Main Content
National Research Council: Committee on Responding to Section 5(d) of Presidential Policy Directive 28, Bulk Collection of Signals Intelligence: Technical Options, National Academies Press (2015)
3.5
https://perma.cc/JX6G-WKQA
Nola K. Breglio, Leaving FISA Behind: The Need To Return to Warrantless Foreign Intelligence Surveillance, 113 Yale L.F. 179
11.5
https://perma.cc/974B-79GY
"NSA slides explain the PRISM data-collection program," The Washington Post (June 6, 2013)
5.4
http://perma.cc/5DYX-J8SK
Office of the Attorney General, “Procedures used by NSA to minimize data collection from US persons: Exhibit B" (July 28, 2009)
6.4
http://perma.cc/B252-ED3D?type=pdf
Office of the Director of National Intelligence, Statistical Transparency Report Regarding Use of National Security Authorities, (Apr 30, 2016)
8.6
https://perma.cc/WZ89-2QVP
Offices of the Inspectors General, Unclassified Report on the President’s Surveillance Program (2009), Parts IV and V
8.5
http://perma.cc/KF6K-NVH5?type=pdf
[OPTIONAL] Harold Abelson et al., Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications, CSAIL (Jul 7, 2015).
9.9
https://perma.cc/2L3U-QST8
“President Obama’s January 17, 2014 speech on NSA Reforms,” The Washington Post (January 17, 2014)
3.6
https://perma.cc/HH8P-3BU4
Rachel Levinson-Waldman, What the Government Does with Americans’ Data, Brennan Center (Oct 8, 2013)
1.2
http://perma.cc/9ULA-6XKU?type=pdf
Robert Litt, Privacy, Technology and National Security: An Overview of Intelligence Collection, Office of the Director of National Intelligence (July 18, 2013)
8.3
http://perma.cc/0sUGY9ca7Wq?type=pdf
This book, and all H2O books, are Creative Commons licensed for sharing and re-use with the exception of certain excerpts. Any excerpts from the Restatements of the Law, Principles of the Law, and the Model Penal Code are copyright by The American Law Institute. Excerpts are reproduced with permission, not as part of a Creative Commons license.