-
Governors normally have jurisdiction over public health emergencies, but a widespread biological attack would cross state boundaries.
-
Early in 1986, the World Health Organization in Geneva still regarded AIDS as an ailment of the promiscuous few.
-
The Patriot Act unleashed the FBI to search your email, travel and credit records without even a suspicion of wrongdoing.
-
Stuxnet, a computer worm reportedly developed by the United States and Israel that destroyed Iranian nuclear centrifuges in attacks in 2009 and 2010, is often cited as the most dramatic use of a cyber weapon.
-
The NSA is forbidden to 'target' American citizens, green-card holders or companies for surveillance without an individual warrant from a judge.
-
The causes and severity of NSA infractions vary widely. One in 10 incidents is attributed to a typographical error in which an analyst enters an incorrect query and retrieves data about U.S phone calls or emails.
-
The NSA has different reporting requirements for each branch of government and each of its legal authorities.
-
When the 'New York Times' revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous.
-
As digital communications have multiplied, and NSA capabilities with them, the agency has shifted resources from surveillance of individual targets to the acquisition of communications on a planetary scale.
-
White House officials acknowledge in broad terms that a president's time and public rhetoric are among his most valuable policy tools.
-
The United States, a signatory to the Chemical Weapons Convention, destroyed the last of its stocks of VX and other chemical agents on the Johnston Atoll, 825 miles southwest of Hawaii, in November 2000.
-
I have no evidence of any relationship between IRS and NSA.
-
The U.S. government has known since the early 1990s about Soviet-era smallpox weapons, and collected circumstantial evidence of programs elsewhere.
-
In the field of biological weapons, there is almost no prospect of detecting a pathogen until it has been used in an attack.
-
As militias go, the Ohio Defense Force is on the moderate side.
-
I don't say I never use Facebook, but I often think about closing my account.
-
Clinton saw himself much more as the steward of alliances and of consensus that moved in the right direction. He didn't see himself as someone who could change the overall thrust, I think, of global policy.
-
Holding our own government to account for the use of its power is, in my view, the highest mission of a U.S. news organization.
-
Cloud services cut both ways in terms of security: you get off-site backup and disaster recovery, but you entrust your secrets to somebody else's hands. Doing the latter increases your exposure to government surveillance and the potential for deliberate or inadvertent breaches of your confidential files.
-
NoScript is probably the most important privacy tool, but it costs you in convenience.
-
Ghostery lets you spy on the spies in your computer. For each web page you visit, this extension uncloaks some - but not all - of the invisible tracking software that is working behind the scenes.
-
Most people inside the bureau believe that the blown opportunities to head off 9/11 would not recur today. Even among the FBI's doubters, few disagree that the bureau has come a long way.
-
The government of Sudan, employing a back channel direct from its president to the Central Intelligence Agency, offered in the early spring of 1996 to arrest Osama bin Laden and place him in Saudi custody, according to officials and former officials in all three countries.
-
China and Russia are regarded as the most formidable cyber threats.