Article contents
Lacan in the US cyber defence: Between public discourse and transgressive practice
Published online by Cambridge University Press: 20 March 2020
Abstract
Edward Snowden exposed the discrepancy between the official US defence discourse of liberal values in cyberspace and secret surveillance and cyber exploitation practices. Situated in the critical literature on security and surveillance, the article proposes that more attention needs to be paid to the constitutive role of transgressive practices for security communities. The article introduces a Lacanian strategy for studying transgression in the US cyber defence community. Through this strategy, a transgressive other – in this case, China in cyberspace – enters the fantasy of the US cyber defence community as the symptom that conceals more fundamental tensions in the US cyber defence. But the community's representation of China in cyberspace represents more than that; China is a fantasmatic object that structures and gives content to a desire for transgressing the official ideals of the US cyber defence. This is why the excessive cyber practices that China is criticised for conducting mirror the secret, disavowed transgressions of the US cyber defence. Transgressions, the article concludes through Lacan, provide the necessary (partial) enjoyment that sustains the US cyber defence community as a solidarity-in-guilt and the official US cyber defence discourse.
Keywords
- Type
- Research Article
- Information
- Copyright
- Copyright © British International Studies Association 2020
References
1 Ashton B. Carter, ‘Remarks by Secretary Carter to US cyber command workforce at Fort Meade, Maryland’, DoD News (13 March 2015), available at: {http://archive.defense.gov/Transcripts/Transcript.aspx?TranscriptID=5602} accessed 20 November 2018; Department of Defense, ‘The DoD Cyber Strategy’ (Washington, DC: US Government Publishing Office, 2015), pp. 1–3.
2 Glenn Greenwald and Ewan MacAskill, ‘Boundless Informant: The NSA's secret tool to track global surveillance data’, The Guardian (11 June 2013), available at: {https://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining} accessed 20 November 2018.
3 Alex Gibney (dir.), Zero Days, Documentary (Magnolia Pictures, 2016).
4 Bauman, Zygmunt et al. , ‘After Snowden: Rethinking the impact of surveillance’, International Political Sociology, 8:2 (2014), pp. 121–44CrossRefGoogle Scholar; Lyon, David, ‘The Snowden stakes: Challenges for understanding surveillance today’, Surveillance & Society, 13:2 (2015), pp. 139–52CrossRefGoogle Scholar; Gros, Valentin, de Goede, Marieke, and İşleyen, Beste, ‘The Snowden files made public: A material politics of contesting surveillance’, International Political Sociology, 11:1 (2017, pp. 73–89CrossRefGoogle Scholar; Aradau, Claudia, ‘Assembling (non)knowledge: Security, law, and surveillance in a digital world’, International Political Sociology, 11:4 (2017), pp. 327–42Google Scholar.
5 Hansen, Lene, Security as Practice: Discourse Analysis and the Bosnian War (London: Routledge, 2006)Google Scholar; Huysmans, Jef, The Politics of Insecurity: Fear, Migration and Asylum in the EU (London: Routledge, 2006)CrossRefGoogle Scholar; Bigo, Didier and Tsoukala, Anastassia (eds), Terror, Insecurity and Liberty: Illiberal Practices of Liberal Regimes after 9/11 (London: Routledge, 2008)CrossRefGoogle Scholar.
6 The article uses US cyber defence community as a collective term for those entities that work with cyber defence issues within the US Department of Defense (DoD), including the subsidiary military and intelligence branches (for example, NSA and US Cyber Command), and within the National Security Council and Office of the Director of National Intelligence (ODNI).
7 Eberle, Jakub, ‘Narrative, desire, ontological security, transgression: Fantasy as a factor in international politics’, Journal of International Relations and Development, 22:1 (2019), pp. 243–68CrossRefGoogle Scholar.
8 Žižek, Slavoj, The Metastases of Enjoyment: Six Essays on Women and Causality (London: Verso, 1994), p. 55Google Scholar.
9 Glynos, Jason and Stavrakakis, Yannis, ‘Lacan and political subjectivity: Fantasy and enjoyment in psychoanalysis and political theory’, Subjectivity, 24:1 (2008), pp. 256–74CrossRefGoogle Scholar.
10 Grosrichard, Alain, The Sultan's Court: European Fantasies of the East, trans. Heron, Liz (London: Verso, 1998)Google Scholar.
11 Solomon, Ty, The Politics of Subjectivity in American Foreign Policy Discourses (Ann Arbor: University of Michigan Press, 2015)CrossRefGoogle Scholar; Mandelbaum, Moran M., ‘State, nation, society: The congruency fantasy and in/security of the body-national/social’, Critical Studies on Security, 4:2 (2016), pp. 187–201CrossRefGoogle Scholar; Zevnik, Andreja, ‘A return of the repressed: Symptom, fantasy and campaigns for justice for Guantánamo detainees post-2010’, The British Journal of Politics and International Relations, 20:1 (2018), pp. 206–22CrossRefGoogle Scholar; Heath-Kelly, Charlotte, ‘Forgetting ISIS: Enmity, drive and repetition in security discourse’, Critical Studies on Security, 6:1 (2018), pp. 85–99CrossRefGoogle Scholar; Ali, Nadya and Whitham, Ben, ‘The unbearable anxiety of being: Ideological fantasies of British Muslims beyond the politics of security’, Security Dialogue, 49:5 (2018), pp. 400–17CrossRefGoogle Scholar.
12 Žižek, Slavoj, The Sublime Object of Ideology (2nd edn, London: Verso, 2008), p. 140Google Scholar; Ali and Whitham, ‘The unbearable anxiety of being’.
13 The article does not discuss the Trump presidency, as the relationship between the public cyber defence discourse and the transgressive practices is different from during the Obama presidency. Russia has emerged as a top threat from cyberspace, although rather ambiguously in the White House; the US Cyber Command has become more open about its aggressive behaviour in cyberspace; and we have not had the same number of leaked documents to provide us with insights into the secret workings of the US cyber defence community.
14 Eberle, ‘Narrative, desire, ontological security, transgression’.
15 Bauman et al., ‘After Snowden’; Lyon, David, ‘Surveillance, Snowden, and Big Data: Capacities, consequences, critique’, Big Data & Society, 1:2 (2014), pp. 1–13CrossRefGoogle Scholar; Lyon, ‘The Snowden stakes’; Gloria González Fuster and Rocco Bellanova, ‘Edward Snowden: The last Big Brother?’, openDemocracy (13 May 2014), available at: {https://www.opendemocracy.net/en/can-europe-make-it/edward-snowden-last-big-brother/} accessed 5 July 2019.
16 Friedewald, Michael et al. (eds), Surveillance, Privacy and Security: Citizens’ Perspectives (London and New York: Routledge, 2017)CrossRefGoogle Scholar.
17 Balzacq, Thierry and Puybareau, Benjamin, ‘The economy of secrecy: Security, information control, and EU‒US relations’, West European Politics, 41:4 (2018), pp. 890–913CrossRefGoogle Scholar; Bigo, Didier, ‘Shared secrecy in a digital age and a transnational world’, Intelligence and National Security, 34:3 (2019), pp. 379–94CrossRefGoogle Scholar.
18 Bauman et al., ‘After Snowden’, p. 124; Richardson, Michael, ‘Surveillance publics after Edward Snowden’, in Marshall, P. David et al. (eds), Contemporary Publics (London: Palgrave Macmillan, 2016), pp. 163–80CrossRefGoogle Scholar; Van der Vlist, Fernando N., ‘Counter-mapping surveillance: A critical cartography of mass surveillance technology after Snowden’, Surveillance & Society, 15:1 (2017), pp. 137–57CrossRefGoogle Scholar.
19 Gros, de Goede, and İşleyen, ‘The Snowden files made public’; Aradau, ‘Assembling (non)knowledge’.
20 Huysmans, Jef, ‘Democratic curiosity in times of surveillance’, European Journal of International Security, 1:1 (2016), pp. 73–93CrossRefGoogle Scholar; Aradau, Claudia and Blanke, Tobias, ‘The (Big) Data-security assemblage: Knowledge and critique’, Big Data & Society, 2:2 (2015), pp. 1–12CrossRefGoogle Scholar. See also Miguelángel Garrido, Verde, ‘Contesting a biopolitics of information and communications: The importance of truth and sousveillance after Snowden’, Surveillance & Society, 13:2 (2015), pp. 153–67CrossRefGoogle Scholar.
21 Gros, de Goede, and İşleyen, ‘The Snowden files made public’, p. 75; Connolly, William E., ‘The “new materialism” and the fragility of things’, Millennium: Journal of International Studies, 41:3 (2013), pp. 399–412CrossRefGoogle Scholar; Schouten, Peer, ‘Security as controversy: Reassembling security at Amsterdam airport’, Security Dialogue, 45:1 (2014), pp. 23–42CrossRefGoogle Scholar; Salter, Mark B. (ed.), Making Things International 1: Circuits and Motion (Minneapolis, MN: University of Minnesota Press, 2015)Google Scholar.
22 Campbell, David, Writing Security: United States Foreign Policy and the Politics of Identity (Minneapolis, MN: University of Minnesota Press, 1992)Google Scholar; Buzan, Barry, Wæver, Ole, and de Wilde, Jaap, Security: A New Framework for Analysis (Boulder, CO: Lynne Rienner Pub, 1998)Google Scholar.
23 Hansen, Security as Practice; Jackson, Richard, Writing the War on Terrorism: Language, Politics and Counterterrorism (Manchester: Manchester University Press, 2005)Google Scholar; Croft, Stuart, Culture, Crisis, and America's War on Terror (Cambridge: Cambridge University Press, 2006)CrossRefGoogle Scholar.
24 Huysmans, The Politics of Insecurity; Bigo and Tsoukala, Terror, Insecurity and Liberty.
25 Arfi, Badredine, ‘Fantasy in the discourse of “social theory of international politics”’, Cooperation and Conflict, 45:4 (2010), pp. 428–48CrossRefGoogle Scholar; Solomon, The Politics of Subjectivity in American Foreign Policy Discourses; Mandelbaum, ‘State, nation, society’; Heath-Kelly, ‘Forgetting ISIS’; Ali and Whitham, ‘The unbearable anxiety of being’; Eberle, ‘Narrative, desire, ontological security, transgression’; Kinnvall, Catarina and Svensson, Ted, ‘Misrecognition and the Indian state: The desire for sovereign agency’, Review of International Studies, 44:5 (2018), pp. 902–21CrossRefGoogle Scholar; Vieira, Marco A., ‘(Re-)imagining the “self” of ontological security: The case of Brazil's ambivalent postcolonial subjectivity’, Millennium: Journal of International Studies, 46:2 (2018), pp. 142–64CrossRefGoogle Scholar.
26 Stavrakakis, Yannis, Lacan and the Political (London: Routledge, 1999), pp. 4–5Google Scholar; Tomšič, Samo and Zevnik, Andreja (eds), Jacques Lacan: Between Psychoanalysis and Politics (London and New York: Routledge, 2016), p. 1Google Scholar.
27 Epstein, Charlotte, ‘Who speaks? Discourse, the subject and the study of identity in international politics’, European Journal of International Relations, 17:2 (2011), pp. 327–50CrossRefGoogle Scholar; Epstein, Charlotte, ‘Theorizing agency in Hobbes's wake: The rational actor, the self, or the speaking subject?’, International Organization, 67:2 (2013), pp. 287–316CrossRefGoogle Scholar; Burgess, J. Peter, The Ethical Subject of Security: Geopolitical Reason and the Threat against Europe (London: Routledge, 2011), pp. 50–65CrossRefGoogle Scholar.
28 Edkins, Jenny and Pin-Fat, Véronique, ‘The subject and the political’, in Edkins, Jenny, Nalini, Persram, and Pin-Fat, Véronique (eds), Sovereignty and Subjectivity (Boulder, CO: Lynne Rienner Publishers, 1999), pp. 1–18Google Scholar.
29 Kinnvall and Svensson, ‘Misrecognition and the Indian state’, p. 907.
30 Epstein, ‘Who speaks?’.
31 Kinnvall and Svensson, ‘Misrecognition and the Indian state’; Epstein, Charlotte, ‘The productive force of the negative and the desire for recognition: Lessons from Hegel and Lacan’, Review of International Studies, 44:5 (2018), pp. 805–28CrossRefGoogle Scholar; Adler-Nissen, Rebecca and Tsinovoi, Alexei, ‘International misrecognition: The politics of humour and national identity in Israel's public diplomacy’, European Journal of International Relations, 25:1 (2019), pp. 3–29CrossRefGoogle Scholar.
32 Eberle, ‘Narrative, desire, ontological security, transgression’.
33 Žižek, The Sublime Object of Ideology, pp. 47–50, 138.
34 To capture this process, Lacan introduces the notion objet petit a, which stands for the process through which our desire becomes attached to objects, as well as a structural position that ensures that the objects remain unattainable.
35 Heath-Kelly, ‘Forgetting ISIS’, p. 88.
36 Mandelbaum, ‘State, nation, society’.
37 Ali and Whitham, ‘The unbearable anxiety of being’.
38 Žižek, Slavoj, Tarrying with the Negative: Kant, Hegel, and the Critique of Ideology (Durham, NC: Duke University Press, 1993), p. 217CrossRefGoogle Scholar; Žižek, Slavoj, The Ticklish Subject: The Absent Centre of Political Ontology (London: Verso, 1999), pp. 248, 367Google Scholar.
39 Žižek, Slavoj, Violence: Six Sideways Reflections (New York, NY: Picador, 2008), pp. 167–77Google Scholar.
40 Žižek, Slavoj, The Plague of Fantasies (2nd edn, London: Verso, 2008), pp. 70–2Google Scholar.
41 Žižek, The Metastases of Enjoyment, p. 55, emphasis in original.
42 Eberle, ‘Narrative, desire, ontological security, transgression’, p. 259.
43 Žižek, The Sublime Object of Ideology, p. 140.
44 Ibid.
45 Ibid., p. 142.
46 Žižek, Tarrying with the Negative, p. 203, fn. 7.
47 Lacan's matrix for the Four Discourses, and particularly the Master Discourse, offers a useful methodological entry point into this initial step of the symptomal reading. Without expressively engaging in a symptomal reading, Arfi's discussion on Wendtian constructivism provides an excellent illustration of how the structural relations in the Master Discourse inevitably lead to the construction of a fantasy. Arfi, ‘Fantasy in the discourse of “social theory of international politics”’. For another discursive reading of Lacan. See also Solomon, The Politics of Subjectivity in American Foreign Policy Discourses.
48 Zevnik, ‘A return of the repressed’; Ali and Whitham, ‘The unbearable anxiety of being’.
49 Žižek, The Sublime Object of Ideology, p. 141, emphasis in original.
50 Lacan, Jacques, Psychosis, ed. Miller, Jacques-Alain, trans. Grigg, Russell, Book III (New York, NY: W. W. Norton and Company, 1997), p. 60Google Scholar; Žižek, Slavoj, ‘Introduction: The spectre of ideology’, in Žižek, Slavoj (ed.), Mapping Ideology (London: Verso, 1994), p. 10Google Scholar.
51 Zevnik, ‘A return of the repressed’.
52 Žižek, The Sublime Object of Ideology, p. 140.
53 Ibid., p. 141.
54 Žižek, Slavoj, Iraq: The Borrowed Kettle (London: Verso, 2004), p. 142Google Scholar.
55 Solomon, The Politics of Subjectivity in American Foreign Policy Discourses.
56 Supplementing the reading of official sources, the article draws here on eight interviews with US officials working with defending the US in cyberspace, two from the US Cyber Command, four from the US Military Academy, West Point, one from US Indo-Pacific Command, and one from NATO Headquarters. One conversation took place in 2015, while the others took place in late 2016 and early 2017. Two additional interviews have been made with employees at FireEye and Crowdstrike. None of the individuals were willing to be quoted with name and rank and have thus been anonymised.
57 Paying analytical attention to the slip of the tongue could open the psychoanalytic lens to critique from more methodologically conservative voices of ‘an interpretation gone too far’. Such critique somewhat misses the point. This is because the surprising interpretations are not simply attempts to offer ‘objective truths’ about the empirical object of investigation. Lacanian interventions are about making the subjects (in this case, in the US cyber defence community) think again, and ultimately to better reflect on (and master) the position they occupy within the US cyber defence discourse. This psychoanalytic ambition follows its own discursive structure, what Lacan called the Analyst Discourse. Lacan, Jacques, On Feminine Sexuality: The Limits of Love and Knowledge, ed. Miller, Jacques-Alain, trans. Fink, Bruce, Book XX: Encore (New York, NY: W. W. Norton and Company, 1998), pp. 14–25Google Scholar; Lacan, Jacques, The Other Side of Psychoanalysis, ed. Miller, Jacques-Alain, trans. Grigg, Russell, Book XVII (London, New York, NY: W. W. Norton and Company, 2007), pp. 11–68Google Scholar.
58 Department of Defense, ‘The DoD Cyber Strategy’, p. 1.
59 Carter, ‘Remarks by Secretary Carter to US cyber command workforce at Fort Meade, Maryland’.
60 Department of Defense, ‘The DoD Cyber Strategy’, p. 6.
61 David E. Sanger, ‘U.S. cyberattacks target ISIS in a new line of combat’, The New York Times (24 April 2016), available at: {https://www.nytimes.com/2016/04/25/us/politics/us-directs-cyberweapons-at-isis-for-first-time.html?hp&action=click&pgtype=Homepage&clickSource=story-heading&module=first-column-region®ion=top-news&WT.nav=top-news&_r=0} accessed 20 November 2018.
62 Jacobsen, Jeppe Teglskov and Ringsmose, Jens, ‘Cyber-bombing ISIS: Why disclose what is better kept secret?’, Global Affairs, 3:2 (2017), pp. 125–37CrossRefGoogle Scholar.
63 Ellen Nakashima and Missy Ryan, ‘U.S. military has launched a new digital war against the Islamic State’, Washington Post (15 July 2016), available at: {https://www.washingtonpost.com/world/national-security/us-militarys-digital-war-against-the-islamic-state-is-off-to-a-slow-start/2016/07/15/76a3fe82-3da3-11e6-a66f-aa6c1883b6b1_story.html} accessed 20 November 2018.
64 Lynn, William J. III, ‘Defending a new domain’, Foreign Affairs, 85:5 (2010), pp. 97–108Google Scholar; James Clapper, ‘Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community’ (Senate Armed Service Committee Hearing, Washington, DC, 12 March 2013); James Clapper, ‘Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community’ (Senate Armed Service Committee Hearing, Washington, DC, 29 January 2014); James Clapper, ‘Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community’ (Senate Select Intelligence Committee, Washington, DC, 9 February 2016).
65 Clapper, ‘Statement for the Record’, pp. 1–3.
66 Ibid.
67 Clapper, ‘Statement for the Record’, p. 2.
68 Cited in Josh Rogin, ‘NSA chief: Cybercrime constitutes the “greatest transfer of wealth in history” – foreign policy’, Foreign Policy (9 July 2012), available at: {https://foreignpolicy.com/2012/07/09/nsa-chief-cybercrime-constitutes-the-greatest-transfer-of-wealth-in-history/} accessed 20 November 2018.
69 Office of the National Counterintelligence Executive, ‘Foreign Spies Stealing US Economic Secrets in Cyberspace’, Report to Congress (Washington, DC: Office of the Director of National Intelligence Publications, October 2011).
70 Henderson, Scott J., The Dark Visitor: Inside the World of Chinese Hackers (self-published manuscript: Lulu, 2007), p. 102Google Scholar. See also Thomas, Timothy L., ‘China's electronic long-range reconnaissance’, Military Review (2008)Google Scholar.
71 Jayson M. Spade, ‘Information as Power: China's Cyber Power and America's National Security’ (Carlisle Barracks, PA: US Army War College, 2012), p. 17.
72 James C. Mulvenon et al., ‘Chinese Responses to U.S. Military Transformation and Implications for the Department of Defense’ (Santa Monica, CA: Rand Cooperation, 2006), p. 93.
73 Hansen, Security as Practice, p. 26.
74 Lindsay, Jon R., ‘The impact of China on cybersecurity: Fiction and friction’, International Security, 39:3 (2015), pp. 18–19CrossRefGoogle Scholar.
75 Glynos and Stavrakakis, ‘Lacan and political subjectivity’, p. 263.
76 Ibid., p. 268.
77 Žižek, The Ticklish Subject, pp. 248, 367; Diken, Bülent and Laustsen, Carsten Bagge, ‘Enjoy your fight! – fight club as a symptom of the network society’, Cultural Values, 6:4 (2002), pp. 349–67CrossRefGoogle Scholar.
78 Ellen Nakashima and Joby Warrick, ‘For NSA chief, terrorist threat drives passion to “collect it all”’, Washington Post (14 July 2013), available at: {https://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html?utm_term=.d6d4eff5d534} accessed 20 November 2018.
79 Greenwald and MacAskill, ‘Boundless Informant’.
80 Ibid.
81 Steve Contorno, ‘James Clapper's testimony one year later’, Politifact (11 March 2014), available at: {http://www.politifact.com/truth-o-meter/article/2014/mar/11/james-clappers-testimony-one-year-later/} accessed 20 November 2018.
82 Christopher Joye, ‘Interview transcript: Former Head of the NSA and Commander of the US Cyber Command, General Keith Alexander’, The Financial Review (9 May 2014), available at: {http://www.afr.com/technology/web/security/interview-transcriptformer-head-of-the-nsa-and-commander-of-the-us-cyber-command-general-keith-alexander-20140507-itzhw} accessed 20 November 2018.
83 Devlin Barrett, ‘Surveillance court judge criticized NSA “overcollection” of data: Decision offers scathing assessment of agency's management of Internet-surveillance program’, The Wall Street Journal (11 August 2014), available at: {https://www.wsj.com/articles/surveillance-court-judge-criticized-nsa-overcollection-of-data-1407806807} accessed 20 November 2018.
84 Michael Isikoff, ‘NSA program stopped no terror attacks, says White House panel member’, NBC News (20 December 2013), available at: {https://www.nbcnews.com/news/other/nsa-program-stopped-no-terror-attacks-says-white-house-panel-f2D11783588} accessed 20 November 2018.
85 Joye, ‘Interview transcript’.
86 Žižek, The Metastases of Enjoyment, p. 55.
87 Darren Samuelsohn, ‘Inside the NSA's hunt for hackers’, Politico (9 December 2015), available at: {http://www.politico.com/agenda/story/2015/12/federal-government-cyber-security-technology-worker-recruiting-000330} accessed 20 November 2018.
88 Cheryl Pellerin, ‘Carter unveils new DoD cyber strategy in Silicon Valley’, DoD News (23 April 2015), available at: {https://www.defense.gov/News/Article/Article/604511/} accessed 20 November 2018.
89 Interviews with FireEye and CrowdStrike employees.
90 Anthony H. Cordesman and Joseph Kendall, ‘Chinese Strategy and Military Modernization in 2016: A Comparative Analysis’, CSIS Report (Washington, DC: Center for Strategic & International Studies, 2016), pp. 157–9; Jack Goldsmith, ‘Why did DOJ indict the Chinese military officers?’, Lawfare (20 May 2014), available at: {https://www.lawfareblog.com/why-did-doj-indict-chinese-military-officers} accessed 20 November 2018.
91 Grosrichard, The Sultan's Court, p. 11.
92 Craig Timberg and Barton Gellman, ‘NSA paying U.S. companies for access to communication networks’, Washington Post (29 August 2013), available at: {https://www.washingtonpost.com/world/national-security/nsa-paying-us-companies-for-access-to-communications-networks/2013/08/29/5641a4b6-10c2-11e3-bdf6-e4fc677d94a1_story.html?utm_term=.c4c0c1721f43} accessed 20 November 2018.
93 Kaplan, Fred, Dark Territory: The Secret History of Cyber War (New York, NY: Simon & Schuster Paperbacks, 2016), pp. 281–2Google Scholar.
94 Ibid.
95 Michael Daniel, ‘Heartbleed: Understanding when we disclose cyber vulnerabilities’, White House Blog (28 April 2014), available at: {https://obamawhitehouse.archives.gov/blog/2014/04/28/heartbleed-understanding-when-we-disclose-cyber-vulnerabilities} accessed 20 November 2018.
96 Ibid.
97 Ellen Nakashima and Craig Timberg, ‘NSA officials worried about the day its potent hacking tool would get loose. Then it did’, Washington Post (16 May 2017), available at: {https://www.washingtonpost.com/business/technology/nsa-officials-worried-about-the-day-its-potent-hacking-tool-would-get-loose-then-it-did/2017/05/16/50670b16-3978-11e7-a058-ddbb23c75d82_story.html?utm_term=.1a0da5176c99} accessed 20 November 2018.
98 Peter Maass, ‘The hunter – he was a hacker for the NSA and he was willing to talk. I was willing to listen’, The Intercept (28 June 2016), available at: {https://theintercept.com/2016/06/28/he-was-a-hacker-for-the-nsa-and-he-was-willing-to-talk-i-was-willing-to-listen/} accessed 20 November 2018.
99 Gibney (dir.), Zero Days, 1:45:25–1:46:25.
- 2
- Cited by