H. Abelson, R. Anderson, S. Bellovin, J. Benaloh, M. Blaze et al., Keys under doormats, Communications of the ACM, vol.58, issue.10, 2015.
DOI : 10.1145/2814825

I. Apple, Apple Inc.'s Motion to Vacate Order Compelling Apple Inc.to Assist Agents in Search, and Opposition to Government's Motion to Compel Assistance, 2016.

R. Burr and D. Feinstein, Compliance with Court Orders Act of 2016 Discussion Draft, 2016.

Y. Bot, Opinion of Advocate General to European Court of Justice. Case C-362/14 " Maximillian Schrems versus Data Protection Commissioner, 2015.

D. Castro and A. Mcquinn, Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S. Competitiveness Information Technology and Innovation Foundation, 2015.

E. Cott, Prosthetic Limbs, Controlled by Thought, 2015.

M. Daniel, E. Felten, and T. Scott, Announcing the President's Commission on Enhancing National Cybersecurity The White House, 2016.

I. Disconnect, Complaint of Disconnect, Inc. European Antitrust Commission, Case COMP, vol.40099, 2015.

H. Farrell and A. Newman, The Transatlantic Data War: Europe Fights Back Against the NSA. Foreign Affairs, 2016.

A. Funder, Stasiland: Stories from Behind the Berlin Wall, 2011.

R. Gallagher, Revealed: How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer. The Intercept, 2015.

R. Gallagher and G. Greenwald, How the NSA plans to infect 'millions' of computers with malware. The Intercept, 2014.

J. Gilmore and M. Wiser, Secrets, Politics and Torture. PBS Frontline, 2015.

J. Granick, OmniCISA Pits DHS Against the FCC and FTC on User Privacy. Just Security Blog, 2015.

S. Harris, @War: The Rise of the Military-Internet Complex

C. Hauser, Denver Police Caught Misusing Databases Got Light Punishments, Report Says, 2016.

A. Hern, Google aims to kill passwords by the end of this year. Guardian, 2016.

F. Henckel-von-donnersmarck-wiedemann and &. Berg, The Lives of Others, 2006.

C. Hewitt, Actor Model of Computation for Scalable Robust Information Systems in Inconsistency Robustness, 2015.

C. Hewitt, C. ®. Actorscript?-extension-of, ®. Java, C. ®. Objective, C. Javascript et al., and SystemVerilog using iAdaptiveTM concurrency for antiCloudTM privacy and security in Inconsistency Robustness, 2015.

C. Hewitt, Actors for CyberThings. Erlang Keynote. YouTube, 2015.

C. Hobak, Terms and Conditions May Apply. Phase 4 Films, 2013.

J. Jouvenal, The new way police are surveilling you: Calculating your threat 'score'. Washington Post, 2016.

S. Kroft, The Data Brokers: Selling your personal information. 60 Minutes, 2014.

J. Leyden, Hey, does your Smart TV have a mic? Enjoy your surveillance, bro. The Register, 2014.

T. Lieu, Ensuring National Constitutional Rights for Your Private Telecommunications Act of, 2016.

J. Mclaughlin and E. Snowden, Explains Why Apple Should Continue To Fight the Government on Encryption. The Intercept, 2015.

E. Nakashima, With a series of major hacks, China builds a database on Americans, 2015.

E. Macaskill, NSA paid millions to cover Prism compliance costs for tech companies. The Guardian, 2013.

J. Masuch and M. Delgado-restituto, Ultra-Low Power Transceiver for Wireless Body Area Networks, 2013.
DOI : 10.1007/978-3-319-00098-5

B. Marczak, China's Great Cannon, 2015.

T. May, UK Home Secretary) Draft Investigatory Powers Bill. Presented to Parliament, 2015.

J. Mayer, The Dark Side. Doubleday, 2008.

J. Mclaughlin and Z. Jilani, We Asked NSA's Privacy Officer If U.S. Spying Powers Are Safe With Donald Trump. Here's What She Said. The Intercept, 2016.

J. Meyer, Review of Inconsistency Robustness. College Publications, 2016.

P. Mozur and J. Perlez, China Quietly Targets U.S. Tech Companies in Security Reviews, 2016.

J. Judge-magistrate and . Orenstein, Memorandum and Order. 15-MC-1902 (JO), 2016.

A. Peterson, Why a staggering number of Americans have stopped using the Internet the way they used to, 2016.

A. Philip, A paralyzed woman flew an F-35 fighter jet in a simulator ? using only her mind, 2015.

S. Rodriguez and . Nsa-', Equation' Fallout: Experts Say Damage To US Tech Firms Could Top $180B International Business Times, 2015.

A. Roy, A. Edward-snowden-meets, J. Roy, and . Cusack, He was small and lithe, like a house cat' The Guardian, 2015.

C. Savage, Obama Administration Set to Expand Sharing of Data That NSA Intercepts, 2016.

J. Scahill and J. Begley, The CIA Campaign to Steal Apple's Secrets. The Intercept, 2015.

J. Scahill and E. Snowden, Glenn Greenwald, and the staff of the Intercept. The Assassination Complex: Inside the Government's Secret Drone Warfare Program, 2016.

E. Schlosser, Command and Control: Nuclear Weapons, the Damascus Accident, and the Illusion of Safety. Penguin Books, 2014.

S. Shane and C. Moynihan, Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.'s NY Times, 2013.

D. That and V. Cerf, Request for the Allowance of Optional Electronic Labeling for Wireless Devices Letter to US FCC, 2015.

S. Thielman, Cybersecurity bill could 'sweep away' internet users' privacy, agency warns. The Guardian, 2015.

D. Thomas, Huawei does not pose risk to UK national security, report finds. Financial Times, 2015.

C. R. Vance and J. , Written Testimony Before the United States House of Representatives Committee on the Judiciary, 2016.

S. Zuboff, Big other: surveillance capitalism and the prospects of an information civilization, Journal of Information Technology, vol.14, issue.2, 2015.
DOI : 10.1016/0090-2616(85)90033-6