Further Reading: Chapter 32 — Counter-Surveillance


1. Electronic Frontier Foundation. "Surveillance Self-Defense." ssd.eff.org (continuously updated).

The most comprehensive publicly available guide to practical privacy and security, maintained by one of the world's leading digital rights organizations. Covers threat modeling, encrypted messaging, secure browsing, account security, and tools for specific populations (journalists, activists, people with intimate partner surveillance concerns, etc.). Free, open source, written for non-technical audiences. This should be the first stop for anyone moving from conceptual understanding of counter-surveillance to practical implementation. The "First Steps" and "Tool Guides" sections are most immediately useful; "Especially For..." addresses specific high-risk groups.


2. Greenwald, Glenn. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York: Metropolitan Books, 2014.

Greenwald's first-person account of his contact with Edward Snowden, his experience in Hong Kong, and the security measures that made the disclosure possible. The book's opening chapter — on Greenwald's initial resistance to using PGP and Snowden's response — is one of the most vivid illustrations available of how usability problems in privacy tools create real-world security failures. The chapter on the surveillance programs revealed is essential context for Chapter 9 (mass interception). For the counter-surveillance curriculum: pages 1-30 are directly relevant to the communication security practices this chapter discusses.


3. Levy, Karen. Data Driven: Truckers in the Age of Algorithmic Management. Princeton: Princeton University Press, 2023.

Levy's empirical study of workplace surveillance in the trucking industry provides the most detailed account available of how ordinary workers — not technical experts, activists, or whistleblowers — develop counter-surveillance practices within pervasive monitoring regimes. The book challenges the assumption that counter-surveillance is primarily a technical practice and documents behavioral, social, and procedural forms of resistance. Essential for understanding surveillance resistance in everyday working life, as distinct from the high-stakes scenarios that dominate most counter-surveillance writing.


4. Nissenbaum, Helen and Ryan Calo. Obfuscation: A User's Guide for Privacy and Protest. Cambridge: MIT Press, 2016. (Nissenbaum sole author)

The foundational text on obfuscation as a privacy strategy. Nissenbaum surveys the history of obfuscation across many domains (camouflage, smokescreens, financial misdirection) and develops the ethical and political case for obfuscation as a legitimate response to nonconsensual surveillance. The book includes analysis of specific tools (AdNauseam, TrackMeNot) and a philosophical discussion of when obfuscation is ethically defensible. This is the key text for the philosophical debate introduced in Section 32.10.


5. Narayanan, Arvind and Vitaly Shmatikoff. "Robust De-anonymization of Large Sparse Datasets." Proceedings of the IEEE Symposium on Security and Privacy, 2008.

The paper that demonstrated the re-identification of the "anonymized" Netflix Prize dataset. The technical paper is dense, but the introduction and conclusion are accessible to non-specialists. For understanding the limits of anonymization, this is the foundational empirical reference — the paper that established, with mathematical rigor, that removing names from rich behavioral data is insufficient to prevent re-identification. The paper's significance for privacy law is that it undermines the widespread legal and corporate assumption that "anonymized" data is safe to collect, share, and monetize without privacy protections.


6. Zittrain, Jonathan, Kendra Albert, and Larry Lessig. "Perma: Scoping and Addressing the Problem of Link and Reference Rot in Legal Citations." Legal Information Management 14, no. 2 (2014). [Note: See also Berkman Klein Center's "Don't Panic" report on going dark.]

The Berkman Klein Center's "Don't Panic: Making Progress on the 'Going Dark' Debate" (2016), authored by a team of technologists, lawyers, and policy experts, provides the most comprehensive rebuttal of the FBI's "going dark" argument. The report argues that the explosion of available data — IoT devices, cloud services, metadata, digital communications — means law enforcement has more surveillance capability than ever, even as specific communication channels have been encrypted. This is the essential reference for Chapter 32's treatment of the going dark debate and provides the empirical basis for the counter-argument.


7. Marlinspike, Moxie. "Reflections on Trusting Trust." moxie.org, various dates (blog posts and talks).

Moxie Marlinspike — the cryptographer who founded Signal and developed the Signal Protocol — writes and speaks accessibly about the philosophy of privacy engineering. His talks on the "going dark" debate, on why privacy tools need to be usable (not just secure), and on the relationship between technical tools and political change are among the most insightful reflections available on the ethics of building privacy infrastructure. His 2016 talk "We should all have something to hide" is particularly relevant to Section 32.3 on the "nothing to hide" argument.


8. Dwork, Cynthia and Aaron Roth. "The Algorithmic Foundations of Differential Privacy." Foundations and Trends in Theoretical Computer Science 9, nos. 3–4 (2014): 211–407.

The foundational technical paper on differential privacy by its primary developer. This is advanced technical material, but the introduction is accessible and provides the clearest explanation of what differential privacy is, what it guarantees, and what it cannot do. For students who want to understand the mathematical precision behind privacy claims — as opposed to the marketing language companies use — this paper provides the standard reference. The gap between what differential privacy actually guarantees and how companies deploy it in practice is a recurring source of confusion in public privacy discourse.


9. Freedom of the Press Foundation. "Security Training for Journalists." freedom.press/training (continuously updated).

The Freedom of the Press Foundation — co-founded by Glenn Greenwald, Laura Poitras, and Daniel Ellsberg, among others — provides free security training resources specifically oriented toward journalists and their sources. The training materials cover: setting up and using SecureDrop, encrypted communication practices, operational security for source protection, and mobile device security. More than a technical guide, it reflects the institutional knowledge accumulated through years of protecting sources from government surveillance. Directly relevant to the Snowden case study and to any journalism or advocacy application of counter-surveillance.


10. Swire, Peter and Kenesa Ahmad. "'Going Dark' Versus a 'Golden Age for Surveillance.'" Center for Democracy and Technology, November 2011.

This earlier paper, which predates the Berkman Klein Center's "Don't Panic" report but anticipates its arguments, frames the "going dark" debate in terms of the full range of available surveillance tools. Swire and Ahmad argue that even as encryption has become more widespread, the overall surveillance landscape has expanded dramatically — more data is available than ever before, from more sources, accessible through more legal mechanisms. The paper provides historical context for the "going dark" debate and is an important resource for understanding that surveillance capability is not declining but transforming.


For hands-on tool installation: Signal (signal.org), ProtonMail (proton.me), Tor Browser (torproject.org), uBlock Origin (ublockorigin.com), Mullvad VPN (mullvad.net), GrapheneOS (grapheneos.org). All are free and open source unless noted.