-
Governors normally have jurisdiction over public health emergencies, but a widespread biological attack would cross state boundaries.
-
The Patriot Act unleashed the FBI to search your email, travel and credit records without even a suspicion of wrongdoing.
-
The NSA is forbidden to 'target' American citizens, green-card holders or companies for surveillance without an individual warrant from a judge.
-
Early in 1986, the World Health Organization in Geneva still regarded AIDS as an ailment of the promiscuous few.
-
Stuxnet, a computer worm reportedly developed by the United States and Israel that destroyed Iranian nuclear centrifuges in attacks in 2009 and 2010, is often cited as the most dramatic use of a cyber weapon.
-
The causes and severity of NSA infractions vary widely. One in 10 incidents is attributed to a typographical error in which an analyst enters an incorrect query and retrieves data about U.S phone calls or emails.
-
The NSA has different reporting requirements for each branch of government and each of its legal authorities.
-
When the 'New York Times' revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous.
-
The United States, a signatory to the Chemical Weapons Convention, destroyed the last of its stocks of VX and other chemical agents on the Johnston Atoll, 825 miles southwest of Hawaii, in November 2000.
-
White House officials acknowledge in broad terms that a president's time and public rhetoric are among his most valuable policy tools.
-
In the field of biological weapons, there is almost no prospect of detecting a pathogen until it has been used in an attack.
-
The U.S. government has known since the early 1990s about Soviet-era smallpox weapons, and collected circumstantial evidence of programs elsewhere.
-
I have no evidence of any relationship between IRS and NSA.
-
As digital communications have multiplied, and NSA capabilities with them, the agency has shifted resources from surveillance of individual targets to the acquisition of communications on a planetary scale.
-
Clinton saw himself much more as the steward of alliances and of consensus that moved in the right direction. He didn't see himself as someone who could change the overall thrust, I think, of global policy.
-
Holding our own government to account for the use of its power is, in my view, the highest mission of a U.S. news organization.
-
As militias go, the Ohio Defense Force is on the moderate side.
-
NoScript is probably the most important privacy tool, but it costs you in convenience.
-
Cloud services cut both ways in terms of security: you get off-site backup and disaster recovery, but you entrust your secrets to somebody else's hands. Doing the latter increases your exposure to government surveillance and the potential for deliberate or inadvertent breaches of your confidential files.
-
Ghostery lets you spy on the spies in your computer. For each web page you visit, this extension uncloaks some - but not all - of the invisible tracking software that is working behind the scenes.
-
Most people inside the bureau believe that the blown opportunities to head off 9/11 would not recur today. Even among the FBI's doubters, few disagree that the bureau has come a long way.
-
Doctrines don't govern policy. They provide a conceptual framework by which policymakers approach their decisions. But there is no such thing as a doctrine that controls policy in every way.
-
The government of Sudan, employing a back channel direct from its president to the Central Intelligence Agency, offered in the early spring of 1996 to arrest Osama bin Laden and place him in Saudi custody, according to officials and former officials in all three countries.
-
China and Russia are regarded as the most formidable cyber threats.