309:
had performed a significant disservice to the worldwide health of the
Internet by leading Brazil and other countries to reconsider the Internet's decentralized nature. Leighton suggested that nation-states' efforts to create their own versions of the Internet were the beginning of the end for the Internet as we know it. "When you have a situation where all of a sudden, everyone goes into 'tribal' mode—a German cloud, a Swiss cloud, or any other separate Internet—they are significant nationalistic attempts," said Leighton. "What happened with Snowden, it's more of an excuse than a policy, it's more of an excuse to re-nationalize the Internet."
22:
139:. "Instead of getting carried away with the concept of leakers as heroes," Evanina said in August, "we need to get back to the basics of what it means to be loyal. Undifferentiated, unauthorized leaking is a criminal act." While dealing with insider threats had been an intelligence community priority since WikiLeaks published Chelsea Manning's disclosures in 2010, Evanina said that in the aftermath of Snowden's June 2013 revelations, the process "sped up from a regional railway to the
429:" indicating that Snowden's leaks impelled al-Qaeda to develop more secure digital communications. "The underlying public encryption methods employed by online jihadists," the report concluded, "do not appear to have significantly changed since the emergence of Edward Snowden. Major recent technological advancements have focused primarily on expanding the use of encryption to instant messenger and mobile communications mediums."
326:, said that due to Snowden his customers thought American companies had connections to the NSA. Security analysts estimated that U.S. tech companies had since Snowden collectively spent millions and possibly billions of dollars adding state-of-the-art encryption features to consumer services and to the cables that link data centres.
49:, which supplies federated search capabilities for all NSA databases. Since that time, there have been perceptible increases in the general public's knowledge about the U.S. government's cybersecurity initiatives and awareness of how those initiatives have impacted the privacy of individuals, businesses and foreign governments.
358:. Proposed laws in more than a dozen foreign countries, including Germany, Brazil, and India, would make it harder for U.S. firms to do business there. The European Union is considering stricter domestic privacy legislation that could result in fines and penalties costing U.S. firms billions of dollars.
264:
predicted the effect would top 2014 news as well, given the number of documents yet to be revealed. In China, the most profitable country for U.S. tech companies, all are "under suspicion as either witting or unwitting collaborators" in the NSA spying, according to the director of the
Research Center
187:
told
Congress that Snowden's disclosures had damaged U.S. intelligence capabilities. Rasmussen said the government knew of specific terrorists who, after learning from Snowden's leaks how the U.S. collected intelligence, had increased their security measures by using new types of encryption, changing
438:
reported, "The fallout from the Edward
Snowden fiasco wasn't just political—it was largely economic. Soon after the extent of the NSA's data collection became public, overseas customers (including the Brazilian government) started abandoning U.S.-based tech companies in droves over privacy concerns.
337:
executives in France, Hong Kong, Germany, the UK, and the U.S. confirmed that
Snowden's leaks directly impacted how companies around the world think about information and communication technologies, particularly cloud computing. A quarter of British and Canadian multinational companies surveyed were
308:
Since
Snowden's disclosures, Americans used the Internet less for things like email, online shopping and banking, according to an April 2014 poll. Also in April 2014, former NSA deputy director Col. Cedric Leighton told the Bloomberg Enterprise Technology Summit in New York City that Snowden's leaks
223:
as editor-in-chief "can be read as, in part, a deeply equivocal response on the part of the paper's staff, with its unusual power in the process of selecting a new editor, to the
Snowden story." According to Wolff, there had developed "a sense of journalistic queasiness around Snowden, difficult to
157:, degrading the intelligence community's capabilities. Snowden's leaks, said Clapper, damaged relationships with foreign and corporate stakeholders, restrained budget resources, and caused the U.S. to discontinue collecting intelligence on certain targets, putting the United States at greater risk.
171:
that
Snowden's disclosures had made it easier for terrorist groups to evade U.S. surveillance by changing their encryption methods. Olsen said intelligence collection against some individuals of concern had been lost, preventing insight into their activities. By July 2015,
1070:
289:, revelations from the NSA leaks "rocked the IT world" and had a "chilling effect." The three biggest impacts were seen as increased interest in encryption, business leaving U.S. companies, and a reconsideration of the safety of cloud technology. The
95:
defined the
Snowden effect as "Direct and indirect gains in public knowledge from the cascade of events and further reporting that followed Edward Snowden's leaks of classified information about the surveillance state in the U.S." In December 2013,
272:, a secure email provider that Snowden used, discontinued service after being asked for encryption keys that would have exposed to U.S. government prosecutors the emails of all 410,000 Lavabit users. The next day, a similar provider called
475:
situated this development within a "Post
Snowden Era" in which Apple would no longer comply with NSA and law enforcement requests for user data, instead maintaining that Apple doesn't possess the key to unlocking data on the
265:
for Chinese Politics and Business at Indiana University. The effect was also seen in changes to investment in the industry, with security "back on the map" according to Hussein Kanji, Venture Capitalist at Hoxton Ventures.
1039:
191:
Reflecting on the effect of his leaks, Snowden himself wrote in February 2015 that "the biggest change has been in awareness. Before 2013, if you said the NSA was making records of everybody's phone calls and the
1078:
1489:
512:
373:
announced it had found a direct connection between Snowden's leaks and dramatic changes in how Islamist terrorists interacted online. (In 2010, the privately held Recorded Future received an investment from
56:'s mass surveillance program, exposed by Edward Snowden, was illegal and possibly unconstitutional. They also stated that the US intelligence leaders, who publicly defended it, were not telling the truth.
644:
1563:
808:
670:
1323:
322:, predicted that the United States cloud computing industry could lose $ 35 billion by 2016. Matthias Kunisch, a German software executive who switched from U.S. cloud computing providers to
1202:
1101:
467:, "not only killed recent efforts to expand the law, but also made nations around the world suspicious that every piece of American hardware and software—from phones to servers made by
1356:
895:
110:
would let foreign customers store their personal data on servers outside America as a sign that Snowden's leaks were leading countries and companies to erect borders in cyberspace. In
1628:
79:, and served as the impetus for new products that address privacy concerns such as encryption services. Collectively, these impacts have been referred to by media and others as the "
1232:
1014:
753:
1378:
276:
announced that it too would shut down because it was not possible to sufficiently secure email. In October 2013, the two companies joined forces and announced a new email service,
1163:
1047:
136:
1293:
864:
1429:
1263:
319:
253:
1485:
520:
957:
722:
926:
636:
318:
reported that economic fallout from Snowden's leaks had been a boon for foreign companies, to the detriment of U.S. firms. Daniel Castro, a senior analyst at the
176:
had studied Snowden's disclosures and, said U.S. officials, its leaders were using couriers or encrypted communications that Western analysts could not crack.
1567:
805:
390:
and associated groups completely overhauled their 7-year-old encryption methods, which included "homebrewed" algorithms, adopting instead more sophisticated
666:
333:
summarized the impact of Snowden's revelations on U.S. businesses. The erosion of trust, said the report, has had serious consequences for U.S. tech firms.
236:
In the technology industry, the Snowden effect had a profound impact after it was revealed that the NSA was tapping into the information held by some U.S.
582:
551:
283:
After revelations that German Chancellor Angela Merkel's mobile was being tapped, the tech industry rushed to create a secure cell phone. According to
260:
named "the Snowden effect" as 2013's top tech story, saying Snowden's leaks "taught businesses that the convenience of the cloud cuts both ways." The
1459:
1315:
1132:
463:, which encrypts all data inside it, as demonstrating how Snowden's impact had begun to work its way into consumer products. His revelations said
1194:
613:
1598:
1109:
988:
193:
1346:
887:
1621:
745:
1024:
297:
called "a phone for the age of Snowden"—described as "a smartphone explicitly designed for security and privacy," created by the makers of
173:
1224:
780:
1393:
1171:
338:
moving their data outside the U.S. Among U.S. companies attributing drops in revenue to, in part, the fallout from Snowden's leaks was
1285:
147:
834:
180:
161:
1515:
856:
1255:
1419:
421:
monitoring firm Flashpoint Global Partners published a report that found "very little open-source information available via
484:
service, Apple will still be able to obtain some customer information stored on iCloud in response to government requests.
196:
was monitoring lawyers and journalists, people raised eyebrows and called you a conspiracy theorist. Those days are over."
949:
1656:
918:
714:
256:
published in August 2013 estimated that the cloud-based computing industry could have lost up to $ 35 billion by 2016.
124:
found that Snowden's disclosures had tarnished the image of the United States, especially in Europe and Latin America.
1541:
492:
480:. However, since the new security protects information stored on the device itself, but not data stored on Apple's
414:
399:
212:
574:
273:
102:
wrote that Snowden had sparked an overdue debate about national security and individual privacy. At the 2014
1661:
1424:
543:
21:
41:
from the electronic communications of United States citizens. Other disclosures included information about
1389:
334:
330:
857:"We are Edward Snowden, Laura Poitras and Glenn Greenwald from the Oscar-winning documentary CITIZENFOUR"
228:. Questioning Snowden's retreat to Russia and his protection by Vladimir Putin was internally verboten."
1451:
686:
1140:
605:
252:
lost business internationally due to the public outcry over their roles in NSA spying. A study by the
980:
391:
103:
1590:
302:
121:
76:
72:
1351:
816:
440:
314:
277:
184:
443:
estimated the losses may total 'as high as $ 180 billion,' or 25 percent of industry revenue."
776:
132:
68:
60:
366:
323:
164:
1379:"Surveillance Costs: The NSA's Impact on the Economy, Internet Freedom & Cybersecurity"
1316:"Former NSA deputy director: Snowden leaks caused 'significant disservice' to the Internet"
116:, the effect was seen to have nearly united the U.S. Congress in opposition to the massive
812:
801:
699:
379:
370:
355:
237:
220:
128:
53:
38:
1564:"Measuring the Impact of the Snowden Leaks on the Use of Encryption by Online Jihadists"
667:"Global Opposition to U.S. Surveillance and Drones, but Limited Harm to America's Image"
120:
domestic intelligence gathering system. In its Spring 2014 Global Attitudes Survey, the
830:
30:
1650:
1511:
468:
362:
339:
154:
150:
140:
1020:
426:
395:
285:
207:
637:"The Snowden Effect Hits Congress: Will Effective Crowdsourced Lobbying Follow?"
386:.) Just months after Snowden's 2013 leaks, said Recorded Future, operatives of
45:, the agency's data collection program, a surveillance metadata collection and
456:
434:
298:
290:
98:
305:, provided encryption for phone calls, emails, texts, and Internet browsing.
403:
351:
201:
117:
107:
92:
46:
1486:"Big Data Firm Says It Can Link Snowden Data To Changed Terrorist Behavior"
1537:
422:
418:
387:
375:
343:
410:
269:
249:
64:
1133:"Silent Circle and Lavabit Team Up to Protect Your Email From the NSA"
1071:"Lavabit, Silent Circle shut down e-mail: What alternatives are left?"
513:"U.S. court: Mass surveillance program exposed by Snowden was illegal"
777:"Ex-counterterror chief: U.S. lost track of terrorists after Snowden"
489:
481:
477:
241:
112:
143:
train." A year later, 100,000 fewer people had security clearances.
919:"' Snowden Effect' Threatens U.S. Tech Industry's Global Ambitions"
471:—have 'back doors' for American intelligence and law enforcement."
460:
245:
42:
20:
1286:"Post Snowden, Some Internet Usage Is Contracting, Study Finds"
746:"Intelligence chief says Snowden leaks created 'perfect storm'"
495:
would have encryption enabled by default in upcoming versions.
188:
email addresses, or abandoning prior methods of communicating.
1102:"Email is broken – but Dark Mail Alliance is aiming to fix it"
383:
347:
168:
37:
contractor, leaked NSA documents that revealed the agency was
34:
75:, and have resulted in notable impacts on society and the
1622:"Signaling Post-Snowden Era, New iPhone Locks Out N.S.A."
1566:. Flashpoint Partners. September 16, 2014. Archived from
1040:"As F.B.I. Pursued Snowden, an E-Mail Service Stood Firm"
1008:
1006:
394:
and newly available downloads that enabled encryption on
52:
On September 2, 2020, a US federal court ruled that the
1620:
Sanger, David E.; Chen, Brian X. (September 26, 2014).
1347:"Revelations of N.S.A. Spying Cost U.S. Tech Companies"
575:"What the Press Should Learn From the 'Snowden Effect'"
1195:"Understanding Snowden's impact on IT... in 2 minutes"
1131:
Franceschi-Bicchieraioct, Lorenzo (October 30, 2013).
219:
for many years, asserted that the recent selection of
1420:"New Report: Snowden Revelations Hurt U.S. Companies"
1452:"How Al-Qaeda Uses Encryption Post-Snowden (Part 2)"
1225:"Das Blackphone soll die totale Ăśberwachung stoppen"
715:"Meet the Man Who's Gauging the Damage From Snowden"
439:
The dust hasn't settled yet, but tech-research firm
1038:Perlroth, Nicole; Shane, Scott (October 1, 2013).
981:"In China, U.S. tech firms weigh 'Snowden Effect'"
950:"Snowden Effect Dominates 2013 Tech Industry News"
806:ISIS Leader Takes Steps to Ensure Group's Survival
280:, designed to withstand government surveillance.
831:"Leaks Damaged U.S. Intelligence, Official Says"
320:Information Technology and Innovation Foundation
254:Information Technology and Innovation Foundation
127:In May 2014, the Obama administration appointed
59:Snowden's disclosures have fueled debates over
1479:
1477:
1016:The Snowden Effect: Impact on the Tech Sector
544:"The Snowden Effect: definition and examples"
8:
1164:"The Daunting Challenge of Secure E-mail"
406:, to help disguise their communications.
205:reported that the Snowden effect had hit
25:Edward Snowden in Moscow, October 9, 2013
16:Collective impact of Edward Snowden leaks
160:In October 2014, former Director of the
829:Aftergood, Steven (February 17, 2015).
504:
1631:from the original on February 10, 2021
1518:from the original on February 10, 2015
1484:Temple-Raston, Dina (August 1, 2014).
1345:Miller, Claire Cain (March 21, 2014).
695:
684:
669:. Pew Research Center. July 14, 2014.
585:from the original on February 26, 2014
554:from the original on February 28, 2015
137:National Counterintelligence Executive
135:specialty, as the new government-wide
1544:from the original on February 8, 2015
1462:from the original on December 7, 2017
1432:from the original on October 23, 2017
1205:from the original on January 30, 2014
960:from the original on February 3, 2014
929:from the original on February 3, 2014
867:from the original on January 22, 2020
833:. Federation of American Scientists.
713:Clark, Charles S. (August 15, 2014).
647:from the original on January 30, 2014
7:
1418:Dwoskin, Elizabeth (July 30, 2014).
1069:Tsukayama, Hayley (August 9, 2013).
979:Miller, Matthew (January 21, 2014).
948:Boulton, Clint (December 26, 2013).
573:Alterman, Eric (December 20, 2013).
131:, a former FBI special agent with a
1492:from the original on April 25, 2015
1359:from the original on March 17, 2015
1326:from the original on April 25, 2014
1235:from the original on August 1, 2015
1162:Green, Matthew (November 9, 2013).
898:from the original on March 23, 2015
837:from the original on April 20, 2017
783:from the original on April 12, 2019
756:from the original on April 11, 2015
744:Sink, Justin (September 18, 2014).
673:from the original on April 22, 2016
519:. September 2, 2020. Archived from
1589:Cappello, Lawrence (May 4, 2015).
1296:from the original on April 6, 2014
1266:from the original on March 1, 2014
1193:Hiner, Jason (November 26, 2013).
991:from the original on March 6, 2016
775:Liptak, Kevin (October 21, 2014).
616:from the original on March 2, 2014
382:firm whose primary partner is the
14:
917:Smith, Gerry (January 24, 2014).
886:Wolff, Michael (March 20, 2015).
148:Director of National Intelligence
106:, Internet experts saw news that
1601:from the original on May 5, 2015
1256:"A Phone for the Age of Snowden"
1100:Hern, Alex (December 31, 2013).
888:"Snowden effect hits 'Guardian'"
804:and Ben Hubbard (July 20, 2015)
725:from the original on May 5, 2016
604:Davos, L.S. (January 24, 2014).
181:National Counterterrorism Center
162:National Counterterrorism Center
1591:"Privacy and the Profit Motive"
153:said Snowden's leaks created a
329:In July 2014, the nonpartisan
1:
1392:. Summer 2014. Archived from
542:Rosen, Jay (July 5, 2013).
91:In July 2013, media critic
1678:
224:express at the party-line
67:, and the balance between
811:October 8, 2017, at the
1425:The Wall Street Journal
1290:The Wall Street Journal
954:The Wall Street Journal
258:The Wall Street Journal
1390:New America Foundation
694:Cite journal requires
548:Jay Rosen's PressThink
331:New America Foundation
26:
1399:on September 12, 2014
863:. February 23, 2015.
301:, Silent Circle, and
24:
1231:. January 15, 2014.
719:Government Executive
606:"The Snowden effect"
392:open-source software
238:cloud-based services
104:World Economic Forum
1657:Global surveillance
1081:on January 25, 2014
1075:The Washington Post
1027:on January 5, 2015.
523:on November 1, 2020
451:In September 2014,
409:In September 2014,
268:On August 8, 2013,
232:Technology industry
146:In September 2014,
122:Pew Research Center
73:information privacy
1625:The New York Times
1458:. August 1, 2014.
1352:The New York Times
1322:. April 24, 2014.
1254:Kopfstein, Janus.
1044:The New York Times
817:The New York Times
453:The New York Times
315:The New York Times
278:Dark Mail Alliance
185:Nicholas Rasmussen
179:In February 2015,
65:government secrecy
27:
1292:. April 3, 2014.
1174:on March 28, 2014
1112:on March 23, 2014
447:Consumer products
133:counter-terrorism
69:national security
61:mass surveillance
1669:
1641:
1640:
1638:
1636:
1617:
1611:
1610:
1608:
1606:
1586:
1580:
1579:
1577:
1575:
1570:on March 7, 2018
1560:
1554:
1553:
1551:
1549:
1534:
1528:
1527:
1525:
1523:
1508:
1502:
1501:
1499:
1497:
1481:
1472:
1471:
1469:
1467:
1448:
1442:
1441:
1439:
1437:
1415:
1409:
1408:
1406:
1404:
1398:
1383:
1375:
1369:
1368:
1366:
1364:
1342:
1336:
1335:
1333:
1331:
1312:
1306:
1305:
1303:
1301:
1282:
1276:
1275:
1273:
1271:
1251:
1245:
1244:
1242:
1240:
1221:
1215:
1214:
1212:
1210:
1190:
1184:
1183:
1181:
1179:
1170:. Archived from
1159:
1153:
1152:
1150:
1148:
1143:on March 6, 2014
1139:. Archived from
1128:
1122:
1121:
1119:
1117:
1108:. Archived from
1097:
1091:
1090:
1088:
1086:
1077:. Archived from
1066:
1060:
1059:
1057:
1055:
1046:. Archived from
1035:
1029:
1028:
1023:. Archived from
1013:Kanji, Hussein.
1010:
1001:
1000:
998:
996:
976:
970:
969:
967:
965:
945:
939:
938:
936:
934:
914:
908:
907:
905:
903:
883:
877:
876:
874:
872:
853:
847:
846:
844:
842:
826:
820:
799:
793:
792:
790:
788:
772:
766:
765:
763:
761:
741:
735:
734:
732:
730:
710:
704:
703:
697:
692:
690:
682:
680:
678:
663:
657:
656:
654:
652:
632:
626:
625:
623:
621:
601:
595:
594:
592:
590:
570:
564:
563:
561:
559:
539:
533:
532:
530:
528:
509:
400:Android products
367:web intelligence
361:In August 2014,
324:Deutsche Telekom
215:, who wrote for
165:Matthew G. Olsen
1677:
1676:
1672:
1671:
1670:
1668:
1667:
1666:
1647:
1646:
1645:
1644:
1634:
1632:
1619:
1618:
1614:
1604:
1602:
1588:
1587:
1583:
1573:
1571:
1562:
1561:
1557:
1547:
1545:
1536:
1535:
1531:
1521:
1519:
1512:"IQT Portfolio"
1510:
1509:
1505:
1495:
1493:
1483:
1482:
1475:
1465:
1463:
1456:Recorded Future
1450:
1449:
1445:
1435:
1433:
1417:
1416:
1412:
1402:
1400:
1396:
1381:
1377:
1376:
1372:
1362:
1360:
1344:
1343:
1339:
1329:
1327:
1314:
1313:
1309:
1299:
1297:
1284:
1283:
1279:
1269:
1267:
1253:
1252:
1248:
1238:
1236:
1223:
1222:
1218:
1208:
1206:
1192:
1191:
1187:
1177:
1175:
1161:
1160:
1156:
1146:
1144:
1130:
1129:
1125:
1115:
1113:
1099:
1098:
1094:
1084:
1082:
1068:
1067:
1063:
1053:
1051:
1050:on June 6, 2022
1037:
1036:
1032:
1012:
1011:
1004:
994:
992:
978:
977:
973:
963:
961:
947:
946:
942:
932:
930:
923:Huffington Post
916:
915:
911:
901:
899:
885:
884:
880:
870:
868:
855:
854:
850:
840:
838:
828:
827:
823:
813:Wayback Machine
802:Eric P. Schmitt
800:
796:
786:
784:
774:
773:
769:
759:
757:
743:
742:
738:
728:
726:
712:
711:
707:
693:
683:
676:
674:
665:
664:
660:
650:
648:
634:
633:
629:
619:
617:
603:
602:
598:
588:
586:
572:
571:
567:
557:
555:
541:
540:
536:
526:
524:
511:
510:
506:
501:
449:
380:venture capital
371:Recorded Future
356:Hewlett-Packard
312:In March 2014,
234:
221:Katharine Viner
199:In March 2015,
129:William Evanina
89:
54:US intelligence
39:collecting data
17:
12:
11:
5:
1675:
1673:
1665:
1664:
1662:Edward Snowden
1659:
1649:
1648:
1643:
1642:
1612:
1581:
1555:
1529:
1503:
1473:
1443:
1410:
1386:newamerica.net
1370:
1337:
1307:
1277:
1260:The New Yorker
1246:
1216:
1185:
1168:The New Yorker
1154:
1123:
1092:
1061:
1030:
1002:
971:
940:
909:
878:
848:
821:
794:
767:
736:
705:
696:|journal=
658:
627:
596:
565:
534:
503:
502:
500:
497:
448:
445:
378:, a nonprofit
295:The New Yorker
233:
230:
88:
85:
81:Snowden effect
31:Edward Snowden
15:
13:
10:
9:
6:
4:
3:
2:
1674:
1663:
1660:
1658:
1655:
1654:
1652:
1630:
1626:
1623:
1616:
1613:
1600:
1596:
1592:
1585:
1582:
1569:
1565:
1559:
1556:
1543:
1539:
1533:
1530:
1517:
1513:
1507:
1504:
1491:
1487:
1480:
1478:
1474:
1461:
1457:
1453:
1447:
1444:
1431:
1427:
1426:
1421:
1414:
1411:
1403:September 30,
1395:
1391:
1387:
1380:
1374:
1371:
1358:
1354:
1353:
1348:
1341:
1338:
1325:
1321:
1317:
1311:
1308:
1295:
1291:
1287:
1281:
1278:
1265:
1261:
1257:
1250:
1247:
1234:
1230:
1226:
1220:
1217:
1204:
1200:
1196:
1189:
1186:
1173:
1169:
1165:
1158:
1155:
1142:
1138:
1134:
1127:
1124:
1111:
1107:
1103:
1096:
1093:
1080:
1076:
1072:
1065:
1062:
1049:
1045:
1041:
1034:
1031:
1026:
1022:
1018:
1017:
1009:
1007:
1003:
990:
986:
982:
975:
972:
959:
955:
951:
944:
941:
928:
924:
920:
913:
910:
897:
893:
889:
882:
879:
866:
862:
858:
852:
849:
836:
832:
825:
822:
819:
818:
814:
810:
807:
803:
798:
795:
782:
778:
771:
768:
755:
751:
747:
740:
737:
724:
720:
716:
709:
706:
701:
688:
672:
668:
662:
659:
646:
642:
638:
635:Watson, Tom.
631:
628:
615:
611:
610:The Economist
607:
600:
597:
584:
580:
576:
569:
566:
553:
549:
545:
538:
535:
522:
518:
514:
508:
505:
498:
496:
494:
491:
487:
483:
479:
474:
470:
469:Cisco Systems
466:
462:
458:
454:
446:
444:
442:
437:
436:
432:In May 2015,
430:
428:
424:
420:
416:
412:
407:
405:
401:
397:
393:
389:
385:
381:
377:
372:
368:
364:
363:Massachusetts
359:
357:
353:
349:
345:
341:
340:Cisco Systems
336:
332:
327:
325:
321:
317:
316:
310:
306:
304:
300:
296:
292:
288:
287:
281:
279:
275:
274:Silent Circle
271:
266:
263:
259:
255:
251:
247:
243:
239:
231:
229:
227:
222:
218:
214:
213:Michael Wolff
211:. Journalist
210:
209:
204:
203:
197:
195:
189:
186:
182:
177:
175:
170:
166:
163:
158:
156:
155:perfect storm
152:
151:James Clapper
149:
144:
142:
138:
134:
130:
125:
123:
119:
115:
114:
109:
105:
101:
100:
94:
86:
84:
82:
78:
77:tech industry
74:
70:
66:
62:
57:
55:
50:
48:
44:
40:
36:
32:
23:
19:
1633:. Retrieved
1624:
1615:
1603:. Retrieved
1594:
1584:
1572:. Retrieved
1568:the original
1558:
1548:February 10,
1546:. Retrieved
1540:. In-Q-Tel.
1532:
1522:February 10,
1520:. Retrieved
1514:. In-Q-Tel.
1506:
1494:. Retrieved
1464:. Retrieved
1455:
1446:
1434:. Retrieved
1423:
1413:
1401:. Retrieved
1394:the original
1385:
1373:
1361:. Retrieved
1350:
1340:
1328:. Retrieved
1319:
1310:
1298:. Retrieved
1289:
1280:
1268:. Retrieved
1259:
1249:
1237:. Retrieved
1229:heise online
1228:
1219:
1207:. Retrieved
1199:TechRepublic
1198:
1188:
1176:. Retrieved
1172:the original
1167:
1157:
1145:. Retrieved
1141:the original
1136:
1126:
1114:. Retrieved
1110:the original
1106:The Guardian
1105:
1095:
1083:. Retrieved
1079:the original
1074:
1064:
1052:. Retrieved
1048:the original
1043:
1033:
1025:the original
1021:Bloomberg TV
1015:
993:. Retrieved
984:
974:
962:. Retrieved
953:
943:
931:. Retrieved
922:
912:
900:. Retrieved
891:
881:
871:February 25,
869:. Retrieved
860:
851:
839:. Retrieved
824:
815:
797:
785:. Retrieved
770:
758:. Retrieved
749:
739:
727:. Retrieved
718:
708:
687:cite journal
675:. Retrieved
661:
649:. Retrieved
640:
630:
618:. Retrieved
609:
599:
587:. Retrieved
578:
568:
558:February 18,
556:. Retrieved
547:
537:
527:September 2,
525:. Retrieved
521:the original
516:
507:
485:
472:
464:
457:Apple Inc.'s
452:
450:
433:
431:
427:social media
408:
360:
328:
313:
311:
307:
294:
286:TechRepublic
284:
282:
267:
261:
257:
235:
225:
217:The Guardian
216:
208:The Guardian
206:
200:
198:
190:
178:
159:
145:
126:
111:
97:
90:
80:
58:
51:
28:
18:
1574:October 29,
1538:"About IQT"
1466:December 5,
1436:October 29,
1209:February 1,
995:February 1,
964:February 1,
933:February 1,
841:October 29,
677:October 29,
488:added that
33:, a former
1651:Categories
1595:The Nation
579:The Nation
499:References
459:update of
435:The Nation
396:cellphones
299:GeeksPhone
291:Blackphone
99:The Nation
87:On society
1635:April 11,
1363:April 11,
1330:April 25,
1239:April 11,
1178:March 16,
1147:March 16,
1116:March 16,
1085:March 16,
1054:March 16,
902:March 26,
892:USA Today
787:April 11,
760:April 11,
729:April 11,
486:The Times
473:The Times
465:The Times
455:credited
441:Forrester
352:Microsoft
202:USA Today
183:director
118:post-9/11
108:Microsoft
93:Jay Rosen
47:XKeyscore
29:In 2013,
1629:Archived
1599:Archived
1542:Archived
1516:Archived
1496:April 5,
1490:Archived
1460:Archived
1430:Archived
1357:Archived
1324:Archived
1300:April 6,
1294:Archived
1270:March 2,
1264:Archived
1233:Archived
1203:Archived
1137:Mashable
989:Archived
958:Archived
927:Archived
896:Archived
865:Archived
835:Archived
809:Archived
781:Archived
754:Archived
750:The Hill
723:Archived
671:Archived
651:March 2,
645:Archived
620:March 2,
614:Archived
589:March 2,
583:Archived
552:Archived
490:Google's
419:Dark web
415:Deep Web
388:al-Qaeda
376:In-Q-Tel
344:Qualcomm
293:, which
250:AT&T
226:Guardian
1488:. NPR.
985:Reuters
779:. CNN.
517:Reuters
493:Android
425:online
413:-based
411:Seattle
365:-based
270:Lavabit
262:Journal
1605:May 4,
861:Reddit
641:Forbes
482:iCloud
478:iPhone
423:jihadi
402:, and
354:, and
248:, and
242:Google
113:Forbes
1397:(PDF)
1382:(PDF)
1320:ZDNet
461:iOS 8
369:firm
246:Cisco
167:told
141:Acela
43:PRISM
1637:2015
1607:2015
1576:2017
1550:2015
1524:2015
1498:2018
1468:2017
1438:2017
1405:2014
1365:2015
1332:2014
1302:2014
1272:2014
1241:2015
1211:2014
1180:2014
1149:2014
1118:2014
1087:2014
1056:2014
997:2014
966:2014
935:2014
904:2015
873:2015
843:2017
789:2015
762:2015
731:2015
700:help
679:2017
653:2014
622:2014
591:2014
560:2015
529:2020
417:and
404:Macs
194:GCHQ
174:ISIL
71:and
384:CIA
348:IBM
303:PGP
169:CNN
83:".
35:NSA
1653::
1627:.
1597:.
1593:.
1476:^
1454:.
1428:.
1422:.
1388:.
1384:.
1355:.
1349:.
1318:.
1288:.
1262:.
1258:.
1227:.
1201:.
1197:.
1166:.
1135:.
1104:.
1073:.
1042:.
1019:.
1005:^
987:.
983:.
956:.
952:.
925:.
921:.
894:.
890:.
859:.
752:.
748:.
721:.
717:.
691::
689:}}
685:{{
643:.
639:.
612:.
608:.
581:.
577:.
550:.
546:.
515:.
398:,
350:,
346:,
342:,
335:IT
244:,
240:.
63:,
1639:.
1609:.
1578:.
1552:.
1526:.
1500:.
1470:.
1440:.
1407:.
1367:.
1334:.
1304:.
1274:.
1243:.
1213:.
1182:.
1151:.
1120:.
1089:.
1058:.
999:.
968:.
937:.
906:.
875:.
845:.
791:.
764:.
733:.
702:)
698:(
681:.
655:.
624:.
593:.
562:.
531:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.