DRAFT: This module has unpublished changes.

 

 

Alexander, B. Keith. (2013, June 7). A STATEMENT BEFORE THE SENATE COMMITTEE ON A PPROPRIATIONS. Retrieved December 7, 2014, from http://www.defense.gov/home/features/2013/0713_cyberdomain

/docs/Alexander,_General_Keith_Testimony_6.12.13_Cybersecurity_Hearing.pdf

 

 

Alexander, B. Keith. 2013. “Cyber Challenges” . Baltimore Council of Foreign Affairs. United States: YouTube: https://www.youtube.com/watch?v=ygKcksuHi4M

 

Chris Jay Hoofnagle & Nathan Good, The Web Privacy Census , October 2012, available at http://law.berkeley.edu/privacycensus.htm

 

Civic Impulse. (2014). H.R. 6304 — 110th Congress: FISA Amendments Act of 2008. Retrieved from https://www.govtrack.us/congress/bills/110/hr6304

 

Consumer Federation of California. (2013). Assembly Bill 370 signed into law in 2013, amends CalOPPA 

 

DOS, (2012). Insider Threat. (n.d.). Retrieved December 9, 2014, from http://www.dhs.gov/science-and-technology/csd-insider-threat

 

EFF. (2013, March 13). National Security Letters Are Unconstitutional, Federal Judge Rules. Retrieved December 14, 2014, from https://www.eff.org/press/releases/national-security-letters-are-unconstitutional-federal-judge-rules

 

Jaycox, M. (2014, January 2). A Primer on Executive Order 12333: The Mass Surveillance Starlet. Retrieved December 15, 2014, from https://www.eff.org/deeplinks/2014/06/primer-executive-order-12333-mass-surveillance-starlet

 

Harris, K. (2014). MAKING YOUR PRIVACY PRACTICES PUBLIC. Recommendations on Developing a Meaningful Privacy Policy. Retrieved December 3, 2014, from https://oag.ca.gov/sites/all/files/agweb/pdfs/cybersecurity/making_

your_privacy_practices_public.pdf

 

Garamone, J. (2010, September 24). Alexander Details U.S. Cyber Command Gains. American Forces Press Service. Retrieved December 7, 2014, from http://www.defense.gov/news/newsarticle.aspx?id=61014

 

Greenwald, G. (2013, June 19). Fisa court oversight: A look inside a secret and empty process. The Guardian. Retrieved December 6, 2014, from http://www.theguardian.com/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy

 

Garamone, J. (2010, September 24). Alexander Details U.S. Cyber Command Gains. Retrieved from http://www.defense.gov/news/newsarticle.aspx?id=61014

 

Mezzofiore, G. (2013, June 17). NSA Whistleblower Edward Snowden: Washington Snoopers are Criminals. International Business Times. Retrieved December 12, 2014, from http://www.ibtimes.co.uk/nsa-whistleblower-edward-snowden-479709

 

NSA slides explain the PRISM data-collection program. (2013, June 6). The Washington Post. Retrieved from http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/

 

Online Privacy: Using the Internet Safely. (2014, July 1). Retrieved December 1, 2014, from https://www.privacyrights.org/online-privacy-using-internet-safely#engine

 

Pellerin, C. (2013, October 30). Alexander: Defending Against Cyberattacks Requires Collaboration. American Forces Press Service. Retrieved December 8, 2014, from http://www.defense.gov/news/newsarticle.aspx?id=

 

Pellerin, C. (2013, July 19). Alexander: Terrorists Benefit from Snowden’s Actions. Retrieved December 8, 2014, from http://www.defense.gov/news/newsarticle.aspx?id=120490

 

Robertson, J., Lawrence, D., & Strohm, C. (2014, December 8). Sony’s Breach Stretched From Thai Hotel to Hollywood. Blomberg. Retrieved December 8, 2014, from http://www.bloomberg.com/news/2014-12-07/sony-s-darkseoul-breach

-stretched-from-thai-hotel-to-hollywood.html

 

SANGER, D. (2013, October 12). N.S.A. Director Firmly Defends Surveillance Efforts. The New York Times. Retrieved from http://www.nytimes.com/2013/10/13/us/nsa-director-gives-firm-and-broad-defense-of-surveillance-efforts.html?pagewanted=all&_r=1&

 

The Constitution, P. (2012). REPORT ON THE FISA AMENDMENTS ACT OF 2008. The Constitution Project.

DRAFT: This module has unpublished changes.