Page 233 - Privacy in a Cyber Age Policy and Practice
P. 233
NOTES 221
64. Jaffer, “Needles are Harder to Find in Bigger Haystacks.”
65. Matthew Waxman, “How to Measure the Value of NSA Programs?” Lawfare,
August 12, 2013, http://www.lawfareblog.com/2013/08/how-to-measure-the-
value-of-nsa-programs/.
66. Wyden and Udall, “Wyden, Udall Issue Statement on Effectiveness of Declas-
sified NSA Programs”; Drum, “The NSA’s Massive Call Record Surveillance
Program Barely Accomplishes Anything”; andJosh Gerstein, “The Metadata
Muddle: How Effective Is Call-tracking?” Politico, June 19, 2013, http://www.
politico.com/story/2013/06/nsa-surveillance-93075.html.
67. Ibid; and Waxman, “How to Measure the Value of NSA Programs?”
68. John Mueller and Mark G. Stewart, “Secret without Reason and Costly with-
out Accomplishment: Questioning the National Security Agency’s Meta-
data Program,” I/S: A Journal of Law and Policy for the Information Society
10, 1 (2014): 407.
69. See Mark D. Young, “National Insecurity: The Impacts of Illegal Disclosures
of Classified Information,” I/S: A Journal of Law and Policy for the Informa-
tion Society, 10, 1 (2014): 367: “The complexities, technology, and ambiguity
of the modern security environment make it unlikely that any single intelli-
gence source or program will provide a “smoking gun” on a national secu-
rity threat [. . .] To overcome these realities, the Intelligence Community must
apply a dizzying set of analytic techniques [. . .] This is no small task and it
requires a mosaic of information, to include bulk metadata.”
70. Peter L. Bergen, The Osama bin Laden I Know (New York: Free Press, 2006),
397; Jason Burke and Ian Black, “Al-Qaida: Tales from Bin Laden’s Volunteers,”
The Guardian, September 10, 2009, http://www.theguardian.com/world/2009/
sep/10/al-qaida-terrorism-bin-laden; Matthew Schofield, “Osama bin Laden
Was Angry, Increasingly Irrelevant in Final Years, Letters Show,” McClatchy,
May 3, 2012, http://www.mcclatchydc.com/2012/05/03/v-print/147573/
letters-show-bin-laden-was-angry.html.
71. Peter Finn and Anne E. Kornblut, “Al-Qaeda Couriers Provided Trail That Led to
bin Laden,” The Washington Post, May 2, 2011, http://articles. washingtonpost.
com/2011-05-02/national/35264458_1_al-qaeda-couriers-osama-
bin-laden-abu-faraj.
72. Sibohan Gorman, Evan Perez, and Janet Hook, “U.S. Collects Vast Data Trove,”
The Wall Street Journal, June 7, 2013, http://online.wsj.com/article/SB1000142
4127887324299104578529112289298922.html.
73. Dianne Feinstein, “Make NSA Programs More Transparent,” The Wash-
ington Post, July 30, 2013, http://articles.washingtonpost.com/2013-07-30/
opinions/40893423_1_nsa-analyst-national-security-agency-fisa-court; Bob
Cesca, “CNET Reporter Posts Wildly Inaccurate Yet Totally Viral “Bombshell”
About NSA Eavesdropping,” The Daily Banter, June 16, 2013,
http://thedailybanter.com/2013/06/cnet-reporter-posts-wildly-inaccurate-
yet-totally-viral-bombshell-about-nsa-eavesdropping/. Examples of critics
include: Glenn Greenwald, “Fisa Court Oversight: A Look Inside a Secret and
Empty Process,” The Guardian, June 18, 2013,