CINXE.COM
(PDF) Tomgram: Alfred W. McCoy, Obama's Expanding Surveillance Universe | Yaqian Hu - Academia.edu
<!DOCTYPE html> <html > <head> <meta charset="utf-8"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <meta content="width=device-width, initial-scale=1" name="viewport"> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs"> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="su2ARugM6mKIWUckk3OJcshCoLaBJBHPUXSNgj00YSraBIEOKYeshz8QzZVox2lTZNWhti2AYips6NmVYOyTVA==" /> <meta name="citation_title" content="Tomgram: Alfred W. McCoy, Obama&#39;s Expanding Surveillance Universe" /> <meta name="citation_author" content="Yaqian Hu" /> <meta name="twitter:card" content="summary" /> <meta name="twitter:url" content="https://www.academia.edu/35424350/Tomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe" /> <meta name="twitter:title" content="Tomgram: Alfred W. McCoy, Obama's Expanding Surveillance Universe" /> <meta name="twitter:description" content="Academia.edu is a platform for academics to share research papers." /> <meta name="twitter:image" content="http://a.academia-assets.com/images/twitter-card.jpeg" /> <meta property="fb:app_id" content="2369844204" /> <meta property="og:type" content="article" /> <meta property="og:url" content="https://www.academia.edu/35424350/Tomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe" /> <meta property="og:title" content="Tomgram: Alfred W. McCoy, Obama's Expanding Surveillance Universe" /> <meta property="og:image" content="http://a.academia-assets.com/images/open-graph-icons/fb-paper.gif" /> <meta property="og:description" content="Tomgram: Alfred W. McCoy, Obama's Expanding Surveillance Universe" /> <meta property="article:author" content="https://independent.academia.edu/YaqianHu" /> <meta name="description" content="Tomgram: Alfred W. McCoy, Obama's Expanding Surveillance Universe" /> <title>(PDF) Tomgram: Alfred W. McCoy, Obama's Expanding Surveillance Universe | Yaqian Hu - Academia.edu</title> <link rel="canonical" href="https://www.academia.edu/35424350/Tomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe" /> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "single_work", 'action': "show", 'controller_action': 'single_work#show', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script> var $controller_name = 'single_work'; var $action_name = "show"; var $rails_env = 'production'; var $app_rev = '9387f500ddcbb8d05c67bef28a2fe0334f1aafb8'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.require = { config: function() { return function() {} } } </script> <script> window.Aedu = window.Aedu || {}; window.Aedu.hit_data = null; window.Aedu.serverRenderTime = new Date(1732987738000); window.Aedu.timeDifference = new Date().getTime() - 1732987738000; </script> <script type="application/ld+json">{"@context":"https://schema.org","@type":"ScholarlyArticle","abstract":null,"author":[{"@context":"https://schema.org","@type":"Person","name":"Yaqian Hu"}],"contributor":[],"dateCreated":"2017-12-13","dateModified":"2017-12-13","datePublished":null,"headline":"Tomgram: Alfred W. McCoy, Obama's Expanding Surveillance Universe","inLanguage":"en","keywords":[],"locationCreated":null,"publication":null,"publisher":{"@context":"https://schema.org","@type":"Organization","name":null},"image":null,"thumbnailUrl":null,"url":"https://www.academia.edu/35424350/Tomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe","sourceOrganization":[{"@context":"https://schema.org","@type":"EducationalOrganization","name":null}]}</script><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/single_work_page/loswp-102fa537001ba4d8dcd921ad9bd56c474abc201906ea4843e7e7efe9dfbf561d.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/body-8d679e925718b5e8e4b18e9a4fab37f7eaa99e43386459376559080ac8f2856a.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/text_button-73590134e40cdb49f9abdc8e796cc00dc362693f3f0f6137d6cf9bb78c318ce7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> </head> <body> <div id='react-modal'></div> <div class="js-upgrade-ie-banner" style="display: none; text-align: center; padding: 8px 0; background-color: #ebe480;"><p style="color: #000; font-size: 12px; margin: 0 0 4px;">Academia.edu no longer supports Internet Explorer.</p><p style="color: #000; font-size: 12px; margin: 0;">To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.querySelector('.js-upgrade-ie-banner').style.display = 'block'; }</script> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "ebde8b24644e973f5e57fba6a1a0a570d02c6e451384ded91522f43684b86698", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="LOHeLU7FlI8NHupRNt8UIgG+BkeWzuyWQOIg1qPLHC1ECN9lj07SarpXYODNa/QDrSkHRzpqn3N9fnTB/hPuUw==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/35424350/Tomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="3idD/VIzruyLPPnpofb/3UFlxV3+js4JldcrQsDsj+62zkK1k7joCTx1c1haQh/87fLEXVIqveyoS39VnTR9kA==" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><input class="btn btn-primary btn-block g-recaptcha js-password-reset-submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" type="submit" value="Email me a link" /></form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script> <div class="header--container" id="main-header-container"><div class="header--inner-container header--inner-container-ds2"><div class="header-ds2--left-wrapper"><div class="header-ds2--left-wrapper-inner"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="hide-on-desktop-redesign" style="height: 24px; width: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hide-on-mobile-redesign" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a><div class="header--search-container header--search-container-ds2"><form class="js-SiteSearch-form select2-no-default-pills" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><svg style="width: 14px; height: 14px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="search" class="header--search-icon svg-inline--fa fa-search fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z"></path></svg><input class="header--search-input header--search-input-ds2 js-SiteSearch-form-input" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" /></form></div></div></div><nav class="header--nav-buttons header--nav-buttons-ds2 js-main-nav"><a class="ds2-5-button ds2-5-button--secondary js-header-login-url header-button-ds2 header-login-ds2 hide-on-mobile-redesign" href="https://www.academia.edu/login" rel="nofollow">Log In</a><a class="ds2-5-button ds2-5-button--secondary header-button-ds2 hide-on-mobile-redesign" href="https://www.academia.edu/signup" rel="nofollow">Sign Up</a><button class="header--hamburger-button header--hamburger-button-ds2 hide-on-desktop-redesign js-header-hamburger-button"><div class="icon-bar"></div><div class="icon-bar" style="margin-top: 4px;"></div><div class="icon-bar" style="margin-top: 4px;"></div></button></nav></div><ul class="header--dropdown-container js-header-dropdown"><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/login" rel="nofollow">Log In</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/signup" rel="nofollow">Sign Up</a></li><li class="header--dropdown-row js-header-dropdown-expand-button"><button class="header--dropdown-button">more<svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="caret-down" class="header--dropdown-button-icon svg-inline--fa fa-caret-down fa-w-10" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z"></path></svg></button></li><li><ul class="header--expanded-dropdown-container"><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/about">About</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/press">Press</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://medium.com/@academia">Blog</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/documents">Papers</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/terms">Terms</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/privacy">Privacy</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/copyright">Copyright</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/hiring"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="header--dropdown-row-icon svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>We're Hiring!</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://support.academia.edu/"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="header--dropdown-row-icon svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>Help Center</a></li><li class="header--dropdown-row js-header-dropdown-collapse-button"><button class="header--dropdown-button">less<svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="caret-up" class="header--dropdown-button-icon svg-inline--fa fa-caret-up fa-w-10" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z"></path></svg></button></li></ul></li></ul></div> <script src="//a.academia-assets.com/assets/webpack_bundles/fast_loswp-bundle-86832e264efa375cdd3fa5979579c95643bf6a5c1b20c95ec7a98005fcb4b9a4.js" defer="defer"></script><script>window.loswp = {}; window.loswp.author = 72670049; window.loswp.bulkDownloadFilterCounts = {}; window.loswp.hasDownloadableAttachment = true; window.loswp.hasViewableAttachments = true; // TODO: just use routes for this window.loswp.loginUrl = "https://www.academia.edu/login?post_login_redirect_url=https%3A%2F%2Fwww.academia.edu%2F35424350%2FTomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe%3Fauto%3Ddownload"; window.loswp.translateUrl = "https://www.academia.edu/login?post_login_redirect_url=https%3A%2F%2Fwww.academia.edu%2F35424350%2FTomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe%3Fshow_translation%3Dtrue"; window.loswp.previewableAttachments = [{"id":55285304,"identifier":"Attachment_55285304","shouldShowBulkDownload":false}]; window.loswp.shouldDetectTimezone = true; window.loswp.shouldShowBulkDownload = true; window.loswp.showSignupCaptcha = false window.loswp.willEdgeCache = false; window.loswp.work = {"work":{"id":35424350,"created_at":"2017-12-13T18:12:08.706-08:00","from_world_paper_id":null,"updated_at":"2021-01-11T15:45:03.506-08:00","_data":{},"document_type":"paper","pre_hit_view_count_baseline":null,"quality":"high","language":"en","title":"Tomgram: Alfred W. McCoy, Obama's Expanding Surveillance Universe","broadcastable":true,"draft":null,"has_indexable_attachment":true,"indexable":true}}["work"]; window.loswp.workCoauthors = [72670049]; window.loswp.locale = "en"; window.loswp.countryCode = "SG"; window.loswp.cwvAbTestBucket = ""; window.loswp.designVariant = "ds_vanilla"; window.loswp.fullPageMobileSutdModalVariant = "control"; window.loswp.useOptimizedScribd4genScript = false; window.loswp.appleClientId = 'edu.academia.applesignon';</script><script defer="" src="https://accounts.google.com/gsi/client"></script><div class="ds-loswp-container"><div class="ds-work-card--grid-container"><div class="ds-work-card--container js-loswp-work-card"><div class="ds-work-card--cover"><div class="ds-work-cover--wrapper"><div class="ds-work-cover--container"><button class="ds-work-cover--clickable js-swp-download-button" data-signup-modal="{"location":"swp-splash-paper-cover","attachmentId":55285304,"attachmentType":"pdf"}"><img alt="First page of “Tomgram: Alfred W. McCoy, Obama's Expanding Surveillance Universe”" class="ds-work-cover--cover-thumbnail" src="https://0.academia-photos.com/attachment_thumbnails/55285304/mini_magick20190114-635-1frq5uy.png?1547518444" /><img alt="PDF Icon" class="ds-work-cover--file-icon" src="//a.academia-assets.com/assets/single_work_splash/adobe.icon-574afd46eb6b03a77a153a647fb47e30546f9215c0ee6a25df597a779717f9ef.svg" /><div class="ds-work-cover--hover-container"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span><p>Download Free PDF</p></div><div class="ds-work-cover--ribbon-container">Download Free PDF</div><div class="ds-work-cover--ribbon-triangle"></div></button></div></div></div><div class="ds-work-card--work-information"><h1 class="ds-work-card--work-title">Tomgram: Alfred W. McCoy, Obama's Expanding Surveillance Universe</h1><div class="ds-work-card--work-authors ds-work-card--detail"><a class="ds-work-card--author js-wsj-grid-card-author ds2-5-body-md ds2-5-body-link" data-author-id="72670049" href="https://independent.academia.edu/YaqianHu"><img alt="Profile image of Yaqian Hu" class="ds-work-card--author-avatar" src="//a.academia-assets.com/images/s65_no_pic.png" />Yaqian Hu</a></div><div class="ds-work-card--detail"></div><div class="ds-work-card--button-container"><button class="ds2-5-button js-swp-download-button" data-signup-modal="{"location":"continue-reading-button--work-card","attachmentId":55285304,"attachmentType":"pdf","workUrl":"https://www.academia.edu/35424350/Tomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe"}">See full PDF</button><button class="ds2-5-button ds2-5-button--secondary js-swp-download-button" data-signup-modal="{"location":"download-pdf-button--work-card","attachmentId":55285304,"attachmentType":"pdf","workUrl":"https://www.academia.edu/35424350/Tomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe"}"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span>Download PDF</button></div></div></div></div><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-doc_id="55285304" data-landing_url="https://www.academia.edu/35424350/Tomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><div class="ds-top-related-works--grid-container"><div class="ds-related-content--container ds-top-related-works--container"><h2 class="ds-related-content--heading">Related papers</h2><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="0" data-entity-id="29923642" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/29923642/Tomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe_July_15_2013_">Tomgram: Alfred W. McCoy, Obama's Expanding Surveillance Universe (July 15, 2013)</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="54609288" href="https://wisc.academia.edu/AlfredMcCoy">Alfred W McCoy</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Tomgram: Alfred W. McCoy, Obama's Expanding Surveillance Universe (July 15, 2013)","attachmentId":50382409,"attachmentType":"pdf","work_url":"https://www.academia.edu/29923642/Tomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe_July_15_2013_","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/29923642/Tomgram_Alfred_W_McCoy_Obamas_Expanding_Surveillance_Universe_July_15_2013_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="1" data-entity-id="45139500" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/45139500/How_Republicans_and_Democrats_Strengthen_Secret_Surveillance_in_the_United_States">How Republicans and Democrats Strengthen Secret Surveillance in the United States</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="63975951" href="https://uj-pl.academia.edu/Pawe%C5%82Laidler">Paweł Laidler</a></div><p class="ds-related-work--metadata ds2-5-body-xs">"Political Preferences", 2019</p><p class="ds-related-work--abstract ds2-5-body-sm">The purpose of the paper is to assess the relationship between secrecy and transparency in the pre-and post-Snowden eras in the United States. The Author analyzes, from both political and legal perspectives, the sources and outcomes of the U.S. politics of national security with a special focus on domestic and intelligence surveillance measures. The core argument of the paper is that, due to the role of the executive which has always promoted the culture of secrecy, there is no chance for the demanded transparency in national security surveillance, despite the controlling powers of the legislative and judiciary. As the analysis proves, the United States in the post-Snowden era seems to be the most transparent and secretive state, at the same time.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"How Republicans and Democrats Strengthen Secret Surveillance in the United States","attachmentId":65711107,"attachmentType":"pdf","work_url":"https://www.academia.edu/45139500/How_Republicans_and_Democrats_Strengthen_Secret_Surveillance_in_the_United_States","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/45139500/How_Republicans_and_Democrats_Strengthen_Secret_Surveillance_in_the_United_States"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="2" data-entity-id="7539992" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/7539992/_The_New_Surveillance_Normal_NSA_and_Corporate_Surveillance_in_the_Age_of_Global_Capitalism_2014_Monthly_Review_July_August_2014_66_3_43_53">“The New Surveillance Normal: NSA and Corporate Surveillance in the Age of Global Capitalism" 2014. Monthly Review July-August 2014, 66(3):43-53.</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="3424513" href="https://stmartin.academia.edu/DavidPrice">David Price</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"“The New Surveillance Normal: NSA and Corporate Surveillance in the Age of Global Capitalism\" 2014. Monthly Review July-August 2014, 66(3):43-53.","attachmentId":34104364,"attachmentType":"pdf","work_url":"https://www.academia.edu/7539992/_The_New_Surveillance_Normal_NSA_and_Corporate_Surveillance_in_the_Age_of_Global_Capitalism_2014_Monthly_Review_July_August_2014_66_3_43_53","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/7539992/_The_New_Surveillance_Normal_NSA_and_Corporate_Surveillance_in_the_Age_of_Global_Capitalism_2014_Monthly_Review_July_August_2014_66_3_43_53"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="3" data-entity-id="1644617" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/1644617/Watching_the_watchers_Surveillance_transparency_and_political_freedom_in_the_war_on_terror">Watching the watchers: Surveillance, transparency, and political freedom in the war on terror</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="1925180" href="https://upenn.academia.edu/SethKreimer">Seth Kreimer</a></div><p class="ds-related-work--metadata ds2-5-body-xs">University of Pennsylvania Journal of Constitutional …, 2004</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Watching the watchers: Surveillance, transparency, and political freedom in the war on terror","attachmentId":17486612,"attachmentType":"pdf","work_url":"https://www.academia.edu/1644617/Watching_the_watchers_Surveillance_transparency_and_political_freedom_in_the_war_on_terror","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/1644617/Watching_the_watchers_Surveillance_transparency_and_political_freedom_in_the_war_on_terror"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="4" data-entity-id="188759" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/188759/Listening_in_on_DC_Soviet_Eavesdropping_and_the_Origins_of_US_Privacy_Policy">Listening in on DC: Soviet Eavesdropping and the Origins of US Privacy Policy</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="60543" href="https://independent.academia.edu/JohnLaprise">John P Laprise</a></div><p class="ds-related-work--abstract ds2-5-body-sm">The discovery of Soviet eavesdropping on US telecommunications by the Ford Administration in 1974 set off a chain of events that culminated in the creation of the first substantive US government policy on electronic privacy and security. This discovery occurred in the politically sensitive aftermath of the Watergate scandal and led the Ford administration to formulate federal information privacy policy for the first time. This policy recognized the growing link between computers and telecommunications systems and the vulnerability of US information networks. The Ford Administration’s National Security Council implemented a complex plan to secure the US telecommunications infrastructure from foreign eavesdroppers with a clear understanding of the convergence of computers and telecommunications technologies by ordering the Office of Telecommunications Policy and the National Security Agency to examine the problem and recommend solutions. These policies addressed the intelligence community’s concerns over communications security and access to signals intelligence as well as administrative concerns about the US telecommunications market structure. Soviet eavesdropping set in motion the development of modern information privacy policy centered on national security and intelligence priorities and this has been the foundation upon which US privacy policy has been built.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Listening in on DC: Soviet Eavesdropping and the Origins of US Privacy Policy","attachmentId":1935504,"attachmentType":"doc","work_url":"https://www.academia.edu/188759/Listening_in_on_DC_Soviet_Eavesdropping_and_the_Origins_of_US_Privacy_Policy","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/188759/Listening_in_on_DC_Soviet_Eavesdropping_and_the_Origins_of_US_Privacy_Policy"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="5" data-entity-id="9780772" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/9780772/The_NSA_and_the_Legal_Regime_for_Foreign_Intelligence_Surveillance">The NSA and the Legal Regime for Foreign Intelligence Surveillance</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33534" href="https://osu.academia.edu/PeterShane">Peter M Shane</a></div><p class="ds-related-work--abstract ds2-5-body-sm">This paper both introduces the first major academic symposium on the NSA surveillance programs disclosed by Edward Snowden and lays out the evolution of constitutional and statutory law that positioned the NSA to argue that its programs are lawful.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The NSA and the Legal Regime for Foreign Intelligence Surveillance","attachmentId":35957382,"attachmentType":"pdf","work_url":"https://www.academia.edu/9780772/The_NSA_and_the_Legal_Regime_for_Foreign_Intelligence_Surveillance","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/9780772/The_NSA_and_the_Legal_Regime_for_Foreign_Intelligence_Surveillance"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="6" data-entity-id="37634765" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/37634765/Secrets_and_Lies_Exposed_and_Combatted_Warrantless_Surveillance_Under_and_Around_the_Law_2001_2017">Secrets and Lies—Exposed and Combatted: Warrantless Surveillance Under and Around the Law, 2001–2017</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="665086" href="https://independent.academia.edu/PatriceMcDermott">Patrice McDermott</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Secrecy and Society</p><p class="ds-related-work--abstract ds2-5-body-sm">Before June 2013, civil society and much of Congress were largely in the dark about the extent of the surveillance activities of the National Security Agency and the circumlocutions of statute undertaken by the White House and the Department of Justice. After the releases by Edward Snowden to specific journalists, the mendacity of Intelligence Community lawyers and leaders, the evasions of the law and manipulation of the FISA Court by the White House working with the Justice Department, and the scope of the violations of the Fourth Amendment protections of U.S. Persons (USPs) became increasingly apparent. This article reviews the changes that were initiated in the Executive Branch (and to a lesser extent in the Legislative Branch), the role civil society played in pushing and utilizing greater transparency, and what the changes mean for government accountability to the public.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Secrets and Lies—Exposed and Combatted: Warrantless Surveillance Under and Around the Law, 2001–2017","attachmentId":57619787,"attachmentType":"pdf","work_url":"https://www.academia.edu/37634765/Secrets_and_Lies_Exposed_and_Combatted_Warrantless_Surveillance_Under_and_Around_the_Law_2001_2017","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/37634765/Secrets_and_Lies_Exposed_and_Combatted_Warrantless_Surveillance_Under_and_Around_the_Law_2001_2017"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="7" data-entity-id="115377742" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/115377742/Secrecy_versus_transparency_in_the_US_national_security_surveillance_state">Secrecy versus transparency in the US national security surveillance state</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="63975951" href="https://uj-pl.academia.edu/Pawe%C5%82Laidler">Paweł Laidler</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Routledge eBooks, 2021</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Secrecy versus transparency in the US national security surveillance state","attachmentId":111802086,"attachmentType":"pdf","work_url":"https://www.academia.edu/115377742/Secrecy_versus_transparency_in_the_US_national_security_surveillance_state","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/115377742/Secrecy_versus_transparency_in_the_US_national_security_surveillance_state"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="8" data-entity-id="72524501" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/72524501/Surveillance_and_Scandal_Weapons_in_an_Emerging_Array_for_U_S_Global_Power">Surveillance and Scandal: Weapons in an Emerging Array for U.S. Global Power</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="66381509" href="https://independent.academia.edu/AlfredMcCoy1">Alfred McCoy</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Monthly Review, 2014</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Surveillance and Scandal: Weapons in an Emerging Array for U.S. Global Power","attachmentId":81418481,"attachmentType":"pdf","work_url":"https://www.academia.edu/72524501/Surveillance_and_Scandal_Weapons_in_an_Emerging_Array_for_U_S_Global_Power","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/72524501/Surveillance_and_Scandal_Weapons_in_an_Emerging_Array_for_U_S_Global_Power"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="9" data-entity-id="5186718" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/5186718/FOREWORD_THE_NSA_AND_THE_LEGAL_REGIME_FOR_FOREIGN_INTELLIGENCE_SURVEILLANCE">FOREWORD: THE NSA AND THE LEGAL REGIME FOR FOREIGN INTELLIGENCE SURVEILLANCE</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33534" href="https://osu.academia.edu/PeterShane">Peter M Shane</a></div><p class="ds-related-work--metadata ds2-5-body-xs">I/S: A Journal of Law and Policy for the Information Society, 2014</p><p class="ds-related-work--abstract ds2-5-body-sm">This paper introduces a symposium, published in Volume 10, Issue 2 of I/S: A Journal of Law and Policy for the Information Society, entitled, "NSA Surveillance: Security, Privacy, and Civil Liberty," which is available at http://moritzlaw.osu.edu/students/groups/is/volume-102/. The paper traces the history of electronic surveillance law by way of explaining how our laws have evolved to a stage where lawyers could plausibly defend the government’s entitlement to capture and store an immense volume of our telephone and online communications, as well as metadata about both. It goes on to introduce the other papers in the symposium and concludes by arguing the importance of executive branch acquiescence in such statutory limits as Congress may impose on national security surveillance as it affects Americans. Keywords: NSA, FBI, surveillance, warrantless surveillance, foreign intelligence, fourth amendment</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"FOREWORD: THE NSA AND THE LEGAL REGIME FOR FOREIGN INTELLIGENCE SURVEILLANCE","attachmentId":53999206,"attachmentType":"pdf","work_url":"https://www.academia.edu/5186718/FOREWORD_THE_NSA_AND_THE_LEGAL_REGIME_FOR_FOREIGN_INTELLIGENCE_SURVEILLANCE","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/5186718/FOREWORD_THE_NSA_AND_THE_LEGAL_REGIME_FOR_FOREIGN_INTELLIGENCE_SURVEILLANCE"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div></div></div><div class="ds-sticky-ctas--wrapper js-loswp-sticky-ctas hidden"><div class="ds-sticky-ctas--grid-container"><div class="ds-sticky-ctas--container"><button class="ds2-5-button js-swp-download-button" data-signup-modal="{"location":"continue-reading-button--sticky-ctas","attachmentId":55285304,"attachmentType":"pdf","workUrl":null}">See full PDF</button><button class="ds2-5-button ds2-5-button--secondary js-swp-download-button" data-signup-modal="{"location":"download-pdf-button--sticky-ctas","attachmentId":55285304,"attachmentType":"pdf","workUrl":null}"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span>Download PDF</button></div></div></div><div class="ds-below-fold--grid-container"><div class="ds-work--container js-loswp-embedded-document"><div class="attachment_preview" data-attachment="Attachment_55285304" style="display: none"><div class="js-scribd-document-container"><div class="scribd--document-loading js-scribd-document-loader" style="display: block;"><img alt="Loading..." src="//a.academia-assets.com/images/loaders/paper-load.gif" /><p>Loading Preview</p></div></div><div style="text-align: center;"><div class="scribd--no-preview-alert js-preview-unavailable"><p>Sorry, preview is currently unavailable. You can download the paper by clicking the button above.</p></div></div></div></div><div class="ds-sidebar--container js-work-sidebar"><div class="ds-related-content--container"><h2 class="ds-related-content--heading">Related papers</h2><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="0" data-entity-id="33095038" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/33095038/All_swept_up_An_initial_classification_of_NSA_surveillance_technology">All swept up: An initial classification of NSA surveillance technology</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="37932251" href="https://hud.academia.edu/CoenGulijk">Coen Gulijk</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"All swept up: An initial classification of NSA surveillance technology","attachmentId":53193709,"attachmentType":"pdf","work_url":"https://www.academia.edu/33095038/All_swept_up_An_initial_classification_of_NSA_surveillance_technology","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/33095038/All_swept_up_An_initial_classification_of_NSA_surveillance_technology"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="1" data-entity-id="72524502" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/72524502/Exploring_the_Shadows_of_America_s_Security_State_Or_How_I_Learned_Not_to_Love_Big_Brother_Reprinted_from_TomDispatch_com_courtesy_of_Haymarket_Books">Exploring the Shadows of America’s Security State (Or How I Learned Not to Love Big Brother) Reprinted from TomDispatch.com courtesy of Haymarket Books</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="66381509" href="https://independent.academia.edu/AlfredMcCoy1">Alfred McCoy</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Class Race Corporate Power</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Exploring the Shadows of America’s Security State (Or How I Learned Not to Love Big Brother) Reprinted from TomDispatch.com courtesy of Haymarket Books","attachmentId":81418480,"attachmentType":"pdf","work_url":"https://www.academia.edu/72524502/Exploring_the_Shadows_of_America_s_Security_State_Or_How_I_Learned_Not_to_Love_Big_Brother_Reprinted_from_TomDispatch_com_courtesy_of_Haymarket_Books","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/72524502/Exploring_the_Shadows_of_America_s_Security_State_Or_How_I_Learned_Not_to_Love_Big_Brother_Reprinted_from_TomDispatch_com_courtesy_of_Haymarket_Books"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="2" data-entity-id="102351163" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/102351163/Societal_Opinon_of_Government_and_Private_Agencies_Surveillance_Capabilities_Post_9_11">Societal Opinon of Government and Private Agencies' Surveillance Capabilities Post 9-11</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="42693376" href="https://independent.academia.edu/KaplanStephanie">Stephanie Kaplan</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2017</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Societal Opinon of Government and Private Agencies' Surveillance Capabilities Post 9-11","attachmentId":102644700,"attachmentType":"pdf","work_url":"https://www.academia.edu/102351163/Societal_Opinon_of_Government_and_Private_Agencies_Surveillance_Capabilities_Post_9_11","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/102351163/Societal_Opinon_of_Government_and_Private_Agencies_Surveillance_Capabilities_Post_9_11"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="3" data-entity-id="105192933" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/105192933/The_Foreign_Intelligence_Surveillance_Act_of_1978_The_Role_of_Symbolic_Politics">The Foreign Intelligence Surveillance Act of 1978: The Role of Symbolic Politics</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="224077630" href="https://independent.academia.edu/StolzB">Barbara Stolz</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Law &lt;html_ent glyph="@amp;" ascii="&amp;amp;"/&gt; Policy, 2002</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Foreign Intelligence Surveillance Act of 1978: The Role of Symbolic Politics","attachmentId":104713922,"attachmentType":"pdf","work_url":"https://www.academia.edu/105192933/The_Foreign_Intelligence_Surveillance_Act_of_1978_The_Role_of_Symbolic_Politics","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/105192933/The_Foreign_Intelligence_Surveillance_Act_of_1978_The_Role_of_Symbolic_Politics"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="4" data-entity-id="108992756" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/108992756/The_Transformation_of_the_National_Security_Agency">The Transformation of the National Security Agency</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="27138085" href="https://independent.academia.edu/DavidPan4">David Pan</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Telos, 2014</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Transformation of the National Security Agency","attachmentId":107240991,"attachmentType":"pdf","work_url":"https://www.academia.edu/108992756/The_Transformation_of_the_National_Security_Agency","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/108992756/The_Transformation_of_the_National_Security_Agency"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="5" data-entity-id="40741081" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/40741081/_Liberalism_and_Surveillance_">"Liberalism and Surveillance"</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="3272286" href="https://independent.academia.edu/IvanGreenberg">Ivan Greenberg</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"\"Liberalism and Surveillance\"","attachmentId":61024339,"attachmentType":"docx","work_url":"https://www.academia.edu/40741081/_Liberalism_and_Surveillance_","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/40741081/_Liberalism_and_Surveillance_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="6" data-entity-id="7904841" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/7904841/1984_All_Over_Again_The_Snowden_NSA_Revelations_in_Perspective">1984 All Over Again. The Snowden NSA Revelations in Perspective</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="172501" href="https://independent.academia.edu/KeesVanderPijl">Kees Van der Pijl</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"1984 All Over Again. The Snowden NSA Revelations in Perspective","attachmentId":34387763,"attachmentType":"doc","work_url":"https://www.academia.edu/7904841/1984_All_Over_Again_The_Snowden_NSA_Revelations_in_Perspective","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/7904841/1984_All_Over_Again_The_Snowden_NSA_Revelations_in_Perspective"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="7" data-entity-id="33150004" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/33150004/NSA_DEA_Information_Sharing_and_Parallel_Construction_Illegal_Unconstitutional_Incontestable">NSA/DEA Information Sharing & Parallel Construction: Illegal, Unconstitutional, Incontestable</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="42563365" href="https://newschool.academia.edu/MelissaSchubert">Melissa M Schubert</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"NSA/DEA Information Sharing \u0026 Parallel Construction: Illegal, Unconstitutional, Incontestable","attachmentId":53238844,"attachmentType":"pdf","work_url":"https://www.academia.edu/33150004/NSA_DEA_Information_Sharing_and_Parallel_Construction_Illegal_Unconstitutional_Incontestable","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/33150004/NSA_DEA_Information_Sharing_and_Parallel_Construction_Illegal_Unconstitutional_Incontestable"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="8" data-entity-id="51762302" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/51762302/The_Snowden_Stakes_Challenges_for_Understanding_Surveillance_Today">The Snowden Stakes: Challenges for Understanding Surveillance Today</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="45094720" href="https://independent.academia.edu/DavidLyon8">David Lyon</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Surveillance & Society</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Snowden Stakes: Challenges for Understanding Surveillance Today","attachmentId":69341862,"attachmentType":"pdf","work_url":"https://www.academia.edu/51762302/The_Snowden_Stakes_Challenges_for_Understanding_Surveillance_Today","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/51762302/The_Snowden_Stakes_Challenges_for_Understanding_Surveillance_Today"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="9" data-entity-id="36060435" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/36060435/Democracy_Betrayed_The_Rise_of_the_Surveillance_Security_State">Democracy Betrayed: The Rise of the Surveillance Security State</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="15759064" href="https://flacso-gt.academia.edu/NelsonArteaga">Nelson Arteaga</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Democracy Betrayed: The Rise of the Surveillance Security State","attachmentId":55945972,"attachmentType":"pdf","work_url":"https://www.academia.edu/36060435/Democracy_Betrayed_The_Rise_of_the_Surveillance_Security_State","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/36060435/Democracy_Betrayed_The_Rise_of_the_Surveillance_Security_State"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="10" data-entity-id="74059763" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/74059763/The_Ethical_Dilemma_of_the_USA_Government_Wiretapping">The Ethical Dilemma of the USA Government Wiretapping</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="12096659" href="https://independent.academia.edu/shawon91">Shawon Rahman</a></div><p class="ds-related-work--metadata ds2-5-body-xs">International Journal of Managing Information …, 2010</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Ethical Dilemma of the USA Government Wiretapping","attachmentId":83480042,"attachmentType":"pdf","work_url":"https://www.academia.edu/74059763/The_Ethical_Dilemma_of_the_USA_Government_Wiretapping","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/74059763/The_Ethical_Dilemma_of_the_USA_Government_Wiretapping"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="11" data-entity-id="35989673" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/35989673/Surveillance_Technologies_If_We_Have_Nothing_to_Hide_Do_We_Have_Nothing_to_Fear">Surveillance Technologies: If We Have Nothing to Hide, Do We Have Nothing to Fear?</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="36014169" href="https://edinburgh.academia.edu/JenniferManning">Jennifer Manning</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Surveillance Technologies: If We Have Nothing to Hide, Do We Have Nothing to Fear?","attachmentId":55874772,"attachmentType":"pdf","work_url":"https://www.academia.edu/35989673/Surveillance_Technologies_If_We_Have_Nothing_to_Hide_Do_We_Have_Nothing_to_Fear","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/35989673/Surveillance_Technologies_If_We_Have_Nothing_to_Hide_Do_We_Have_Nothing_to_Fear"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="12" data-entity-id="93431117" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/93431117/From_Keyhole_to_Big_Brother_The_Legacies_of_Early_Cold_War_Surveillance">From Keyhole to Big Brother: The Legacies of Early Cold War Surveillance</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="61773244" href="https://independent.academia.edu/JMacWillie">John MacWillie</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Surveillance & Society, 2018</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"From Keyhole to Big Brother: The Legacies of Early Cold War Surveillance","attachmentId":96171017,"attachmentType":"pdf","work_url":"https://www.academia.edu/93431117/From_Keyhole_to_Big_Brother_The_Legacies_of_Early_Cold_War_Surveillance","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/93431117/From_Keyhole_to_Big_Brother_The_Legacies_of_Early_Cold_War_Surveillance"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="13" data-entity-id="54065705" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/54065705/The_Patriot_Acts_Impact_on_the_Governments_Ability_to_Conduct_Electronic_Surveillance_of_Ongoing_Domestic_Communications">The Patriot Act's Impact on the Government's Ability to Conduct Electronic Surveillance of Ongoing Domestic Communications</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="179853204" href="https://independent.academia.edu/NathanHenderson16">Nathan Henderson</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Duke Law Journal, 2002</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Patriot Act's Impact on the Government's Ability to Conduct Electronic Surveillance of Ongoing Domestic Communications","attachmentId":70609757,"attachmentType":"pdf","work_url":"https://www.academia.edu/54065705/The_Patriot_Acts_Impact_on_the_Governments_Ability_to_Conduct_Electronic_Surveillance_of_Ongoing_Domestic_Communications","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/54065705/The_Patriot_Acts_Impact_on_the_Governments_Ability_to_Conduct_Electronic_Surveillance_of_Ongoing_Domestic_Communications"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="14" data-entity-id="65752104" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/65752104/FISA_Surveillance_and_Aliens">FISA Surveillance and Aliens</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="79848336" href="https://independent.academia.edu/AmitChhabra9">Amit K Chhabra</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2014</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"FISA Surveillance and Aliens","attachmentId":77212265,"attachmentType":"pdf","work_url":"https://www.academia.edu/65752104/FISA_Surveillance_and_Aliens","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/65752104/FISA_Surveillance_and_Aliens"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="15" data-entity-id="34148858" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/34148858/Democratic_Surveillance">Democratic Surveillance</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="66483737" href="https://mepfamilylaw.academia.edu/MAFranks">Mary Anne Franks</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Harvard Journal of Law & Technology , 2017</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Democratic Surveillance","attachmentId":54072539,"attachmentType":"pdf","work_url":"https://www.academia.edu/34148858/Democratic_Surveillance","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/34148858/Democratic_Surveillance"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="16" data-entity-id="33488958" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/33488958/Planning_for_Change_Building_a_Framework_to_Predict_Future_Changes_to_the_Foreign_Intelligence_Surveillance_Act">Planning for Change: Building a Framework to Predict Future Changes to the Foreign Intelligence Surveillance Act</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="28426640" href="https://fletc.academia.edu/PatWalsh">Pat Walsh</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Planning for Change: Building a Framework to Predict Future Changes to the Foreign Intelligence Surveillance Act","attachmentId":53529412,"attachmentType":"pdf","work_url":"https://www.academia.edu/33488958/Planning_for_Change_Building_a_Framework_to_Predict_Future_Changes_to_the_Foreign_Intelligence_Surveillance_Act","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/33488958/Planning_for_Change_Building_a_Framework_to_Predict_Future_Changes_to_the_Foreign_Intelligence_Surveillance_Act"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="17" data-entity-id="65227641" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/65227641/Informers_Revisited_Government_Surveillance_of_Domestic_Political_Organizations_and_the_Fourth_and_First_Amendments">Informers Revisited: Government Surveillance of Domestic Political Organizations and the Fourth and First Amendments</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="44091790" href="https://usfca.academia.edu/DoloresDonovan">Dolores Donovan</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2008</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Informers Revisited: Government Surveillance of Domestic Political Organizations and the Fourth and First Amendments","attachmentId":76920840,"attachmentType":"pdf","work_url":"https://www.academia.edu/65227641/Informers_Revisited_Government_Surveillance_of_Domestic_Political_Organizations_and_the_Fourth_and_First_Amendments","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/65227641/Informers_Revisited_Government_Surveillance_of_Domestic_Political_Organizations_and_the_Fourth_and_First_Amendments"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="18" data-entity-id="105529566" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee">The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="272873631" href="https://independent.academia.edu/JohnEastman9">John Eastman</a></div><p class="ds-related-work--metadata ds2-5-body-xs">SSRN Electronic Journal, 2006</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee","attachmentId":104959212,"attachmentType":"pdf","work_url":"https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="19" data-entity-id="99809899" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/99809899/The_NSA_s_mass_surveillance_program_illegal_and_opaque">The NSA’s mass surveillance program: illegal and opaque</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="230812549" href="https://independent.academia.edu/ToniLocy">Toni Locy</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2015</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The NSA’s mass surveillance program: illegal and opaque","attachmentId":100799515,"attachmentType":"pdf","work_url":"https://www.academia.edu/99809899/The_NSA_s_mass_surveillance_program_illegal_and_opaque","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/99809899/The_NSA_s_mass_surveillance_program_illegal_and_opaque"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="20" data-entity-id="8312034" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/8312034/After_Snowden_Rethinking_the_Impact_of_Surveillance">After Snowden: Rethinking the Impact of Surveillance</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="3176145" href="https://kcl.academia.edu/didierbigo">didier bigo</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"After Snowden: Rethinking the Impact of Surveillance","attachmentId":34720205,"attachmentType":"pdf","work_url":"https://www.academia.edu/8312034/After_Snowden_Rethinking_the_Impact_of_Surveillance","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/8312034/After_Snowden_Rethinking_the_Impact_of_Surveillance"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="21" data-entity-id="84827476" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/84827476/The_Dangers_of_Dissent_The_FBI_and_Civil_Liberties_since_1965">The Dangers of Dissent: The FBI and Civil Liberties since 1965</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="229420360" href="https://independent.academia.edu/GreenbergIvan">Ivan Greenberg</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Journal of American History, 2012</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Dangers of Dissent: The FBI and Civil Liberties since 1965","attachmentId":89718801,"attachmentType":"pdf","work_url":"https://www.academia.edu/84827476/The_Dangers_of_Dissent_The_FBI_and_Civil_Liberties_since_1965","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/84827476/The_Dangers_of_Dissent_The_FBI_and_Civil_Liberties_since_1965"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="22" data-entity-id="1848743" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/1848743/State_Wiretaps_and_Electronic_Surveillance_After_September_11">State Wiretaps and Electronic Surveillance After September 11</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="2283514" href="https://osu.academia.edu/PeterSwire">Peter Swire</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Hastings Lj, 2002</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"State Wiretaps and Electronic Surveillance After September 11","attachmentId":25909669,"attachmentType":"pdf","work_url":"https://www.academia.edu/1848743/State_Wiretaps_and_Electronic_Surveillance_After_September_11","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/1848743/State_Wiretaps_and_Electronic_Surveillance_After_September_11"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="23" data-entity-id="33177142" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/33177142/Husain_Waris_SURVEILLANCE_AND_LAW_ENFORCEMENT_TOOLS_IN_THE_FIGHT_AGAINST_TERRORISM_IN_THE_UNITED_STATES_AND_PAKISTAN">Husain, Waris SURVEILLANCE_AND_LAW_ENFORCEMENT_TOOLS_IN_THE_FIGHT_AGAINST TERRORISM IN THE UNITED STATES AND PAKISTAN</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="16679989" href="https://howard.academia.edu/WarisHusain">Waris Husain</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Husain, Waris SURVEILLANCE_AND_LAW_ENFORCEMENT_TOOLS_IN_THE_FIGHT_AGAINST TERRORISM IN THE UNITED STATES AND PAKISTAN","attachmentId":53261566,"attachmentType":"pdf","work_url":"https://www.academia.edu/33177142/Husain_Waris_SURVEILLANCE_AND_LAW_ENFORCEMENT_TOOLS_IN_THE_FIGHT_AGAINST_TERRORISM_IN_THE_UNITED_STATES_AND_PAKISTAN","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/33177142/Husain_Waris_SURVEILLANCE_AND_LAW_ENFORCEMENT_TOOLS_IN_THE_FIGHT_AGAINST_TERRORISM_IN_THE_UNITED_STATES_AND_PAKISTAN"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div></div></div></div></div><div class="footer--content"><ul class="footer--main-links hide-on-mobile"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px; position: relative; bottom: -1px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a href="https://support.academia.edu/"><svg style="width: 12px; height: 12px; position: relative; bottom: -1px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer--research-interests"><li>Find new research papers in:</li><li><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul><ul class="footer--legal-links hide-on-mobile"><li><a href="https://www.academia.edu/terms">Terms</a></li><li><a href="https://www.academia.edu/privacy">Privacy</a></li><li><a href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2024</li></ul></div> </body> </html>