Citations

  1. C.E. Shannon, “Communication Theory of Secrecy Systems,” Bell System Tech-nical Journal, no. 4 (October 1949): 656–715.

  2. Whitfield Diffie and Martin Hellman, “New Directions in Cryptography,” IEEETransactions on Information Theory, no. 6 (1976), https://www-ee.stanford.edu/~hellman/publications/24.pdf.

  3. “The Official SecureDrop Directory,” Freedom of the Press Foundation, https://securedrop.org/directory.

  4. “HOPE X Schedule,” HOPE, http://x.hope.net/schedule.html.

  5. Kevin Poulsen, “Strongbox and Aaron Swartz,” The New Yorker, 14 May 2013,http://www.newyorker.com/news/news-desk/strongbox-and-aaron-swartz.

  6. Amy Davidson, “Introducing Strongbox,” The New Yorker, 14 May 2013, http://www.newyorker.com/news/amy-davidson/introducing-strongbox.

  7. Jesse Holcomb, Amy Mitchell, and Kristen Purcell, “Investigative Journalists andDigital Security: Perceptions of Vulnerability and Changes in Behavior,” Pew ResearchCenter, 5 February 2015, http://www.journalism.org/2015/02/05/investigative-journalists-and-digital-security/.

  8. MIT, http://pgp.mit.edu/.

  9. Emily Bell, “Facebook Is Eating the World,” Columbia Journalism Review, 7 March2016, http://www.cjr.org/analysis/facebook_and_media.php.

  10. Chris Anderson, Emily Bell, and Clay Shirkey, “Post-Industrial Journalism: Adapt-ing to the Present,” Tow Center for Digital Journalism, 3 December 2014, http://towcenter.org/research/post-industrial-journalism-adapting-to-the-present-2/.

  11. Jordan Smith and Micah Lee, “Not So Securus: Massive Hack of 70 Million Pris-oner Phone Calls Indicates Violations of Attorney-Client Privilege,” The Intercept,11 November 2015, https://theintercept.com/2015/11/11/securus-hack-prison-phone-company-exposes-thousands-of-calls-lawyers-and-clients/.

  12. Jenna McLaughlin, “U.S. Mass Surveillance Has No Record of Thwarting LargeTerror Attacks, Regardless of Snowden Leaks,” The Intercept, 17 November 2015, https://theintercept.com/2015/11/17/u-s-mass-surveillance-has-no-record-of-thwarting-large-terror-attacks-regardless-of-snowden-leaks/.

  13. Colin Freeze, “The Globe Adopts Encrypted Technology in Effort to Protect Whistle-Blowers,” The Globe and Mail, 4 March 2015, http://www.theglobeandmail.com/news/investigations/the-globe-adopts-encrypted-technology-in-effort-to-protect-whistle-blowers/article23302598/.

  14. Smith and Lee, “Not So Securus: Massive Hack of 70 Million Prisoner Phone CallsIndicates Violations of Attorney-Client Privilege.”

  15. MIT.