Page 237 - Privacy in a Cyber Age Policy and Practice
P. 237

NOTES  225

               Heidi Boghosian, “The Business of Surveillance,”  Human Rights Maga-
               zine 39 (2013), http://www.americanbar.org/publications/human_rights_
               magazine_home/2013_vol_39/may_2013_n2_privacy/the_business_of_
               surveillance.html.
           118.  Christopher Slobogin, “Government Data Mining and the Fourth Amend-
               ment,” The University of Chicago Law Review 75 (2008): 317, 320.
           119. Ibid.
           120.  “Rein in the Surveillance State,” American Civil Liberties Union, accessed
               March 3, 2015 at https://www.aclu.org/rein-surveillance-state.
           121.  Jeff Mason, “Exclusive: Obama Sharply Criticizes China’s Plans for New Tech-
               nology Rules,” Reuters, March 2, 2015.
           122.  Erin Kelly, “Tech Companies Say NSA Spying Harms Competitiveness,” USA
               Today, October 7, 2014.
           123.  Sam_Frizell, “The FBI and NSA Hate Apple’s Plan to Keep Your iPhone Data
               Secret,” Time, September 27 2014.
           124.  Glenn Greenwald and Ewen MacAskill, “NSA Prism Program Taps in to User
               Data of Apple, Google and Others,” The Guardian, June 6, 2013,  http://www
               .theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data.
           125.  “Cover Letter and 2009 Report on the National Security Agency’s Bulk Col-
               lection Program for USA PATRIOT Act Reauthorization,” Office of the
               Director of National Intelligence, Washington, DC (2013), http://www.dni.
               gov/files/documents/2009_CoverLetter_Report_Collection.pdf.
           126.  “Letters to the House Permanent Select Committee on Intelligence and
               the Senate Select Committee on Intelligence Leadership regarding Section
               702 Congressional White Paper ‘The Intelligence Community’s Collection
               Programs Under Title VII of the Foreign Intelligence Surveillance Act,”
               Office of the Director of National Intelligence, Washington, DC (2013): 6,
               http://www.dni.gov/files/documents/Ltr%20to%20HPSCI%20Chair-
               man%20Rogers%20and%20Ranking%20Member%20Ruppersberger_
               Scan.pdf.
           127.  James Ball, “NSA Collects Millions of Text Messages Daily in ‘Untargeted’
               Global Sweep,” The Guardian, January 16, 2014.
           128.  Barton Gellman and Ashkan Soltani, “NSA Infiltrates Links to Yahoo, Google
               Data Centers Worldwide, Snowden Documents Say,” Washington Post, Octo-
               ber 30, 2013.
           129.  Glenn Greenwald and Ewen MacAskill, “NSA Prism Program Taps in to User
               Data of Apple, Google and Others,” The Guardian, June 6, 2013, http://www.
               theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data. With respect
               to the Americans whose data is collected, the Washington Post reports that
               “The surveillance may not ‘intentionally target’ an American, but the NSA
               can obtain the private communications of Americans as part of a request
               that officially ‘targets’ a foreigner” (Lee, “Here’s Everything We Know about
               PRISM to Date”).
           130.  Litt, “Privacy, Technology, and National Security.”
           131.  United States v. Verdugo-Urquidez, 856 F.2d 1214, 1218 (9th Cir. 1988).
   232   233   234   235   236   237   238   239   240   241   242