Table of contents
Publication type
Pavel Sharikov 
The whole world was shocked with the revelations by Edward Snowden in Summer 2013. Former NSA contractor revealed the secret technologies used by American security agencies to eavesdrop on the confidential information of all major Internet-providers.
information revolution, Internet, privacy violations, national security agency
Date of publication
Number of purchasers
Readers community rating
0.0 (0 votes)
Cite Download pdf

To download PDF you should sign in



Additional sources and materials

1. Amerikanskaya assotsiatsiya yuristov. Pravovaya initsiativa v Tsentral'noj i Vostochnoj Evrope. Tsentr prava i sredstv massovoj informatsii. Seriya «Zhurnalistika i pravo». Vypusk 8. S. 21.
2. Vstrecha V.V. Putina s rukovodstvom i korrespondentami telekanala Russia Today. 11 iyunya 2013 g. (http://president.kremlin.ru/news/18319).
3. Dorokhov R., Nikol'skij A. Shpion v tsentre Moskvy // Vedomosti. 12.08.2013. 144 (3406).
4. Ivanyan Eh.A. Istoriya SShA. M.: Drofa, 2004. S. 503-505.
5. Konstitutsiya SShA. Popravka IV.
6. O'Rejli Tim. Chto takoe Veb 2.0. // Komp'yuterra. 18.10.2005 (http://computerra.ru/think/234100/).
7. Pravovye voprosy zhurnalistiki i telekommunikatsij v SShA. M.: Institut problem informatsionnogo prava. 2005. Seriya «Zhurnalistika i pravo». Vypusk 53. S. 21 (naprimer, znamenitaya Wikipedia ili servis «Yandeks probki», avtomaticheski sobirayuschij i predostavlyayuschij informatsiyu ot samikh pol'zovatelej o situatsii na dorogakh krupnykh gorodov Rossii).
8. 149791922-National-Security-Agency-Section-702-of-FISA-and-Section-215-of-PATRIOT-Act-Fact-Sheets.pdf.
9. Apple’s Commitment to Customer Privacy. June 16, 2013 (http://www.apple.com/apples-commitment-to-customer-privacy/).
10. Barton G. and Poitras L. U.S. Mining Data from 9 Leading Internet Firms; Companies Deny Knowledge // The Washington Post. June 7, 2013.
11. Bernstein C., Woodward B. All the Presidents Men. Simon & Schuster, 1972.
12. Congressional Hearings. House Select Intelligence Committee Holds Hearing on Disclosure of National Security Agency Surveillance Programs. June 18, 2013 (http://west moreland.house.gov/images/6-19-13%20Intel%20Hearing%20Transcript%20 NSA%20Leaks.pdf).
13. Edward Snowden Identifies Himself as Source of NSA Leaks - As It Happened // The Guardian. 9.06.2013 (http://www.guardian.co.uk/world/2013/jun/09/nsa-secret-surveillance-lawmakers-live?INTCMP=SRCH).
14. Facebook Global Government Requests Report (https://www.facebook.com/about/government_requests).
15. Fisher Louis. National Security Whistleblowers. 30.12.2005. P. 1.
16. The Foreign Intelligence Surveillance Act: An Overview of Selected Issues Updated. CRS Report to Congress RL34279. 7.07.2008.
17. Google Transparency Report (http://www.google.com/transparencyreport/userdatarequests/US/).
18. How Microsoft Handed the NSA Access to Encrypted Messages // The Guardian Friday. 12.07.2013.
19. https://www.cdt.org/files/pdfs/Letter-Judicary-Committee-NSA.pdf
20. Lewis Anthony. Make No Law. Vintage Books, 1992. P. 65.
21. Liberty and Security in a Changing World. Report and Recommendations of the President’s Review Group on Intelligence and Communications Technologies. December 12, 2012 (http://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf).
22. NSA Pilots 2-person Rule to Thwart Leaks. By Eric Cabrow. July 22, 2013. Govinfosecurity
23. Obama Administration White Paper on NSA Surveillance Oversight // (http://apps.washingtonpost.com/g/page/politics/white-house-surveillance-reform-plan/388/).
24. ODNI Statement on the Limits of Surveillance Activities. June 16, 2013 (http://www.dni.gov/index.php/newsroom/press-releases/191-press-releases-2013/880-odni-statement-on-the-limits-of-surveillance-activities).
25. The Pentagon Papers.
26. Reed John. Insurgents Used Cell Phone Geotags to Destroy AH-64s in Iraq, 15.03.2012 (http://defensetech.org/2012/03/15/insurgents-used-cell-phone-geotags-to-destroy-ah-64s-in-iraq/).
27. Savage Ch. Obama to Call for End to N.S.A.'s Bulk Data Collection // The New York Times. March 24, 2014 (http://www.nytimes.com/2014/03/25/us/obama-to-seek-nsa-curb-on-call-data.html?emc=edit_na_20140324&nlid=61925389&_r=1).
28. The Sedition Act of 1798 (zakon byl prinyat vmeste s tremya drugimi zakonami, neobkhodimymi dlya protivodejstviya antipravitel'stvennoj deyatel'nosti).
29. Statement of General Keith B. Alexander, USA Commander, United States Cyber Command Director, National Security Agency Chief, Central Security Service before the Senate Committee on Appropriations "Cybersecurity: Preparing for and Responding to the Enduring Threat", 12.07.2013 (http://www.appropriations.senate.gov/ht-full.cfm?method=hearings.view&id=33dda6f9-5d83-409d-a8c5-7ada84b0c598).
30. Timberg C. U.S. to Relinquish Remaining Control Over the Internet // The Washington Post. March 15, 2014 (http://www.washingtonpost.com/business/technology/us-to-relinquish-remaining-control-over-the-internet/2014/03/14/0c7472d0-abb5-11e3-adbc-888c8010c799_story.html).
31. U.S.-EU Cyber Cooperation. March 26, 2014 (http://www.whitehouse.gov/the-press-office/2014/03/26/fact-sheet-us-eu-cyber-cooperation).
32. US House of Representatives Permanent Select Committee on Intelligence. Hearings on “How Disclosed NSA Programs Protect Americans, and Why Disclosure Aids Our Adversaries”, 18.06.2013 (http://intelligence.house.gov/hearing/how-disclosed-nsa-programs-protect-americans-and-why-disclosure-aids-our-adversaries).
33. What the..? Posted: Friday, June 07, 2013. Posted by Larry Page, CEO and David Drummond, Chief Legal Officer (http://googleblog.blogspot.ru/2013/06/what.html).
34. Zuckerberg Mark. 7 iyunya v 14:45 vozle Menlo-Park. I want to respond personally to the outrageous press reports about PRISM: (https://www.facebook.com/zuck/posts/10100828955847631).