You are previewing NSA Secrets.
O'Reilly logo
NSA Secrets

Book Description

The NSA's extensive surveillance program has riveted America as the public questions the threats to their privacy. As reported by The Washington Post, in their Pulitzer Prize-winning coverage of whistleblower Edward Snowden's NSA leaks, NSA SECRETS delves into the shadowy world of information gathering, exposing how data about you is being gathered every day.

From his earliest encrypted exchanges with reporters, Edward Snowden knew he was a man in danger. Sitting on a mountain of incriminating evidence about the NSA surveillance programs, Snowden was prepared to risk his freedom, and his very life, to let the world know about the perceived overreach of the NSA and the massive collection of personal information that was carried out in the name of national security by the U.S. government.

The Washington Post’s complete coverage of the NSA spying scandal, which it helped break, is now collected in one place to give as comprehensive a view of the story as is known. From the first contact with Snowden to the latest revelations in worldwide cellphone tracking, the award-winning reporters at the Post have vigorously reported on the scope of the NSA’s surveillance. Snowden called the internet “a TV that watches you,” and accused the government of "abusing [it] in secret to extend their powers beyond what is necessary and appropriate." Here, the secrets are revealed of those who tried in vain to remain in the shadows.

Table of Contents

  1. NSA Secrets: Government Spying in the Internet Age
  2. NSA Secrets
  3. Copyright
  4. Introduction
  5. U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program
  6. From obscurity to notoriety, Snowden took an unusual path
  7. Edward Snowden, Bradley Manning and the risk of the low-level, tech-savvy leaker
  8. U.S. surveillance architecture includes collection of revealing Internet, phone metadata
  9. Metadata reveals secrets of social position, company hierarchy, terrorist cells
  10. New documents reveal parameters of NSA's secret surveillance programs
  11. President's surveillance program worked with private sector to collect data after Sept. 11, 2001
  12. For NSA chief, terrorist threat drives passion to ‘collect it all, observers say
  13. NSA broke privacy rules thousands of times per year, audit finds
  14. FISA court: Ability to police U.S. spying program limited
  15. NSA gathered thousands of Americans' e-mails before court ordered it to revise its tactics
  16. U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary
  17. NSA paying U.S. companies for access to communications networks
  18. To hunt Osama bin Laden, satellites watched over Abbottabad, Pakistan, and Navy SEALs
  19. U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show
  20. Spy agencies spend millions to hunt for insider threats, document shows
  21. Top-secret files show new levels of distrust of Pakistan
  22. U.S. documents detail al-Qaeda's efforts to fight back against drones
  23. Obama administration had NSA restrictions reversed in 2011
  24. Declassified court documents highlight NSA violations in data collection
  25. FISA court releases opinion upholding NSA phone program
  26. U.S. officials dodge questions on scope of surveillance
  27. NSA report on the Tor Encrypted Network
  28. Dual-leadership role at NSA and Cyber Command stirs debate
  29. NSA tries to regain industry's trust to work cooperatively against cyber-threats
  30. Effort underway to declassify document that is legal foundation for NSA phone program
  31. NSA collects millions of e-mail address books globally
  32. Documents reveal NSA's extensive involvement in targeted killing program
  33. NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say
  34. NSA tracking cellphone locations worldwide, Snowden documents show
  35. Judge: NSA’s collecting of phone records is probably unconstitutional
  36. More from the Washington Post
  37. Connect with Diversion Books