Roman Empire to the NSA: A world history of government spying. BBC News Magazine. Retrieved from http://www.bbc.com/news/magazine-24749166 on 11/29/2014
http://news.yahoo.com/hackers-may-used-pa-company-hit-target-195942337.html. 7 February 2014. 11 February 2014. Hendler, James. http://www.scientificamerican.com/article/its-times-reform-computer-fraud-abuse-act/.
NSA Spying on Americans. Retrieved March 9, 2014 from https://www.eff.org/nsa-spying Kizza, J. (2011). Computer network security and cyber ethics. (3rd ed.).
Greenwald G. (2014). "How the NSA Plans to Infect 'Millions' of Computers with Malware". The Intercept Greenwald G., MacAskill E., & Poitras L. (2013). “Edward Snowden: the whistleblower behind the NSA surveillance revelations”. The Guardian (London).
"Leaks and the law: the prosecution of Thomas Drake highlights the tension between government secrecy and the public's right to know" Smithsonian 2011: 90. Academic OneFile. Web. 27 Feb. 2014.
Introduction This essay will consider the politics of spying. It will discuss examples of espionage as well as its necessity. The paper will also debate upon whether spying is an invasion of privacy and there for rights, or not. The essay begins by defining espionage. It offers examples of espionage and how it has been used by different countries in the past as well as how it is increasingly used today on a global scale.
The confirmation of these NSA searches on Americans’ communications also increased the difficulty of President Barack Obama’s initial defense of the wide surveillance that occurred in 2013. It was reassured from the Department of Justice that any searches made under Section 702 of the Foreign Intelligence Surveillance Act, or FISA, data will be used in compliance with guidelines and procedures, and it does not provide a way to get around the requirement of a court order before targeting any U.S. citizen under the FISA. A considerable amount of the NSA's bulk data collection is actually substantiated under section 702. This gives permission for the collection of communications without an individual warrant for each case, as long as there is a reasonable belief that the communications are both foreign and in another nation.
The Drudgery of Treason. Retrieved April 10, 2014, from http://theintermediateperiod.wordpress.com/2014/02/16/ 4. http://www.fbi.gov/about-us/history/famous-cases/aldrich-hazen-ames 5. http://www2.gwu.edu/~nsarchiv/coldwar/interviews/episode-21/aldrich1.html 6. https://www.fas.org/irp/congress/1994_rpt/ssci_ames.htm