%T Stasiland %A Anna Funder %D 2003 %I Granta Books %G ISBN 9781783787340 %T Global digital population as of January 2021 %A Joseph Johnson %D 2021 %J Statista %O https://www.statista.com/statistics/617136/digital-population-worldwide/" %T Americans’ Internet Access: 2000-2015 %A Andrew Perrin %A Maeve Duggan %J Pew Research Center %D 2015 %O https://www.pewresearch.org/internet/2015/06/26/americans-internet-access-2000-2015 %A van Mill, David %T Freedom of Speech %J The Stanford Encyclopedia of Philosophy %E Edward N. Zalta %O https://plato.stanford.edu/archives/spr2021/entries/freedom-speech/ %D 2021 %C Metaphysics Research Lab, Stanford University %T Why Twitter’s Mission Statement Matters %A Justin Fox %D 2014 %J Harvard Business Review %O https://hbr.org/2014/11/why-twitters-mission-statement-matters %T The great firewall of China: Xi Jinping’s internet shutdown %A Elizabeth C. Economy %D 2018 %J The Guardian %O https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown %T Intel's Management Engine is a security hazard, and users need a way to disable it %A Erica Portnoy %A Peter Eckersley %D May 2017 %J Electronic Frontier Foundation %O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it (Accessed 22 January 2022) %T Facebook’s push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles %J The Conversation %A Roberto Musotto %A David S. Wall %D December 2019 %O https://theconversation.com/facebooks-push-for-end-to-end-encryption-is-good-news-for-user-privacy-as-well-as-terrorists-and-paedophiles-128782 (Accessed 22 January 2022) %T How Terrorists Use Encryption %V Volume 9, Issue 6 %A Robert Graham %D June 2016 %J CTC Sentinel %O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022) %T International statement: End-to-end encryption and public safety %A Home^Office %D Oct 2020 %O https://www.gov.uk/government/publications/international-statement-end-to-end-encryption-and-public-safety (Accessed 29 January 2021) %T Between Myth and Reality: The Stasi Legacy in German History %A Konrad Jarausch %D 2014 %J Bulletin of the German Historical Institute %C German Historical Institute Washington DC %O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf (Accessed 3rd January 2022) %T Participatory Repression? Reflections on Popular Involvement with the Stasi %A Gary Bruce %D 2014 %J Bulletin of the German Historical Institute %C German Historical Institute Washington DC %O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf (Accessed 3rd January 2022) %T N.S.A. Able to Foil Basic Safeguards of Privacy on Web %J The New York Times %A Nicole Perlroth %A Jeff Larson %A Scott Shane %D Sep 2013 %O https://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html (Accessed 3rd February 2022) %T Photos of an NSA “upgrade” factory show Cisco router getting implant %A Sean Gallagher %J Ars Technica %D May 2014 %O https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ (Accessed 3rd February 2022) %T Revealed: The NSA's Secret Campaign to Crack, Undermine Internet Security %J Pro Publica %A Jeff Larson %D Sep 2013 %O https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption (Accessed 3rd February 2022) %T US House passes bill to boost chip manufacturing and R&D %J The Register %D Feb 2022 %A Agam Shah %O https://www.theregister.com/2022/02/05/us_house_passes_america_competes/ (Accessed 6th February 2022) %T Intel ME controller chip has secret kill switch %J The Register %A Thomas Claburn %D Aug 2017 %O Accessed online on 6th February 2022 %T Researchers Find a Way to Disable Much-Hated Intel ME Component Courtesy of the NSA %A Catalin Cimpanu %J BleepingComputer %D Aug 2017 %O https://www.bleepingcomputer.com/news/hardware/researchers-find-a-way-to-disable-much-hated-intel-me-component-courtesy-of-the-nsa/ (Accessed 6th February 2022) %T Researchers Discover Two Major Flaws in the World’s Computers %J The New York Times %D Jan 2018 %A Cade Metz %A Nicole Perlroth %O https://www.nytimes.com/2018/01/03/business/computer-flaws.html (Accessed 7th February 2022)