http://www.nytimes.com/2015/04/25/world/asia/cia-qaeda-drone-strikes-warren-weinstein-giovanni-lo-porto-deaths.html
“5 NSA Whistleblowers Who Came Before Snowden”
http://capitalismisfreedom.com/top-nsa-whistleblowers-came-snowden/
More on what happened to every NSA whistleblower who tried to work through the system can be found in chapter 9 of James Risen’s excellent book, Pay Any Price: Greed, Power, and Endless War (New York: Houghton Mifflin Harcourt, 2014)
http://www.amazon.com/Pay-Any-Price-Greed-Endless-ebook/dp/B00J76JPYK/ref=sr_1_1_twi_2_kin?ie=UTF8&qid=1427299672&sr=8–1&keywords=james+risen
More on Jesselyn Radack, whistleblower and lawyer to whistleblowers
http://www.theverge.com/2014/6/24/5818594/edward-snowdens-lawyer-jesselyn-radack-will-keep-your-secrets
And Diane Roark and Thomas Tamm, who also tried to go through the system
http://cryptome.org/2014/10/roark-risen.htm
http://www.pbs.org/wgbh/pages/frontline/government-elections-politics/united-states-of-secrets/the-frontline-interview-diane-roark/
http://www.pbs.org/wgbh/pages/frontline/government-elections-politics/united-states-of-secrets/the-frontline-interview-thomas-tamm/
Peyton Quinn’s Five Rules for Managing Impending Violence
http://www.nononsenseselfdefense.com/get_attacked.htm
HUMINT, SIGINT… and now, LOVEINT
http://crookedtimber.org/2013/08/24/loveint/
The National License Plate Reader (LPR) Initiative — the DEA’s massive license plate tracking system, open to other federal agencies
http://dissenter.firedoglake.com/2015/01/27/deas-massive-license-plate-tracking-program-spies-on-millions-of-americans-helps-agents-seize-property
Using license plate trackers to monitor gun shows… and what else?
http://www.theguardian.com/us-news/2015/jan/29/us-plan-track-car-drivers-documents
License plate readers are being paired with facial recognition technology, just like Evie’s camera network
http://www.theguardian.com/world/2015/feb/05/aclu-dea-documents-spy-program-millions-drivers-passengers
The NSA targets the privacy-conscious
http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html
XKeyscore: NSA’s Google for the World’s Private Communications
https://firstlook.org/theintercept/2015/07/01/nsas-google-worlds-private-communications/
How XKeyscore works
https://firstlook.org/theintercept/2015/07/02/look-under-hood-xkeyscore/
How the FBI caught Petraeus: cross-referencing metadata, all without a warrant
http://www.aclu.org/blog/technology-and-liberty-national-security/surveillance-and-security-lessons-petraeus-scandal
MIT researchers report they don’t need an individual’s name, address, or credit card number to identify people
http://www.zdnet.com/article/credit-card-metadata-study-easily-identifies-individuals/
Don’t worry; it’s just metadata!
http://www.wired.com/2013/06/phew-it-was-just-metadata-not-think-again/
The CIA intercepts whistleblower communications
http://www.mcclatchydc.com/2014/07/25/234484/after-cia-gets-secret-whistleblower.html
How a surveillance system ostensibly targeted at terrorists in fact sucks in massive amounts of unrelated people and data: Canada’s download dragnet
https://firstlook.org/theintercept/2015/01/28/canada-cse-levitation-mass-surveillance/
How to leak securely using SecureDrop
https://firstlook.org/theintercept/2015/01/28/how-to-leak-to-the-intercept/
CIA director’s attempt to conceal emails by saving them as drafts, not sending
http://www.washingtonpost.com/blogs/worldviews/wp/2012/11/12/heres-the-e-mail-trick-petraeus-and-broadwell-used-to-communicate/
If you’re using encryption, the NSA is watching extra closely
https://www.techdirt.com/articles/20130620/15390323549/nsa-has-convinced-fisa-court-that-if-your-data-is-encrypted-you-might-be-terrorist-so-itll-hang-onto-your-data.shtml
Lawyer-client privileged communications are of particular interest
http://www.theguardian.com/uk-news/2015/feb/18/uk-admits-unlawfully-monitoring-legally-privileged-communications
Governments monitor WikiLeaks website, collect IP addresses of visitors
https://firstlook.org/theintercept/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/
Thinking about searching for privacy-enhancing tools? The NSA is watching for that
http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html
UK Parliamentary Committee: “GCHQ’s bulk interception capability is used primarily to find patterns in, or characteristics of, online communications which indicate involvement in threats to national security”—aka God’s Eye
https://firstlook.org/theintercept/2015/03/12/uk-parliament-finally-offers-evidence-mass-surveillance-stops-terror-attacks/
NSA spies on journalists
http://www.spiegel.de/international/germany/the-nsa-and-american-spies-targeted-spiegel-a-1042023.html
“Surveillance Forces Journalists to Think and Act Like Spies”
https://cpj.org/2015/04/attacks-on-the-press-surveillance-forces-journalists-to-think-act-like-spies.php
This is by design: “When journalists must compete with spies and surveillance, even if they win, society loses.”
http://inthesetimes.com/article/18035/a-spys-guide-to-protecting-whistleblowers
Another example of God’s Eye-type pattern recognition: the NSA’s SKYNET program
https://firstlook.org/theintercept/2015/05/08/u-s-government-designated-prominent-al-jazeera-journalist-al-qaeda-member-put-watch-list/
Israel’s Unit 8200 uses compromising information gathered from captured emails to coerce key Palestinians. Unthinkable NSA does anything similar?
http://blogs.reuters.com/great-debate/2015/05/11/if-youre-not-outraged-about-the-nsa-surveillance-heres-why-you-should-be/
Turning a phone into a listening device via WARRIOR PRIDE and NOSEY SMURF (yes, they really have names like that — your tax dollars at work)
https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/
New exploit turns Samsung Galaxy phones into remote bugging devices
https://twitter.com/rj_gallagher/status/618543070884315136/photo/1
Using a cell phone’s gyroscopes like a microphone
http://www.wired.com/2014/08/gyroscope-listening-hack/
The $2.8 billion JLENS blimps floating over Maryland
https://firstlook.org/theintercept/2014/12/17/billion-dollar-surveillance-blimp-launch-maryland/
The CIA/US Marshals joint cell phone tracking initiative
http://www.wsj.com/articles/cia-gave-justice-department-secret-phone-scanning-technology-1426009924
Accessing baby monitors and other listening devices
http://www.forbes.com/sites/kashmirhill/2013/09/04/shodan-terrifying-search-engine/
Entertainment systems listening in on your living room conversations
http://www.bbc.com/news/technology-31296188
The NSA converts spoken words into searchable text so surveillance of conversations can be conducted at huge scale