"In a discussion of how to secure the "critical infrastructure" of the United States he described the phenomenon of compromised computer hardware - namely, chips that have hidden "back doors" inserted into them at the design or manufacturing stage - as "the problem from hell". And, he went on, "frankly, it's not a problem that can be solved"."
"The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself."
"There it is. If you run a business, and the FBI or NSA want to turn it into a mass surveillance tool, they believe they can do so, solely on their own initiative. They can force you to modify your system. They can do it all in secret and then force your business to keep that secret. Once they do that, you no longer control that part of your business. You can't shut it down. You can't terminate part of your service. In a very real sense, it is not your business anymore. It is an arm of the vast U.S. surveillance apparatus, and if your interest conflicts with theirs then they win. Your business has been commandeered."
"Silent Circle, a secure communications company founded by PGP creator Phil Zimmerman, has pre-emptively shut down its secure, encrypted email service and destroyed the servers so that it cannot be forced to reveal its customers' secrets to NSA spooks. "
"The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet."
"President Obama has reassured US citizens that 'nobody is listening to your calls', but it's not the content of conversations that intelligence agencies crave"
"In this age of information overload, internet exhibitionism and NSA snooping, is it possible to make yourself unGoogleable? And does it earn you added credibility, as fashion designer Phoebe Philo and bands such as !!! suggest?"
"The NSA has a tool that records and analyzes all the flow of data that the spy agency collects around the world. Think of it as a global data-mining software that details exactly how much intelligence, and of what type, has been collected from every country in the world. It's aptly called "Boundless Informant." "
"UK's electronic eavesdropping and security agency, GCHQ, has been secretly gathering intelligence from the world's biggest internet companies through a covertly run operation set up by America's top spy agency, documents obtained by the Guardian reveal."