Citations
C.E. Shannon, “Communication Theory of Secrecy Systems,” Bell System Tech-nical Journal, no. 4 (October 1949): 656–715.
Whitfield Diffie and Martin Hellman, “New Directions in Cryptography,” IEEETransactions on Information Theory, no. 6 (1976), https://www-ee.stanford.edu/~hellman/publications/24.pdf.
“The Official SecureDrop Directory,” Freedom of the Press Foundation, https://securedrop.org/directory.
“HOPE X Schedule,” HOPE, http://x.hope.net/schedule.html.
Kevin Poulsen, “Strongbox and Aaron Swartz,” The New Yorker, 14 May 2013,http://www.newyorker.com/news/news-desk/strongbox-and-aaron-swartz.
Amy Davidson, “Introducing Strongbox,” The New Yorker, 14 May 2013, http://www.newyorker.com/news/amy-davidson/introducing-strongbox.
Jesse Holcomb, Amy Mitchell, and Kristen Purcell, “Investigative Journalists andDigital Security: Perceptions of Vulnerability and Changes in Behavior,” Pew ResearchCenter, 5 February 2015, http://www.journalism.org/2015/02/05/investigative-journalists-and-digital-security/.
MIT, http://pgp.mit.edu/.
Emily Bell, “Facebook Is Eating the World,” Columbia Journalism Review, 7 March2016, http://www.cjr.org/analysis/facebook_and_media.php.
Chris Anderson, Emily Bell, and Clay Shirkey, “Post-Industrial Journalism: Adapt-ing to the Present,” Tow Center for Digital Journalism, 3 December 2014, http://towcenter.org/research/post-industrial-journalism-adapting-to-the-present-2/.
Jordan Smith and Micah Lee, “Not So Securus: Massive Hack of 70 Million Pris-oner Phone Calls Indicates Violations of Attorney-Client Privilege,” The Intercept,11 November 2015, https://theintercept.com/2015/11/11/securus-hack-prison-phone-company-exposes-thousands-of-calls-lawyers-and-clients/.
Jenna McLaughlin, “U.S. Mass Surveillance Has No Record of Thwarting LargeTerror Attacks, Regardless of Snowden Leaks,” The Intercept, 17 November 2015, https://theintercept.com/2015/11/17/u-s-mass-surveillance-has-no-record-of-thwarting-large-terror-attacks-regardless-of-snowden-leaks/.
Colin Freeze, “The Globe Adopts Encrypted Technology in Effort to Protect Whistle-Blowers,” The Globe and Mail, 4 March 2015, http://www.theglobeandmail.com/news/investigations/the-globe-adopts-encrypted-technology-in-effort-to-protect-whistle-blowers/article23302598/.
Smith and Lee, “Not So Securus: Massive Hack of 70 Million Prisoner Phone CallsIndicates Violations of Attorney-Client Privilege.”
MIT.