Summary of No Place to Hide (eBook)
39 Seiten
Instaread, Inc (Verlag)
978-1-68378-226-1 (ISBN)
Summary of No Place to Hide by Glenn Greenwald | Includes Analysis
Preview:
Chapter 1
Edward Snowden first contacted Glenn Greenwald on December 1,
2012, using the alias name Cincinnatus. Snowden is a former
Senior Advisor to the NSA, a former Field Officer with the CIA,
and a former lecturer for the United States Defense Intelligence
Agency. He had confidential information he wanted to share with
Greenwald, but would only do it if he knew their connection was
secure.
Greenwald is a journalist known for his reporting on the
wrongdoings of the National Security Agency (NSA). Snowden
wanted Greenwald to use PGP (pretty good privacy) encryption on
his computer so that he could safely send him some information
that he had gathered. Although Greenwald considered adding these
extra security measures to his computer, he was very busy with
other things and did not want to take the time to put the
complicated software in place. Snowden sent him a guide on how
to add the encryption, but Greenwald still took no action. Snowden
offered to find someone who could help Greenwald install the
system. Without positive proof that the information Snowden had
was really newsworthy, Greenwald did not feel motivated to take
the steps necessary to install the PGP encryption. However,
without a secure form of communication in place, Snowden was
unwilling to risk sharing the information he had with Greenwald.
This communication between the two took place over several
weeks and then came to a standstill.
On April 18, Laura Poitras contacted Greenwald. Laura Poitras is a
documentary filmmaker who is known for fearlessly taking risks in
making her films. She made three films about the conduct of the
United States during the war on terror, which made her a target of
government officials whenever she entered or left the country.
Poitras wanted to talk to Greenwald about something but would
only do it in person and in private in a secure location...
PLEASE NOTE: This is a summary and analysis of the book and NOT the original book.
About the Author:
With Instaread Summaries, you can get the summary of a book in 30 minutes or
less. We read every chapter, summarize and analyze it for your convenience.
| Erscheint lt. Verlag | 19.5.2016 |
|---|---|
| Sprache | englisch |
| Themenwelt | Mathematik / Informatik ► Informatik |
| ISBN-10 | 1-68378-226-7 / 1683782267 |
| ISBN-13 | 978-1-68378-226-1 / 9781683782261 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich