Officials are again pointing to the need for mass surveillance to take down terrorists. Here’s what we know about how well it works.
A library in a small New Hampshire town started to help Internet users around the world surf anonymously using Tor. Until the Department of Homeland Security raised a red flag.
In an age of ubiquitous surveillance, there are still some things you can do to keep your communications private—and not all of it is high-tech.
The Obama administration has stepped up the National Security Agency's surveillance program on U.S. soil to search for signs of hacking.
After Edward Snowden, the government said its controversial surveillance programs had stopped a terrorist—David Coleman Headley. The claim is largely untrue.
The British government's demand that physical computers be destroyed is both nonsensical and ruthless—and that’s what makes it so disturbing.
Werner Koch’s code powers the email encryption programs around the world.
Here are some techniques that anybody can use to protect their privacy online.
Rereading the late senator in a post-Edward Snowden and Julian Assange era.
The decision follows revelations about the NSA’s covert influence on computer security standards.
In a secret effort, the National Security Agency appears to be vacuuming up large swathes of the Internet.
Commercial products and artistic projects that hint at how we might protect ourselves from government detection in the future, should we so choose.
The George Zimmerman trial has provoked a national conversation on race. The NSA probably doesn't want one on security.
In their book Cypherpunks, Julian Assange and three other Internet activists predicted much of what Edward Snowden revealed about the NSA.
Prism and the NSA’s phone tapping programs were supposed to be emergency measures designed to combat terrorism. But what happens when the threat of terrorism is the norm?