Page 241 - Privacy in a Cyber Age Policy and Practice
P. 241
NOTES 229
171. Wittes, “The NSA, the Washington Post, and the Administration.”
172. Litt, “Privacy, Technology, a National Security”; and Sean Mirski and
Benjamin Wittes, “The NSA Documents Part VI: The 2011 Minimization
Procedures,” Lawfare, August 23, 2013, http://www.lawfareblog.com/2013/08/
the-nsa-documents-part-vi-the-2011-minimization-procedures/.
173. Gellman, “NSA Broke Privacy Rules Thousands of Times per Year, Audit
Finds.”
174. Corey M. Then, “Searches and Seizures of Americans Abroad: Re-examining
the Fourth Warrant Clause and the Foreign Intelligence Exception Five Years
After United States v. Bin Laden,” Duke Law Journal 55 (2005): 1064.
175. Ibid., 1065–68.
176. Zeke J. Miller, “Obama Administration Declassifies Details On ‘PRISM,’ Blasts
‘Reckless’ Media and Leakers,” TIME, June 8, 2013, http://swampland.time.
com/2013/06/08/obama-administration-declassifies-details-on-prism-blasts-
reckless-media-and-leakers/.
177. Edward Liu, “Reauthorization of the FISA Amendments Act,” Congressio-
nal Research Service, Washington, DC, April 2013, p. 5, http://www.cfr.org/
intelligence/crs-reauthorization-fisa-amendments-act/p30877.
178. Ackerman and Ball, “NSA Loophole Allows Warrantless Search for U.S. Citi-
zens’ Emails and Phone Calls.”
179. Gellman and Poitras, “U.S., British Intelligence Mining Data from Nine U.S.
Internet Companies in Broad Secret Program.”
180. “H.R. 6304 (110th): FISA Amendments Act of 2008,” http://www.govtrack.
us/congress/bills/110/hr6304/text.
181. United States v. Ramsey, 431 U.S. 606, 616 (1977).
182. Almeida-Sanchez v. United States, 413 U.S. 266, 272, (1973).
183. “Will the Fourth Amendment Protect Your Laptop at the Border?” American
Bar Association, September 17, 2013, http://www.americanbar.org/publications/
gp_solo/2012/november_december2012privacyandconfidentiality/will_fourth_
amendment_protect_your_laptop_border.html.
184. Yule Kim, “Protecting the US Perimeter: Border Searches Under the Fourth
Amendment,” Congressional Research Service (2009), http://www.fas.org/sgp/
crs/homesec/RL31826.pdf.
185. See Michael Riley, “NSA Said to Exploit Heartbleed Bug for Intelligence for
Years,” Bloomberg, April 12, 2014; David Sanger, “Obama Lets N.S.A. Exploit
Some Internet Flaws, Officials Say,” New York Times, April 12, 2014; Michael
Daniel, “Heartbleed: Understanding When We Disclose Cyber Vulnerabili-
ties,” White House Blog, April 28, 2014.
186. Glenn Greenwald and Ewen MacAskill, “Boundless Informant: The NSA’s
Secret Tool to Track Global Surveillance Data,” The Guardian, June 11,
2013.
187. Barton Gellman and Ashkan Soltani, “NSA Surveillance Program Reaches ‘Into
the Past’ to Retrieve, Replay Phone Calls,” Washington Post, March 18, 2014.
188. James Ball, “NSA Collects Millions of Text Messages Daily in ‘Untargeted’
Global Sweep,” The Guardian, January 16, 2014.
189. Gellman and Soltani, “NSA Tracking Cellphone Locations Worldwide.”