%T Stasiland %A Anna Funder %D 2003 %I Granta Books %G ISBN 9781783787340 %T Global digital population as of January 2021 %A Joseph Johnson %D 2021 %J Statista %O https://www.statista.com/statistics/617136/digital-population-worldwide/" %T Americans’ Internet Access: 2000-2015 %A Andrew Perrin %A Maeve Duggan %J Pew Research Center %D 2015 %O https://www.pewresearch.org/internet/2015/06/26/americans-internet-access-2000-2015 %A van Mill, David %T Freedom of Speech %J The Stanford Encyclopedia of Philosophy %E Edward N. Zalta %O https://plato.stanford.edu/archives/spr2021/entries/freedom-speech/ %D 2021 %C Metaphysics Research Lab, Stanford University %T Why Twitter’s Mission Statement Matters %A Justin Fox %D 2014 %J Harvard Business Review %O https://hbr.org/2014/11/why-twitters-mission-statement-matters %T The great firewall of China: Xi Jinping’s internet shutdown %A Elizabeth C. Economy %D 2018 %J The Guardian %O https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown . %T Facebook’s push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles %J The Conversation %A Roberto Musotto %A David S. Wall %D December 2019 %O https://theconversation.com/facebooks-push-for-end-to-end-encryption-is-good-news-for-user-privacy-as-well-as-terrorists-and-paedophiles-128782 (Accessed 22 January 2022) %T How Terrorists Use Encryption %V Volume 9, Issue 6 %A Robert Graham %D June 2016 %J CTC Sentinel %O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022) %T The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (9/11 Report) %A National^Commission^on^Terrorist^Attacks^Upon^the^United^States %D July 2004 %A Daniel Byman %D 2014 %T The Intelligence War on Terrorism %J Intelligence and National Security %V 29:6 %P 837-863 %G DOI: 10.1080/02684527.2013.851876 %T International statement: End-to-end encryption and public safety %A Home^Office %D Oct 2020 %O https://www.gov.uk/government/publications/international-statement-end-to-end-encryption-and-public-safety (Accessed 29 January 2021) %T Between Myth and Reality: The Stasi Legacy in German History %A Konrad Jarausch %D 2014 %J Bulletin of the German Historical Institute %C German Historical Institute Washington DC %O https://www.ghi-dc.org/publication/stasi-at-home-and-abroad-domestic-order-and-foreign-intelligence . %T Participatory Repression? Reflections on Popular Involvement with the Stasi %A Gary Bruce %D 2014 %J Bulletin of the German Historical Institute %C German Historical Institute Washington DC %O https://www.ghi-dc.org/publication/stasi-at-home-and-abroad-domestic-order-and-foreign-intelligence . %T N.S.A. Able to Foil Basic Safeguards of Privacy on Web %J The New York Times %A Nicole Perlroth %A Jeff Larson %A Scott Shane %D Sep 2013 %O https://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html (Accessed 3rd February 2022) %T Photos of an NSA “upgrade” factory show Cisco router getting implant %A Sean Gallagher %J Ars Technica %D May 2014 %O https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ (Accessed 3rd February 2022) %T Revealed: The NSA's Secret Campaign to Crack, Undermine Internet Security %J Pro Publica %A Jeff Larson %D Sep 2013 %O https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption (Accessed 3rd February 2022) %T U.S. Confirms That It Gathers Online Data Overseas %A Charlie Savage %A Edward Wyatt %A Peter Baker %D June 2013 %J The New York Times %O Accessed online on 17th February 2022 %T NSA collecting phone records of millions of Verizon customers daily %A Glenn Greenwald %D June 2013 %J The Guardian %O Accessed online on 17th February 2022 %T Anger swells after NSA phone records court order revelations %J The Guardian %D June 2013 %A Dan Roberts %A Spencer Ackerman %O Accessed online on 17th February 2022 -- lawmaking %T US House passes bill to boost chip manufacturing and R&D %J The Register %D Feb 2022 %A Agam Shah %O Accessed online on 6th February 2022 %A H.R.3773 %T 110th Congress (2007-2008): FISA Amendments Act of 2008 %D (2008) -- Intel management engine %T Intel's Management Engine is a security hazard, and users need a way to disable it %A Erica Portnoy %A Peter Eckersley %D May 2017 %J Electronic Frontier Foundation %O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it (Accessed 22 January 2022) %T Intel ME controller chip has secret kill switch %J The Register %A Thomas Claburn %D Aug 2017 %O Accessed online on 6th February 2022 %T Researchers Find a Way to Disable Much-Hated Intel ME Component Courtesy of the NSA %A Catalin Cimpanu %J BleepingComputer %D Aug 2017 %O https://www.bleepingcomputer.com/news/hardware/researchers-find-a-way-to-disable-much-hated-intel-me-component-courtesy-of-the-nsa/ (Accessed 6th February 2022) -- Spectre, meltdown %T Researchers Discover Two Major Flaws in the World’s Computers %J The New York Times %D Jan 2018 %A Cade Metz %A Nicole Perlroth %O https://www.nytimes.com/2018/01/03/business/computer-flaws.html (Accessed 7th February 2022) %T One-time Pad %A Dirk Rijmenants %D n.d. %O https://www.ciphermachinesandcryptology.com/en/onetimepad.htm (Accessed 26th February 2022) -- quantum %T Report on Post-Quantum Cryptography %A Lily Chen %A Stephen Jordan %A Yi-Kai Liu %A Dustin Moody %A Rene Peralta %A Ray Perlner %A Daniel Smith-Tone %J National Institute of Standards and Technology %D April 2016 %O https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf . %T Quantum information research in China %A Qiang Zhang %A Feihu Xu %A Li Li %A Nai-Le Liu %A Jian-Wei Pan %D Nov 2019 %J Quantum Science and Technology %V 4 040503 %O https://iopscience.iop.org/article/10.1088/2058-9565/ab4bea/ . %T Physicists in China challenge Google’s ‘quantum advantage’ %A Philip Ball %D Dec 2020 %J Nature %O https://www.nature.com/articles/d41586-020-03434-7 (Accessed 13th January 2022) %T Hello quantum world! Google publishes landmark quantum supremacy claim %A Elizabeth Gibney %D Oct 2019 %J Nature %O https://www.nature.com/articles/d41586-019-03213-z (Accessed 13th January 2022) %T Quantum computational advantage using photons %A Han-Sen Zhong^et^al %D 2020 %O DOI: 10.1126/science.abe8770 %T Google Claims To Achieve Quantum Supremacy — IBM Pushes Back %J NPR %D Oct 2019 %A Paolo Zialcita %O https://www.npr.org/2019/10/23/772710977/google-claims-to-achieve-quantum-supremacy-ibm-pushes-back . %T Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process %D July 2020 %J National Institute of Standards and Technology %R NISTIR 8309 %O DOI: 10.6028/NIST.IR.8309 %A Gorjan Alagic %A Jacob Alperin-Sheriff %A Daniel Apon %A David Cooper %A Quynh Dang %A John Kelsey %A Yi-Kai Liu %A Carl Miller %A Dustin Moody %A Rene Peralta %A Ray Perlner %A Angela Robinson %A Daniel Smith-Tone %J European Journal of Privacy Law & Technologies %D 2021 %N 1 %T Post-quantum encryption and privacy regulation: Can the law keep pace with technology? %A Luigi Bruno %A Isabella Spano %O https://universitypress.unisob.na.it/ojs/index.php/ejplt/article/view/1225 . %T The Hidden Truth Anonymity in Cyberspace: Deep Web %D 2018 %A Saksham Gulati %A Shilpi Sharma %A Garima Agarwal %J Advances in Intelligent Systems and Computing %V 673 %P 719–730 %O DOI: 10.1007/978-981-10-7245-1_70 %T China Cracks Down on Tor Anonymity Network %A David Talbot %D Oct 2009 %J MIT Technology Review %T How China Is Blocking Tor %A Philipp Winter %A Stefan Lindskog %J Karlstad University %G arXiv:1204.0447 [cs.CR] %D Apr 2012 %A Chen Chen^et^al %T Xuantie-910: A Commercial Multi-Core 12-Stage Pipeline Out-of-Order 64-bit High Performance RISC-V Processor with Vector Extension %D 2020 %J ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA) %O DOI: 10.1109/isca45697.2020.00016 %T Instruction Sets Should Be Free: The Case For RISC-V %A Krste Asanović %A David A. Patterson %J Electrical Engineering and Computer Sciences %C University of California at Berkeley %R UCB/EECS-2014-146 %D Aug 2014 %T Exclusive: Secret contract tied NSA and security industry pioneer %A Joseph Menn %J Reuters %D Dec 2013 %O https://www.reuters.com/article/us-usa-security-rsa-idUSBRE9BJ1C220131220 (Accessed 5 March 2022) %T RSA issues non-denying denial of NSA deal to favor flawed crypto code %J Ars Technica %A Dan Goodin %D Dec 2013 %O https://arstechnica.com/information-technology/2013/12/rsa-issues-non-denying-denial-of-nsa-deal-to-favor-flawed-crypto-code/ (Accessed 5 March 2022) %T Government Announces Steps to Restore Confidence on Encryption Standards %A Nicole Perlroth %D September 2013 %J The New York Times %O https://bits.blogs.nytimes.com/2013/09/10/government-announces-steps-to-restore-confidence-on-encryption-standards/ (Accessed 5 March 2022) %A Paul Kocher %A Jann Horn %A Anders Fogh %A Daniel Genkin %A Daniel Gruss %A Werner Haas %A Mike Hamburg %A Moritz Lipp %A Stefan Mangard %A Thomas Prescher %A Michael Schwarz %A Yuval Yarom %T Spectre Attacks: Exploiting Speculative Execution %D 2019 %O DOI: 10.1109/SP.2019.00002 %T GCHQ taps fibre-optic cables for secret access to world's communications %J The Guardian %D June 2013 %A Ewen MacAskill %A Julian Borger %A Nick Hopkins %A Nick Davies %A James Ball %O Accessed online on 2 April 2022 %T The Cold War Broadcast That Gave East German Dissidents A Voice %J NPR %D November 2014 %A Esme Nicholson %O Accessed online on 2 April 2022 %A The^Federal^Archives %T About the Stasi Records Archive %D n.d. %O https://www.stasi-unterlagen-archiv.de/en/archives/about-the-archives/ Accessed 2 April 2022 %D n.d. %O https://eur-lex.europa.eu/procedure/EN/201286 Accessed 25 March 2022 %A EUR-Lex %T Procedure 2012/0011/COD %O https://hbr.org/2018/04/gdpr-and-the-end-of-the-internets-grand-bargain Accessed 25 March 2022 %T GDPR and the End of the Internet’s Grand Bargain %D April 2018 %A Larry Downes %J Harvard Business Review