Edward Snowden
Where's the Evidence That Mass Surveillance Actually Works?
Officials are again pointing to the need for mass surveillance to take down terrorists. Here’s what we know about how well it works.
The First Library to Support Anonymous Internet Browsing Has Turned Off Tor
A library in a small New Hampshire town started to help Internet users around the world surf anonymously using Tor. Until the Department of Homeland Security raised a red flag.
A Beginner's Guide to Protecting Your Communications From Prying Eyes
In an age of ubiquitous surveillance, there are still some things you can do to keep your communications private—and not all of it is high-tech.
Secret Memos Reveal Warrantless Surveillance of Internet Activity
The Obama administration has stepped up the National Security Agency's surveillance program on U.S. soil to search for signs of hacking.
The Hidden Intelligence Breakdowns Behind the Mumbai Terrorist Attacks
After Edward Snowden, the government said its controversial surveillance programs had stopped a terrorist—David Coleman Headley. The claim is largely untrue.
Two Years Later, Snowden’s Mangled Laptop Is More Than an Empty Symbol
The British government's demand that physical computers be destroyed is both nonsensical and ruthless—and that’s what makes it so disturbing.
The World's Email Encryption Software Relies on One Guy
Werner Koch’s code powers the email encryption programs around the world.
A Quick Guide to Encrypting the Data You Store and Transmit
Here are some techniques that anybody can use to protect their privacy online.
What the Proposed NSA Reforms Wouldn't Do
All the plans purport to end the bulk phone records collection program, but there are big differences.
Secrecy, Surveillance, and Misinformation: Lessons From Moynihan
Rereading the late senator in a post-Edward Snowden and Julian Assange era.
How to Appear Properly Annoyed by a Wiretap
Australia's security service tapped some phones in Indonesia. It hasn't ended well.
Is the NSA Really Preventing Terrorist Attacks?
The agency, President Obama, and members of Congress have all said NSA spying programs have thwarted more than 50 terrorist plots. But there’s no evidence the claim is true.
Standards Agency Suggests Dropping Its Own Encryption Standard
The decision follows revelations about the NSA’s covert influence on computer security standards.
Why NSA Snooping Is a Much Bigger Deal in Germany
In Germany, furor over the NSA revelations is much bigger than in the U.S. Why do Germans fear Big Brother so much?
Does the NSA Tap That? What We Still Don't Know About the Agency's Internet Surveillance
In a secret effort, the National Security Agency appears to be vacuuming up large swathes of the Internet.
Privacy: Rebelling Against the New Surveillance and NSA Spying
Commercial products and artistic projects that hint at how we might protect ourselves from government detection in the future, should we so choose.
A Buyer’s Guide to Safer Communication
There are a lot of ways to talk to people securely on the Internet, some are purpose-built to enhance your privacy and security. Here’s a guide to getting started.
What Happens if (or When) Edward Snowden Faces a Jury?
The George Zimmerman trial has provoked a national conversation on race. The NSA probably doesn't want one on security.
Would Giving Up Computers Protect Your Privacy?
Vladimir Putin wants to use typewriters to avoid an Edward Snowden situation. Could you actually do this?
Told You So: Julian Assange, the NSA, and Edward Snowden
In their book Cypherpunks, Julian Assange and three other Internet activists predicted much of what Edward Snowden revealed about the NSA.
Why Don’t Americans Seem to Care About Government Surveillance?
Prism and the NSA’s phone tapping programs were supposed to be emergency measures designed to combat terrorism. But what happens when the threat of terrorism is the norm?
A Security Scholar Talks About the NSA Scandal
"They’ve established a Google for police and intelligence operations by siphoning off all the data that we’re producing through telecommunications and other forms of data production."