Datablog + UK Riots 2011. The Guardian, 2011-12
Reading the Riots. The Guardian, 12/4/11
London riots: BlackBerry to help police by Josh Halliday. The Guardian, 8/8/11
Twitter Must Hand Over Protester Malcolm Harris’ Tweets by Jennifer Peltz. The Huffington Post, 7/2/12
Twitter fights back against subpoena by Nilay Patel. The Verge, 5/8/12
Twitter Turns Over Protester Posts by Tiffany Kary. Bloomberg, 9/14/12
NSA paid millions to cover Prism compliance, The Guardian, 8/22/13
Is Glenn Greenwald the Future of News?, The New York Times, 10/27/13
Social media and the search for the Boston bombing suspects. CBS News, 4/24/13
NPR Ethics Handbook: Independence. NPR, Retrieved: 6/5/14
AP President accuses DOJ of source intimidation, Jennifer C. Kerr. AP, 6/19/13
Will Eric Holder Back Off?, Emily Bazelon. Slate, 6/2/14; DOJ scrutiny of James Rosen draws fire, Ann E. Marimow. Washington Post, 5/20/13
No Place to Hide – review, Philippe Sands. The Guardian, 5/23/14
Journalists’ Privilege, Kathleen Ann Ruane. CRS, 1/19/11
When Enough is Enough, Bellovin et al. NYU Journal of Law, 2014
Holder Tightens Rules on Getting Reporters’ Data, by Charlie Savage. The New York Times, 7/12/13
Making Sense from Snowden, Susan Landau. IEEE Computer and Reliability Societies, 8/13
A High-Tech War on Leaks, by Adam Liptak. The New York Times, 2/11/12
ACLU v. Clapper – Challenge to NSA, ACLU, retrieved: 6/6/14
Supreme Court declines look at NSA case, Lawrence Hurley. Reuters, 4/7/14
Amicus Brief, Risen v United States.PDF), LSKS, LLP. 3/26/14
Justices reject reporter’s bid to protect source. AP, 6/2/14
Branzburg v. Hayes, Opinion of The Court, Justic White. 6/29/72
Agencies collected data on Americans, Ellen Nakashima. The Washington Post, 12/9/13
Armed agents seize records of reporter, Guy Taylor. The Washington Times, 10/25/13
Judge Says Giving Up Your Password May Be A 5th Amendment Violation, Mike Masnick. Techdirt, 4/25/13
Apple’s Fingerprint ID May Mean You Can’t “Take the Fifth”, Marcia Hoffman. Wired, 9/12/13
On Distributed Communications Networks, Paul Baran. IEEE CS-12, (1), 3/64
Spreading the News: The American Postal System from Franklin to Morse. Richard R. John, 2009.
On Distributed Communications Networks, Paul Baran. IEEE CS-12, (1), 3/64
NSA uses Google cookies to pinpoint targets, Andrea Peterson. The Washington Post, 12/12/13
Why Johnny Can’t Browse in Peace, Lukasz Olejnik et al. 5th PET Workshop, 7/13/12
Enhanced 9-1-1 Wireless Services, FCC, Retrieved: 6/7/14
AT&T willing to spy for NSA, MPAA, and RIAA, Nate Anderson. Arstechnica, 6/13/07
Internet Censorship by DNS Injection, Anonymous. ACM SIGCOMM, (42)(3), 7/12
Make HTTPS and Email More Secure, Peter Eckersley. EFF, 11/18/11
Yahoo finally enables HTTPS encryption for email by default, Liam Tung. ZDNet, 1/8/14
42 million unencrypted passwords leaked from Cupid Media, Darlene Storm. Computer World, 11/20/13
Snowden’s E-Mail Provider Defied FBI Demands to Turn Over Crypto Keys, Kevin Poulsen. Wired, 10/2/13
David Miranda:“They said I would be put in jail”, Jonathan Watts. The Guardian, 8/19/13
Snapchat Settles FTC Charges, FTC, 5/8/14
Whistleblowers Beware: Apps Will Rat You Out, Andy Greenberg. Wired, 5/14/14
The Disconnect on Anonymous Sources, Margaret Sullivan. The New York Times, 10/12/13
Privacy Tools: Encrypt What You Can, Julia Angwin. ProPublica, 5/6/14
Crypto for the Masses, Quinn Norton. The Daily Beast, 5/12/14
Five Best VPN Service Providers, Alan Henry. LifeHacker, 3/23/14
Harvard Student Receives F For Tor Failure, Runa A. Sandvik. Forbes, 12/18/13
zxcvbn: realistic password strength estimation, Dan Wheeler. DropBox, 4/10/12
CleanOS: Limiting Mobile Data Exposure, Yang Tang et al. usenix;login; (38)(1), 2012; Blackphone, The Smartphone That Simplifies Privacy, Natasha Lomas. Techcrunch, 2/26/14
Edward Snowden Speaks to Peter Maass, Peter Maass. The New York Times, 8/8/13
Meet the Man Hired to Make Sure the Snowden Docs Aren’t Hacked, Lorenzo Franceschi-Bicchierai. Mashable, 5/27/14
Why King George III Can Encrypt, Arvind Narayanan. Center for Information Technology Policy, 6/10/14
Tech giants finally agree to fund OpenSSL, Jon Brodkin. Arstechnica, 4/24/14
“Be transparent” as a guiding journalism principle, Tom Rosenstiel. Poynter, 9/16/13
Source Available vs Open Source vs Free Software, Phil Haack. 7/26/06
The New Privacy Interest: Electronic Mail, Steven Winters. Berkeley Technology Law Journal (8), 1993
Ars tests Internet surveillance, Sean Gallagher. Arstechnica, 6/10/14
AT&T willing to spy for NSA, MPAA, and RIAA, Nate Anderson. Arstechnica, 6/13/07