Yahoo / Reuters / the AES / The Guardian / National Intelligence James Clapper / The New York Times / Verizon / Microsoft / BellSouth / Petrobas / GCHQ / National Security Agency / The Washington Post / US Naval Research Laboratory / AT&T / USA Today / Google / /
Continent
South America / Europe / /
Country
Afghanistan / Brazil / United Kingdom / Egypt / Canada / Australia / Iraq / Germany / Sweden / New Zealand / United States / US / /
Currency
USD / /
Event
Product Issues / Person Travel / Diplomatic Relations / /
Facility
US Naval Research Laboratory / UK Government Communications Headquarters / National Institute of Standards and Technology / Government Communications Headquarters / /
IndustryTerm
extraneous domestic communications / daily telephony metadata / communications surveillance systems / Internet protocols / e - m / Internet wiretapping / communications intelligence / Internet transactions / memory devices / secure Internet commerce / security technologies / prior applications / invasive search / Internet traffic / terrorist / bulk telephony metadata / Internet metadata / inter-datacenter communications / electronic communications / communications privacy protections / surveillance systems / telecommunications / secure communications systems / telephone / civilian security standards / encryption systems / communications security / default algorithm / Internet metadata11 / Internet backbone / security products / communications paths / communications data / law enforcement officers / 4G networks / human communications / telephony metadata / Internet providers / public key technologies / cell site / radio communications / foreign intelligence wiretap law / communications security standardization process / open source operating systems / wiretap law / symmetric-key algorithm / oil and gas / collect communications / intelligence communications / ubiquitous mobile communications / symmetric-key cryptographic algorithm / Internet documents / internal communications / computing / communications content / Internet / communications providers / Web interface / stored telephony / telecommunications providers / Communications surveillance / private fiber networks / communications systems / wholesale data mining / communications metadata / communications security infrastructure / public-key cryptography algorithms / metadata search / Internet communications / /
OperatingSystem
Microsoft Vista / /
Organization
US Department of Commerce / US embassy in Berlin / US court / Senate / National Institute of Standards and Technology / Central Intelligence Agency / Internet Engineering Task Force / Verizon court / Foreign Intelligence Surveillance Court / Bush administration / United States District Court / White House / United Nations / DC District Court / US Drug Enforcement Administration / UN Court / IEEE Computer Society / US military / Five Eyes / US government / US Department of State / U.S. Securities and Exchange Commission / US Supreme Court / G20 / Church Committee / Obama administration / Electronic Frontier Foundation / UK government / National Intelligence / Federal Bureau of Investigation / Department of Justice / Congress / National Bureau of Standards / National Aeronautics and Space Administration / Christian Social Union / Department of Justice Deputy / Brazilian government / /
Person
Victor Miller / Dilma Rousseff / Glenn Greenwald / Ron Wyden / Patrick Leahy / Tor Stinks / John Bates / Edward Snowden / Richard Leon / John F. Kennedy / Joel Brenner / Whitfield Diffie / James Cole / Peter Kadzik / Neal Koblitz / Martin Hellman / Obama / Keith Alexander / F. James Sensenbrenner Jr. / Mark Udall / David Drummond / Angela Merkel / Colleen Kollar-Kotelly / Reggie Walton / Niels Ferguson / Dan Shumow / /
Position
Chancellor / General / Director General / Inspector General / author / contractor / Deputy Director Inglis / Representative / Deputy Assistant Attorney General / journalist / Attorney General / President / head / Director / Chief Legal Officer / Judge / NSA contractor / NSA Inspector General / /
Product
communications security companies / GSM / the communications security standardization process / random number generator / communications security infrastructure / cryptographic standards / an algorithm / privacy rules / trust / /
ProgrammingLanguage
R / /
ProvinceOrState
Utah / District of Columbia / /
PublishedMedium
the NSA review / the Internet daily / The Washington Post / Der Spiegel / The New York Times / the USA Today / The Guardian / USA Today / /
Technology
Encryption / Digital Signature / 3G / public-key cryptography algorithms / Internet protocols / pdf / default algorithm / smartphones / file sharing / http / data mining / symmetric-key cryptographic algorithm / mobile phones / html / RSA algorithm / public key technologies / security technologies / cryptography / GSM / 56-bit symmetric-key algorithm / SSL / operating systems / cellular telephone / long-term security.20 Technology / /