This article discusses the faults in former deputy director of the CIA Michael Morell's statement that the use of encrypted apps made it difficult to stop terrorists. Claims that encrypted communications put them out of reach was false - there had been no change in al Qaeda tactics. Also, author Howard points out that there isn't a clear dichotomy between privacy and security.
E-text for a book detailing the fundamentals behind modern cryptography and how they are applied in practice. Lots of detailed information about various underlying theorems and mathematical properties and how they work, as well as various encryption techniques and cryptographic processes.
Video camera surveillance, Biometric data collection (fingerprints), RFID Tags (monitors movement to within centimeters), Galvanic Skin Response Bracelet (monitors a child's physiological responses)
This blog contains vast amounts of information dealing with military cryptography, both in the past and the present. One of the recent articles discussed the morality of utilizing military level cryptography to ensure complete surveillance of civilians, and whether or not it should be allowed.
China will complete and put into service the world's longest quantum communication network stretching 2,000km from Beijing to Shanghai by 2016. By 2030, the Chinese network would be extended worldwide, Xinhua reported.