-
No one ought to be under any illusion that Cheney privately thinks himself a failure.
-
I'm a journalist and author. I make my living by finding things out and writing about them.
-
The gravest risks from al Qaeda combine its affinity for big targets and its announced desire for weapons of mass destruction.
-
In the wealthy industrialized nations, effective drug therapies against AIDS became available - AZT as early as 1987, then combinations of antiretroviral agents in 1996. The new drugs offered hope that fatal complications might be staved off and AIDS rendered a chronic condition.
-
Even complex passwords are getting easy to break if they're too short. That's because today's inexpensive computer chips have the power of supercomputers from the year 2000.
-
In general, states do not count on pledges of 'no more war' from their neighbors. Israel's army never counted on it from Egypt, for example.
-
Everyone and his Big Brother wants to log your browsing habits, the better to build a profile of who you are and how you live your life - online and off. Search engine companies offer a benefit in return: more relevant search results. The more they know about you, the better they can tailor information to your needs.
-
The first reports of AIDS closely followed the inauguration of President Ronald Reagan, whose 'family values' agenda and alliance with Christian conservatives associated AIDS with deviance and sin.
-
Unsettling signs of al Qaeda's aims and skills in cyberspace have led some government experts to conclude that terrorists are at the threshold of using the Internet as a direct instrument of bloodshed.
-
Given the volume of PC sales and the way McAfee runs its operation, I imagine there must be thousands of phantom subscribers - folks who signed up once upon a time and left the software behind two or three computers ago.
-
U.S. intelligence services routinely use collection methods against foreigners that foreseeably - with certainty - ingest high volumes of U.S. communications as well.
-
I don't think Cheney started off in 2000 with a burning desire to become vice-president. I think the prospect gradually became more appealing, and he goosed the process.
-
There's a long history of private-company cooperation with the NSA that dates back to at least the 1970s.
-
Cheney was among the best secretaries of defence the country has ever had. He was a very effective White House chief of staff. He did not make many enemies, and he had the ability to persuade people with that soft tone and very reasonable style of his. He's always been exceptionally good as the right-hand man.
-
During the morning rush hour on March 20, 1995, the Japanese cult Aum Shinrikyo placed packages on five subway trains converging on Tokyo's central station. When punctured, the packages spread vaporized Sarin through the subway cars and then into the stations as the trains pulled in.
-
The first and pivotal negotiations over global access to AIDS drugs began in Geneva in 1991. They lasted two years, but confidential minutes suggest they were doomed the first day.
-
If Iraq had succeeded in spray-drying anthrax spores to extend their life and lethality, that would have been among the most important secrets of its wide-ranging weapons program.
-
Why does it appear that interested readers so often attribute flaws to 'the press' rather than taking particular issue with particular reports?
-
Obama's ascendancy unhinged the radical right, offering a unified target to competing camps of racial, nativist and religious animus.
-
We know what's in our Cheerios and in our retirement accounts because the law requires disclosure.
-
I've always shied away from online data storage. I don't even use my employers' network drives for anything sensitive. I want to control access myself.
-
Federal prosecutors want to indict Julian Assange for making public a great many classified documents.
-
The surveillance of ordinary people is far greater than I would have imagined and far greater than the American public has been able to debate.
-
You don't need to be a spook to care about encryption. If you travel with your computer or keep it in a place where other people can put their hands on it, you're vulnerable.