Page 237 - Privacy in a Cyber Age Policy and Practice
P. 237
NOTES 225
Heidi Boghosian, “The Business of Surveillance,” Human Rights Maga-
zine 39 (2013), http://www.americanbar.org/publications/human_rights_
magazine_home/2013_vol_39/may_2013_n2_privacy/the_business_of_
surveillance.html.
118. Christopher Slobogin, “Government Data Mining and the Fourth Amend-
ment,” The University of Chicago Law Review 75 (2008): 317, 320.
119. Ibid.
120. “Rein in the Surveillance State,” American Civil Liberties Union, accessed
March 3, 2015 at https://www.aclu.org/rein-surveillance-state.
121. Jeff Mason, “Exclusive: Obama Sharply Criticizes China’s Plans for New Tech-
nology Rules,” Reuters, March 2, 2015.
122. Erin Kelly, “Tech Companies Say NSA Spying Harms Competitiveness,” USA
Today, October 7, 2014.
123. Sam_Frizell, “The FBI and NSA Hate Apple’s Plan to Keep Your iPhone Data
Secret,” Time, September 27 2014.
124. Glenn Greenwald and Ewen MacAskill, “NSA Prism Program Taps in to User
Data of Apple, Google and Others,” The Guardian, June 6, 2013, http://www
.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data.
125. “Cover Letter and 2009 Report on the National Security Agency’s Bulk Col-
lection Program for USA PATRIOT Act Reauthorization,” Office of the
Director of National Intelligence, Washington, DC (2013), http://www.dni.
gov/files/documents/2009_CoverLetter_Report_Collection.pdf.
126. “Letters to the House Permanent Select Committee on Intelligence and
the Senate Select Committee on Intelligence Leadership regarding Section
702 Congressional White Paper ‘The Intelligence Community’s Collection
Programs Under Title VII of the Foreign Intelligence Surveillance Act,”
Office of the Director of National Intelligence, Washington, DC (2013): 6,
http://www.dni.gov/files/documents/Ltr%20to%20HPSCI%20Chair-
man%20Rogers%20and%20Ranking%20Member%20Ruppersberger_
Scan.pdf.
127. James Ball, “NSA Collects Millions of Text Messages Daily in ‘Untargeted’
Global Sweep,” The Guardian, January 16, 2014.
128. Barton Gellman and Ashkan Soltani, “NSA Infiltrates Links to Yahoo, Google
Data Centers Worldwide, Snowden Documents Say,” Washington Post, Octo-
ber 30, 2013.
129. Glenn Greenwald and Ewen MacAskill, “NSA Prism Program Taps in to User
Data of Apple, Google and Others,” The Guardian, June 6, 2013, http://www.
theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data. With respect
to the Americans whose data is collected, the Washington Post reports that
“The surveillance may not ‘intentionally target’ an American, but the NSA
can obtain the private communications of Americans as part of a request
that officially ‘targets’ a foreigner” (Lee, “Here’s Everything We Know about
PRISM to Date”).
130. Litt, “Privacy, Technology, and National Security.”
131. United States v. Verdugo-Urquidez, 856 F.2d 1214, 1218 (9th Cir. 1988).