael Sontheimer, and Christian Stöcker. “Prying Eyes: Inside The NSA’s War On Internet Security – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 28 Dec. 2014. Web. 1 Jan. 2015.
  55. Ibid
  56. Ibid
  57. Ibid
  58. Ibid
  59. Ibid
  60. Ibid
  61. Ibid
  62. Ibid
  63. General Description how NSA handles encrypted traffic
  64. Intercept with PGP encrypted message
  65. Classification Guide for Cryptanalysis
  66. Procedural GCHQ Document on how analysts are to handle encrypted traffic
  67. NSA / GCHQ Crypt Discovery Joint Collaboration Activity
  68. NSA Cryptographic Modernization (CryptoMod) Classification Guide
  69. “National Information Assurance Research Laboratory (NIARL)”: Newsletter, Keyword TUNDRA
  70. What Your Mother Never Told You About the development of Signal Intelligence
  71. Intercept with OTR encrypted chat
  72. Appelbaum, Jacob, Aaron Gibson, Christian Grothoff, Andy Müller-Maguhn, Laura Poitras, Michael Sontheimer, and Christian Stöcker. “Prying Eyes: Inside The NSA’s War On Internet Security – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 28 Dec. 2014. Web. 1 Jan. 2015.
  73. Ibid
  74. Ibid
  75. Ibid
  76. Ibid
  77. Ibid
  78. Ibid
  79. Ibid
  80. Ibid
  81. Ibid
  82. Ibid
  83. Ibid
  84. Ibid
  85. Ibid
  86. Ibid
  87. Ibid
  88. Phil Zimmerman – Profile
  89. Appelbaum, Jacob, Aaron Gibson, Christian Grothoff, Andy Müller-Maguhn, Laura Poitras, Michael Sontheimer, and Christian Stöcker. “Prying Eyes: Inside The NSA’s War On Internet Security – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 28 Dec. 2014. Web. 1 Jan. 2015.
  90. Ibid
  91. Ibid
  92. U.S. Arms Export Control Act
  93. Appelbaum, Jacob, Aaron Gibson, Christian Grothoff, Andy Müller-Maguhn, Laura Poitras, Michael Sontheimer, and Christian Stöcker. “Prying Eyes: Inside The NSA’s War On Internet Security – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 28 Dec. 2014. Web. 1 Jan. 2015.
  94. Ibid
  95. Ibid
  96. Ibid
  97. Ibid
  98. Ibid
  99. Ibid
  100. Explanation of a potential technique to deanonymise users of the TOR network
  101. Analytics on security of TOR hidden services
  102. Overview on Internet Anonymization Services on how they work
  103. TOR deanonymisation research
  104. TOR Overview of Existing Techniques
  105. A potential technique to deanonymise users of the TOR network
  106. Appelbaum, Jacob, Aaron Gibson, Christian Grothoff, Andy Müller-Maguhn, Laura Poitras, Michael Sontheimer, and Christian Stöcker. “Prying Eyes: Inside The NSA’s War On Internet Security – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 28 Dec. 2014. Web. 1 Jan. 2015.
  107. Ibid
  108. Ibid
  109. Ibid
  110. Ibid
  111. Ibid
  112. Ibid
  113. Ibid
  114. Ibid
  115. Ibid
  116. Ibid
  117. Ibid
  118. Ibid
  119. Ibid
  120. NSA High Level Description on TURMOIL / APEX Programs on Attacking VPN
  121. Explanation of the GALLANTWAVE that decrypts VPN Traffic within LONGHAUL
  122. Intro to the VPN Exploitation Process mentioning the protocols attacked – PPTP, IPSEC, SSL, SSH)
  123. Analytic Challenges from Active-Passive Integration when NSA attacks IPSEC VPNs
  124. Overview of the capabilities of the VALIANTSURF program
  125. MALIBU Architecture Overview to exploit VPN Communication
  126. POISENNUT Virtual Private Network Attack Orchestrator (VAO)
  127. NSA Presentation on the development of Attacks on VPN
  128. NSA Presentation on the Analysis and Contextualisation of data from VPN
  129. Description of existing projects on VPN decryption
  130. Explanation of the Transform Engine Emulator when attacking VPN
  131. Explanation of the POISENNUT Product and its role when attacking VPN
  132. Explanation of the TURMOIL GALLANTWAVE Program and its role when attacking VPN
  133. Processing of data from exploited VPN in the TURMOIL program
  134. Decryption of VPN Connections within the VALIANTSURF program
  135. Description on the processing of VPN data packets within the TURMOIL program
  136. Explanation on the SPIN9 program on end-to-end attacks on VPN
  137. SecurityKiss – Press Announcement – PPTP Discontinued – 12-17-2014
  138. Appelbaum, Jacob, Aaron Gibson, Christian Grothoff, Andy Müller-Maguhn, Laura Poitras, Michael Sontheimer, and Christian Stöcker. “Prying Eyes: Inside The NSA’s War On Internet Security – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 28 Dec. 2014. Web. 1 Jan. 2015.
  139. Greenwald, Glenn. “XKeyscore: NSA Tool Collects ‘nearly Everything a User Does on the Internet'” The Gaurdian. The Gaurdian, 31 July 2013. Web. 1 Jan. 2015.
  140. Appelbaum, Jacob, Aaron Gibson, Christian Grothoff, Andy Müller-Maguhn, Laura Poitras, Michael Sontheimer, and Christian Stöcker. “Prying Eyes: Inside The NSA’s War On Internet Security – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 28 Dec. 2014. Web. 1 Jan. 2015.
  141. Ibid
  142. Ibid
  143. Ibid
  144. Ibid
  145. Ibid
  146. Ibid
  147. Ibid
  148. Ibid
  149. Ibid
  150. Ibid
  151. Ibid
  152. Ibid
  153. Ibid
  154. Ibid
  155. Ibid
  156. Ibid
  157. Ibid
  158. NSA Experiment for massive SSL/TLS Decryption
  159. Canadian Document from CES on TLS Trends
  160. Details on how NSA uses the SCARLETFEVER program to attack Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
  161. Analysis from SSL/TLS Connections through GCHQ in the flying pig database
  162. Appelbaum, Jacob, Aaron Gibson, Christian Grothoff, Andy Müller-Maguhn, Laura Poitras, Michael Sontheimer, and Christian Stöcker. “Prying Eyes: Inside The NSA’s War On Internet Security – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 28 Dec. 2014. Web. 1 Jan. 2015.
  163. Ibid
  164. Ibid
  165. Ibid
  166. Ibid
  167. Ibid
  168. Ibid
  169. Ibid
  170. Ibid
  171. Ibid
  172. Ibid
  173. Ibid
  174. Ibid
  175. Ibid
  176. Ibid
  177. Ibid
  178. Ibid
  179. NSA classification guide: “Cryptographic modifications”
  180. Appelbaum, Jacob, Aaron Gibson, Christian Grothoff, Andy Müller-Maguhn, Laura Poitras, Michael Sontheimer, and Christian Stöcker. “Prying Eyes: Inside The NSA’s War On Internet Security – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 28 Dec. 2014. Web. 1 Jan. 2015.
  181. Ibid
  182. Ibid
  183. Ibid
  184. Ibid
  185. Ibid
  186. Ibid
  187. Ibid
  188. Ibid
  189. Ibid
  190. Ibid
  191. Ibid
  192. Ibid
  193. Ibid
  194. Ibid
  195. Ibid
  196. Ibid
  197. Ibid
  198. Ibid
  199. Ibid
  200. Ibid
  201. NSA Source Document – “Tundra”
  202. Appelbaum, Jacob, Aaron Gibson, Christian Grothoff, Andy Müller-Maguhn, Laura Poitras, Michael Sontheimer, and Christian Stöcker. “Prying Eyes: Inside The NSA’s War On Internet Security – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 28 Dec. 2014. Web. 1 Jan. 2015.
  203. Ibid
  204. Ibid
  205. Ibid

Thoughts – How is the NSA Preparing the U.S. For a Digital Arms Race and Future Battles?

  1. @The Heart of Big Brother Blog – Thoughts – Not All Encryption Methods Live Up To Their Promises – January 11th, 2015
  2. Jacob Appelbaum – Profile
  3. Aaron Gibson – Profile
  4. Claudio Guarnieri – Profile
  5. Andy Müller-Maguhn – Profile
  6. Laura Poitras – Profile
  7. Marcel Rosenbach – Profile
  8. Leif Ryge – Profile
  9. Hilmar Schmundt – Profile
  10. Michael Sontheimer – Profile
  11. Appelbaum, Jacob, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbach, Leif Ryge, Hilmar Schmundt, and Michael Sontheimer. “The Digital Arms Race: NSA Preps America for Future Battle – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 17 Jan. 2015. Web. 18 Jan. 2015.
  12. Ibid
  13. Ibid
  14. Ibid
  15. Appelbaum, Jacob, Laura Poitras, Marcel Rosenbach, Christian STÖCKER, JÖRG Schindler, and Holger Stark. “Inside TAO: Documents Reveal Top NSA Hacking Unit – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 29 Dec. 2013. Web. 18 Jan. 2015.
  16. Appelbaum, Jacob, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbach, Leif Ryge, Hilmar Schmundt, and Michael Sontheimer. “The Digital Arms Race: NSA Preps America for Future Battle – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 17 Jan. 2015. Web. 18 Jan. 2015.
  17. Ibid
  18. Ibid
  19. Ibid
  20. Ibid
  21. Ibid
  22. Ibid
  23. Ibid
  24. Ibid
  25. Ibid
  26. Ibid
  27. Ibid
  28. Ibid
  29. Ibid
  30. Ibid
  31. Marshall McLuhan – Profile
  32. Appelbaum, Jacob, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbach, Leif Ryge, Hilmar Schmundt, and Michael Sontheimer. “The Digital Arms Race: NSA Preps America for Future Battle – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 17 Jan. 2015. Web. 18 Jan. 2015.
  33. Ibid
  34. Ibid
  35. Ibid
  36. Ibid
  37. Admiral Michael Rogers – Profile
  38. Appelbaum, Jacob, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbach, Leif Ryge, Hilmar Schmundt, and Michael Sontheimer. “The Digital Arms Race: NSA Preps America for Future Battle – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 17 Jan. 2015. Web. 18 Jan. 2015.
  39. Ibid
  40. Ibid
  41. Ibid
  42. Ibid
  43. Ibid
  44. Ibid
  45. Ibid
  46. Ibid
  47. Ibid
  48. Ibid
  49. Ibid
  50. Excerpt from the secret NSA budget on computer network operations / Code word GENIE
  51. Document about the expansion of the Remote Operations Center (ROC) on endpoint operations
  52. Document explaining the role of the Remote Operations Center (ROC)
  53. Interview with an employee of NSA’s department for Tailored Access Operations about his field of work
  54. Supply-chain interdiction / Stealthy techniques can crack some of SIGINT’s hardest targets
  55. Classification guide for computer network exploitation (CNE)
  56. NSA training course material on computer network operations
  57. Overview of methods for NSA integrated cyber operations
  58. NSA project description to recognize and process data that comes from third party attacks on computers
  59. Exploring and exploiting leaky mobile apps with BADASS
  60. Overview of projects of the TAO/ATO department such as the remote destruction of network cards
  61. iPhone target analysis and exploitation with Apple’s unique device identifiers (UDID)
  62. Report of an NSA Employee about a Backdoor in the OpenSSH Daemon
  63. NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties
  64. Appelbaum, Jacob, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbach, Leif Ryge, Hilmar Schmundt, and Michael Sontheimer. “The Digital Arms Race: NSA Preps America for Future Battle – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 17 Jan. 2015. Web. 18 Jan. 2015.
  65. Ibid
  66. Ibid
  67. Ibid
  68. Ibid
  69. Ibid
  70. Ibid
  71. Ibid
  72. Ibid
  73. Ibid
  74. Ibid
  75. Ibid
  76. Ibid
  77. Ibid
  78. Ibid
  79. Ibid
  80. Ibid
  81. Ibid
  82. CSEC document about the recognition of trojans and other “network based anomaly”
  83. The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job
  84. QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL)
  85. Sample code of a malware program from the Five Eyes alliance
  86. Appelbaum, Jacob, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbach, Leif Ryge, Hilmar Schmundt, and Michael Sontheimer. “The Digital Arms Race: NSA Preps America for Future Battle – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 17 Jan. 2015. Web. 18 Jan. 2015.
  87. Ibid
  88. Ibid
  89. Ibid
  90. Ibid
  91. Ibid
  92. Ibid
  93. Ibid
  94. Ibid
  95. Ibid
  96. Ibid
  97. Ibid
  98. Ibid
  99. Ibid
  100. Explanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked
  101. Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability
  102. Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA
  103. Methods to exfiltrate data even from devices which are supposed to be offline
  104. Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence
  105. Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA
  106. Appelbaum, Jacob, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbach, Leif Ryge, Hilmar Schmundt, and Michael Sontheimer. “The Digital Arms Race: NSA Preps America for Future Battle – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 17 Jan. 2015. Web. 18 Jan. 2015.
  107. Ibid
  108. Ibid
  109. Ibid
  110. Ibid
  111. Ibid
  112. Ibid
  113. Ibid
  114. Ibid
  115. Ibid
  116. Ibid
  117. Ibid
  118. Ibid
  119. Ibid
  120. Ibid
  121. Ibid
  122. Ibid
  123. Ibid
  124. Ibid
  125. Ibid
  126. Ibid
  127. Ibid
  128. Ibid
  129. Ibid
  130. Ibid
  131. Description of an NSA employee on fifth party access / When the targeted fourth party has someone under surveillance who puts others under surveillance
  132. 4th party collection / Taking advantage of non-partner computer network exploitation activity
  133. Combination of offensive and defensive missions / How fourth-party missions are being performed
  134. Overview of the TRANSGRESSION program to analyze and exploit foreign CNA/CNE exploits
  135. NSA example SNOWGLOBE, in which a suspected French government trojan is analyzed to find out if it can be helpful for own interests
  136. NSA fourth party access / “I drink your milkshake”
  137. NSA Program TUTELAGE to instrumentalize third party attack tools
  138. Codename BYZANTINE HADES / NSA research on the targets of Chinese network exploitation tools, the targets and actors
  139. CSEC document on the handling of existing trojans when trojanizing computers
  140. Analysis of Chinese methods and performed actions in the context of computer network exploitation
  141. Appelbaum, Jacob, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbach, Leif Ryge, Hilmar Schmundt, and Michael Sontheimer. “The Digital Arms Race: NSA Preps America for Future Battle – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 17 Jan. 2015. Web. 18 Jan. 2015.
  142. Ibid
  143. Ibid
  144. Ibid
  145. Ibid
  146. Ibid
  147. Ibid
  148. Ibid
  149. Ibid
  150. Ibid
  151. Ibid
  152. Ibid
  153. Ibid
  154. Ibid
  155. Ibid
  156. Ibid
  157. Ibid
  158. Ibid
  159. Ibid
  160. Ibid
  161. Ibid
  162. Ibid
  163. Overview on the NSA use of bots and the DEFIANTWARRIOR program
  164. HIDDENSALAMANDER / Program for the recognition of botnet activity and options for takeover of clients and data
  165. Appelbaum, Jacob, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbach, Leif Ryge, Hilmar Schmundt, and Michael Sontheimer. “The Digital Arms Race: NSA Preps America for Future Battle – SPIEGEL ONLINE.” SPIEGEL ONLINE. Der Spiegel, 17 Jan. 2015. Web. 18 Jan. 2015.
  166. Ibid
  167. Ibid
  168. Ibid
  169. Ibid
  170. Ibid
  171. Ibid
  172. Ibid
  173. Ibid
  174. Ibid
  175. Ibid
  176. Ibid
  177. Ibid
  178. Ibid
  179. Ibid
  180. Ibid
  181. Ibid
  182. Ibid
  183. Ibid
  184. Ibid
  185. Ibid
  186. Ibid
  187. Ibid
  188. Ibid
  189. Ibid
  190. Ibid
  191. Ibid
  192. Ibid
  193. Ibid
  194. Ibid
  195. Ibid
  196. Ibid
  197. Ibid
  198. Ibid
  199. Ibid
  200. Ibid
  201. Ibid
  202. Ibid
  203. Ibid
  204. Ibid

Thoughts – The History and Danger of Administrative Law

  1. Philip Hamburger – Columbia Law School Profile
  2. Hamburger, Philip. Is Administrative Law Unlawful? Chicago: U of Chicago, 2014. Print.
  3. Hamburger, Phillip. “The History and Danger of Administrative Law.” Imprimis. Hillsdale College, 01 Sept. 2014. Web. 1 Mar. 2015.
  4. Ibid
  5. Ibid
  6. Ibid
  7. Ibid
  8. Ibid
  9. Ibid
  10. Ibid
  11. Ibid
  12. Ibid
  13. Ibid
  14. Ibid
  15. Ibid
  16. Ibid
  17. Ibid
  18. Ibid
  19. Ibid
  20. Ibid
  21. Ibid
  22. Ibid
  23. Interstate Commerce Commission – Profile
  24. Hamburger, Phillip. “The History and Danger of Administrative Law.” Imprimis. Hillsdale College, 01 Sept. 2014. Web. 1 Mar. 2015.
  25. National Security Act of 1948
  26. Hamburger, Phillip. “The History and Danger of Administrative Law.” Imprimis. Hillsdale College, 01 Sept. 2014. Web. 1 Mar. 2015.
  27. Ibid
  28. Ibid
  29. Ibid
  30. Ibid
  31. Ibid
  32. Ibid
  33. Ibid
  34. Ibid
  35. Ibid
  36. Ibid
  37. Ibid
  38. Ibid
  39. Ibid
  40. Ibid
  41. Ibid
  42. Ibid
  43. Ibid
  44. Ibid
  45. Ibid
  46. Ibid
  47. Ibid
  48. Ibid
  49. Ibid
  50. Ibid
  51. Ibid
  52. Ibid
  53. Ibid
  54. Ibid
  55. Ibid
  56. Ibid
  57. Ibid
  58. Ibid
  59. Ibid
  60. Ibid
  61. Ibid
  62. Ibid
  63. Ibid
  64. Ibid
  65. Ibid
  66. Ibid
  67. Ibid
  68. Ibid
  69. Ibid
  70. Ibid
  71. Ibid
  72. Ibid
  73. Ibid
  74. Ibid
  75. Ibid
  76. Ibid
  77. Ibid
  78. Ibid
  79. Ibid
  80. Ibid
  81. Ibid
  82. Ibid
  83. Ibid
  84. Ibid
  85. Ibid
  86. Ibid
  87. Ibid
  88. Ibid
  89. Ibid
  90. Ibid
  91. Ibid
  92. Ibid
  93. Ibid
  94. Ibid
  95. Ibid
  96. Ibid
  97. Ibid
  98. Ibid
  99. Ibid
  100. Ibid
  101. Ibid
  102. Ibid
  103. Ibid
  104. Ibid
  105. Ibid
  106. Ibid
  107. Ibid
  108. Ibid
  109. Ibid
  110. Ibid
  111. Ibid
  112. Ibid
  113. Ibid
  114. Ibid
  115. Ibid
  116. Ibid
  117. Ibid
  118. Ibid
  119. Ibid
  120. Ibid
  121. Ibid
  122. Ibid

Thoughts – Is the U.S. Still an Authoritarian National Surveillance State?

  1. Balkin, Jack M., “The Constitution in the National Surveillance State.“ (2008) Faculty Scholarship Series. Paper 225.
  2. Jack Balkin – Yale Law School Faculty Profile
  3. @The Heart of Big Brother Blog – Part 1
  4. Balkin, Jack M., “The Constitution in the National Surveillance State.“ (2008) Faculty Scholarship Series. Paper 225.
  5. Berman, Jillian. “Paul Krugman: NSA Surveillance State ‘On The Authoritarian Side'” The Huffington Post. TheHuffingtonPost.com, 9 June 2013. Web. 13 Apr. 2015.
  6. Krugman, Paul. “Apple and the Self-Surveillance State.” New York Times. New York Times, 10 Apr. 2015. Web. 12 Apr. 2015.
  7. @The Heart of Big Brother – Part 1 – What is A National Surveillance State? – August 22, 2014
  8. @The Heart of Big Brother – Part 1 – Foreign Intelligence Surveillance Act & National Security Letters – August 23rd, 2014
  9. @The Heart of Big Brother – Part 1 – What Are The Three Main Threats National Surveillance Poses to Our Freedoms? – August 25th, 2014
  10. @The Heart of Big Brother – Part 1 – What is an Authoritarian Information State? – August 26th, 2014
  11. @The Heart of Big Brother – Part 1 – What is a Democratic Information State? – August 26th, 2014
  12. Balkin, Jack M., “The Constitution in the National Surveillance State.“ (2008) Faculty Scholarship Series. Paper 225.
  13. Ibid
  14. Ibid
  15. Ibid
  16. Ibid
  17. Foreign Intelligence Surveillance Act (FISA)
  18. Ibid
  19. Ibid
  20. Ibid
  21. Ibid
  22. Yeh, Brian. Doyle, Charles. “USA Patriot Act Improvement and Reauthorization Act of 2005: A Legal Analysis.” Congressional Research Services Report for Congress. December 6, 2006.
  23. Ibid
  24. Ibid
  25. Ibid
  26. Ibid
  27. Balkin, Jack M., “The Constitution in the National Surveillance State.“ (2008) Faculty Scholarship Series. Paper 225.
  28. Ibid
  29. Ibid
  30. Ibid
  31. Ibid
  32. Ibid
  33. Ibid
  34. Ibid
  35. Ibid
  36. Ibid
  37. Ibid
  38. Ibid
  39. Ibid
  40. Ibid
  41. Ibid
  42. Ibid
  43. Ibid
  44. Ibid
  45. Ibid
  46. Ibid
  47. Ibid
  48. Ibid
  49. Ibid
  50. Ibid
  51. Ibid
  52. Ibid
  53. Ibid
  54. Ibid
  55. Ibid
  56. Ibid
  57. Ibid
  58. Ibid
  59. Ibid
  60. George Bernard Shaw – Quote
  61. Greenwald, Glenn. “NSA Collecting Phone Records of Millions of Verizon Customers Daily.” The Guardian. Guardian News and Media, 05 June 2013. Web. 19 June 2013.
  62. Konczal, Mike. “Is a Democratic Surveillance State Possible?” The Washington Post, 8 June 2013. Web. 19 June 19.
  63. Greenwald, Glenn. “NSA Collecting Phone Records of Millions of Verizon Customers Daily.” The Guardian. Guardian News and Media, 05 June 2013. Web. 19 June 2013.
  64. Ibid
  65. Ibid
  66. Ibid
  67. Gorman, Siobhan. “U.S. Collects Vast Data Trove.” Wall Street Journal. 07 June 2012.
  68. Gellman, Barton, and Ashkan Soltani. “NSA Surveillance Program Reaches ‘into the Past’ to Retrieve, Replay Phone Calls.” Washington Post. The Washington Post, 18 Mar. 2014. Web. 12 Apr. 2015.
  69. Greenwald, Glenn. “XKeyscore: NSA Tool Collects ‘nearly Everything a User Does on the Internet'” The Guardian. The Guardian, 31 July 2013. Web. 12 Apr. 2015.
  70. Ibid
  71. Ibid
  72. “”Collect It All”: Glenn Greenwald on NSA Bugging Tech Hardware, Economic Espionage & Spying on U.N.” Interview by Amy Goodman. Democracy Now! Democracy Now!, 13 May 2014. Web. 12 Apr. 2015.
  73. Scahill, Jeremy, and Josh Begley. “The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle.” The Intercept. First Look Media, 19 Feb. 2015. Web. 12 Apr. 2015.
  74. Ibid
  75. Ibid
  76. Ibid
  77. Gellman, Barton, and Ashkan Soltani. “NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say.” Washington Post. The Washington Post, 30 Oct. 2013. Web. 12 Apr. 2015.
  78. Ibid
  79. Ibid
  80. Ibid
  81. Savage, Charlie, and Laura Poitras. “How a Court Secretly Evolved, Extending U.S. Spies’ Reach.” The New York Times. The New York Times, 11 Mar. 2014. Web. 12 Apr. 2015.
  82. Ibid
  83. @The Heart of Big Brother Blog – Part 1 – U.S. National Surveillance and the Fourth Amendment – September 4th, 2014
  84. Greenwald, Glenn. “NSA Collecting Phone Records of Millions of Verizon Customers Daily.” The Guardian. Guardian News and Media, 05 June 2013. Web. 19 June 2013.
  85. Ibid
  86. Lee, Timothy. “In AP Surveillance Case, the Real Scandal Is What’s Legal.” Washington Post, 14 May 2013. Web. 19 June 2013.
  87. Ibid
  88. Ibid
  89. Byers, Dylan. “Jill Abramson: ‘This Is the Most Secretive White House I Have Ever Dealt With” POLITICO. Politico, 23 Jan. 2014. Web. 23 Aug. 2014.
  90. Mayer, Jane. “The Secret Sharer.” The New Yorker. N.p., 23 May 2011. Web. 19 June 2013.
  91. Konczal, Mike. “Is a Democratic Surveillance State Possible?” The Washington Post, 8 June 2013. Web. 19 June 19.
  92. Morrissey, Ed. “AP: Obama Administration Sets New Record for FOIA Non-compliance – Hot Air.” HotAir.com. HotAir.com, 18 Mar. 2015. Web. 12 Apr. 2015.
  93. Ibid
  94. Aaronson, Trevor. “How the FBI Created a Terrorist – The Intercept.” The Intercept. First Look Media, 16 Mar. 2015. Web. 12 Apr. 2015.
  95. Ibid
  96. Ibid
  97. Ibid
  98. Ibid
  99. Gilson, Dave, Lauren Ellis, Carolyn Perot, Trevor Aaronson, and Jeff Berlin. “Terror Trials by the Numbers.” Mother Jones. Mother Jones, 1 Oct. 2011. Web. 12 Apr. 2015.
  100. Aaronson, Trevor. “How the FBI Created a Terrorist – The Intercept.” The Intercept. First Look Media, 16 Mar. 2015. Web. 12 Apr. 2015.
  101. Ibid
  102. Ibid
  103. “The Illusion of Justice”, Human Rights Watch Report. Published Columbia Law School Copyright 2014
  104. Aaronson, Trevor. “How the FBI Created a Terrorist – The Intercept.” The Intercept. First Look Media, 16 Mar. 2015. Web. 12 Apr. 2015.
  105. “Terror” Tribeca Film Festival – Aired April 2015
  106. Aaronson, Trevor. “The FBI Informant Who Mounted a Sting Operation Against the FBI – The Intercept.” The Intercept. First Look Media, 15 Apr. 2015. Web. 15 Apr. 2015.
  107. Ibid
  108. Ibid
  109. Ibid
  110. Hicks, Josh. “Dozens of Inspectors General Say Federal Agencies Hindering Oversight.” Washington Post. The Washington Post, 6 Aug. 2014. Web. 12 Apr. 2015.
  111. Ibid
  112. Ibid
  113. Philip Hamburger – Columbia Law School Profile
  114. Hamburger, Phillip. “The History and Danger of Administrative Law.” Imprimis. Hillsdale College, 01 Sept. 2014. Web. 1 Mar. 2015.
  115. Ibid
  116. Ibid
  117. Ibid
  118. Ibid
  119. Ibid
  120. Ibid
  121. Edgar, Timothy. “The Good News About Spying.” Foreign Affairs. Council on Foreign Relations, 13 Apr. 2015. Web. 13 Apr. 2015.

 

 

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s