Page 241 - Privacy in a Cyber Age Policy and Practice
P. 241

NOTES  229

           171.  Wittes, “The NSA, the Washington Post, and the Administration.”
           172.  Litt, “Privacy, Technology, a National Security”; and Sean Mirski and
               Benjamin Wittes, “The NSA Documents Part VI: The 2011 Minimization
               Procedures,” Lawfare, August 23, 2013, http://www.lawfareblog.com/2013/08/
               the-nsa-documents-part-vi-the-2011-minimization-procedures/.
           173.  Gellman, “NSA Broke Privacy Rules Thousands of Times per Year, Audit
               Finds.”
           174.  Corey M. Then, “Searches and Seizures of Americans Abroad: Re-examining
               the Fourth Warrant Clause and the Foreign Intelligence Exception Five Years
               After United States v. Bin Laden,” Duke Law Journal 55 (2005): 1064.
           175. Ibid., 1065–68.
           176.  Zeke J. Miller, “Obama Administration Declassifies Details On ‘PRISM,’ Blasts
               ‘Reckless’ Media and Leakers,” TIME, June 8, 2013, http://swampland.time.
               com/2013/06/08/obama-administration-declassifies-details-on-prism-blasts-
               reckless-media-and-leakers/.
           177.  Edward Liu, “Reauthorization of the FISA Amendments Act,”  Congressio-
               nal Research Service, Washington, DC, April 2013, p. 5, http://www.cfr.org/
               intelligence/crs-reauthorization-fisa-amendments-act/p30877.
           178.  Ackerman and Ball, “NSA Loophole Allows Warrantless Search for U.S. Citi-
               zens’ Emails and Phone Calls.”
           179.  Gellman and Poitras, “U.S., British Intelligence Mining Data from Nine U.S.
               Internet Companies in Broad Secret Program.”
           180.  “H.R. 6304 (110th): FISA Amendments Act of 2008,” http://www.govtrack.
               us/congress/bills/110/hr6304/text.
           181.  United States v. Ramsey, 431 U.S. 606, 616 (1977).
           182.  Almeida-Sanchez v. United States, 413 U.S. 266, 272, (1973).
           183.  “Will the Fourth Amendment Protect Your Laptop at the Border?” American
               Bar Association, September 17, 2013, http://www.americanbar.org/publications/
               gp_solo/2012/november_december2012privacyandconfidentiality/will_fourth_
               amendment_protect_your_laptop_border.html.
           184.  Yule Kim, “Protecting the US Perimeter: Border Searches Under the Fourth
               Amendment,” Congressional Research Service (2009), http://www.fas.org/sgp/
               crs/homesec/RL31826.pdf.
           185.  See Michael Riley, “NSA Said to Exploit Heartbleed Bug for Intelligence for
               Years,” Bloomberg, April 12, 2014; David Sanger, “Obama Lets N.S.A. Exploit
               Some Internet Flaws, Officials Say,” New York Times, April 12, 2014; Michael
               Daniel, “Heartbleed: Understanding When We Disclose Cyber Vulnerabili-
               ties,” White House Blog, April 28, 2014.
           186.  Glenn Greenwald and Ewen MacAskill, “Boundless Informant: The NSA’s
               Secret Tool to Track Global Surveillance Data,”  The Guardian, June 11,
               2013.
           187.  Barton Gellman and Ashkan Soltani, “NSA Surveillance Program Reaches ‘Into
               the Past’ to Retrieve, Replay Phone Calls,” Washington Post, March 18, 2014.
           188.  James Ball, “NSA Collects Millions of Text Messages Daily in ‘Untargeted’
               Global Sweep,” The Guardian, January 16, 2014.
           189.  Gellman and Soltani, “NSA Tracking Cellphone Locations Worldwide.”
   236   237   238   239   240   241   242   243   244   245   246