Intro: IT Security in the Snowden Era