-
Drug manufacturers could afford to sell AIDS drugs in Africa at virtually any discount. The companies said they did not do so because Africa lacked the requisite infrastructure.
-
Nothing is absolute in security.
-
The gravest risks from al Qaeda combine its affinity for big targets and its announced desire for weapons of mass destruction.
-
Even complex passwords are getting easy to break if they're too short. That's because today's inexpensive computer chips have the power of supercomputers from the year 2000.
-
Unsettling signs of al Qaeda's aims and skills in cyberspace have led some government experts to conclude that terrorists are at the threshold of using the Internet as a direct instrument of bloodshed.
-
In the wealthy industrialized nations, effective drug therapies against AIDS became available - AZT as early as 1987, then combinations of antiretroviral agents in 1996. The new drugs offered hope that fatal complications might be staved off and AIDS rendered a chronic condition.
-
In general, states do not count on pledges of 'no more war' from their neighbors. Israel's army never counted on it from Egypt, for example.
-
Everyone and his Big Brother wants to log your browsing habits, the better to build a profile of who you are and how you live your life - online and off. Search engine companies offer a benefit in return: more relevant search results. The more they know about you, the better they can tailor information to your needs.
-
The first reports of AIDS closely followed the inauguration of President Ronald Reagan, whose 'family values' agenda and alliance with Christian conservatives associated AIDS with deviance and sin.
-
I don't think Cheney started off in 2000 with a burning desire to become vice-president. I think the prospect gradually became more appealing, and he goosed the process.
-
If Iraq had succeeded in spray-drying anthrax spores to extend their life and lethality, that would have been among the most important secrets of its wide-ranging weapons program.
-
Given the volume of PC sales and the way McAfee runs its operation, I imagine there must be thousands of phantom subscribers - folks who signed up once upon a time and left the software behind two or three computers ago.
-
U.S. intelligence services routinely use collection methods against foreigners that foreseeably - with certainty - ingest high volumes of U.S. communications as well.
-
During the morning rush hour on March 20, 1995, the Japanese cult Aum Shinrikyo placed packages on five subway trains converging on Tokyo's central station. When punctured, the packages spread vaporized Sarin through the subway cars and then into the stations as the trains pulled in.
-
We know what's in our Cheerios and in our retirement accounts because the law requires disclosure.
-
There's a long history of private-company cooperation with the NSA that dates back to at least the 1970s.
-
Federal prosecutors want to indict Julian Assange for making public a great many classified documents.
-
Early in 1986, the World Health Organization in Geneva still regarded AIDS as an ailment of the promiscuous few.
-
Cheney was among the best secretaries of defence the country has ever had. He was a very effective White House chief of staff. He did not make many enemies, and he had the ability to persuade people with that soft tone and very reasonable style of his. He's always been exceptionally good as the right-hand man.
-
As digital communications have multiplied, and NSA capabilities with them, the agency has shifted resources from surveillance of individual targets to the acquisition of communications on a planetary scale.
-
Why does it appear that interested readers so often attribute flaws to 'the press' rather than taking particular issue with particular reports?
-
Obama's ascendancy unhinged the radical right, offering a unified target to competing camps of racial, nativist and religious animus.
-
Governors normally have jurisdiction over public health emergencies, but a widespread biological attack would cross state boundaries.
-
I've always shied away from online data storage. I don't even use my employers' network drives for anything sensitive. I want to control access myself.