-
Experts said public companies worry about the loss of customer confidence and the legal liability to shareholders or security vendors when they report flaws.
-
CloudShield did not see itself as a cloak-and-dagger company. It made its name for high-end hardware that could peer deeply into Internet traffic and pull out and analyze 'packets' of data as they flew by.
-
China and Russia are regarded as the most formidable cyber threats.
-
Among all the upheavals of war with al Qaeda, the surest indicator of the historic stakes is the ongoing rotation of top U.S. government managers - scores at a time - into a bunker deep underground and far from Washington.
-
Doctrines don't govern policy. They provide a conceptual framework by which policymakers approach their decisions. But there is no such thing as a doctrine that controls policy in every way.
-
The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents.
-
A national security letter cannot be used to authorize eavesdropping or to read the contents of e-mail. But it does permit investigators to trace revealing paths through the private affairs of a modern digital citizen.
-
Pakistan has accepted some security training from the CIA, but U.S. export restrictions and Pakistani suspicions have prevented the two countries from sharing the most sophisticated technology for safeguarding nuclear components.
-
In effect, you cannot stop Iraq from growing nasty bugs in the basement. You can stop them from putting operational warheads on working missiles and launching them at their neighbors.
-
For personal use, I recommend the free and open-source Truecrypt, which comes in flavors for Windows, Mac and Linux.
-
Snowden has yet to tell me anything that was a fact that I have been able to rebut or that anybody in the U.S. government I have talked to has been able to rebut.
-
U.S. surveillance of Pakistan extends far beyond its nuclear program. There are several references in the black budget to expanding U.S. scrutiny of chemical and biological laboratories.
-
The CIA now assesses that four nations - Iraq, North Korea, Russia and, to the surprise of some specialists, France - have undeclared samples of the smallpox virus.
-
Companies that receive government information demands have to obey the law, but they often have room for maneuver. They scarcely ever use it.
-
The federal government is often said in militia circles to have made wholesale seizures of power, at times by subterfuge. A leading grievance holds that the 16th Amendment, which authorizes the federal income tax, was ratified through fraud.
-
The modern era of continuity planning began under President Ronald Reagan.
-
Pakistan has dozens of laboratories and production and storage sites scattered across the country. After developing warheads with highly enriched uranium, it has more recently tried to do the same with more-powerful and compact plutonium.
-
Activists and geeks, standing together, are demonstrating powers beyond the reach of government control.
-
Snowden grants that NSA employees by and large believe in their mission and trust the agency to handle the secrets it takes from ordinary people - deliberately, in the case of bulk records collection, and 'incidentally,' when the content of American phone calls and e-mails are swept into NSA systems along with foreign targets.
-
In late 2003, the Bush administration reversed a long-standing policy requiring agents to destroy their files on innocent American citizens, companies and residents when investigations closed.
-
Most people inside the bureau believe that the blown opportunities to head off 9/11 would not recur today. Even among the FBI's doubters, few disagree that the bureau has come a long way.
-
In Africa through the 1990s, with notable exceptions in Senegal and Uganda, nearly all the ruling powers denied they had a problem with AIDS.
-
Leaders at the top of al Qaeda's hierarchy, the evidence shows, completed plans and obtained the materials required to manufacture two biological toxins - botulinum and salmonella - and the chemical poison cyanide.
-
In computer circles, any unencrypted data is known as 'cleartext.'