The Risks Digest

The RISKS Digest

Forum on Risks to the Public in Computers and Related Systems

ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator

Volume 27 Issue 93

Thursday 15 May 2014


Germany Sets New Record, Generating 74 Percent Of Energy Needs from Renewable Energy
Kiley Kroh
Who Watches the Watchers? *Beyond the NSA* via Rebecca Mercuri
Dan Wallach's talk at NSF on STAR-Vote
Jeremy Epstein
Photo from san diego fire
Paul Saffo
Kansas muzzles academic tweets
Richard Forno
Forged SSL Certs
Chris Beck
EFF: Which Tech Companies Help Protect You From Government Data Demands?
Rebecca Jeschke
EFF: AT&T, Comcast, and Snapchat are laggards on privacy policies
Ars Technica
Can This Web Be Saved? Mozilla Accepts DRM, and We All Lose
Danny O'Brien via Dewayne Hendricks via Dave Farber
Internet Subversion
Bruce Schneier
FCC votes to proceed with net neutrality rules
Here's that FCC net neutrality compromise everyone demanded. And here's the problem.
Stacey Higginbotham
A politician, paedophile and doctor have already asked Google “to be forgotten''
Glenn Greenwald: U.S. Corporate Media is “Neutered, Impotent and Obsolete''
Democracy Now
Info on RISKS (comp.risks)

Germany Sets New Record, Generating 74 Percent Of Energy Needs from Renewable Energy (Kiley Kroh via Dave Farber)

Dewayne Hendricks <>
May 14, 2014 at 1:28:23 PM EDT
  [Some readers will ask, Why is this computer-related?  The answer of
  course that our computer systems and especially Big Data systems tend to
  be power hungry.  Besides, I have been harping for years on the need for
  holistic thinking, and thus it behooves us to keep in mind the effects of
  climate change (the popular term for `global warming') in our long-term
  thinking.  Thus, this item seems highly relevant to the bigger picture.

Kiley Kroh, *Think Progress*, 13 May 2014

On Sunday, Germany's impressive streak of renewable energy milestones
continued, with renewable energy generation surging to a record portion --
nearly 75 percent—of the country's overall electricity demand by
midday. With wind and solar in particular filling such a huge portion of the
country's power demand, electricity prices actually dipped into the negative
for much of the afternoon, according to Renewables International.

In the first quarter of 2014, renewable energy sources met a record 27
percent of the country's electricity demand, thanks to additional
installations and favorable weather. “Renewable generators produced 40.2
billion kilowatt-hours of electricity, up from 35.7 billion kilowatt-hours
in the same period last year,'' Bloomberg reported. Much of the country's
renewable energy growth has occurred in the past decade and, as a point of
comparison, Germany's 27 percent is double the approximately 13 percent of
U.S. electricity supply powered by renewables as of November 2013.

Observers say the records will keep coming as Germany continues its
Energiewende, or energy transformation, which aims to power the country
almost entirely on renewable sources by 2050.

“Once again, it was demonstrated that a modern electricity system such as
the German one can already accept large penetration rates of variable but
predictable renewable energy sources such as wind and solar PV power,'' said
Bernard Chabot, a renewable energy consultant based in France, via
e-mail. “In fact there are no technical and economic obstacles to go first
to 20 percent of annual electricity demand penetration rate from a
combination of those two technologies, then 50 percent and beyond by
combining them with other renewables and energy efficiency measures and some
progressive storage solutions at a modest level.''  ]...]

Who Watches the Watchers?

Rebecca Mercuri <>
Thu, 15 May 2014 17:15:19 -0400
*Beyond the NSA* is a series of articles at, examining the
unchecked expansion of private-sector data collection and its implications
for consumer privacy.

One of the articles in this series—“Who watches the watchers? Big Data
goes unchecked''—can be found at
The lead is “The NSA might be tracking your phone calls. But private
industry is prying far more deeply into your life.''

This is even true of the Webpage containing the article itself!
A Ghostery analysis shows that the page initiates 495 calls to various http
or https Websites, at 38 locations, including 92 of these to DoubleClick.

As the article says, “it's kind of creepy.''

Dan Wallach talk at NSF on STAR-Vote (also recorded)

Jeremy Epstein <>
Thu, 15 May 2014 08:08:48 -0400
I'm honored to have Dan Wallach speaking at NSF today (this is a lecture
series I organize).  Please watch it on the recorded copy.  (BTW, the
recorded copy is closed captioned.)

Dan Wallach (Rice University), STAR-Vote: A Secure, Transparent, Auditable,
and Reliable Voting System, 15 May 2014

STAR-Vote is a collaboration between a number of academics and the Travis
County (Austin), Texas elections office, which currently uses a DRE voting
system and previously used an optical scan voting system. STAR-Vote
represents a rare opportunity for a variety of sophisticated technologies,
such as end-to-end cryptography and risk limiting audits, to be designed
into a new voting system, from scratch, with a variety of real world
constraints, such as election-day vote centers that must support thousands
of ballot styles and run all day in the event of a power failure. This paper
describes the current design of STAR-Vote which is now largely settled and
whose development will soon begin.


Dan Wallach is a professor in the Department of Computer Science and a Rice
Scholar at the Baker Institute for Public Policy at Rice University in
Houston, Texas. His research considers a variety of different computer
security topics, ranging from web browsers and servers through electronic
voting technologies and smartphones.

Future talks:
Jul 17 2014: Crispin Cowan, Microsoft
Nov 13 2014: Data Chisnell from UsabilityWorks

Photo from san diego fire

Paul Saffo <>
Fri, 16 May 2014 06:33:32 -0700
An old story, but right in the risks area:

Kansas muzzles academic tweets (via Dave Farber)

Richard Forno <>
May 15, 2014 7:17 AM
In Kansas, Professors Must Now Watch What They Tweet
NRP,  14 May 2014

The Kansas Board of Regents gave final approval Wednesday to a strict new
policy on what employees may say on social media. Critics say the policy
violates both the First Amendment and academic freedom, but school officials
say providing faculty with more specific guidelines will actually bolster
academic freedom on campus.

The controversial policy was triggered by an equally controversial tweet
posted last September by David Guth, an associate journalism professor.
Reacting to a lone gunman who killed 12 people at the Washington Navy Yard
in Washington, D.C., he wrote: “The blood is on the hands of the #NRA. Next
time, let it be YOUR sons and daughters.''

Guth was placed on administrative leave after an outcry from the public and
state lawmakers.

Rep. Travis Couture-Lovelady, a member of the Kansas House of
Representatives and the National Rifle Association, says he was outraged by
the tweet. He supports the board of regents' new policy to place parameters
on professors.  “Look, you have freedom of speech, but you can't go this
far, I think having a clear understanding between faculty and the board of
regents on what's acceptable and what's not is better for everyone

The new policy says that faculty and staff of the state's six universities,
19 community colleges and six technical colleges may not say anything on
social media that would incite violence, disclose confidential student
information or release protected data. But it also says staffers are barred
from saying anything “contrary to the best interests of the university.''

Critics say the broad nature of the guidelines would offer administrators
enormous latitude in firing people—even those with tenure.

Will Creeley, director of legal and public advocacy at the Foundation for
Individual Rights in Education, says it's one of the most restrictive social
media policies in the country.  “We have a First Amendment to protect
controversial statements like professor Guth's, We don't have it to protect
pictures of kittens posted on Facebook. If you punish a student or professor
for a clearly protected speech, you send a message to everyone else on
campus that you better watch what you say.''

Kansas University science professor Burdett Loomis says the regents are
scared of Kansas lawmakers. “All of this has to be taken into account in
the context of a very, very conservative Kansas Legislature that has very
little sympathy, I think, for higher education,'' Loomis says. The board of
regents is appointed by the state's Republican governor, Sam Brownback.

Last December, when the board of regents first announced that a new policy
was in the works, Loomis posted this reaction on Facebook: “Unbelievably
broad and vague set of policies. Perfect example of using a nuclear weapon
to destroy a gnat of a pseudo problem.''

The board of regents chairman, Fred Logan, has dismissed the controversy
over the policy as `ludicrous'. He defended the new policy and said it would
shore up academic freedom by creating more specific guidelines.  “In many
respects, the work that has been done has really focused on lifting up
academic freedom as a core principle for the Kansas Board of Regents.  Now,
that may sound funny, but if you look in our policy manual, there's really
not much in there about that.''

As for Guth, the professor who triggered the policy, he spent this semester
on sabbatical in far western Kansas. But he's still talking; on his blog, he
writes, “How can a guy talk to students about social media if he doesn't
participate in the online discussion?''

Forged SSL Certs (via Dave Farber)

Chris Beck <>
May 16, 2014 at 9:38:16 AM EDT

EFF: Which Tech Companies Help Protect You From Government Data Demands? (via Dave Farber)

Rebecca Jeschke <>
May 15, 2014 at 2:02:13 PM EDT
Electronic Frontier Foundation Media Release
For Immediate Release: Thursday, 15 May 2014


Rebecca Jeschke
 Media Relations Director
 Electronic Frontier Foundation
 +1 415 436-9333 x177

Which Tech Companies Help Protect You From Government Data

EFF Survey Shows Improved Privacy and Transparency Policies
of the Internet's Biggest Companies

San Francisco - Technology companies are privy to our most sensitive
information: our conversations, photos, location data, and more.  But which
companies fight the hardest to protect your privacy from government data
requests?  Today, the Electronic Frontier Foundation (EFF) releases its
fourth annual *Who Has Your Back* report, with comprehensive information on
26 companies' commitments to fighting unfair demands for customer data.  The
report examines the privacy policies, terms of service, public statements,
and courtroom track records of major technology companies, including
Internet service providers, e-mail providers, social networking sites, and
mobile services.

“The sunlight brought about by a year's worth of Snowden leaks appears have
prompted dozens of companies to improve their policies when it comes to
giving user data to the government,'' said EFF Activism Director Rainey
Reitman.  “Our report charts objectively verifiable categories of how tech
companies react when the government seeks user data, so users can make
informed decisions about which companies they should trust with their

EFF's report awards up to six gold stars for best practices in categories
like require a warrant for content, and publish transparency reports.  Last
year, only one company we surveyed earned a full six stars—Sonic, a
California ISP.  This year, Apple, CREDO Mobile, Dropbox, Facebook, Google,
Microsoft, Twitter, and Yahoo all joined Sonic in receiving six full stars,
and several others—LinkedIn, SpiderOak, Tumblr, Wickr and Wordpress --
only missed getting all six stars because they did not have to bring public
court battles on behalf of their users.

This year, the majority of the companies surveyed have made a formal
commitment to inform users when their data was sought, a welcome safeguard
that gives users the information they need to fight on their own.  This
shows that the technology industry is adopting a best practice pioneered by
Twitter, which in 2010 fought for the right to tell its users about a
government order for their information as part of the WikiLeaks

Additionally, 20 of the companies EFF reviewed published transparency
reports detailing government requests for user data, which is a striking
increase from last year, when only seven companies in EFF's report published
them.  This is now a new standard in the tech industry: corporations are
actively and voluntarily working to shed light on the government attempts to
access user data.  However, it's not all good news in this year's report.
Photo-messaging application Snapchat received only one star—particularly
troubling due to the sensitive nature of photos and the company's young user

“Snapchat joins AT&T and Comcast in failing to require a warrant for
government access to the content of communications.  That means the
government can obtain extraordinarily sensitive information about your
activities and communications without convincing a judge that there is
probable cause to collect it,'' said EFF Staff Attorney Nate Cardozo.  “We
urge these companies to change course and give their users this simple and
needed protection from government overreach.''

As part of this year's report, EFF collaborated with data analysis company
Silk to help explore trends in government access requests.  Silk's analysis
provides a simple mechanism for reporters and the general public to explore
corporate transparency reports, shedding light on which companies receive
the most data requests, which companies push back against government data
requests, and which countries are most aggressive in demanding user data.

For the full report, *Who Has Your Back*:

For the Silk analysis:

For this release:

About EFF

The Electronic Frontier Foundation is the leading organization protecting
civil liberties in the digital world. Founded in 1990, we defend free speech
online, fight illegal surveillance, promote the rights of digital
innovators, and work to ensure that the rights and freedoms we enjoy are
enhanced, rather than eroded, as our use of technology grows. EFF is a
member-supported organization.  Find out more at

EFF: AT&T, Comcast, and Snapchat are laggards on privacy policies

Lauren Weinstein <>
Thu, 15 May 2014 14:08:38 -0700
EFF: AT&T, Comcast, and Snapchat are laggards on privacy policies
  [Terser summary of the preceding item.  PGN]

(Ars Technica via NNSquad)

  The highest ratings—companies given six stars—were handed to Apple,
  Credo Mobile, Dropbox, Facebook, Google, Microsoft, Sonic, Twitter, and
  Yahoo.  The report, released Thursday, reviewed 26 companies in all,
  rating them on everything from whether they require warrants for data
  handovers to whether they have publicly opposed mass surveillance and
  fight for “users' privacy rights in courts.''  The study found that
  Snapchat, AT&T, and Comcast lagged “behind others.'' Snapchat was among
  the biggest privacy underachievers, earning one star.

Can This Web Be Saved? Mozilla Accepts DRM, and We All Lose (Danny O'Brien via Dave Farber)

Dewayne Hendricks <>
May 16, 2014 at 12:49:14 AM EDT
Danny O'brien, EFF, 14 May 2014

It's official: the last holdout for the open web has fallen. Flanked on all
sides by Google, Microsoft, Opera, and (it appears) Safari's support and
promotion of the EME DRM-in-HTML standard, Mozilla is giving in to pressure
from Hollywood, Netflix, et al, and will be implementing its own third-party
version of DRM. It will be rolled out in Desktop Firefox later this
year. Mozilla's CTO, Andreas Gal, says that Mozilla “has little choice.''
Mozilla's Chair, Mitchell Baker adds, “Mozilla cannot change the industry on
DRM at this point.''

At EFF, we disagree. We've had over a decade of watching this ratchet at
work, and we know where it can lead. Technologists implement DRM with great
reticence, because they can see it's not a meaningful solution to anything
but rather a font of endless problems. It doesn't prevent infringement,
which continues regardless. Instead, it reduces the security of our devices,
reduces user trust, makes finding and reporting of bugs legally risky,
eliminates fair use rights, undermines competition, promotes secrecy, and
circumvents open standards.

It's clear from the tone of Gal and Baker's comments, and our own
discussions with Mozilla, that you'll find no technologist there who is
happy with this step. The fact that Mozilla, in opposition to its mission,
had to prepare and design this feature in secret without being able to
consult the developers and users who make up its community is an indication
of how much of a contradiction DRM is in a pro-user open-source browser.

Unchecked, that contradiction is only going to grow. Mozilla's DRM
code,imported from Adobe as a closed-source binary, will sit in a cordoned
sandbox, simultaneously Mozilla's responsibility but beyond its
control. Mozilla will be responsible for updates to the DRM blackbox, which
means users will have to navigate browser updates that will either fix
security bugs or strip features from their video watching. Mozillians have
already been warned of the danger of talking too much about how DRM works
(and doesn't work), lest they trigger the provisions in the Digital
Millennium Copyright Act (DMCA) that forbid `trafficking' in circumvention

Baker may think that Mozilla cannot change the industry on its own (despite
it having done so many years ago). Sadly, it changes the industry by
accepting DRM. It is these repeated compromises to the needs of DRM
advocates by tech company after tech company that are changing the nature of
personal computing, transforming it into a sector that is dominated by
established interests and produces locked-down devices, monitored and
managed by everyone but their users.

Past experience has shown that standing up to DRM and calling it out does
have an effect. As we have said to the W3C, and Cory Doctorow spells out to
Mozilla in this Guardian article, we can do much more to fight the negative
consequences of DRM than simply attempt to mitigate the damage of its
adoption. [...]

Internet Subversion

Bruce Schneier <>
Wed, 14 May 2014 22:02:06 -0500
CRYPTO-GRAM, May 15, 2014, by Bruce Schneier, CTO, Co3 Systems, Inc.

In addition to turning the Internet into a worldwide surveillance platform,
the NSA has surreptitiously weakened the products, protocols, and standards
we all use to protect ourselves. By doing so, it has destroyed the trust
that underlies the Internet. We need that trust back.  Trust is inherently
social. It is personal, relative, situational, and fluid. It is not uniquely
human, but it is the underpinning of everything we have accomplished as a
species. We trust other people, but we also trust organizations and
processes. The psychology is complex, but when we trust a technology, we
basically believe that it will work as intended.

This is how we technologists trusted the security of the Internet. We didn't
have any illusions that the Internet was secure, or that governments,
criminals, hackers, and others couldn't break into systems and networks if
they were sufficiently skilled and motivated. We didn't trust that the
programmers were perfect, that the code was bug-free, or even that our
crypto math was unbreakable. We knew that Internet security was an arms
race, and the attackers had most of the advantages.  What we trusted was
that the technologies would stand or fall on their own merits.

We now know that trust was misplaced. Through cooperation, bribery, threats,
and compulsion, the NSA—and the United Kingdom's GCHQ—forced companies
to weaken the security of their products and services, then lie about it to
their customers.

We know of a few examples of this weakening. The NSA convinced Microsoft to
make some unknown changes to Skype in order to make eavesdropping on
conversations easier. The NSA also inserted a degraded random number
generator into a common standard, then worked to get that generator used
more widely.

I have heard engineers working for the NSA, FBI, and other government
agencies delicately talk around the topic of inserting a `backdoor' into
security products to allow for government access. One of them told me,
“It's like going on a date. Sex is never explicitly mentioned, but you know
it's on the table.'' The NSA's SIGINT Enabling Project has a $250 million
annual budget; presumably it has more to show for itself than the fragments
that have become public. Reed Hundt calls for the government to support a
secure Internet, but given its history of installing backdoors, why would we
trust claims that it has turned the page?  We also have to assume that other
countries have been doing the same things. We have long believed that
networking products from the Chinese company Huawei have been backdoored by
the Chinese government. Do we trust hardware and software from Russia?
France? Israel? Anywhere?  This mistrust is poison. Because we don't know,
we can't trust any of them. Internet governance was largely left to the
benign dictatorship of the United States because everyone more or less
believed that we were working for the security of the Internet instead of
against it. But now that system is in turmoil. Foreign companies are fleeing
US suppliers because they don't trust American firms' security claims. Far
worse governments are using these revelations to push for a more
isolationist Internet, giving them more control over what their citizens see
and say.  All so we could eavesdrop better.

There is a term in the NSA: `nobus', short for `nobody but us'.  The NSA
believes it can subvert security in such a way that only it can take
advantage of that subversion. But that is hubris. There is no way to
determine if or when someone else will discover a vulnerability. These
subverted systems become part of our infrastructure; the harms to everyone,
once the flaws are discovered, far outweigh the benefits to the NSA while
they are secret.

We can't both weaken the enemy's networks and protect our own. Because we
all use the same products, technologies, protocols, and standards, we either
allow everyone to spy on everyone, or prevent anyone from spying on
anyone. By weakening security, we are weakening it against all attackers. By
inserting vulnerabilities, we are making everyone vulnerable. The same
vulnerabilities used by intelligence agencies to spy on each other are used
by criminals to steal your passwords. It is surveillance versus security,
and we all rise and fall together.

Security needs to win. The Internet is too important to the world—and
trust is too important to the Internet—to squander it like this.
We'll never get every power in the world to agree not to subvert the parts
of the Internet they control, but we can stop subverting the parts we
control. Most of the high-tech companies that make the Internet work are US
companies, so our influence is disproportionate. And once we stop
subverting, we can credibly devote our resources to detecting and preventing
subversion by others.

This essay previously appeared in the *Boston Review*.

FCC votes to proceed with net neutrality rules

Lauren Weinstein <>
Thu, 15 May 2014 09:53:49 -0700
(BBC via NNSquad)

  “The controversial proposals have drawn an unprecedented level of scrutiny
  to the Federal Communication Commission (FCC) and its vote, which was
  passed with three commissioners voting in favour and two against.  The
  meeting of the five commissioners was repeatedly interrupted by
  protesters, several of whom were removed from the room.''

 - - -

Had to go to BBC for this. CNN is busy running wall to wall playback and
analysis of phone conversations of an apparently senile basketball team
owner, recorded illegally by his pimp. They also interviewed the pimp live.
So they don't have time left for stories affecting the future of the

Here's that FCC net neutrality compromise everyone demanded. And here's the problem. (Stacey Higginbotham via Dave Farber)

*Dewayne Hendricks* <>
Thursday, May 15, 2014
Stacey Higginbotham,, 15 May 2014

The FCC is sticking to its guns on net neutrality, voting to approve a
framework for rules that could create an Internet fast lane, while trying
to patch up the loopholes that would make that fast lane possible.

On Thursday, the FCC commissioners voted 3-2 to approve a framework for net
neutrality rules that continue to favor the creation of an Internet fast
lane while exploring a line of inquiry into the idea of reclassifying
broadband as a public utility. So, while the Federal Communications
Commission has taken the protesters outside their offices to heart and
adjusted the focus of its net neutrality rules a bit, the fate of the
Internet is still up in the air.

The notice sets off a discussion process that will culminate in new net
neutrality rules, which chairman Tom Wheeler has said he hopes will be in
place before the end of the year. Such rules are aimed at preventing ISPs
from discriminating against traffic on their pipe, for example,
preventing Comcast from slowing Gigaom traffic while stories from
Comcast-owned NBC properties load with ease. However, the timing of actual
rules will depend on what the agency decides to do after the four-month
comment period on today's proposed rules expires. So what are those
rules? I'll explain below.

Bringing in wireless networks to the net neutrality fold: In 2010, wireless
and wireline networks were subject to different net neutrality rules after a
compromise between Google and Verizon. The rules around discrimination on
wireless networks were a bit more lenient, given the challenges of
delivering large amounts of content over limited spectrum resources. By
including the possibility of bringing wireless further into these rules, we
have the debate over wireless discrimination all over again. And this is
truly a tough debate because the physics of wireless networks are different
from wireline networks. But with AT&T and Verizon trying to push landline
and DSL customers onto LTE networks for voice and broadband access in rural
areas, this debate is essential in order to make sure that the customers who
have no choice but LTE have the same Internet options as someone with cable
or fiber.

Enhance transparency rule: This is pretty simple, but the idea here is that
when ISPs take actions to block content or slow content or engage in deals
with companies under any sort of prioritization scheme, customers will know
about it, so they can “weigh their options.''  While it's nice to know that
AT&T might have faster Netflix because the two companies have signed a deal
to put Netflix traffic in a fast lane, it doesn't help me if my only other
alternative is Time Warner Cable that has put Gigaom's servers in a fast
lane, so I can send my video files back to my corporate office. Consumers
will be left with bad choices or no choices, depending on their needs and

No blocking: This gets into the concept of the Internet slow lane. As part
of no blocking, the agency recognizes that there are plenty of things an ISP
can do to make content unusable, such as slowing it to the point where video
files become unwatchable or packets in a download are lost. This rule
proposes minimum standards that remain to be seen (I'll update when I see
them) and will be a source of much drama in the weeks and months to come,
because activists worry that it's the weak legal link that ISPs can use to
fight the new net neutrality rules.

No paid prioritization: The rules also try to say that priority service
offered exclusively by a broadband provider to an affiliate should be
considered illegal until proven otherwise. However, the agency acknowledges
that this is a `Crebuttable presumption', which it defines as “presumption
that is taken to be true unless someone comes forward to contest it and
proves otherwise.''  Like a court case. That would then allow for paid
prioritization. Yes, that is a house the FCC is building on sand. [...]

A politician, paedophile and doctor have already asked Google “to be forgotten'' says the BBC

Lauren Weinstein <>
Thu, 15 May 2014 09:39:11 -0700
(Next Web via NNSquad)

  “Now, the BBC reports that Google has received fresh takedown requests,
  from a former politician currently seeking re-election and who wants
  mentions of his behaviour in office deleted. Also, a man convicted of
  owning images of child abuse has requested links about his convictions to
  be removed, while a doctor has sought to delete negative reviews from his

 - - -

It would have been SO much easier for Stalin to delete `unfortunate' aspects
of his history (not to mention completely deleting his ex-colleagues) if he
had had access to the EU `right to be forgotten'.  Yep.  He didn't really
believe in the public's Right to Know—like the EU, apparently.

Glenn Greenwald: U.S. Corporate Media is “Neutered, Impotent and Obsolete''

Dewayne Hendricks <>
May 15, 2014 8:00 AM
  [via Dave Farber, who comments, “This was a major part of the new book
  from Greenwald, very very interesting.''

Democracy Now, 14 May 2014

In the final part of our extended interview, Glenn Greenwald reflects on the
Pulitzer Prize, adversarial journalism and the corporate media's response to
his reporting on Edward Snowden's leaked National Security Agency
documents. “We knew that once we started publishing not one or two stories,
but dozens of stories, that not just the government, but even fellow
journalists were going to start to look at what we were doing with
increasing levels of hostility and to start to say, 'This doesn't actually
seem like journalism anymore,' because it's not the kind of journalism that
they do.  It doesn't abide by these unspoken rules that are designed to
protect the government.''

Glenn Greenwald, Pulitzer Prize-winning journalist and author of the new
book, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance

Please report problems with the web pages to the maintainer