I've always shied away from online data storage. I don't even use my employers' network drives for anything sensitive. I want to control access myself.
For months, Obama administration officials attacked Snowden's motives and said the work of the NSA was distorted by selective leaks and misinterpretations.
One common puzzle for the security-minded is how to work with confidential data on the road. Sometimes you can't bring your laptop, or don't want to. But working on somebody else's machine exposes you to malware and leaves behind all kinds of electronic trails.
Doctrines don't govern policy. They provide a conceptual framework by which policymakers approach their decisions. But there is no such thing as a doctrine that controls policy in every way.
In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use 'contact chaining' techniques to build what the NSA describes as network graphs of people who represented potential threats.
Privacy and encryption work, but it's too easy to make a mistake that exposes you.
Scott Ritter is a very well-known archetype of a certain U.S. military officer. Very hard talking, very ambitious, zealous, and completely consumed with carrying out his mission. He's a guy who, throughout his career, I would say, did not break rules, but he worked around road blocks.