Выбрать главу

http://www.nytimes.com/2015/04/25/world/asia/cia-qaeda-drone-strikes-warren-weinstein-giovanni-lo-porto-deaths.html

CHAPTER 26

“5 NSA Whistleblowers Who Came Before Snowden”

http://capitalismisfreedom.com/top-nsa-whistleblowers-came-snowden/

More on what happened to every NSA whistleblower who tried to work through the system can be found in chapter 9 of James Risen’s excellent book, Pay Any Price: Greed, Power, and Endless War (New York: Houghton Mifflin Harcourt, 2014)

http://www.amazon.com/Pay-Any-Price-Greed-Endless-ebook/dp/B00J76JPYK/ref=sr_1_1_twi_2_kin?ie=UTF8&qid=1427299672&sr=8–1&keywords=james+risen

More on Jesselyn Radack, whistleblower and lawyer to whistleblowers

http://www.theverge.com/2014/6/24/5818594/edward-snowdens-lawyer-jesselyn-radack-will-keep-your-secrets

And Diane Roark and Thomas Tamm, who also tried to go through the system

http://cryptome.org/2014/10/roark-risen.htm

http://www.pbs.org/wgbh/pages/frontline/government-elections-politics/united-states-of-secrets/the-frontline-interview-diane-roark/

http://www.pbs.org/wgbh/pages/frontline/government-elections-politics/united-states-of-secrets/the-frontline-interview-thomas-tamm/

CHAPTER 27

Peyton Quinn’s Five Rules for Managing Impending Violence

http://www.nononsenseselfdefense.com/get_attacked.htm

CHAPTER 28

HUMINT, SIGINT… and now, LOVEINT

http://crookedtimber.org/2013/08/24/loveint/

CHAPTER 31

The National License Plate Reader (LPR) Initiative — the DEA’s massive license plate tracking system, open to other federal agencies

http://dissenter.firedoglake.com/2015/01/27/deas-massive-license-plate-tracking-program-spies-on-millions-of-americans-helps-agents-seize-property

Using license plate trackers to monitor gun shows… and what else?

http://www.theguardian.com/us-news/2015/jan/29/us-plan-track-car-drivers-documents

License plate readers are being paired with facial recognition technology, just like Evie’s camera network

http://www.theguardian.com/world/2015/feb/05/aclu-dea-documents-spy-program-millions-drivers-passengers

The NSA targets the privacy-conscious

http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html

XKeyscore: NSA’s Google for the World’s Private Communications

https://firstlook.org/theintercept/2015/07/01/nsas-google-worlds-private-communications/

How XKeyscore works

https://firstlook.org/theintercept/2015/07/02/look-under-hood-xkeyscore/

How the FBI caught Petraeus: cross-referencing metadata, all without a warrant

http://www.aclu.org/blog/technology-and-liberty-national-security/surveillance-and-security-lessons-petraeus-scandal

MIT researchers report they don’t need an individual’s name, address, or credit card number to identify people

http://www.zdnet.com/article/credit-card-metadata-study-easily-identifies-individuals/

Don’t worry; it’s just metadata!

http://www.wired.com/2013/06/phew-it-was-just-metadata-not-think-again/

The CIA intercepts whistleblower communications

http://www.mcclatchydc.com/2014/07/25/234484/after-cia-gets-secret-whistleblower.html

How a surveillance system ostensibly targeted at terrorists in fact sucks in massive amounts of unrelated people and data: Canada’s download dragnet

https://firstlook.org/theintercept/2015/01/28/canada-cse-levitation-mass-surveillance/

CHAPTER 32

How to leak securely using SecureDrop

https://firstlook.org/theintercept/2015/01/28/how-to-leak-to-the-intercept/

CHAPTER 41

CIA director’s attempt to conceal emails by saving them as drafts, not sending

http://www.washingtonpost.com/blogs/worldviews/wp/2012/11/12/heres-the-e-mail-trick-petraeus-and-broadwell-used-to-communicate/

If you’re using encryption, the NSA is watching extra closely

https://www.techdirt.com/articles/20130620/15390323549/nsa-has-convinced-fisa-court-that-if-your-data-is-encrypted-you-might-be-terrorist-so-itll-hang-onto-your-data.shtml

Lawyer-client privileged communications are of particular interest

http://www.theguardian.com/uk-news/2015/feb/18/uk-admits-unlawfully-monitoring-legally-privileged-communications

Governments monitor WikiLeaks website, collect IP addresses of visitors

https://firstlook.org/theintercept/2014/02/18/snowden-docs-reveal-covert-surveillance-and-pressure-tactics-aimed-at-wikileaks-and-its-supporters/

Thinking about searching for privacy-enhancing tools? The NSA is watching for that

http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html

UK Parliamentary Committee: “GCHQ’s bulk interception capability is used primarily to find patterns in, or characteristics of, online communications which indicate involvement in threats to national security”—aka God’s Eye

https://firstlook.org/theintercept/2015/03/12/uk-parliament-finally-offers-evidence-mass-surveillance-stops-terror-attacks/

NSA spies on journalists

http://www.spiegel.de/international/germany/the-nsa-and-american-spies-targeted-spiegel-a-1042023.html

“Surveillance Forces Journalists to Think and Act Like Spies”

https://cpj.org/2015/04/attacks-on-the-press-surveillance-forces-journalists-to-think-act-like-spies.php

This is by design: “When journalists must compete with spies and surveillance, even if they win, society loses.”

http://inthesetimes.com/article/18035/a-spys-guide-to-protecting-whistleblowers

Another example of God’s Eye-type pattern recognition: the NSA’s SKYNET program

https://firstlook.org/theintercept/2015/05/08/u-s-government-designated-prominent-al-jazeera-journalist-al-qaeda-member-put-watch-list/

Israel’s Unit 8200 uses compromising information gathered from captured emails to coerce key Palestinians. Unthinkable NSA does anything similar?

http://blogs.reuters.com/great-debate/2015/05/11/if-youre-not-outraged-about-the-nsa-surveillance-heres-why-you-should-be/

CHAPTER 45

Turning a phone into a listening device via WARRIOR PRIDE and NOSEY SMURF (yes, they really have names like that — your tax dollars at work)

https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/

New exploit turns Samsung Galaxy phones into remote bugging devices

https://twitter.com/rj_gallagher/status/618543070884315136/photo/1

Using a cell phone’s gyroscopes like a microphone

http://www.wired.com/2014/08/gyroscope-listening-hack/

The $2.8 billion JLENS blimps floating over Maryland

https://firstlook.org/theintercept/2014/12/17/billion-dollar-surveillance-blimp-launch-maryland/

The CIA/US Marshals joint cell phone tracking initiative

http://www.wsj.com/articles/cia-gave-justice-department-secret-phone-scanning-technology-1426009924

Accessing baby monitors and other listening devices

http://www.forbes.com/sites/kashmirhill/2013/09/04/shodan-terrifying-search-engine/

Entertainment systems listening in on your living room conversations

http://www.bbc.com/news/technology-31296188

The NSA converts spoken words into searchable text so surveillance of conversations can be conducted at huge scale