{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:52Z","timestamp":1750306672002,"version":"3.41.0"},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2014,5,1]],"date-time":"2014-05-01T00:00:00Z","timestamp":1398902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2014,5]]},"abstract":"

How good security at the NSA could have stopped him.","DOI":"10.1145\/2594502","type":"journal-article","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T15:24:14Z","timestamp":1398698654000},"page":"44-51","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["The NSA and Snowden"],"prefix":"10.1145","volume":"57","author":[{"given":"Bob","family":"Toxen","sequence":"first","affiliation":[{"name":"Horizon Network Security"}]}],"member":"320","published-online":{"date-parts":[[2014,5]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Allen J. NSA to cut system administrators by 90 percent to limit data access. Reuters. Aug. 9 2013; http:\/\/www.reuters.com\/article\/2013\/08\/09\/us-usa-security-nsa-leaks-idUSBRE97801020130809. Allen J. NSA to cut system administrators by 90 percent to limit data access. Reuters. Aug. 9 2013; http:\/\/www.reuters.com\/article\/2013\/08\/09\/us-usa-security-nsa-leaks-idUSBRE97801020130809."},{"volume-title":"National Public Radio.","author":"Block M.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","unstructured":"Brosnahan J. and West T. Brief of Amicus Curiae Mark Klein. May 4 2006; https:\/\/www.eff.org\/files\/filenode\/att\/kleinamicus.pdf. Brosnahan J. and West T. Brief of Amicus Curiae Mark Klein. May 4 2006; https:\/\/www.eff.org\/files\/filenode\/att\/kleinamicus.pdf."},{"key":"e_1_2_1_4_1","first-page":"761","volume":"395","author":"Chimel","year":"1969","journal-title":"California"},{"volume-title":"Electronic Frontier Foundation","author":"Cohn C.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","unstructured":"Coke's Reports 91a 77 Eng. Rep. 194 (K.B. 1604). Coke's Reports 91a 77 Eng. Rep. 194 (K.B. 1604)."},{"volume-title":"The New Yorker.","author":"Davidson A.","key":"e_1_2_1_7_1"},{"volume-title":"Washington Post.","author":"Davidson J.","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","unstructured":"Defense Logistics Agency. Critical nuclear weapon design information access certificate; http:\/\/www.dla.mil\/dss\/forms\/fillables\/DL1710.pdf. Defense Logistics Agency. Critical nuclear weapon design information access certificate; http:\/\/www.dla.mil\/dss\/forms\/fillables\/DL1710.pdf."},{"key":"e_1_2_1_10_1","unstructured":"Department of Defense Trusted Computer System Evaluation Criteria a.k.a. Orange Book 1985; http:\/\/csrc.nist.gov\/publications\/history\/dod85.pdf. Department of Defense Trusted Computer System Evaluation Criteria a.k.a. Orange Book 1985; http:\/\/csrc.nist.gov\/publications\/history\/dod85.pdf."},{"volume-title":"Los Angeles Times.","author":"Dilanian K.","key":"e_1_2_1_11_1"},{"key":"e_1_2_1_12_1","unstructured":"Electronic Frontier Foundation (eff.org). NSA spying video includes comments from many well-known respected people and reminders of past violations; http:\/\/www.youtube.com\/watch?v=aGmiw_rrNxk. Electronic Frontier Foundation (eff.org). NSA spying video includes comments from many well-known respected people and reminders of past violations; http:\/\/www.youtube.com\/watch?v=aGmiw_rrNxk."},{"volume-title":"NBC News.","author":"Esposito R.","key":"e_1_2_1_13_1"},{"volume-title":"Politico.","author":"Everett B.","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","unstructured":"GNU Privacy Guard; http:\/\/www.gnupg.org. GNU Privacy Guard; http:\/\/www.gnupg.org."},{"key":"e_1_2_1_16_1","unstructured":"Howell's State Trials 1029 95 Eng. 807 (1705). Howell's State Trials 1029 95 Eng. 807 (1705)."},{"volume-title":"Booksurge Publishing","year":"2009","author":"Klein M.","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","unstructured":"Legal Information Institute Cornell University Law School. Fourth Amendment: an overview; http:\/\/www.law.cornell.edu\/wex\/fourth_amendment. Legal Information Institute Cornell University Law School. Fourth Amendment: an overview; http:\/\/www.law.cornell.edu\/wex\/fourth_amendment."},{"key":"e_1_2_1_19_1","unstructured":"Miller J. CBS News \"60 Minutes.\" Dec. 15 2013; http:\/\/www.cbsnews.com\/news\/nsa-speaks-out-on-snowden-spying\/. Miller J. CBS News \"60 Minutes.\" Dec. 15 2013; http:\/\/www.cbsnews.com\/news\/nsa-speaks-out-on-snowden-spying\/."},{"key":"e_1_2_1_20_1","unstructured":"Lemos R. Security guru: Let's secure the Net. ZDnet 2002; http:\/\/www.zdnet.com\/news\/security-guru-lets-secure-the-net\/120859. Lemos R. Security guru: Let's secure the Net. ZDnet 2002; http:\/\/www.zdnet.com\/news\/security-guru-lets-secure-the-net\/120859."},{"volume-title":"CNN.","author":"Mears B.","key":"e_1_2_1_21_1"},{"key":"e_1_2_1_22_1","unstructured":"Nakashima E. A story of surveillance. Washington Post. Nov 7 2007; http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2007\/11\/07\/AR2007110700006.html. Nakashima E. A story of surveillance. Washington Post . Nov 7 2007; http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2007\/11\/07\/AR2007110700006.html."},{"volume-title":"Fox News.","author":"Napolitano A.P.","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","unstructured":"Presidential Executive Order 13526 12\/29\/2009; http:\/\/www.whitehouse.gov\/the-press-office\/executive-order-classified-national-security-information. Presidential Executive Order 13526 12\/29\/2009; http:\/\/www.whitehouse.gov\/the-press-office\/executive-order-classified-national-security-information."},{"volume-title":"Spiegel Online International.","author":"Rosenbach M.","key":"e_1_2_1_25_1"},{"volume-title":"InformationWeek.","author":"Schwartz M.","key":"e_1_2_1_26_1"},{"volume-title":"Reuters.","author":"Shiffman J.","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","unstructured":"Smith C. BGR. Jan. 23 2014; http:\/\/news.yahoo.com\/watchdog-says-nsa-phone-spying-program-illegal-end-130014396.html. Smith C. BGR. Jan. 23 2014; http:\/\/news.yahoo.com\/watchdog-says-nsa-phone-spying-program-illegal-end-130014396.html."},{"volume-title":"2nd Edition. Prentice Hall","year":"2002","author":"Toxen B.","key":"e_1_2_1_29_1"},{"key":"e_1_2_1_30_1","unstructured":"U. S. Courts. What does the Fourth Amendment mean?; http:\/\/www.uscourts.gov\/educational-resources\/get-involved\/constitution-activities\/fourth-amendment\/fourth-amendment-mean.aspx. U. S. Courts. What does the Fourth Amendment mean?; http:\/\/www.uscourts.gov\/educational-resources\/get-involved\/constitution-activities\/fourth-amendment\/fourth-amendment-mean.aspx."},{"key":"e_1_2_1_31_1","unstructured":"U.S. Government Printing Office. Fourth Amendment; http:\/\/beta.congress.gov\/content\/conan\/pdf\/GPO-CONAN-2013-10-5.pdf. U.S. Government Printing Office. Fourth Amendment; http:\/\/beta.congress.gov\/content\/conan\/pdf\/GPO-CONAN-2013-10-5.pdf."},{"key":"e_1_2_1_32_1","unstructured":"Washington Post. Transcript of President Obama's Jan. 17 speech on NSA reforms 2014; http:\/\/www.washingtonpost.com\/politics\/full-text-of-president-obamas-jan-17-speech-on-nsa-reforms\/2014\/01\/17\/fa33590a-7f8c-11e3-9556-4a4bf7bcbd84_story.html. Washington Post . Transcript of President Obama's Jan. 17 speech on NSA reforms 2014; http:\/\/www.washingtonpost.com\/politics\/full-text-of-president-obamas-jan-17-speech-on-nsa-reforms\/2014\/01\/17\/fa33590a-7f8c-11e3-9556-4a4bf7bcbd84_story.html."},{"key":"e_1_2_1_33_1","unstructured":"Wikipedia. Public-key cryptography; http:\/\/en.wikipedia.org\/wiki\/Public-key_cryptography Wikipedia. Public-key cryptography; http:\/\/en.wikipedia.org\/wiki\/Public-key_cryptography"},{"key":"e_1_2_1_34_1","unstructured":"Wikipedia. Edward Snowden; http:\/\/en.wikipedia.org\/wiki\/Edward_Snowden#NSA_rulings_in_federal_court. Wikipedia. Edward Snowden; http:\/\/en.wikipedia.org\/wiki\/Edward_Snowden#NSA_rulings_in_federal_court."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2594502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2594502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:52Z","timestamp":1750230052000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2594502"}},"subtitle":["securing the all-seeing eye"],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":34,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,5]]}},"alternative-id":["10.1145\/2594502"],"URL":"https:\/\/doi.org\/10.1145\/2594502","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2014,5]]},"assertion":[{"value":"2014-05-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}