Keys under doormats, Communications of the ACM, vol.58, issue.10, 2015. ,
DOI : 10.1145/2814825
Apple Inc.'s Motion to Vacate Order Compelling Apple Inc.to Assist Agents in Search, and Opposition to Government's Motion to Compel Assistance, 2016. ,
Compliance with Court Orders Act of 2016 Discussion Draft, 2016. ,
Opinion of Advocate General to European Court of Justice. Case C-362/14 " Maximillian Schrems versus Data Protection Commissioner, 2015. ,
Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S. Competitiveness Information Technology and Innovation Foundation, 2015. ,
Prosthetic Limbs, Controlled by Thought, 2015. ,
Announcing the President's Commission on Enhancing National Cybersecurity The White House, 2016. ,
Complaint of Disconnect, Inc. European Antitrust Commission, Case COMP, vol.40099, 2015. ,
The Transatlantic Data War: Europe Fights Back Against the NSA. Foreign Affairs, 2016. ,
Stasiland: Stories from Behind the Berlin Wall, 2011. ,
Revealed: How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer. The Intercept, 2015. ,
How the NSA plans to infect 'millions' of computers with malware. The Intercept, 2014. ,
Secrets, Politics and Torture. PBS Frontline, 2015. ,
OmniCISA Pits DHS Against the FCC and FTC on User Privacy. Just Security Blog, 2015. ,
@War: The Rise of the Military-Internet Complex ,
Denver Police Caught Misusing Databases Got Light Punishments, Report Says, 2016. ,
Google aims to kill passwords by the end of this year. Guardian, 2016. ,
The Lives of Others, 2006. ,
Actor Model of Computation for Scalable Robust Information Systems in Inconsistency Robustness, 2015. ,
and SystemVerilog using iAdaptiveTM concurrency for antiCloudTM privacy and security in Inconsistency Robustness, 2015. ,
Actors for CyberThings. Erlang Keynote. YouTube, 2015. ,
Terms and Conditions May Apply. Phase 4 Films, 2013. ,
The new way police are surveilling you: Calculating your threat 'score'. Washington Post, 2016. ,
The Data Brokers: Selling your personal information. 60 Minutes, 2014. ,
Hey, does your Smart TV have a mic? Enjoy your surveillance, bro. The Register, 2014. ,
Ensuring National Constitutional Rights for Your Private Telecommunications Act of, 2016. ,
Explains Why Apple Should Continue To Fight the Government on Encryption. The Intercept, 2015. ,
With a series of major hacks, China builds a database on Americans, 2015. ,
NSA paid millions to cover Prism compliance costs for tech companies. The Guardian, 2013. ,
Ultra-Low Power Transceiver for Wireless Body Area Networks, 2013. ,
DOI : 10.1007/978-3-319-00098-5
China's Great Cannon, 2015. ,
UK Home Secretary) Draft Investigatory Powers Bill. Presented to Parliament, 2015. ,
The Dark Side. Doubleday, 2008. ,
We Asked NSA's Privacy Officer If U.S. Spying Powers Are Safe With Donald Trump. Here's What She Said. The Intercept, 2016. ,
Review of Inconsistency Robustness. College Publications, 2016. ,
China Quietly Targets U.S. Tech Companies in Security Reviews, 2016. ,
Memorandum and Order. 15-MC-1902 (JO), 2016. ,
Why a staggering number of Americans have stopped using the Internet the way they used to, 2016. ,
A paralyzed woman flew an F-35 fighter jet in a simulator ? using only her mind, 2015. ,
Equation' Fallout: Experts Say Damage To US Tech Firms Could Top $180B International Business Times, 2015. ,
He was small and lithe, like a house cat' The Guardian, 2015. ,
Obama Administration Set to Expand Sharing of Data That NSA Intercepts, 2016. ,
The CIA Campaign to Steal Apple's Secrets. The Intercept, 2015. ,
Glenn Greenwald, and the staff of the Intercept. The Assassination Complex: Inside the Government's Secret Drone Warfare Program, 2016. ,
Command and Control: Nuclear Weapons, the Damascus Accident, and the Illusion of Safety. Penguin Books, 2014. ,
Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.'s NY Times, 2013. ,
Request for the Allowance of Optional Electronic Labeling for Wireless Devices Letter to US FCC, 2015. ,
Cybersecurity bill could 'sweep away' internet users' privacy, agency warns. The Guardian, 2015. ,
Huawei does not pose risk to UK national security, report finds. Financial Times, 2015. ,
Written Testimony Before the United States House of Representatives Committee on the Judiciary, 2016. ,
Big other: surveillance capitalism and the prospects of an information civilization, Journal of Information Technology, vol.14, issue.2, 2015. ,
DOI : 10.1016/0090-2616(85)90033-6