NOVELS


THE GOD'S EYE VIEW

The God's Eye View

SOURCES


Prologue

Timeline of NSA revelations
http://america.aljazeera.com/

"13 Ways the NSA Has Spied on Us"
http://www.vox.com/

One of the NSA's least known and most potent surveillance tools: EO 12333
http://www.washingtonpost.com

The false and propagandistic notion of an American "oath" of secrecy
http://barryeisler.blogspot.com

Not so many burning Humvees in Desert Storm, true, but see Day 15 and Day 41
http://armylive.dodlive.mil

How an undersea oil eruption became a "leak"
http://barryeisler.blogspot.com

"Enhanced Interrogation" sounds better in the original German
http://www.theatlantic.com

It's almost as though all these "narcissist" hacks were working off the same set of talking points
https://www.google.com

Speaking of the "narcissism" talking points/projection, don't miss Jay Rosen on the "Toobin Principle"
http://pressthink.org

"They are using the exact same deny, degrade, distract, disrupt, destroy playbook against [Snowden] that his own revelations show are being used against every other activist."
https://occupysavvy.wordpress.com

Our august lawmakers solicit the Defense Intelligence Agency for dirt they can use to undermine Snowden's credibility
https://news.vice.com

1.2 million people on US government watch list
http://www.theguardian.com


Chapter 1

US/Turkish intelligence cooperation
https://firstlook.org

More on NSA Special Liaison Advisors
https://firstlook.org

Webcam hacking
http://arstechnica.com

Mesh network CCTV surveillance systems are trivial to hack
http://www.forbes.com

Harvard secretly installs cameras in its classrooms
http://www.nytimes.com

Gunshot-detecting microphones
http://www.economist.com

Identifying people via biometric data like height, stride length, and walking speed
http://arstechnica.com

"New Surveillance Technology Can Track Everyone in an Area for Several Hours at a Time"
http://www.washingtonpost.com

Facial recognition technology is everywhere, even in churches
http://fusion.net

Who is this Marcy Wheeler?!
https://www.emptywheel.net


Chapter 2

Intelligence agencies achieve greater openness by prohibiting officials from talking to media
http://www.wsj.com

Those damn subversives the director is so upset about:
Barrett Brown
Sarah Harrison
Murtaza Hussain
Angela Keaton
Jason Leopold
Janet Reitman
Trevor Timm
Marcy Wheeler

How the NSA tracks cell phone locations
https://www.eff.org

A lost dog identified three thousand miles from home via a microchip implant. Coming soon to babies everywhere, no doubt
http://www.aol.com

Amazingly, about a day after I wrote the scene where the director ruminates about using a kidnapping to persuade Americans to have microchips implanted in their children, this was published (and quickly debunked)
http://www.washingtonpost.com

Another place the government used the all-seeing eye of providence was as part of the design for the Total Information Awareness program. The Latin means "knowledge is power"
https://en.wikipedia.org

The brilliant cartoonist Tom Tomorrow summed up Total Information Awareness perfectly . . . all the way back in 2002
https://twitter.com

Inventing ever scarier-sounding terrorist groups to justify more bombings. Heard of the Khorasan group lately?
https://firstlook.org
https://firstlook.org


Chapter 6

United Nations Special Rapporteur on Torture finds Chelsea Manning's treatment cruel and inhuman
http://www.theguardian.com

Yemenis seek justice in wedding drone strike
http://www.aljazeera.com

The best coverage of America's drone wars ever is courtesy of comedian John Oliver
http://www.motherjones.com

Detaining someone assisting in journalism under the pretext of antiterrorism
http://barryeisler.blogspot.com

Hacking a car and turning it into a drone:
http://www.youtube.com
http://www.nytimes.com
http://www.huffingtonpost.com
http://www.forbes.com
http://www.economist.com
https://www.techdirt.com

Airplanes are vulnerable to cyberhacking, too
http://www.foxnews.com

Everything in a high-end car is microprocessor-controlled—even the steering
http://auto.howstuffworks.com

Hertz puts cameras inside some of its rental cars
http://arstechnica.com


Chapter 7

It's possible Manus has seen this video on concealing a handgun inside a vehicle
https://www.youtube.com


Chapter 8

How Western media is manipulated by ISIS into spreading jihadist propaganda
http://www.juancole.com

The real starship Enterprise-like "Information Dominance Center," used by former NSA chief Keith Alexander, is at Fort Belvoir, not Fort Meade. But I couldn't resist moving it
http://www.theguardian.com

See how excited Brian Williams gets when the government permits him a peek inside the (gasp) Situation Room!
http://rockcenter.nbcnews.com


Chapter 9

If you think Brian's interview of the director was deferential to the point of parody, you probably haven't seen Wolf Blitzer's version, with FBI director James Comey:
https://twitter.com
https://www.youtube.com

Pakistani government forces cell phone users to turn over fingerprints or lose their service
http://www.washingtonpost.com


Chapter 10

ACLU rendition of just how powerful a tool location data can be
https://www.aclu.org

Leaving your cell phone at home when you go out? Using encryption? The NSA might think you're a terrorist
http://www.theguardian.com

NSA spied on US senators
http://foreignpolicy.com

"We Kill People Based on Metadata"
http://www.nybooks.com


Chapter 11

ISIS waterboarded journalist James Foley
http://www.ibtimes.com


Chapter 12

Obama prosecutes whistleblowers under the 1917 Espionage Act more than twice as many times as all administrations in history combined
http://theweek.com

Here's what the Constitutional law professor and Nobel Peace laureate did to whistleblower Jeffrey Sterling
https://firstlook.org
https://firstlook.org

Secret FISA "court" is nothing but an administrative rubber stamp
http://www.thedailybeast.com

FISA "court" approves 99.97 percent of government surveillance requests
http://www.motherjones.com


Chapter 13

Journalists relying on face-to-face meetings and human couriers
http://barryeisler.blogspot.com

NSA spends billions to weaken international standards, install backdoors, and otherwise subvert encryption
http://www.nytimes.com

NSA intercepts shipments of Internet-ordered computers; infects them with malware
http://www.spiegel.de

"Secret Documents Reveal NSA Campaign Against Encryption"
http://www.nytimes.com

"A Few Thoughts on Cryptographic Engineering"
http://blog.cryptographyengineering.com

The menace of "insider threats"
http://www.mcclatchydc.com

Over 700,000,000 people changing their online behavior to evade NSA surveillance
https://www.schneier.com

US Postal Service logs all mail for law enforcement
http://www.nytimes.com


Chapter 14

Over 1.5 million people with top secret clearances (more than the population of Norway)
http://www.washingtonpost.com


Chapter 16

"New Hi-Tech Police Surveillance: The 'StingRay' Cell Phone Spying Device"
http://www.globalresearch.ca


Chapter 17

In case you're wondering how the director can come up with spare grenade launchers to trade like playing cards
http://www.washingtonpost.com

NSA's AURORAGOLD cell phone eavesdropping and encryption subversion program
https://firstlook.org


Chapter 18

NASA's SHARAD technology
http://mars.nasa.gov

And other existing and coming means of peering through brick and concrete
https://www.documentcloud.org


Chapter 20

Mobile IMSI-catcher cell phone trackers
http://arstechnica.com


Chapter 22

Pakistani government forces cell phone users to turn over fingerprints or lose their service
http://www.washingtonpost.com

"We don't know if it was terrorism" means "We don't know if it was Muslims," and other aspects of the "terrorism expert" industry
http://www.democracynow.org

If you think Barbara Stirr's exchange with the director was deferential to the point of parody, you probably haven't seen Wolf Blitzer's version, with FBI director James Comey
https://twitter.com
https://www.youtube.com


Chapter 23

No one uses words like "homeland" accidentally
http://intercepts.defensenews.com
http://www.huffingtonpost.com

"US Military Drone Network in the Middle East and Africa"
http://apps.washingtonpost.com

US automatically counts all military-age males killed as terrorists
http://www.nytimes.com

ISIS claims US hostage killed in coalition air strike in Syria
http://www.theguardian.com

On the CIA choosing its own pet reporters, by two great journalists for whom I've named characters in other books—Dan Froomkin and Scott Horton
https://firstlook.org

Wolf Blitzer is a particularly compliant tool
https://firstlook.org

The New York Times helpfully publishes the government's side of the story: Sure, American hostages were killed, but counterterrorism officials and analysts say the drone program overall is effective . . .
http://www.nytimes.com

Establishment "journalists" detest whistleblowers
http://antiwar.com

The surveillance state never stops looking for excuses to increase its powers
http://www.nytimes.com

"Former FBI Assistant Director: To Keep Budgets High, We Must 'Keep Fear Alive'"
https://www.privacysos.org


Chapter 24

The FBI's tendency to create, then take credit for dismantling, terror plots that could never have existed without the FBI's assistance
https://firstlook.org
http://www.salon.com
https://firstlook.org
https://firstlook.org

TED talk by Trevor Aaronson on how the FBI's tactics create domestic terrorists
http://www.ted.com

To get what you want it's good to "scare hell" out of the American people
http://www.whale.to

New eavesdropping equipment sucks all the data off your cell phone
http://www.newsweek.com


Chapter 25

"A Decade After 9/11, Police Departments Are Increasingly Militarized"
http://www.huffingtonpost.com

Domestic drones
https://www.aclu.org

FBI behind mysterious surveillance aircraft over US cities
http://bigstory.ap.org

More on domestic surveillance aircraft
https://medium.com

This ACLU domestic drone "nightmare scenario" from 2012 doesn't sound so far-fetched now, does it?
https://www.aclu.org

Spy organizations routinely monitor email accounts of journalists, assessing investigative journalists as a threat comparable to terrorists and hackers
http://www.theguardian.com

More on the NSA spying on journalists
http://www.spiegel.de

FBI's instructions to police: "Do not advise this individual that they [sic] may be on a terrorist watchlist"
http://www.dailydot.com

White House: "It is with tremendous sorrow that we recently concluded that a US Government counterterrorism operation in January killed two innocent hostages held by al-Qaeda"
https://www.whitehouse.gov
http://www.nytimes.com

One day after the news that US drones killed American hostages, the PR counteroffensive kicks into gear: "Counterterrorism officials and analysts say . . ."
http://www.nytimes.com


Chapter 26

"5 NSA Whistleblowers Who Came Before Snowden"
http://capitalismisfreedom.com

More on what happened to every NSA whistleblower who tried to work through the system can be found in chapter 9 of James Risen's excellent book, Pay Any Price: Greed, Power, and Endless War (New York: Houghton Mifflin Harcourt, 2014)

More on Jesselyn Radack, whistleblower and lawyer to whistleblowers
http://www.theverge.com

And Diane Roark and Thomas Tamm, who also tried to go through the system
http://cryptome.org
http://www.pbs.org
http://www.pbs.org


Chapter 27

Peyton Quinn's Five Rules for Managing Impending Violence
http://www.nononsenseselfdefense.com


Chapter 28

HUMINT, SIGINT . . . and now, LOVEINT
http://crookedtimber.org


Chapter 31

The National License Plate Reader (LPR) Initiative—the DEA's massive license plate tracking system, open to other federal agencies
http://dissenter.firedoglake.com

Using license plate trackers to monitor gun shows . . . and what else?
http://www.theguardian.com

License plate readers are being paired with facial recognition technology, just like Evie's camera network
http://www.theguardian.com

The NSA targets the privacy conscious
http://daserste.ndr.de

XKeyscore: NSA's Google for the World's Private Communications
https://firstlook.org

How XKeyscore works
https://firstlook.org

How the FBI caught Petraeus: cross-referencing metadata, all without a warrant
http://www.aclu.org

MIT researchers report they don't need an individual's name, address, or credit card number to identify people
http://www.zdnet.com

Don't worry; it's just metadata!
http://www.wired.com

The CIA intercepts whistleblower communications
http://www.mcclatchydc.com

How a surveillance system ostensibly targeted at terrorists in fact sucks in massive amounts of unrelated people and data: Canada's download dragnet
https://firstlook.org


Chapter 32

How to leak securely using SecureDrop
https://firstlook.org


Chapter 41

CIA director's attempt to conceal emails by saving them as drafts, not sending
http://www.washingtonpost.com

If you're using encryption, the NSA is watching extra closely
https://www.techdirt.com

Lawyer-client privileged communications are of particular interest
http://www.theguardian.com

Governments monitor WikiLeaks website, collect IP addresses of visitors
https://firstlook.org

Thinking about searching for privacy-enhancing tools? The NSA is watching for that
http://daserste.ndr.de

UK Parliamentary Committee: "GCHQ's bulk interception capability is used primarily to find patterns in, or characteristics of, online communications which indicate involvement in threats to national security"—aka God's Eye
https://firstlook.org

NSA spies on journalists
http://www.spiegel.de

"Surveillance Forces Journalists to Think and Act Like Spies"
https://cpj.org

This is by design: "When journalists must compete with spies and surveillance, even if they win, society loses."
http://inthesetimes.com

Another example of God's Eye-type pattern recognition: the NSA's SKYNET program
https://firstlook.org

Israel's Unit 8200 uses compromising information gathered from captured emails to coerce key Palestinians. Unthinkable NSA does anything similar?
http://blogs.reuters.com


Chapter 45

Turning a phone into a listening device via WARRIOR PRIDE and NOSEY SMURF (yes, they really have names like that—your tax dollars at work)
https://firstlook.org

New exploit turns Samsung Galaxy phones into remote bugging devices
https://twitter.com

Using a cell phone's gyroscopes like a microphone
http://www.wired.com

The $2.8 billion JLENS blimps floating over Maryland
https://firstlook.org

The CIA/US Marshals joint cell phone tracking initiative
http://www.wsj.com

Accessing baby monitors and other listening devices
http://www.forbes.com

Entertainment systems listening in on your living room conversations
http://www.bbc.com

The NSA converts spoken words into searchable text so surveillance of conversations can be conducted at huge scale
https://firstlook.org

I wish I were inventing the phrase "civil liberties extremist," as clear a sign of our authoritarian times as any. Alas, I'm not. Pity Barry Goldwater
http://www.theguardian.com


Chapter 46

Uber tracks user movements with a program called God View (aka Creepy Stalker View)
http://www.forbes.com
http://www.engadget.com


Chapter 47

"When you collect it all, when you monitor everyone, you understand nothing."
http://www.theguardian.com

"We are drowning in information. And yet we know nothing."
https://firstlook.org


Chapter 49

Former CIA and NSA director Michael Hayden's "off-the-record" interview gets live-tweeted
http://www.theguardian.com

Former NSA director Keith Alexander doesn't cover his laptop webcam
http://www.theguardian.com


Epilogue

Not quite the "privacy advocate" position imagined in the book, but close enough: the president's blue ribbon intelligence reform panel recommends "public interest advocate"
http://www.theatlantic.com
http://www.nybooks.com

Names change; programs continue
http://en.wikipedia.org


General Reading

For more on the real-world events depicted in the prologue and in the novel generally, I recommend Glenn Greenwald's No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (New York: Metropolitan Books, 2014)

And Laura Poitras's Oscar- and other award-winning documentary, Citizenfour

A brief history of the US surveillance state
http://www.tomdispatch.com

Julian Assange's When Google Met WikiLeaks (New York: OR Books, 2014)

Scott Horton's Lords of Secrecy: The National Security Elite and America's Stealth Warfare (New York: Nation Books, 2015)

For an overview of the ever-metastasizing international surveillance state, I recommend two great books:
Julia Angwin's Dragnet Nation: A Quest for Privacy, Security, and Freedom In a World of Relentless Surveillance (Times Books, 2014)
Bruce Schneier's Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (W. W. Norton & Company, 2015)

If you'd like some historical context for Edward Snowden's actions and what the government has been trying to do to him, Judith Ehrlich's and Rick Goldsmith's Academy Award-nominated The Most Dangerous Man in America: Daniel Ellsberg and the Pentagon Papers is as illuminating as it is riveting


Praise
Excerpt (pdf)
Sources