{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T07:52:39Z","timestamp":1725436359028},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335060","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T17:50:11Z","timestamp":1448301011000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["The adversarial threat posed by the NSA to the integrity of the internet"],"prefix":"10.1109","author":[{"given":"Jared","family":"Naude","sequence":"first","affiliation":[]},{"given":"Lynette","family":"Drevin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Tails 2014 Privacy for anyone anywhere","year":"0","key":"ref33"},{"journal-title":"Launching in 2015 A Certificate Authority to Encrypt the Entire Web","year":"2014","author":"eckersley","key":"ref32"},{"journal-title":"Why the Web Needs Perfect Forward Secrecy More Than Ever","year":"2014","author":"zhu","key":"ref31"},{"journal-title":"PRISM-Proof Your Smartphone 10 Apps To Keep The NSA Out Of Your Phone","year":"2014","author":"neal","key":"ref30"},{"journal-title":"Snowden's Crypto Software May Be Tainted Forever","year":"2014","author":"mcmillan","key":"ref34"},{"journal-title":"Citizenfour produced by Laura Poitras","year":"2013","author":"snowden","key":"ref10"},{"journal-title":"Attacking Tor how the NSA targets users' online anonymity","year":"2013","author":"schneier","key":"ref11"},{"journal-title":"How the NSA's MUSCULAR tapped Google's and Yahoo's private networks","year":"2013","author":"gallagher","key":"ref12"},{"journal-title":"No place to hide Edward Snowden the NSA and the U S surveillance state","year":"2014","author":"greenwald","key":"ref13"},{"journal-title":"Through a PRISM Darkly - Everything we know about NSA spying [30c3]","year":"2013","author":"opsahl","key":"ref14"},{"journal-title":"The Washington Post","year":"2013","key":"ref15"},{"journal-title":"Edward Snowden Here's how we take back the Internet","year":"2014","author":"snowden","key":"ref16"},{"journal-title":"New Utah NSA center requires 1 7M gallons of water daily to operate","year":"2013","author":"adams","key":"ref17"},{"journal-title":"Sydney cafe siege Security hotline had 18 calls about Man Haron Monis before attack","year":"2015","author":"piggott","key":"ref18"},{"journal-title":"Edward Snowden and the secrets of the National Security State","year":"2015","author":"greenwald","key":"ref19"},{"journal-title":"NSA collects millions of text messages daily in &#x2018;untargeted&#x2019; global sweep","year":"2014","author":"ball","key":"ref28"},{"journal-title":"How the programs of the NSA are harming the integrity of the internet ITRI 671 Project NWU Potchefstroom S A","year":"2014","author":"naude","key":"ref4"},{"journal-title":"Google announces end-to-end encryption for Gmail","year":"2014","author":"doctorow","key":"ref27"},{"journal-title":"XKeyscore NSA tool collects &#x2018;nearly everything a user does on the internet","year":"2013","author":"greenwald","key":"ref3"},{"journal-title":"New York Times 2013 Secret Documents Reveal N S A Campaign Against Encryption","year":"0","key":"ref6"},{"journal-title":"Why Telegram has become the hottest messaging app in the world","year":"2014","author":"hamburger","key":"ref29"},{"year":"2013","author":"barrett","key":"ref5"},{"year":"2013","author":"appelbaum","key":"ref8"},{"journal-title":"Exclusive NSA infiltrated RSA security more deeply than thought - study","year":"2014","author":"menn","key":"ref7"},{"journal-title":"To Protect And Infect - The militarization of the Internet [30c3]","year":"2013","author":"guarnieri","key":"ref2"},{"year":"2013","author":"biggs","key":"ref9"},{"journal-title":"The National Security Agency Surveillance giant with eyes on America","year":"2013","author":"greenwald","key":"ref1"},{"journal-title":"Tim Berners-Lee calls NSA surveillance an &#x2018;intrusion on basic human rights","year":"2013","author":"warr","key":"ref20"},{"key":"ref22","first-page":"2014","author":"waldman","year":"0","journal-title":"The economic blowback from NSA spying begins"},{"journal-title":"25 years after inventing the web Tim Berners-Lee invites users to help draft global &#x201C;bill of rights&#x201D;","year":"2014","author":"meyer","key":"ref21"},{"journal-title":"Obama's war on whistleblowers leaves administration insiders unscathed","year":"2015","author":"ackerman","key":"ref24"},{"journal-title":"You can't backdoor a platform","year":"2015","key":"ref23"},{"journal-title":"Der Spiegel Staff 2014 Inside the NSA's war on internet security","year":"0","key":"ref26"},{"journal-title":"Brazilian president US surveillance a &#x2018;breach of international law&#x2019;","year":"2013","author":"borger","key":"ref25"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","start":{"date-parts":[[2015,8,12]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335060.pdf?arnumber=7335060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:52:07Z","timestamp":1490403127000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335060","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}