Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Snowden made clear that he believed in legitimate intelligence operations but said the NSA should abandon its electronic surveillance of entire civilian populations. Instead, Snowden said, it should go back to the traditional model of eavesdropping against specific targets, such as 'North Korea, terrorists, cyber-actors, or anyone else.' Snowden also urged members of the Council of Europe to encrypt their personal communications and said that encryption, used properly, could still withstand 'brute force attacks' from powerful spy agencies and others. 'Properly implemented algorithms backed up by truly random keys of significant length all require more energy to decrypt than exists in the universe.'"
The brain was not designed for reading and there are no genes for reading like there are for language or vision. ... Before the Internet, the brain read mostly in linear ways — one page led to the next page, and so on. The Internet is different. With so much information, hyperlinked text, videos alongside words and interactivity everywhere, our brains form shortcuts to deal with it all — scanning, searching for key words, scrolling up and down quickly. This is nonlinear reading, and it has been documented in academic studies. ... Some researchers believe that for many people, this style of reading is beginning to invade our ability to deal with other mediums. 'We're spending so much time touching, pushing, linking, scrolling and jumping through text that when we sit down with a novel, your daily habits of jumping, clicking, linking is just ingrained in you,' says Andrew Dillon."
The documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual "SIGDEV" gathering of the "Five Eyes" surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda."