Discover one of our 28 local entrepreneurial communities »
Be the first to know as we launch in new countries and markets around the globe.
Interested in bringing MIT Technology Review to your local market?
Unsupported browser: Your browser does not meet modern web standards. See how it scores »
The security researcher Bruce Schneier, who is now helping the Guardian newspaper review Snowden documents, suggests that more revelations are on the way.
Along with NSA spying revelations, 2013 brought faster wireless technologies, global connectivity expansion, and new communications business models.
Revelations that the NSA has compromised hardware for surveillance highlights the vulnerability of computer systems to such attacks.
New details of the NSA’s capabilities suggest encryption can still be trusted. But more effort is needed to fix problems with how it is used.
Leaked documents suggest that American spies can decrypt much of the data they collect by tapping into Internet service providers and telecommunications cables.
Microsoft redesigned its systems to aid U.S. surveillance programs, but whether it did so voluntarily or under duress is unknown.
U.S. companies that pass data from European Union citizens to the NSA’s PRISM surveillance program could be breaching the E.U.’s data-protection laws.
Privacy advocates have warned for years about the kinds of surveillance revelations that were aired this week.