-
+15 +3
CIA, FBI, and NSA chiefs say they wouldn’t use Huawei or ZTE phones
Officials from top U.S. intelligence agencies commented on potential cybersecurity threats from Chinese companies including Huawei and ZTE.
-
+10 +1
Deep State agent amused and annoyed by your conspiracy theories
An agent of the deep state working undercover with the NSA has expressed mixed feelings toward the conspiracy theories you post online.
-
+9 +2
Fear and Mass Surveillance: Our Constitutionally Toxic Political Cocktail
Congress has reauthorized Section 702 due to fear. By Patrick G. Eddington. (Jan. 18, 2018)
-
+25 +3
U.S. Border Guards can Search your Phone: Here are some Details on How
U.S. Customs and Border Protection issued a new directive that sets new limits on border agents accessing travellers' phones, establishing criteria for when they can demand passwords, conduct extensive searches, like downloading documents stored in the cloud, or uploading files into a storage drive for analysis.
-
+18 +3
'Very high level of confidence' Russia used Kaspersky software for devastating NSA leaks
Three months after U.S. officials asserted that Russian intelligence used popular antivirus company Kaspersky to steal U.S. classified information, there are indications that the alleged espionage is related to a public campaign of highly damaging NSA leaks by a mysterious group called the Shadow Brokers.
-
+9 +1
Documents Reveal the Complex Legacy of James Angleton, CIA Counterintelligence Chief and Godfather of Mass Surveillance
James Angleton was a conspiracy theorist with state power who had a profound impact on America’s secret government.
-
+31 +6
The Pentagon’s Secret Search for UFOs
Funded at the request of Harry Reid, the program probed a number of encounters military pilots had with aircraft they believed didn’t operate like anything they had seen before.
-
+16 +2
The confrontation that fueled the fallout between Kaspersky and the U.S. government
The United States’ hostile relationship with Moscow-based cybersecurity firm Kaspersky Lab may have been partially shaped by an incident two years ago in which an eyebrow-raising Kaspersky sales pitch eventually led to a secret and previously undisclosed confrontation between Russian intelligence and the CIA. The confrontation, which ended in Russia’s domestic intelligence agency issuing a diplomatic démarche, was the result of the U.S. government’s intrusive treatment of the...
-
+21 +6
ISO Rejects NSA Encryption Algorithms - Schneier on Security
The ISO has decided not to approve two NSA-designed block encryption algorithms: Speck and Simon. It's because the NSA is not trusted to put security ahead of surveillance:
-
+17 +4
Trump Administration Says It's Classified If They Can Let The NSA Spy On Americans
Senator Ron Wyden, as a member of the Senate Intelligence Committee, spent half a decade trying to get President Obama's Director of National Intelligence, James Clapper, to answer some fairly straightforward questions about NSA surveillance on...
-
+16 +5
NSA Quietly Awarded a Classified $2.4 Billion Tech Contract With More to Come
The National Security Agency has awarded tech firm CSRA the first of three portions of its classified Groundbreaker contract, which could potentially be worth as much as $2.4 billion over the next decade if all options are exercised. CSRA announced the award through a Securities and Exchange Commission filing, where it acknowledged the value and duration of the contract without naming the customer agency or the contract’s name. Neither CSRA nor NSA offered comment to Nextgov for this story.
-
+34 +4
How the NSA identified Satoshi Nakamoto
The ‘creator’ of Bitcoin, Satoshi Nakamoto, is the world’s most elusive billionaire. Very few people outside of the Department of Homeland…
-
+7 +2
Much Ado About Nothing? Cyber Command and the NSA
Last week, word began to spread that the Trump administration was considering granting new powers to U.S. Cyber Command.
-
+40 +13
NSA unlawfully surveiled Kim Dotcom in New Zealand
The National Security Agency (NSA) illegally used technology to spy on Megaupload founder Kim Dotcom, according to new documents from New Zealand's Government Communications Security Bureau (GCSB).
-
+10 +2
The Antiwar Comic: Useful Idiots
Think before you smear.
-
+15 +1
How a few yellow dots burned the Intercept’s NSA leaker
By providing copy of leak, Intercept likely accelerated ID of contractor.
-
+34 +4
Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election
A top-secret National Security Agency report details a months-long Russian hacking effort against the U.S. election infrastructure.
-
+29 +5
How Peter Thiel’s Palantir Helped the NSA Spy on the Whole World
Documents provided by NSA whistleblower Edward Snowden reveal Palantir’s role in creating the U.S. government’s international spy machine.
-
+4 +1
NSA to share data with other agencies without “minimizing” American information
On Thursday The New York Times reported that the Obama administration had recently finalized rules to give the National Security Agency (NSA) more leeway in sharing its vast trove of intercepted communications with the 15 other government agencies that make up the Intelligence Community. Previously, agencies like the Drug Enforcement Agency and the Federal Bureau of Investigation would have to request information on a target from the NSA.
-
+2 +1
President Obama Claims He Cannot Pardon Snowden; He's Wrong
In a big interview with the German media outlet Der Spiegel, President Obama was asked about his interest in pardoning Ed Snowden in response to the big campaign to get him pardoned. Obama's response was that he could not, since Snowden has not been convicted yet...
Submit a link
Start a discussion