Knowledge

Snowden effect

Source đź“ť

309:
had performed a significant disservice to the worldwide health of the Internet by leading Brazil and other countries to reconsider the Internet's decentralized nature. Leighton suggested that nation-states' efforts to create their own versions of the Internet were the beginning of the end for the Internet as we know it. "When you have a situation where all of a sudden, everyone goes into 'tribal' mode—a German cloud, a Swiss cloud, or any other separate Internet—they are significant nationalistic attempts," said Leighton. "What happened with Snowden, it's more of an excuse than a policy, it's more of an excuse to re-nationalize the Internet."
22: 139:. "Instead of getting carried away with the concept of leakers as heroes," Evanina said in August, "we need to get back to the basics of what it means to be loyal. Undifferentiated, unauthorized leaking is a criminal act." While dealing with insider threats had been an intelligence community priority since WikiLeaks published Chelsea Manning's disclosures in 2010, Evanina said that in the aftermath of Snowden's June 2013 revelations, the process "sped up from a regional railway to the 429:" indicating that Snowden's leaks impelled al-Qaeda to develop more secure digital communications. "The underlying public encryption methods employed by online jihadists," the report concluded, "do not appear to have significantly changed since the emergence of Edward Snowden. Major recent technological advancements have focused primarily on expanding the use of encryption to instant messenger and mobile communications mediums." 326:, said that due to Snowden his customers thought American companies had connections to the NSA. Security analysts estimated that U.S. tech companies had since Snowden collectively spent millions and possibly billions of dollars adding state-of-the-art encryption features to consumer services and to the cables that link data centres. 49:, which supplies federated search capabilities for all NSA databases. Since that time, there have been perceptible increases in the general public's knowledge about the U.S. government's cybersecurity initiatives and awareness of how those initiatives have impacted the privacy of individuals, businesses and foreign governments. 358:. Proposed laws in more than a dozen foreign countries, including Germany, Brazil, and India, would make it harder for U.S. firms to do business there. The European Union is considering stricter domestic privacy legislation that could result in fines and penalties costing U.S. firms billions of dollars. 264:
predicted the effect would top 2014 news as well, given the number of documents yet to be revealed. In China, the most profitable country for U.S. tech companies, all are "under suspicion as either witting or unwitting collaborators" in the NSA spying, according to the director of the Research Center
187:
told Congress that Snowden's disclosures had damaged U.S. intelligence capabilities. Rasmussen said the government knew of specific terrorists who, after learning from Snowden's leaks how the U.S. collected intelligence, had increased their security measures by using new types of encryption, changing
438:
reported, "The fallout from the Edward Snowden fiasco wasn't just political—it was largely economic. Soon after the extent of the NSA's data collection became public, overseas customers (including the Brazilian government) started abandoning U.S.-based tech companies in droves over privacy concerns.
337:
executives in France, Hong Kong, Germany, the UK, and the U.S. confirmed that Snowden's leaks directly impacted how companies around the world think about information and communication technologies, particularly cloud computing. A quarter of British and Canadian multinational companies surveyed were
308:
Since Snowden's disclosures, Americans used the Internet less for things like email, online shopping and banking, according to an April 2014 poll. Also in April 2014, former NSA deputy director Col. Cedric Leighton told the Bloomberg Enterprise Technology Summit in New York City that Snowden's leaks
223:
as editor-in-chief "can be read as, in part, a deeply equivocal response on the part of the paper's staff, with its unusual power in the process of selecting a new editor, to the Snowden story." According to Wolff, there had developed "a sense of journalistic queasiness around Snowden, difficult to
157:, degrading the intelligence community's capabilities. Snowden's leaks, said Clapper, damaged relationships with foreign and corporate stakeholders, restrained budget resources, and caused the U.S. to discontinue collecting intelligence on certain targets, putting the United States at greater risk. 171:
that Snowden's disclosures had made it easier for terrorist groups to evade U.S. surveillance by changing their encryption methods. Olsen said intelligence collection against some individuals of concern had been lost, preventing insight into their activities. By July 2015,
1070: 289:, revelations from the NSA leaks "rocked the IT world" and had a "chilling effect." The three biggest impacts were seen as increased interest in encryption, business leaving U.S. companies, and a reconsideration of the safety of cloud technology. The 95:
defined the Snowden effect as "Direct and indirect gains in public knowledge from the cascade of events and further reporting that followed Edward Snowden's leaks of classified information about the surveillance state in the U.S." In December 2013,
272:, a secure email provider that Snowden used, discontinued service after being asked for encryption keys that would have exposed to U.S. government prosecutors the emails of all 410,000 Lavabit users. The next day, a similar provider called 475:
situated this development within a "Post Snowden Era" in which Apple would no longer comply with NSA and law enforcement requests for user data, instead maintaining that Apple doesn't possess the key to unlocking data on the
265:
for Chinese Politics and Business at Indiana University. The effect was also seen in changes to investment in the industry, with security "back on the map" according to Hussein Kanji, Venture Capitalist at Hoxton Ventures.
1039: 191:
Reflecting on the effect of his leaks, Snowden himself wrote in February 2015 that "the biggest change has been in awareness. Before 2013, if you said the NSA was making records of everybody's phone calls and the
1078: 1489: 512: 373:
announced it had found a direct connection between Snowden's leaks and dramatic changes in how Islamist terrorists interacted online. (In 2010, the privately held Recorded Future received an investment from
56:'s mass surveillance program, exposed by Edward Snowden, was illegal and possibly unconstitutional. They also stated that the US intelligence leaders, who publicly defended it, were not telling the truth. 644: 1563: 808: 670: 1323: 322:, predicted that the United States cloud computing industry could lose $ 35 billion by 2016. Matthias Kunisch, a German software executive who switched from U.S. cloud computing providers to 1202: 1101: 467:, "not only killed recent efforts to expand the law, but also made nations around the world suspicious that every piece of American hardware and software—from phones to servers made by 1356: 895: 110:
would let foreign customers store their personal data on servers outside America as a sign that Snowden's leaks were leading countries and companies to erect borders in cyberspace. In
1628: 79:, and served as the impetus for new products that address privacy concerns such as encryption services. Collectively, these impacts have been referred to by media and others as the " 1232: 1014: 753: 1378: 276:
announced that it too would shut down because it was not possible to sufficiently secure email. In October 2013, the two companies joined forces and announced a new email service,
1163: 1047: 136: 1293: 864: 1429: 1263: 319: 253: 1485: 520: 957: 722: 926: 636: 318:
reported that economic fallout from Snowden's leaks had been a boon for foreign companies, to the detriment of U.S. firms. Daniel Castro, a senior analyst at the
176:
had studied Snowden's disclosures and, said U.S. officials, its leaders were using couriers or encrypted communications that Western analysts could not crack.
1567: 805: 390:
and associated groups completely overhauled their 7-year-old encryption methods, which included "homebrewed" algorithms, adopting instead more sophisticated
666: 333:
summarized the impact of Snowden's revelations on U.S. businesses. The erosion of trust, said the report, has had serious consequences for U.S. tech firms.
236:
In the technology industry, the Snowden effect had a profound impact after it was revealed that the NSA was tapping into the information held by some U.S.
582: 551: 283:
After revelations that German Chancellor Angela Merkel's mobile was being tapped, the tech industry rushed to create a secure cell phone. According to
260:
named "the Snowden effect" as 2013's top tech story, saying Snowden's leaks "taught businesses that the convenience of the cloud cuts both ways." The
1459: 1315: 1132: 463:, which encrypts all data inside it, as demonstrating how Snowden's impact had begun to work its way into consumer products. His revelations said 1194: 613: 1598: 1109: 988: 193: 1346: 887: 1621: 745: 1024: 297:
called "a phone for the age of Snowden"—described as "a smartphone explicitly designed for security and privacy," created by the makers of
173: 1224: 780: 1393: 1171: 338:
moving their data outside the U.S. Among U.S. companies attributing drops in revenue to, in part, the fallout from Snowden's leaks was
1285: 147: 834: 180: 161: 1515: 856: 1255: 1419: 421:
monitoring firm Flashpoint Global Partners published a report that found "very little open-source information available via
484:
service, Apple will still be able to obtain some customer information stored on iCloud in response to government requests.
196:
was monitoring lawyers and journalists, people raised eyebrows and called you a conspiracy theorist. Those days are over."
949: 1656: 918: 714: 256:
published in August 2013 estimated that the cloud-based computing industry could have lost up to $ 35 billion by 2016.
124:
found that Snowden's disclosures had tarnished the image of the United States, especially in Europe and Latin America.
1541: 492: 480:. However, since the new security protects information stored on the device itself, but not data stored on Apple's 414: 399: 212: 574: 273: 102:
wrote that Snowden had sparked an overdue debate about national security and individual privacy. At the 2014
1661: 1424: 543: 21: 41:
from the electronic communications of United States citizens. Other disclosures included information about
1389: 334: 330: 857:"We are Edward Snowden, Laura Poitras and Glenn Greenwald from the Oscar-winning documentary CITIZENFOUR" 228:. Questioning Snowden's retreat to Russia and his protection by Vladimir Putin was internally verboten." 1451: 686: 1140: 605: 252:
lost business internationally due to the public outcry over their roles in NSA spying. A study by the
980: 391: 103: 1590: 302: 121: 76: 72: 1351: 816: 440: 314: 277: 184: 443:
estimated the losses may total 'as high as $ 180 billion,' or 25 percent of industry revenue."
776: 132: 68: 60: 366: 323: 164: 1379:"Surveillance Costs: The NSA's Impact on the Economy, Internet Freedom & Cybersecurity" 1316:"Former NSA deputy director: Snowden leaks caused 'significant disservice' to the Internet" 116:, the effect was seen to have nearly united the U.S. Congress in opposition to the massive 812: 801: 699: 379: 370: 355: 237: 220: 128: 53: 38: 1564:"Measuring the Impact of the Snowden Leaks on the Use of Encryption by Online Jihadists" 667:"Global Opposition to U.S. Surveillance and Drones, but Limited Harm to America's Image" 120:
domestic intelligence gathering system. In its Spring 2014 Global Attitudes Survey, the
830: 30: 1650: 1511: 468: 362: 339: 154: 150: 140: 1020: 426: 395: 285: 207: 637:"The Snowden Effect Hits Congress: Will Effective Crowdsourced Lobbying Follow?" 386:.) Just months after Snowden's 2013 leaks, said Recorded Future, operatives of 45:, the agency's data collection program, a surveillance metadata collection and 456: 434: 298: 290: 98: 305:, provided encryption for phone calls, emails, texts, and Internet browsing. 403: 351: 201: 117: 107: 92: 46: 1486:"Big Data Firm Says It Can Link Snowden Data To Changed Terrorist Behavior" 1537: 422: 418: 387: 375: 343: 410: 269: 249: 64: 1133:"Silent Circle and Lavabit Team Up to Protect Your Email From the NSA" 1071:"Lavabit, Silent Circle shut down e-mail: What alternatives are left?" 513:"U.S. court: Mass surveillance program exposed by Snowden was illegal" 777:"Ex-counterterror chief: U.S. lost track of terrorists after Snowden" 489: 481: 477: 241: 112: 143:
train." A year later, 100,000 fewer people had security clearances.
919:"' Snowden Effect' Threatens U.S. Tech Industry's Global Ambitions" 471:—have 'back doors' for American intelligence and law enforcement." 460: 245: 42: 20: 1286:"Post Snowden, Some Internet Usage Is Contracting, Study Finds" 746:"Intelligence chief says Snowden leaks created 'perfect storm'" 495:
would have encryption enabled by default in upcoming versions.
188:
email addresses, or abandoning prior methods of communicating.
1102:"Email is broken – but Dark Mail Alliance is aiming to fix it" 383: 347: 168: 37:
contractor, leaked NSA documents that revealed the agency was
34: 75:, and have resulted in notable impacts on society and the 1622:"Signaling Post-Snowden Era, New iPhone Locks Out N.S.A." 1566:. Flashpoint Partners. September 16, 2014. Archived from 1040:"As F.B.I. Pursued Snowden, an E-Mail Service Stood Firm" 1008: 1006: 394:
and newly available downloads that enabled encryption on
52:
On September 2, 2020, a US federal court ruled that the
1620:
Sanger, David E.; Chen, Brian X. (September 26, 2014).
1347:"Revelations of N.S.A. Spying Cost U.S. Tech Companies" 575:"What the Press Should Learn From the 'Snowden Effect'" 1195:"Understanding Snowden's impact on IT... in 2 minutes" 1131:
Franceschi-Bicchieraioct, Lorenzo (October 30, 2013).
219:
for many years, asserted that the recent selection of
1420:"New Report: Snowden Revelations Hurt U.S. Companies" 1452:"How Al-Qaeda Uses Encryption Post-Snowden (Part 2)" 1225:"Das Blackphone soll die totale Ăśberwachung stoppen" 715:"Meet the Man Who's Gauging the Damage From Snowden" 439:
The dust hasn't settled yet, but tech-research firm
1038:Perlroth, Nicole; Shane, Scott (October 1, 2013). 981:"In China, U.S. tech firms weigh 'Snowden Effect'" 950:"Snowden Effect Dominates 2013 Tech Industry News" 806:ISIS Leader Takes Steps to Ensure Group's Survival 280:, designed to withstand government surveillance. 831:"Leaks Damaged U.S. Intelligence, Official Says" 320:Information Technology and Innovation Foundation 254:Information Technology and Innovation Foundation 127:In May 2014, the Obama administration appointed 59:Snowden's disclosures have fueled debates over 1479: 1477: 1016:The Snowden Effect: Impact on the Tech Sector 544:"The Snowden Effect: definition and examples" 8: 1164:"The Daunting Challenge of Secure E-mail" 406:, to help disguise their communications. 205:reported that the Snowden effect had hit 25:Edward Snowden in Moscow, October 9, 2013 16:Collective impact of Edward Snowden leaks 160:In October 2014, former Director of the 829:Aftergood, Steven (February 17, 2015). 504: 1631:from the original on February 10, 2021 1518:from the original on February 10, 2015 1484:Temple-Raston, Dina (August 1, 2014). 1345:Miller, Claire Cain (March 21, 2014). 695: 684: 669:. Pew Research Center. July 14, 2014. 585:from the original on February 26, 2014 554:from the original on February 28, 2015 137:National Counterintelligence Executive 135:specialty, as the new government-wide 1544:from the original on February 8, 2015 1462:from the original on December 7, 2017 1432:from the original on October 23, 2017 1205:from the original on January 30, 2014 960:from the original on February 3, 2014 929:from the original on February 3, 2014 867:from the original on January 22, 2020 833:. Federation of American Scientists. 713:Clark, Charles S. (August 15, 2014). 647:from the original on January 30, 2014 7: 1418:Dwoskin, Elizabeth (July 30, 2014). 1069:Tsukayama, Hayley (August 9, 2013). 979:Miller, Matthew (January 21, 2014). 948:Boulton, Clint (December 26, 2013). 573:Alterman, Eric (December 20, 2013). 131:, a former FBI special agent with a 1492:from the original on April 25, 2015 1359:from the original on March 17, 2015 1326:from the original on April 25, 2014 1235:from the original on August 1, 2015 1162:Green, Matthew (November 9, 2013). 898:from the original on March 23, 2015 837:from the original on April 20, 2017 783:from the original on April 12, 2019 756:from the original on April 11, 2015 744:Sink, Justin (September 18, 2014). 673:from the original on April 22, 2016 519:. September 2, 2020. Archived from 1589:Cappello, Lawrence (May 4, 2015). 1296:from the original on April 6, 2014 1266:from the original on March 1, 2014 1193:Hiner, Jason (November 26, 2013). 991:from the original on March 6, 2016 775:Liptak, Kevin (October 21, 2014). 616:from the original on March 2, 2014 382:firm whose primary partner is the 14: 917:Smith, Gerry (January 24, 2014). 886:Wolff, Michael (March 20, 2015). 148:Director of National Intelligence 106:, Internet experts saw news that 1601:from the original on May 5, 2015 1256:"A Phone for the Age of Snowden" 1100:Hern, Alex (December 31, 2013). 888:"Snowden effect hits 'Guardian'" 804:and Ben Hubbard (July 20, 2015) 725:from the original on May 5, 2016 604:Davos, L.S. (January 24, 2014). 181:National Counterterrorism Center 162:National Counterterrorism Center 1591:"Privacy and the Profit Motive" 153:said Snowden's leaks created a 329:In July 2014, the nonpartisan 1: 1392:. Summer 2014. Archived from 542:Rosen, Jay (July 5, 2013). 91:In July 2013, media critic 1678: 224:express at the party-line 67:, and the balance between 811:October 8, 2017, at the 1425:The Wall Street Journal 1290:The Wall Street Journal 954:The Wall Street Journal 258:The Wall Street Journal 1390:New America Foundation 694:Cite journal requires 548:Jay Rosen's PressThink 331:New America Foundation 26: 1399:on September 12, 2014 863:. February 23, 2015. 301:, Silent Circle, and 24: 1231:. January 15, 2014. 719:Government Executive 606:"The Snowden effect" 392:open-source software 238:cloud-based services 104:World Economic Forum 1657:Global surveillance 1081:on January 25, 2014 1075:The Washington Post 1027:on January 5, 2015. 523:on November 1, 2020 451:In September 2014, 409:In September 2014, 268:On August 8, 2013, 232:Technology industry 146:In September 2014, 122:Pew Research Center 73:information privacy 1625:The New York Times 1458:. August 1, 2014. 1352:The New York Times 1322:. April 24, 2014. 1254:Kopfstein, Janus. 1044:The New York Times 817:The New York Times 453:The New York Times 315:The New York Times 278:Dark Mail Alliance 185:Nicholas Rasmussen 179:In February 2015, 65:government secrecy 27: 1292:. April 3, 2014. 1174:on March 28, 2014 1112:on March 23, 2014 447:Consumer products 133:counter-terrorism 69:national security 61:mass surveillance 1669: 1641: 1640: 1638: 1636: 1617: 1611: 1610: 1608: 1606: 1586: 1580: 1579: 1577: 1575: 1570:on March 7, 2018 1560: 1554: 1553: 1551: 1549: 1534: 1528: 1527: 1525: 1523: 1508: 1502: 1501: 1499: 1497: 1481: 1472: 1471: 1469: 1467: 1448: 1442: 1441: 1439: 1437: 1415: 1409: 1408: 1406: 1404: 1398: 1383: 1375: 1369: 1368: 1366: 1364: 1342: 1336: 1335: 1333: 1331: 1312: 1306: 1305: 1303: 1301: 1282: 1276: 1275: 1273: 1271: 1251: 1245: 1244: 1242: 1240: 1221: 1215: 1214: 1212: 1210: 1190: 1184: 1183: 1181: 1179: 1170:. Archived from 1159: 1153: 1152: 1150: 1148: 1143:on March 6, 2014 1139:. Archived from 1128: 1122: 1121: 1119: 1117: 1108:. Archived from 1097: 1091: 1090: 1088: 1086: 1077:. Archived from 1066: 1060: 1059: 1057: 1055: 1046:. Archived from 1035: 1029: 1028: 1023:. Archived from 1013:Kanji, Hussein. 1010: 1001: 1000: 998: 996: 976: 970: 969: 967: 965: 945: 939: 938: 936: 934: 914: 908: 907: 905: 903: 883: 877: 876: 874: 872: 853: 847: 846: 844: 842: 826: 820: 799: 793: 792: 790: 788: 772: 766: 765: 763: 761: 741: 735: 734: 732: 730: 710: 704: 703: 697: 692: 690: 682: 680: 678: 663: 657: 656: 654: 652: 632: 626: 625: 623: 621: 601: 595: 594: 592: 590: 570: 564: 563: 561: 559: 539: 533: 532: 530: 528: 509: 400:Android products 367:web intelligence 361:In August 2014, 324:Deutsche Telekom 215:, who wrote for 165:Matthew G. Olsen 1677: 1676: 1672: 1671: 1670: 1668: 1667: 1666: 1647: 1646: 1645: 1644: 1634: 1632: 1619: 1618: 1614: 1604: 1602: 1588: 1587: 1583: 1573: 1571: 1562: 1561: 1557: 1547: 1545: 1536: 1535: 1531: 1521: 1519: 1512:"IQT Portfolio" 1510: 1509: 1505: 1495: 1493: 1483: 1482: 1475: 1465: 1463: 1456:Recorded Future 1450: 1449: 1445: 1435: 1433: 1417: 1416: 1412: 1402: 1400: 1396: 1381: 1377: 1376: 1372: 1362: 1360: 1344: 1343: 1339: 1329: 1327: 1314: 1313: 1309: 1299: 1297: 1284: 1283: 1279: 1269: 1267: 1253: 1252: 1248: 1238: 1236: 1223: 1222: 1218: 1208: 1206: 1192: 1191: 1187: 1177: 1175: 1161: 1160: 1156: 1146: 1144: 1130: 1129: 1125: 1115: 1113: 1099: 1098: 1094: 1084: 1082: 1068: 1067: 1063: 1053: 1051: 1050:on June 6, 2022 1037: 1036: 1032: 1012: 1011: 1004: 994: 992: 978: 977: 973: 963: 961: 947: 946: 942: 932: 930: 923:Huffington Post 916: 915: 911: 901: 899: 885: 884: 880: 870: 868: 855: 854: 850: 840: 838: 828: 827: 823: 813:Wayback Machine 802:Eric P. Schmitt 800: 796: 786: 784: 774: 773: 769: 759: 757: 743: 742: 738: 728: 726: 712: 711: 707: 693: 683: 676: 674: 665: 664: 660: 650: 648: 634: 633: 629: 619: 617: 603: 602: 598: 588: 586: 572: 571: 567: 557: 555: 541: 540: 536: 526: 524: 511: 510: 506: 501: 449: 380:venture capital 371:Recorded Future 356:Hewlett-Packard 312:In March 2014, 234: 221:Katharine Viner 199:In March 2015, 129:William Evanina 89: 54:US intelligence 39:collecting data 17: 12: 11: 5: 1675: 1673: 1665: 1664: 1662:Edward Snowden 1659: 1649: 1648: 1643: 1642: 1612: 1581: 1555: 1529: 1503: 1473: 1443: 1410: 1386:newamerica.net 1370: 1337: 1307: 1277: 1260:The New Yorker 1246: 1216: 1185: 1168:The New Yorker 1154: 1123: 1092: 1061: 1030: 1002: 971: 940: 909: 878: 848: 821: 794: 767: 736: 705: 696:|journal= 658: 627: 596: 565: 534: 503: 502: 500: 497: 448: 445: 378:, a nonprofit 295:The New Yorker 233: 230: 88: 85: 81:Snowden effect 31:Edward Snowden 15: 13: 10: 9: 6: 4: 3: 2: 1674: 1663: 1660: 1658: 1655: 1654: 1652: 1630: 1626: 1623: 1616: 1613: 1600: 1596: 1592: 1585: 1582: 1569: 1565: 1559: 1556: 1543: 1539: 1533: 1530: 1517: 1513: 1507: 1504: 1491: 1487: 1480: 1478: 1474: 1461: 1457: 1453: 1447: 1444: 1431: 1427: 1426: 1421: 1414: 1411: 1403:September 30, 1395: 1391: 1387: 1380: 1374: 1371: 1358: 1354: 1353: 1348: 1341: 1338: 1325: 1321: 1317: 1311: 1308: 1295: 1291: 1287: 1281: 1278: 1265: 1261: 1257: 1250: 1247: 1234: 1230: 1226: 1220: 1217: 1204: 1200: 1196: 1189: 1186: 1173: 1169: 1165: 1158: 1155: 1142: 1138: 1134: 1127: 1124: 1111: 1107: 1103: 1096: 1093: 1080: 1076: 1072: 1065: 1062: 1049: 1045: 1041: 1034: 1031: 1026: 1022: 1018: 1017: 1009: 1007: 1003: 990: 986: 982: 975: 972: 959: 955: 951: 944: 941: 928: 924: 920: 913: 910: 897: 893: 889: 882: 879: 866: 862: 858: 852: 849: 836: 832: 825: 822: 819: 818: 814: 810: 807: 803: 798: 795: 782: 778: 771: 768: 755: 751: 747: 740: 737: 724: 720: 716: 709: 706: 701: 688: 672: 668: 662: 659: 646: 642: 638: 635:Watson, Tom. 631: 628: 615: 611: 610:The Economist 607: 600: 597: 584: 580: 576: 569: 566: 553: 549: 545: 538: 535: 522: 518: 514: 508: 505: 498: 496: 494: 491: 487: 483: 479: 474: 470: 469:Cisco Systems 466: 462: 458: 454: 446: 444: 442: 437: 436: 432:In May 2015, 430: 428: 424: 420: 416: 412: 407: 405: 401: 397: 393: 389: 385: 381: 377: 372: 368: 364: 363:Massachusetts 359: 357: 353: 349: 345: 341: 340:Cisco Systems 336: 332: 327: 325: 321: 317: 316: 310: 306: 304: 300: 296: 292: 288: 287: 281: 279: 275: 274:Silent Circle 271: 266: 263: 259: 255: 251: 247: 243: 239: 231: 229: 227: 222: 218: 214: 213:Michael Wolff 211:. Journalist 210: 209: 204: 203: 197: 195: 189: 186: 182: 177: 175: 170: 166: 163: 158: 156: 155:perfect storm 152: 151:James Clapper 149: 144: 142: 138: 134: 130: 125: 123: 119: 115: 114: 109: 105: 101: 100: 94: 86: 84: 82: 78: 77:tech industry 74: 70: 66: 62: 57: 55: 50: 48: 44: 40: 36: 32: 23: 19: 1633:. Retrieved 1624: 1615: 1603:. Retrieved 1594: 1584: 1572:. Retrieved 1568:the original 1558: 1548:February 10, 1546:. Retrieved 1540:. In-Q-Tel. 1532: 1522:February 10, 1520:. Retrieved 1514:. In-Q-Tel. 1506: 1494:. Retrieved 1464:. Retrieved 1455: 1446: 1434:. Retrieved 1423: 1413: 1401:. Retrieved 1394:the original 1385: 1373: 1361:. Retrieved 1350: 1340: 1328:. Retrieved 1319: 1310: 1298:. Retrieved 1289: 1280: 1268:. Retrieved 1259: 1249: 1237:. Retrieved 1229:heise online 1228: 1219: 1207:. Retrieved 1199:TechRepublic 1198: 1188: 1176:. Retrieved 1172:the original 1167: 1157: 1145:. Retrieved 1141:the original 1136: 1126: 1114:. Retrieved 1110:the original 1106:The Guardian 1105: 1095: 1083:. Retrieved 1079:the original 1074: 1064: 1052:. Retrieved 1048:the original 1043: 1033: 1025:the original 1021:Bloomberg TV 1015: 993:. Retrieved 984: 974: 962:. Retrieved 953: 943: 931:. Retrieved 922: 912: 900:. Retrieved 891: 881: 871:February 25, 869:. Retrieved 860: 851: 839:. Retrieved 824: 815: 797: 785:. Retrieved 770: 758:. Retrieved 749: 739: 727:. Retrieved 718: 708: 687:cite journal 675:. Retrieved 661: 649:. Retrieved 640: 630: 618:. Retrieved 609: 599: 587:. Retrieved 578: 568: 558:February 18, 556:. Retrieved 547: 537: 527:September 2, 525:. Retrieved 521:the original 516: 507: 485: 472: 464: 457:Apple Inc.'s 452: 450: 433: 431: 427:social media 408: 360: 328: 313: 311: 307: 294: 286:TechRepublic 284: 282: 267: 261: 257: 235: 225: 217:The Guardian 216: 208:The Guardian 206: 200: 198: 190: 178: 159: 145: 126: 111: 97: 90: 80: 58: 51: 28: 18: 1574:October 29, 1538:"About IQT" 1466:December 5, 1436:October 29, 1209:February 1, 995:February 1, 964:February 1, 933:February 1, 841:October 29, 677:October 29, 488:added that 33:, a former 1651:Categories 1595:The Nation 579:The Nation 499:References 459:update of 435:The Nation 396:cellphones 299:GeeksPhone 291:Blackphone 99:The Nation 87:On society 1635:April 11, 1363:April 11, 1330:April 25, 1239:April 11, 1178:March 16, 1147:March 16, 1116:March 16, 1085:March 16, 1054:March 16, 902:March 26, 892:USA Today 787:April 11, 760:April 11, 729:April 11, 486:The Times 473:The Times 465:The Times 455:credited 441:Forrester 352:Microsoft 202:USA Today 183:director 118:post-9/11 108:Microsoft 93:Jay Rosen 47:XKeyscore 29:In 2013, 1629:Archived 1599:Archived 1542:Archived 1516:Archived 1496:April 5, 1490:Archived 1460:Archived 1430:Archived 1357:Archived 1324:Archived 1300:April 6, 1294:Archived 1270:March 2, 1264:Archived 1233:Archived 1203:Archived 1137:Mashable 989:Archived 958:Archived 927:Archived 896:Archived 865:Archived 835:Archived 809:Archived 781:Archived 754:Archived 750:The Hill 723:Archived 671:Archived 651:March 2, 645:Archived 620:March 2, 614:Archived 589:March 2, 583:Archived 552:Archived 490:Google's 419:Dark web 415:Deep Web 388:al-Qaeda 376:In-Q-Tel 344:Qualcomm 293:, which 250:AT&T 226:Guardian 1488:. NPR. 985:Reuters 779:. CNN. 517:Reuters 493:Android 425:online 413:-based 411:Seattle 365:-based 270:Lavabit 262:Journal 1605:May 4, 861:Reddit 641:Forbes 482:iCloud 478:iPhone 423:jihadi 402:, and 354:, and 248:, and 242:Google 113:Forbes 1397:(PDF) 1382:(PDF) 1320:ZDNet 461:iOS 8 369:firm 246:Cisco 167:told 141:Acela 43:PRISM 1637:2015 1607:2015 1576:2017 1550:2015 1524:2015 1498:2018 1468:2017 1438:2017 1405:2014 1365:2015 1332:2014 1302:2014 1272:2014 1241:2015 1211:2014 1180:2014 1149:2014 1118:2014 1087:2014 1056:2014 997:2014 966:2014 935:2014 904:2015 873:2015 843:2017 789:2015 762:2015 731:2015 700:help 679:2017 653:2014 622:2014 591:2014 560:2015 529:2020 417:and 404:Macs 194:GCHQ 174:ISIL 71:and 384:CIA 348:IBM 303:PGP 169:CNN 83:". 35:NSA 1653:: 1627:. 1597:. 1593:. 1476:^ 1454:. 1428:. 1422:. 1388:. 1384:. 1355:. 1349:. 1318:. 1288:. 1262:. 1258:. 1227:. 1201:. 1197:. 1166:. 1135:. 1104:. 1073:. 1042:. 1019:. 1005:^ 987:. 983:. 956:. 952:. 925:. 921:. 894:. 890:. 859:. 752:. 748:. 721:. 717:. 691:: 689:}} 685:{{ 643:. 639:. 612:. 608:. 581:. 577:. 550:. 546:. 515:. 398:, 350:, 346:, 342:, 335:IT 244:, 240:. 63:, 1639:. 1609:. 1578:. 1552:. 1526:. 1500:. 1470:. 1440:. 1407:. 1367:. 1334:. 1304:. 1274:. 1243:. 1213:. 1182:. 1151:. 1120:. 1089:. 1058:. 999:. 968:. 937:. 906:. 875:. 845:. 791:. 764:. 733:. 702:) 698:( 681:. 655:. 624:. 593:. 562:. 531:.

Index


Edward Snowden
NSA
collecting data
PRISM
XKeyscore
US intelligence
mass surveillance
government secrecy
national security
information privacy
tech industry
Jay Rosen
The Nation
World Economic Forum
Microsoft
Forbes
post-9/11
Pew Research Center
William Evanina
counter-terrorism
National Counterintelligence Executive
Acela
Director of National Intelligence
James Clapper
perfect storm
National Counterterrorism Center
Matthew G. Olsen
CNN
ISIL

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑