The NSA was already spying on American Senators and prominent Americans who spoke out against the Vietnam War more than 40 years ago.
The NSA has also been conducting industrial espionage for many decades.
Secret documents reveal more than 1,000 targets of American and British surveillance in recent years, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a EU official
Security experts are calling for the removal of a National Security Agency employee who co-chairs an influential cryptography panel, which advises a host of groups that forge widely used standards for the Internet Engineering Task Force (IETF).
Installed in a surveillance vehicle, Stingray tricks all cellphones in a set distance — sometimes exceeding a mile — into connecting to it, capturing location data and numbers dialed for calls and text messages from thousands of people at a time.
A common pastime among the Internet's seedy underbelly is spying on people through their webcams then using the pictures to harass and blackmail the victims. This kind of hacking went mainstream when Miss Teen USA Cassidy Wolf was
Facebook has said that it is within its terms of service to see what users are typing even when the status or comment is never posted on the social network.
Phoenix police have had technology that allows officers to identify and locate cellphones since 2001, and while every investigative bureau has access to the systems, they are primarily used by the drug-enforcement bureau, said Sgt. Trent Crump, a dep
• Ann E. Marimow & Ellen Nakashima, Washington Post
A federal judge in Washington said Monday that the government’s widespread collection of telephone records of millions of Americans is likely unconstitutional.
U.S. District Judge Richard J. Leon granted activist Larry Klayman's request for a prel
Leaks to the media make clear that the panel is a whitewash and that the administration is planning purely cosmetic changes. The panel was set up to divert and dissipate popular outrage with a pretense of reform, while institutionalizing the spying p
• Craig Timberg and Ashkan Soltani, Washington Post
The cellphone encryption technology used most widely across the world can be easily defeated by the National Security Agency, an internal document shows, giving the agency the means to decode most of the billions of calls and texts that travel over p
The cellphone encryption technology used most widely across the world can be easily defeated by the National Security Agency giving the agency the means to decode most of the billions of calls and texts that travel over public airwaves every day.
The Obama administration has decided to preserve a controversial arrangement under which a single military official is permitted to direct both the National Security Agency and the military’s cyberwarfare command despite an external review panel’s re
GCHQ, the British counterpart and facilitator to the NSA, has forced a privacy focused email service to shut down because it could not effectively spy on the encrypted emails people were sending. Web security firm CertiVox was shut down
One particular cookie called Google PREF, is almost ubiquitous in the online world, is of particular value to the NSA – acting as a digital homing beacon for agency operatives to target individual computers and implant spyware inside them
If you are a college junior or senior with a 3.0 grade point average, a concentration in “writing, editing, journalism” you can land a job promoting “accurate and timely information” on the NSA’s “missions and accomplishments,”
Consumer advocates have asked the Federal Communications Commission to declare that AT&T violated a privacy rule in the Communications Act by selling phone records to the Central Intelligence Agency (CIA).
Last March – before Edward Snowden revealed the NSA’s sweeping collection of phone and other data – Director of National Intelligence James Clapper said no such operation existed. Now, a group of ex-national security officials urge President Obama to
The government even has its eye on elves and orcs, according to the latest from Snowden's NSA leaks. ProPublica, reports that the NSA fears online games like World of Warcraft, Second Life, and Microsoft’s Xbox Live universe could serve as a “target-
• Ashkan Soltani, Andrea Peterson, etc. Washington P
The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using "cookies" and location data to pinpoint targets for government hacking and to bolster surveillance.
Virginia State Police are offering an opportunity for every motorist and every pedestrian in the Commonwealth to be “eyes and ears” for suspicious or criminal activity. A new app, available for most smartphones, encourages citizens to either directly
Local police are increasingly able to scoop up large amounts of cellphone data using new technologies, including cell tower dumps and secret mobile devices known as Stingrays. Here's a closer look at how police do it.
“The FBI has been able to covertly activate a computer’s camera — without triggering the light that lets users know it is recording — for several years, and has used that technique mainly in terrorism cases or the most serious criminal investigations
Dubbed the RQ-180, will conduct the penetrating ISR mission that has been left unaddressed, and under wide debate, since retirement of the Lockheed SR-71 in 1998.
Watch Streaming Broadcast Live:
LRN.fm
DLive
Live Chat Telegram
Share this page with your friends
on your favorite social network: