Tapping the strange science of quantum mechanics, physicists are creating new data security protocols that even the NSA can't crack.
By Clay Dillow
FORTUNE -- The news out of Moscow of late has been dominated by Edward Snowden, the American leaker of secret state documents who is currently seeking temporary asylum in Russia. Meanwhile, across town and to much less fanfare, Dr. Nicolas Gisin found himself explaining last week the solution MOREJul 29, 2013 2:45 PM ET
The coalition between civil libertarians on the left and right appears to be stronger than many had thought. But it appears to be an alliance of convenience.
FORTUNE -- The close, bipartisan vote on Wednesday on a House bill to restrict the National Security Agency's program phone surveillance program revealed a radical evolution -- or devolution, depending on how you look at -- in how we approach the always-difficult tension between MOREDan Mitchell, contributor - Jul 25, 2013 4:02 PM ET
Kevin Mandia, who uncovered Chinese hacking, describes how he stumbled onto one of the largest domestic security breaches ever.
FORTUNE -- When 42-year-old Kevin Mandia went public last February with a 60-page report detailing the Chinese theft of American trade secrets, the move propelled his cybersecurity firm Mandiant to the forefront of a national security fire storm.
The story of how Mandia discovered one of America's largest security breaches ever -- and MOREJP Mangalindan, Writer - Jul 24, 2013 7:34 PM ET
In the space of six months Apple received 4,000 to 5,000 law enforcement requests.
FORTUNE -- Embarrassed to find itself on the list of companies from whose servers the National Security Agency claims to have been "directly" collecting data, Apple (AAPL) issued a public statement early Monday that it hoped would allay its customers' concerns. Among the key points:
The authorities asked for a ton of information: Between Dec. 1, 2012 and May MOREPhilip Elmer-DeWitt - Jun 17, 2013 7:21 AM ET
Companies like Silent Circle, which promises to secure or get rid of consumers' private information, have seen a surge in the wake of government spying reports.
FORTUNE -- Silent Circle, an app that allows users to place encrypted phone calls, makes money on paranoia. Paranoia like, say, the fear that the government might build a massive surveillance operation in cooperation with major tech companies and then keep it secret from the MOREJun 14, 2013 10:24 AM ET
What's next for the companies involved in the NSA leaks scandal.
By Ryan Bradley, senior editor
FORTUNE -- On Sunday, a 29-year-old Booz Allen Hamilton employee named Edward Snowden stepped forward and (via the Guardian) told the world why he chose to make public top-secret National Security Agency documents. The NSA files, particularly those concerning a program called PRISM, describe how the agency could access data from several of America's largest MOREJun 10, 2013 9:23 AM ET
Apple, Google, Yahoo and Microsoft have denied participating in the controversial government program. When will one of their employees say otherwise?
By Ryan Bradley, senior editor
FORTUNE -- Thursday night, after the Guardian broke news of Verizon's involvement in a massive domestic spying operation by the National Security Agency, the Washington Post and the Guardian both revealed the existence of a program called PRISM -- a means by which the government gained access MOREJun 7, 2013 11:51 AM ET
A company called Placed is applying some of the methods used online to the real world.
FORTUNE -- Foot traffic at bookstores rose by 27% in the first quarter of this year, according to a report issued this week by Placed, a Seattle-based company that aims to bring Internet-like marketing analytics to the offline world.
That seems like a surprising number. It's hard to know for sure how accurate it is, or MOREDan Mitchell, contributor - May 24, 2013 12:07 PM ET
Hearings on the CISPA cybersecurity measure may be held as soon as next week - behind closed doors.
FORTUNE -- The House Intelligence Committee, possibly as early as next week, will discuss the Cyber Intelligence Sharing and Protection Act (CISPA) for the second time. And for the second time, it will do so behind closed doors.
The bill is designed to make it easier for private companies to share the personal information of MOREDan Mitchell, contributor - Apr 5, 2013 2:10 PM ET
Companies and lobbyists that support CISPA, a proposed cyber-security law that critics call intrusive, outspent opponents by a factor of 13 in House campaign contributions. Nevertheless, CISPA is losing traction.
FORTUNE -- Despite hardball lobbying and vast piles of money shoved toward members of Congress, it's proving to be extremely difficult to pass legislation that is opposed by advocates of privacy and Internet freedom. This was proved last year with the MOREDan Mitchell, contributor - Mar 22, 2013 2:30 PM ET
|Delinquent IRS employees paid bonuses by the agency|
|Students cry foul over athletes unionizing|
|Is capitalism driving itself out of business?|
|Sandy Hook victim's grandfather launches smart gun campaign|
|Premarkets: Waiting for big tech earnings|