RSS feeds allow Web site content to be gathered via feed reader software. Click the subscribe link to obtain the feed URL for this page. The feed will update when new content appears on this page.

Edward Snowden

Edward Snowden
A collection of news and information related to Edward Snowden published by this site and its partners.

Top Edward Snowden Articles

Displaying items 111-121
  • NSA phone data collection far more limited than had been disclosed

    WASHINGTON — Although U.S. intelligence officials have indicated since last summer that the National Security Agency was vacuuming up nearly every American telephone record for counter-terrorism investigations, officials acknowledged Friday that the...
  • Snowden makes NSA look bad

    Snowden makes NSA look bad
    Eight months after Edward Snowden leaked secrets about the National Security Agency's mass surveillance, The New York Times reports that intelligence officials "have determined that he used inexpensive and widely available software to 'scrape' the...
  • House bill takes aim at NSA data collection

    House bill takes aim at NSA data collection
    Legislation introduced in the Maryland General Assembly would require state and local officials to refuse to cooperate with the National Security Agency in a wide variety of ways if it continues to collect bulk electronic data without specific warrants....
  • Photographer captures new images of Maryland's National Security Agency

    Photographer captures new images of Maryland's National Security Agency
    Two news websites Monday published images of the three of the most secretive U.S. agencies including the Maryland-based National Security Agency. Outside of a single undated image provided by the NSA¬†— which has been used repeatedly by The Sun and...
  • NYT shocker: Times scribes discover editorial page is dull, pointless

    The natives are restless. That's the word from the New York Observer about the atmosphere in the newsroom of the once good gray New York Times, which in its financially troubled old age has adopted the showy ways of a left-leaning tabloid. For in recent...
  • Cybersecurity guidelines for companies are unveiled by White House

    WASHINGTON — The White House has released guidelines aimed at prodding companies that run some of the nation's most essential services such as utilities, cellphone towers and banks to better protect themselves from cyberattacks. Officials said the...
  • Fighting the world's most dangerous software

    At what point does a cyber-attack become an act of war? My question is prompted by this week's news that a highly sophisticated malware program called Mask has spent the last six years stealing valuable intelligence from supposedly secure government...
  • Three former NSA workers accused of aiding Snowden

    WASHINGTON — Three people at the National Security Agency have been implicated in Edward Snowden's efforts to copy classified material, including a civilian employee who resigned last month after acknowledging he allowed Snowden to use his...
  • Sen. Dianne Feinstein defends NSA and need for intelligence gathering

    Sen. Dianne Feinstein defends NSA and need for intelligence gathering
    Sen. Dianne Feinstein (D-Calif.) offered a full-throated defense of the government's collection of data on billions of American phone calls, saying Wednesday that the National Security Agency’s practices have safeguarded the nation without trampling...
  • About your TSA fingerprints

    About your TSA fingerprints
    Now that the Transportation Security Administration's Pre-Check program is open for application to any American, its reach is growing quickly: Eight airport enrollment centers have opened nationally since November, and at least 40 more are expected by the...
  • Apple Gotofail bug: Simple mistake or NSA conspiracy?

    Apple Gotofail bug: Simple mistake or NSA conspiracy?
    Apple spent the weekend scrambling to respond to a security bug called "Gotofail" discovered first in its iOS devices and then in its Mac OSX. Beyond just leaving users vulnerable, the flaw ignited a debate among cybersecurity experts because the...