Nothing is absolute in security.

Some misunderstandings are hard to cure.

Al Qaeda is closely aligned with the Chechens.

Most computers today have built in backup software.

Sudan expelled bin Laden on May 18, 1996, to Afghanistan.

Daniel Ellsberg showed tremendous courage back in the 70s.

Daniel Ellsberg showed tremendous courage back in the '70s.

I have no evidence of any relationship between IRS and NSA.

As militias go, the Ohio Defense Force is on the moderate side.

Iraq has, in effect, one export of any consequence. That's oil.

In computer circles, any unencrypted data is known as 'cleartext.'

China and Russia are regarded as the most formidable cyber threats.

All Americans are dependent for their energy on the Arabian peninsula.

The modern era of continuity planning began under President Ronald Reagan.

Ecuador has never stated flatly that it would give asylum to Edward Snowden.

I don't say I never use Facebook, but I often think about closing my account.

Snowden is an orderly thinker, with an engineer's approach to problem-solving.

NSA surveillance is a complex subject - legally, technically and operationally.

Privacy and encryption work, but it's too easy to make a mistake that exposes you.

Snowden has been very sparing about discussing his early life or his personal life.

No one ought to be under any illusion that Cheney privately thinks himself a failure.

NoScript is probably the most important privacy tool, but it costs you in convenience.

Well-secured files don't do you much good if you lose them in a fire or hard drive crash.

It no longer counts as remarkable that Egyptians organized their uprising on social media.

I'm a journalist and author. I make my living by finding things out and writing about them.

In 1995, Glaxo bought Burroughs Wellcome and became the presumptive leader in AIDS therapy.

True net-heads sometimes resort to punctuation cartoons to get around the absence of inflection.

Of all Iraq's rocket scientists, none drew warier scrutiny abroad than Modher Sadeq-Saba Tamimi.

The NSA's business is 'information dominance,' the use of other people's secrets to shape events.

We know what's in our Cheerios and in our retirement accounts because the law requires disclosure.

The Obama administration has provided almost no public information about the NSA's compliance record.

Federal prosecutors want to indict Julian Assange for making public a great many classified documents.

Activists and geeks, standing together, are demonstrating powers beyond the reach of government control.

The defection of Hussein Kamel was a turning point in the U.N.-imposed disarmament of Iraq in the 1990s.

There's a long history of private-company cooperation with the NSA that dates back to at least the 1970s.

I learned the technology and tradecraft of electronic security in self defense, with a lot of expert help.

I favor pocket-sized hard drives that travel between home and office, syncing with computers on both ends.

There is evidence that some of al Qaeda's nuclear efforts over the years met with swindles and false leads.

The NSA has different reporting requirements for each branch of government and each of its legal authorities.

Early in 1986, the World Health Organization in Geneva still regarded AIDS as an ailment of the promiscuous few.

For personal use, I recommend the free and open-source Truecrypt, which comes in flavors for Windows, Mac and Linux.

Palestinians have had to live for a long time with the fact that Israelis had power over them in their everyday lives.

Dell fills its computers with crapware, collecting fees from McAfee and other vendors to pre-install 'trial' versions.

By now, you've heard endless warnings about the risk of short, trivial passwords. There's a good chance you ignore them.

The Patriot Act unleashed the FBI to search your email, travel and credit records without even a suspicion of wrongdoing.

Ordinary Geiger counters, worn on belt clips and resembling pagers, have been in use by the U.S. Customs Service for years.

In the field of biological weapons, there is almost no prospect of detecting a pathogen until it has been used in an attack.

The gravest risks from al Qaeda combine its affinity for big targets and its announced desire for weapons of mass destruction.

Holding our own government to account for the use of its power is, in my view, the highest mission of a U.S. news organization.

When the New York Times revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous.

Share This Page