Page 223 - Privacy in a Cyber Age Policy and Practice
P. 223

NOTES  211

           10.  Larry Abramson, “Privacy Board to Scrutinize Surveillance Programs,” NPR, July
              9, 2013, http://www.npr.org/2013/07/09/200285740/privacy-board-to-hold-
              first-meeting.
           11. See Amitai Etzioni, The Limits of Privacy.
           12.  Sara Carter, “Al Qaeda Gaining Strength in Mali, North Africa,” The Wash-
              ington Times, March 26, 2013, http://www.washingtontimes.com/news/2013/
              mar/26/key-mali-lawmaker-challenges-obama-on-al-qaida-thr/?page=all.
              See also, Sudarsan Raghavan, “Nigerian Islamist Militants Return from Mali
              with Weapons, Skills,”  The Washington Post, May 31, 2013, http://articles.
              washingtonpost.com/2013-05-31/world/39642133_1_northern-mali-boko-
              haram-nigerian-islamist; and Adam Entous, Drew Hinshaw, and David
              Gauthier-Villars, “Militants, Chased From Mali, Pose New Threats,” The Wall
              Street Journal, May 24, 2013, http://online.wsj.com/article/SB10001424127887
              323336104578503464066163002.html.
           13.  Cory Bennett, “How Al-Qaida in Yemen Became the Biggest Terrorist Threat
              to the U.S.,” National Journal, May 30, 2013, http://www.nationaljournal.com/
              political-landscape-podcast/how-al-qaida-in-yemen-became-the-biggest-
              terrorist-threat-to-the-u-s-20121214. See also, Douglas A. Pryer, “The Rise of
              the Machines,”  Military Review (March-April 2013): 17, http://usacac.army.
              mil/CAC2/MilitaryReview/Archives/English/MilitaryReview_20130430_
              art005.pdf.
           14.  Bruce Riedel, “Al Qaeda Comeback,” The Daily Beast, April 12, 2013, http://
              www.thedailybeast.com/articles/2013/04/12/al-qaeda-comeback.html.
           15.  For a detailed discussion of this point, see Paul K. Kerr and Mary Beth Niki-
              tin, “Pakistan’s Nuclear Weapons: Proliferation and Security Issues,” Congres-
              sional Research Service, RL34248 (March 19, 2013), http://www.fas.org/sgp/
              crs/nuke/RL34248.pdf; and Amy F. Woolf, “Nonstrategic Nuclear Weapons,”
              Congressional Research Service, RL32572 (December 19, 2012), http://www.
              fas.org/sgp/crs/nuke/RL32572.pdf.
           16.  Shaun Gregory, “The Terrorist Threat to Pakistan’s Nuclear Weapons” CTC
              Sentinel, July 15, 2009: 2, 7.
           17.  Sean M. Joyce, as quoted in “House Select Intelligence Committee Holds
              Hearing on Disclosure of National Security Agency Surveillance Programs,”
              Federation of American Scientists, June 18, 2013, 10–1, https://www.fas.org/
              irp/congress/2013_hr/disclosure.pdf.
           18. Ibid.
           19. Ibid.
           20.  Ibid.; see also, Erin McClam, “Surveillance Helped Stop Plots against NYSE
              and New York Subway, Official Says,” NBC News, June 18, 2013, http://usnews.
              nbcnews.com/_news/2013/06/18/19022364-surveillance-helped-stop-plots-
              against-nyse-and-new-york-subway-official-says?lite.
           21.  Keith Alexander, as quoted in “House Select Intelligence Committee Holds
              Hearing on Disclosure of National Security Agency Surveillance Programs,”
              Federation of American Scientists, June 18, 2013, 11–13, https://www.fas.org/
              irp/congress/2013_hr/disclosure.pdf.
   218   219   220   221   222   223   224   225   226   227   228