Chapter 9 Further Reading: Intelligence Agencies and Mass Interception
1. James Bamford. The Puzzle Palace: A Report on NSA, America's Most Secret Agency. Houghton Mifflin, 1982. Also Body of Secrets (2001) and The Shadow Factory (2008).
Bamford's three-volume investigation of the NSA is the definitive journalistic account of the agency's history and capabilities. The Puzzle Palace — which NSA tried unsuccessfully to suppress — was the first serious public account of the agency's existence and activities. Body of Secrets provides the most detailed account of ECHELON available at the time of its publication. The Shadow Factory, written after 9/11, examines the post-attack surveillance expansion with the benefit of sources Bamford had cultivated over decades. Together, the three volumes trace the NSA from Cold War origins through the post-Snowden era and provide the essential historical context for understanding ECHELON and the trajectory toward mass interception.
2. Laura Poitras, Glenn Greenwald, and Barton Gellman. Primary journalism from The Intercept and The Washington Post (2013–2015).
The original journalism based on Snowden's documents remains primary source material. The Intercept has continued to publish Snowden documents and subsequent reporting on the Five Eyes and NSA programs. The Washington Post's Gellman produced the most technically detailed reporting, including the MUSCULAR diagrams. The Guardian's original reporting (Greenwald and Ewen MacAskill) covers PRISM and TEMPORA. All of this material is freely available online and represents the foundational documentary record of the Snowden revelations. Students should read at least the original June 2013 stories and the subsequent TEMPORA coverage.
3. Bruce Schneier. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W. W. Norton, 2015.
Schneier is the most prolific and accessible security technologist writing about surveillance for a general audience. Data and Goliath provides a comprehensive treatment of both commercial data collection and government surveillance, with particular strength on the technical dimensions that general audiences find most opaque. The chapter on the Five Eyes alliance and mass interception is among the clearest explanations available. Schneier's consistent argument — that security and privacy are not in fundamental tension, and that the "nothing to hide" argument is a category error — is developed with both technical rigor and rhetorical force.
4. Matthew Aid. The Secret Sentry: The Untold History of the National Security Agency. Bloomsbury Press, 2009.
A comprehensive history of the NSA from its founding to the post-9/11 era, based on declassified documents, interviews with former officials, and extensive archival research. Aid, an intelligence historian, provides the most detailed account of NSA's organizational evolution and collection capabilities available to general readers. Particularly valuable for understanding the ECHELON era and the transition from satellite interception to fiber-optic collection. Read in conjunction with Bamford for a complete historical picture.
5. Moxie Marlinspike. "A Critique of Key Escrow Systems." Various public talks and writings, 2015–2020.
Marlinspike, the primary developer of the Signal Protocol, has been one of the most technically sophisticated and publicly accessible voices in the encryption debate. His critique of key escrow — that it requires a level of institutional trust that no institution has earned, and that it creates vulnerabilities more severe than the problems it solves — is the most cogent technical argument against backdoors from the perspective of someone who has actually built the alternative. His talks (available on YouTube from various conferences) and writings on the Signal blog provide essential technical grounding for the encryption debate.
6. European Court of Human Rights. Big Brother Watch and Others v. United Kingdom. Application No. 58170/13, 2021.
The Grand Chamber judgment finding the UK's bulk interception regime (including TEMPORA and access to NSA PRISM data) to have violated Articles 8 and 10 of the European Convention on Human Rights. The full judgment — available on the ECHR's website — provides the most authoritative legal analysis of what European human rights law requires of bulk interception programs, and specifically what safeguards are necessary to bring such programs within permissible limits. The judgment's analysis of the "quality of law" requirement and the journalist confidentiality protections is particularly significant for non-specialist readers interested in the intersection of surveillance and democratic rights.
7. Peter Bergen, David Sterman, Emily Schneider, and Bailey Cahall. "Do NSA's Bulk Surveillance Programs Stop Terrorists?" New America Foundation, January 14, 2014.
The report describing the review of 225 terrorism cases that found bulk telephone metadata collection was the triggering factor in approximately 1.8% of cases. Available on the New America Foundation's website. The full report provides more detail on methodology and case-by-case analysis than the chapter's summary. Essential reading for anyone who wants to engage seriously with the operational effectiveness claims for bulk collection programs.
8. Privacy and Civil Liberties Oversight Board. Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act. July 2, 2014.
The PCLOB's assessment of the Section 702 program — which authorizes PRISM and Upstream collection — provides the most detailed public analysis of the largest ongoing NSA collection program. Unlike the Section 215 report (which found the program had produced essentially no unique value), the PCLOB's Section 702 report found the program had genuine value but raised significant concerns about its scope, oversight, and safeguards. The report includes detailed analysis of how Section 702 is used, what legal interpretations govern its application, and what the PCLOB considered its most significant risks. Available on the PCLOB website.
9. Whitfield Diffie and Susan Landau. Privacy on the Line: The Politics of Wiretapping and Encryption. MIT Press, 1998 (updated 2007).
The definitive academic treatment of the politics of encryption and wiretapping, co-authored by Diffie, who (with Martin Hellman) invented public-key cryptography — the mathematical foundation underlying modern encryption. Landau, a mathematician and policy scholar, provides the political and legal context. The book is particularly valuable for the historical analysis of the Clipper chip debate — the 1990s predecessor to the current going dark debate — which shows that the arguments have changed very little in thirty years despite significant changes in technology and political context. Essential background for understanding why the encryption debate has been so persistently resistant to resolution.
10. Richard J. Aldrich. GCHQ: The Uncensored Story of Britain's Most Secret Intelligence Agency. HarperPress, 2010.
The most comprehensive public history of GCHQ, written by a historian with extensive access to declassified documents and former officials. Aldrich traces GCHQ from Bletchley Park through the UKUSA Agreement's formation to the post-Cold War era. Particularly valuable for understanding GCHQ's role within the Five Eyes structure and its relationship with the NSA — a relationship that has at times been collaborative and at other times competitive. The book provides essential context for understanding why TEMPORA was architecturally possible and institutionally plausible.
11. Glenn Greenwald. No Place to Hide (referenced in Ch. 6 further reading). For Chapter 9, focus specifically on Chapters 3 and 4, which describe the NSA's international collection programs and the Five Eyes structure in detail.
Greenwald's Chapter 3 ("Collect It All") is one of the most comprehensive public descriptions of NSA's global collection philosophy and capabilities, drawing on specific classified documents. His treatment of the Five Eyes structure and how the alliance enables each country to circumvent its own domestic restrictions through partner collection is particularly relevant to Chapter 9's analysis.
12. Barton Gellman. Dark Mirror (referenced in Ch. 6 further reading). For Chapter 9, focus on Chapters 5 and 6, which describe the NSA's global collection infrastructure including MUSCULAR and the fiber-optic interception capabilities.
Gellman's account of his own surveillance experience and his reporting on NSA infrastructure programs provides the most technically detailed and journalistically rigorous account of how the physical infrastructure of mass interception actually operates.
Chapter 9 Further Reading | Part 2: State Surveillance | The Architecture of Surveillance