%T Stasiland %A Anna Funder %D 2003 %I Granta Books %G ISBN 9781783787340 %T Global digital population as of January 2021 %A Joseph Johnson %D 2021 %J Statista %O https://www.statista.com/statistics/617136/digital-population-worldwide/" %T Americans’ Internet Access: 2000-2015 %A Andrew Perrin %A Maeve Duggan %J Pew Research Center %D 2015 %O https://www.pewresearch.org/internet/2015/06/26/americans-internet-access-2000-2015 %A van Mill, David %T Freedom of Speech %J The Stanford Encyclopedia of Philosophy %E Edward N. Zalta %O https://plato.stanford.edu/archives/spr2021/entries/freedom-speech/ %D 2021 %C Metaphysics Research Lab, Stanford University %T Why Twitter’s Mission Statement Matters %A Justin Fox %D 2014 %J Harvard Business Review %O https://hbr.org/2014/11/why-twitters-mission-statement-matters %T The great firewall of China: Xi Jinping’s internet shutdown %A Elizabeth C. Economy %D 2018 %J The Guardian %O https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown . %T Facebook’s push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles %J The Conversation %A Roberto Musotto %A David S. Wall %D December 2019 %O https://theconversation.com/facebooks-push-for-end-to-end-encryption-is-good-news-for-user-privacy-as-well-as-terrorists-and-paedophiles-128782 (Accessed 22 January 2022) %T How Terrorists Use Encryption %V Volume 9, Issue 6 %A Robert Graham %D June 2016 %J CTC Sentinel %O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022) %T The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (9/11 Report) %A National^Commission^on^Terrorist^Attacks^Upon^the^United^States %D July 2004 %A Daniel Byman %D 2014 %T The Intelligence War on Terrorism %J Intelligence and National Security %V 29:6 %P 837-863 %G DOI: 10.1080/02684527.2013.851876 %T International statement: End-to-end encryption and public safety %A Home^Office %D Oct 2020 %O https://www.gov.uk/government/publications/international-statement-end-to-end-encryption-and-public-safety (Accessed 29 January 2021) %T Between Myth and Reality: The Stasi Legacy in German History %A Konrad Jarausch %D 2014 %J Bulletin of the German Historical Institute %C German Historical Institute Washington DC %T Participatory Repression? Reflections on Popular Involvement with the Stasi %A Gary Bruce %D 2014 %J Bulletin of the German Historical Institute %C German Historical Institute Washington DC %T N.S.A. Able to Foil Basic Safeguards of Privacy on Web %J The New York Times %A Nicole Perlroth %A Jeff Larson %A Scott Shane %D Sep 2013 %O https://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html (Accessed 3rd February 2022) %T Photos of an NSA “upgrade” factory show Cisco router getting implant %A Sean Gallagher %J Ars Technica %D May 2014 %O https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/ (Accessed 3rd February 2022) %T Revealed: The NSA's Secret Campaign to Crack, Undermine Internet Security %J Pro Publica %A Jeff Larson %D Sep 2013 %O https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption (Accessed 3rd February 2022) %T U.S. Confirms That It Gathers Online Data Overseas %A Charlie Savage %A Edward Wyatt %A Peter Baker %D June 2013 %J The New York Times %O Accessed online on 17th February 2022 %T NSA collecting phone records of millions of Verizon customers daily %A Glenn Greenwald %D June 2013 %J The Guardian %O Accessed online on 17th February 2022 %T Anger swells after NSA phone records court order revelations %J The Guardian %D June 2013 %A Dan Roberts %A Spencer Ackerman %O Accessed online on 17th February 2022 -- lawmaking %T US House passes bill to boost chip manufacturing and R&D %J The Register %D Feb 2022 %A Agam Shah %O Accessed online on 6th February 2022 %A H.R.3773 %T 110th Congress (2007-2008): FISA Amendments Act of 2008 %D (2008) -- Intel management engine %T Intel's Management Engine is a security hazard, and users need a way to disable it %A Erica Portnoy %A Peter Eckersley %D May 2017 %J Electronic Frontier Foundation %O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it (Accessed 22 January 2022) %T Intel ME controller chip has secret kill switch %J The Register %A Thomas Claburn %D Aug 2017 %O Accessed online on 6th February 2022 %T Researchers Find a Way to Disable Much-Hated Intel ME Component Courtesy of the NSA %A Catalin Cimpanu %J BleepingComputer %D Aug 2017 %O https://www.bleepingcomputer.com/news/hardware/researchers-find-a-way-to-disable-much-hated-intel-me-component-courtesy-of-the-nsa/ (Accessed 6th February 2022) -- Spectre, meltdown %T Researchers Discover Two Major Flaws in the World’s Computers %J The New York Times %D Jan 2018 %A Cade Metz %A Nicole Perlroth %O https://www.nytimes.com/2018/01/03/business/computer-flaws.html (Accessed 7th February 2022) %T One-time Pad %A Dirk Rijmenants %D date unknown %O https://www.ciphermachinesandcryptology.com/en/onetimepad.htm (Accessed 26th February 2022) -- quantum %T Report on Post-Quantum Cryptography %A Lily Chen %A Stephen Jordan %A Yi-Kai Liu %A Dustin Moody %A Rene Peralta %A Ray Perlner %A Daniel Smith-Tone %J National Institute of Standards and Technology %D April 2016 %O https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf . %T Quantum information research in China %A Qiang Zhang %A Feihu Xu %A Li Li %A Nai-Le Liu %A Jian-Wei Pan %D Nov 2019 %J Quantum Science and Technology %V 4 040503 %O https://iopscience.iop.org/article/10.1088/2058-9565/ab4bea/ . %T Physicists in China challenge Google’s ‘quantum advantage’ %A Philip Ball %D Dec 2020 %J Nature %O https://www.nature.com/articles/d41586-020-03434-7 (Accessed 13th January 2022) %T Hello quantum world! Google publishes landmark quantum supremacy claim %A Elizabeth Gibney %D Oct 2019 %J Nature %O https://www.nature.com/articles/d41586-019-03213-z (Accessed 13th January 2022) %T Quantum computational advantage using photons %A Han-Sen Zhong^et^al %D 2020 %O DOI: 10.1126/science.abe8770 %T Google Claims To Achieve Quantum Supremacy — IBM Pushes Back %J NPR %D Oct 2019 %A Paolo Zialcita %O https://www.npr.org/2019/10/23/772710977/google-claims-to-achieve-quantum-supremacy-ibm-pushes-back . %T The Hidden Truth Anonymity in Cyberspace: Deep Web %D 2018 %A Saksham Gulati %A Shilpi Sharma %A Garima Agarwal %J Advances in Intelligent Systems and Computing %V 673 %P 719–730 %O DOI: 10.1007/978-981-10-7245-1_70 %T China Cracks Down on Tor Anonymity Network %A David Talbot %D Oct 2009 %J MIT Technology Review %T How China Is Blocking Tor %A Philipp Winter %A Stefan Lindskog %J Karlstad University %G arXiv:1204.0447 [cs.CR] %D Apr 2012