Digital Security For Journalists

Footnotes

  1. Datablog + UK Riots 2011. The Guardian, 2011-12

  2. Reading the Riots. The Guardian, 12/4/11

  3. London riots: BlackBerry to help police by Josh Halliday. The Guardian, 8/8/11

  4. Twitter Must Hand Over Protester Malcolm Harris’ Tweets by Jennifer Peltz. The Huffington Post, 7/2/12

  5. Twitter fights back against subpoena by Nilay Patel. The Verge, 5/8/12

  6. Twitter Turns Over Protester Posts by Tiffany Kary. Bloomberg, 9/14/12

  7. NSA paid millions to cover Prism compliance, The Guardian, 8/22/13

  8. Is Glenn Greenwald the Future of News?, The New York Times, 10/27/13

  9. Social media and the search for the Boston bombing suspects. CBS News, 4/24/13

  10. NPR Ethics Handbook: Independence. NPR, Retrieved: 6/5/14

  11. AP President accuses DOJ of source intimidation, Jennifer C. Kerr. AP, 6/19/13

  12. Will Eric Holder Back Off?, Emily Bazelon. Slate, 6/2/14; DOJ scrutiny of James Rosen draws fire, Ann E. Marimow. Washington Post, 5/20/13

  13. No Place to Hide – review, Philippe Sands. The Guardian, 5/23/14

  14. Journalists’ Privilege, Kathleen Ann Ruane. CRS, 1/19/11

  15. When Enough is Enough, Bellovin et al. NYU Journal of Law, 2014

  16. Holder Tightens Rules on Getting Reporters’ Data, by Charlie Savage. The New York Times, 7/12/13

  17. Making Sense from Snowden, Susan Landau. IEEE Computer and Reliability Societies, 8/13

  18. A High-Tech War on Leaks, by Adam Liptak. The New York Times, 2/11/12

  19. ACLU v. Clapper – Challenge to NSA, ACLU, retrieved: 6/6/14

  20. Supreme Court declines look at NSA case, Lawrence Hurley. Reuters, 4/7/14

  21. Amicus Brief, Risen v United States.PDF), LSKS, LLP. 3/26/14

  22. Justices reject reporter’s bid to protect source. AP, 6/2/14

  23. Branzburg v. Hayes, Opinion of The Court, Justic White. 6/29/72

  24. Agencies collected data on Americans, Ellen Nakashima. The Washington Post, 12/9/13

  25. Armed agents seize records of reporter, Guy Taylor. The Washington Times, 10/25/13

  26. Judge Says Giving Up Your Password May Be A 5th Amendment Violation, Mike Masnick. Techdirt, 4/25/13

  27. Apple’s Fingerprint ID May Mean You Can’t “Take the Fifth”, Marcia Hoffman. Wired, 9/12/13

  28. On Distributed Communications Networks, Paul Baran. IEEE CS-12, (1), 3/64

  29. Spreading the News: The American Postal System from Franklin to Morse. Richard R. John, 2009.

  30. On Distributed Communications Networks, Paul Baran. IEEE CS-12, (1), 3/64

  31. NSA uses Google cookies to pinpoint targets, Andrea Peterson. The Washington Post, 12/12/13

  32. Why Johnny Can’t Browse in Peace, Lukasz Olejnik et al. 5th PET Workshop, 7/13/12

  33. Enhanced 9-1-1 Wireless Services, FCC, Retrieved: 6/7/14

  34. AT&T willing to spy for NSA, MPAA, and RIAA, Nate Anderson. Arstechnica, 6/13/07

  35. Internet Censorship by DNS Injection, Anonymous. ACM SIGCOMM, (42)(3), 7/12

  36. Make HTTPS and Email More Secure, Peter Eckersley. EFF, 11/18/11

  37. Yahoo finally enables HTTPS encryption for email by default, Liam Tung. ZDNet, 1/8/14

  38. 42 million unencrypted passwords leaked from Cupid Media, Darlene Storm. Computer World, 11/20/13

  39. Snowden’s E-Mail Provider Defied FBI Demands to Turn Over Crypto Keys, Kevin Poulsen. Wired, 10/2/13

  40. David Miranda:“They said I would be put in jail”, Jonathan Watts. The Guardian, 8/19/13

  41. Snapchat Settles FTC Charges, FTC, 5/8/14

  42. Whistleblowers Beware: Apps Will Rat You Out, Andy Greenberg. Wired, 5/14/14

  43. The Disconnect on Anonymous Sources, Margaret Sullivan. The New York Times, 10/12/13

  44. Privacy Tools: Encrypt What You Can, Julia Angwin. ProPublica, 5/6/14

  45. Crypto for the Masses, Quinn Norton. The Daily Beast, 5/12/14

  46. Five Best VPN Service Providers, Alan Henry. LifeHacker, 3/23/14

  47. Harvard Student Receives F For Tor Failure, Runa A. Sandvik. Forbes, 12/18/13

  48. zxcvbn: realistic password strength estimation, Dan Wheeler. DropBox, 4/10/12

  49. CleanOS: Limiting Mobile Data Exposure, Yang Tang et al. usenix;login; (38)(1), 2012; Blackphone, The Smartphone That Simplifies Privacy, Natasha Lomas. Techcrunch, 2/26/14

  50. Edward Snowden Speaks to Peter Maass, Peter Maass. The New York Times, 8/8/13

  51. Meet the Man Hired to Make Sure the Snowden Docs Aren’t Hacked, Lorenzo Franceschi-Bicchierai. Mashable, 5/27/14

  52. Why King George III Can Encrypt, Arvind Narayanan. Center for Information Technology Policy, 6/10/14

  53. Tech giants finally agree to fund OpenSSL, Jon Brodkin. Arstechnica, 4/24/14

  54. “Be transparent” as a guiding journalism principle, Tom Rosenstiel. Poynter, 9/16/13

  55. Source Available vs Open Source vs Free Software, Phil Haack. 7/26/06

  56. The New Privacy Interest: Electronic Mail, Steven Winters. Berkeley Technology Law Journal (8), 1993

  57. Ars tests Internet surveillance, Sean Gallagher. Arstechnica, 6/10/14

  58. AT&T willing to spy for NSA, MPAA, and RIAA, Nate Anderson. Arstechnica, 6/13/07