Back to Results
First PageMeta Content
Privacy of telecommunications / Mass surveillance / National Security Agency / Signals intelligence / Espionage / NSA warrantless surveillance controversy / Foreign Intelligence Surveillance Act / Telephone tapping / Elliptic curve cryptography / National security / Security / Surveillance


web extra Making Sense of Snowden, Part II: What’s Significant in the NSA Revelations Susan Landau, Google
Add to Reading List

Document Date: 2014-01-30 14:23:54


Open Document

File Size: 1,36 MB

Share Result on Facebook

City

Washington / /

Company

Yahoo / Reuters / the AES / The Guardian / National Intelligence James Clapper / The New York Times / Verizon / Microsoft / BellSouth / Petrobas / GCHQ / National Security Agency / The Washington Post / US Naval Research Laboratory / AT&T / USA Today / Google / /

Continent

South America / Europe / /

Country

Afghanistan / Brazil / United Kingdom / Egypt / Canada / Australia / Iraq / Germany / Sweden / New Zealand / United States / US / /

Currency

USD / /

Event

Product Issues / Person Travel / Diplomatic Relations / /

Facility

US Naval Research Laboratory / UK Government Communications Headquarters / National Institute of Standards and Technology / Government Communications Headquarters / /

IndustryTerm

extraneous domestic communications / daily telephony metadata / communications surveillance systems / Internet protocols / e - m / Internet wiretapping / communications intelligence / Internet transactions / memory devices / secure Internet commerce / security technologies / prior applications / invasive search / Internet traffic / terrorist / bulk telephony metadata / Internet metadata / inter-datacenter communications / electronic communications / communications privacy protections / surveillance systems / telecommunications / secure communications systems / telephone / civilian security standards / encryption systems / communications security / default algorithm / Internet metadata11 / Internet backbone / security products / communications paths / communications data / law enforcement officers / 4G networks / human communications / telephony metadata / Internet providers / public key technologies / cell site / radio communications / foreign intelligence wiretap law / communications security standardization process / open source operating systems / wiretap law / symmetric-key algorithm / oil and gas / collect communications / intelligence communications / ubiquitous mobile communications / symmetric-key cryptographic algorithm / Internet documents / internal communications / computing / communications content / Internet / communications providers / Web interface / stored telephony / telecommunications providers / Communications surveillance / private fiber networks / communications systems / wholesale data mining / communications metadata / communications security infrastructure / public-key cryptography algorithms / metadata search / Internet communications / /

OperatingSystem

Microsoft Vista / /

Organization

US Department of Commerce / US embassy in Berlin / US court / Senate / National Institute of Standards and Technology / Central Intelligence Agency / Internet Engineering Task Force / Verizon court / Foreign Intelligence Surveillance Court / Bush administration / United States District Court / White House / United Nations / DC District Court / US Drug Enforcement Administration / UN Court / IEEE Computer Society / US military / Five Eyes / US government / US Department of State / U.S. Securities and Exchange Commission / US Supreme Court / G20 / Church Committee / Obama administration / Electronic Frontier Foundation / UK government / National Intelligence / Federal Bureau of Investigation / Department of Justice / Congress / National Bureau of Standards / National Aeronautics and Space Administration / Christian Social Union / Department of Justice Deputy / Brazilian government / /

Person

Victor Miller / Dilma Rousseff / Glenn Greenwald / Ron Wyden / Patrick Leahy / Tor Stinks / John Bates / Edward Snowden / Richard Leon / John F. Kennedy / Joel Brenner / Whitfield Diffie / James Cole / Peter Kadzik / Neal Koblitz / Martin Hellman / Obama / Keith Alexander / F. James Sensenbrenner Jr. / Mark Udall / David Drummond / Angela Merkel / Colleen Kollar-Kotelly / Reggie Walton / Niels Ferguson / Dan Shumow / /

Position

Chancellor / General / Director General / Inspector General / author / contractor / Deputy Director Inglis / Representative / Deputy Assistant Attorney General / journalist / Attorney General / President / head / Director / Chief Legal Officer / Judge / NSA contractor / NSA Inspector General / /

Product

communications security companies / GSM / the communications security standardization process / random number generator / communications security infrastructure / cryptographic standards / an algorithm / privacy rules / trust / /

ProgrammingLanguage

R / /

ProvinceOrState

Utah / District of Columbia / /

PublishedMedium

the NSA review / the Internet daily / The Washington Post / Der Spiegel / The New York Times / the USA Today / The Guardian / USA Today / /

Technology

Encryption / Digital Signature / 3G / public-key cryptography algorithms / Internet protocols / pdf / default algorithm / smartphones / file sharing / http / data mining / symmetric-key cryptographic algorithm / mobile phones / html / RSA algorithm / public key technologies / security technologies / cryptography / GSM / 56-bit symmetric-key algorithm / SSL / operating systems / cellular telephone / long-term security.20 Technology / /

URL

www.dni.gov/files/documents / www.theguardian.com/world/interactive / www.theguardian.com/world/interactive/2013 / www.theguardian.com/world/interactive/2013/jun/20 / www.europarl.europa.eu/meetdocs/2009_2014/documents / www.nytimes.com / www.uscourts.gov/uscourts/courts/fisc/br1309-primary-order.pdf / www.theguardian.com/world/interactive/2013/oct/04 / www.aclu.org/files/assets/november_2011_fisc_opinion_ / http /

SocialTag