Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article
Free access

The NSA and Snowden: securing the all-seeing eye

Published: 01 May 2014 Publication History

Abstract

How good security at the NSA could have stopped him.

References

[1]
Allen, J. NSA to cut system administrators by 90 percent to limit data access. Reuters. Aug. 9, 2013; http://www.reuters.com/article/2013/08/09/us-usa-security-nsa-leaks-idUSBRE97801020130809.
[2]
Block, M. Snowden's document leaks shocked the NSA, and more may be on the way. National Public Radio. Dec. 17, 2013; http://www.npr.org/templates/story/story.php?storyId=252006951.
[3]
Brosnahan, J. and West, T. Brief of Amicus Curiae Mark Klein. May 4, 2006; https://www.eff.org/files/filenode/att/kleinamicus.pdf.
[4]
Chimel v. California, 395 U.S. 752, 761 (1969).
[5]
Cohn, C. and Higgins, P. Rating Obama's NSA reform plan: EFF scorecard explained. Electronic Frontier Foundation, Jan. 17, 2014; https://www.eff.org/deeplinks/2014/01/rating-obamas-nsa-reform-plan-eff-scorecard-explained.
[6]
Coke's Reports 91a, 77 Eng. Rep. 194 (K.B. 1604).
[7]
Davidson, A. Judge Pauley to the N.S.A.: Go Big. The New Yorker. Dec. 28, 2013; http://www.newyorker.com/online/blogs/closeread/2013/12/judge-pauley-to-the-nsa-go-big.html.
[8]
Davidson, J. NSA to cut 90 percent of systems administrators. Washington Post. Aug. 13, 2013; http://www.washingtonpost.com/blogs/federal-eye/wp/2013/08/13/nsa-to-cut-90-percent-of-systems-administrators/.
[9]
Defense Logistics Agency. Critical nuclear weapon design information access certificate; http://www.dla.mil/dss/forms/fillables/DL1710.pdf.
[10]
Department of Defense Trusted Computer System Evaluation Criteria, a.k.a., Orange Book 1985; http://csrc.nist.gov/publications/history/dod85.pdf.
[11]
Dilanian, K. Officials: Edward Snowden took NSA secrets on thumb drive. Los Angeles Times. June 13, 2013; http://articles.latimes.com/2013/jun/13/news/la-pn-snowden-nsa-secrets-thumb-drive-20130613.
[12]
Electronic Frontier Foundation (eff.org). NSA spying video, includes comments from many well-known respected people and reminders of past violations; http://www.youtube.com/watch?v=aGmiw_rrNxk.
[13]
Esposito, R. Snowden impersonated NSA officials, sources say. NBC News. Aug. 28, 2013; http://investigations.nbcnews.com/_news/2013/08/28/20234171-snowden-impersonated-nsa-officials-sources-say?lite.
[14]
Everett, B. and Min Kim, S. Lawmakers praise, pan President Obama's NSA plan. Politico. Jan. 17, 2014; http://www.politico.com/story/2014/01/rand-paul-response-nsa-speech-102319.html.
[15]
GNU Privacy Guard; http://www.gnupg.org.
[16]
Howell's State Trials 1029, 95 Eng. 807 (1705).
[17]
Klein, M. and Bamford, J. Wiring Up the Big Brother Machine…and Fighting It. Booksurge Publishing, 2009.
[18]
Legal Information Institute, Cornell University Law School. Fourth Amendment: an overview; http://www.law.cornell.edu/wex/fourth_amendment.
[19]
Miller, J. CBS News "60 Minutes." Dec. 15, 2013; http://www.cbsnews.com/news/nsa-speaks-out-on-snowden-spying/.
[20]
Lemos, R. Security guru: Let's secure the Net. ZDnet, 2002; http://www.zdnet.com/news/security-guru-lets-secure-the-net/120859.
[21]
Mears, B. and Perez, E. Judge: NSA domestic phone data-mining unconstitutional. CNN. Dec. 17, 2013; http://www.cnn.com/2013/12/16/justice/nsa-surveillance-court-ruling/.
[22]
Nakashima, E. A story of surveillance. Washington Post. Nov 7, 2007; http://www.washingtonpost.com/wp-dyn/content/article/2007/11/07/AR2007110700006.html.
[23]
Napolitano, A.P. A presidential placebo -- Obama's massive NSA spying program still alive and well. Fox News. Jan. 23, 2014; http://www.foxnews.com/opinion/2014/01/23/presidential-placebo-obama-massive-nsa-spying-program-still-alive-and-well/.
[24]
Presidential Executive Order 13526 12/29/2009; http://www.whitehouse.gov/the-press-office/executive-order-classified-national-security-information.
[25]
Rosenbach, M. Prism exposed: Data surveillance with global implications. Spiegel Online International. June 10, 2013: 2; http://www.spiegel.de/international/world/prism-leak-inside-the-controversial-us-data-surveillance-program-a-904761.html.
[26]
Schwartz, M. Thumb drive security: Snowden 1, NSA 0. InformationWeek. June 14, 2013; http://www.informationweek.com/infrastructure/storage/thumb-drive-security-snowden-1-nsa-0/d/d-id/1110380.
[27]
Shiffman, J., Cooke, K. Exclusive: U.S. directs agents to cover up program used to investigate Americans. Reuters. Aug. 05, 2013; http://www.reuters.com/article/2013/08/05/us-dea-sod-idUSBRE97409R20130805.
[28]
Smith, C. BGR. Jan. 23, 2014; http://news.yahoo.com/watchdog-says-nsa-phone-spying-program-illegal-end-130014396.html.
[29]
Toxen, B. Real-world Linux Security: Intrusion Detection, Prevention, and Recovery. 2nd Edition. Prentice Hall, 2002.
[30]
U. S. Courts. What does the Fourth Amendment mean?; http://www.uscourts.gov/educational-resources/get-involved/constitution-activities/fourth-amendment/fourth-amendment-mean.aspx.
[31]
U.S. Government Printing Office. Fourth Amendment; http://beta.congress.gov/content/conan/pdf/GPO-CONAN-2013-10-5.pdf.
[32]
Washington Post. Transcript of President Obama's Jan. 17 speech on NSA reforms, 2014; http://www.washingtonpost.com/politics/full-text-of-president-obamas-jan-17-speech-on-nsa-reforms/2014/01/17/fa33590a-7f8c-11e3-9556-4a4bf7bcbd84_story.html.
[33]
Wikipedia. Public-key cryptography; http://en.wikipedia.org/wiki/Public-key_cryptography
[34]
Wikipedia. Edward Snowden; http://en.wikipedia.org/wiki/Edward_Snowden#NSA_rulings_in_federal_court.

Cited By

View all
  • (2024)Data-Centric SecurityData-Centric Security in Software Defined Networks (SDN)10.1007/978-3-031-55517-6_2(5-36)Online publication date: 12-Apr-2024
  • (2023)Towards Data-Centric Security for NATO OperationsDigital Transformation, Cyber Security and Resilience10.1007/978-3-031-44440-1_15(75-92)Online publication date: 1-Nov-2023
  • (2019)Inside the Organization: Why Privacy and Security Engineering Is a Challenge for EngineersProceedings of the IEEE10.1109/JPROC.2018.2866769107:3(600-615)Online publication date: Mar-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 57, Issue 5
May 2014
110 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/2594413
  • Editor:
  • Moshe Y. Vardi
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 2014
Published in CACM Volume 57, Issue 5

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)208
  • Downloads (Last 6 weeks)16
Reflects downloads up to 17 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Data-Centric SecurityData-Centric Security in Software Defined Networks (SDN)10.1007/978-3-031-55517-6_2(5-36)Online publication date: 12-Apr-2024
  • (2023)Towards Data-Centric Security for NATO OperationsDigital Transformation, Cyber Security and Resilience10.1007/978-3-031-44440-1_15(75-92)Online publication date: 1-Nov-2023
  • (2019)Inside the Organization: Why Privacy and Security Engineering Is a Challenge for EngineersProceedings of the IEEE10.1109/JPROC.2018.2866769107:3(600-615)Online publication date: Mar-2019
  • (2019)Dynamic virtual cluster cloud security using hybrid steganographic image authentication algorithmAutomatika10.1080/00051144.2019.1624409(1-8)Online publication date: 12-Jun-2019
  • (2017)Cloud Storage Cost Modeling for Cryptographic File Systems2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP)10.1109/PDP.2017.36(9-14)Online publication date: 2017
  • (2017)The Ethics of Dissent: Can President Trump Survive Guerrilla Government?Administrative Theory & Praxis10.1080/10841806.2017.130980339:2(63-79)Online publication date: 2-May-2017
  • (2017)Big Data is watching YOU: opportunities and challenges from the perspective of young adult consumers in RussiaJournal of Marketing Management10.1080/0267257X.2017.131330133:9-10(719-741)Online publication date: 13-Apr-2017
  • (2017)Leader's dilemma gameInformation Systems Frontiers10.1007/s10796-015-9599-519:2(377-396)Online publication date: 1-Apr-2017
  • (2017)Trustworthiness attribution: Inquiry into insider threat detectionJournal of the Association for Information Science and Technology10.1002/asi.2393869:2(271-280)Online publication date: 22-Sep-2017
  • (2017)Ethical dilemmaJournal of the Association for Information Science and Technology10.1002/asi.2384968:12(2729-2742)Online publication date: 8-Nov-2017
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDFChinese translation

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media