Latest Edward Snowden revelation shows that Google’s cookies are used to determine if target’s worthiness for future surveillance.
In a leaked document, the NSA was found to have been using porn and other potentially-incriminating material in a plan to discredit its targets, who are potential “radicalizers” in the US and abroad.
Sources that have spoken to the New York Times say electronic eavesdropping may have occurred on pipes that carry data between company servers.
The NSA contacted Linus Torvalds, the father of Linux/GNU, to ask about injecting surreptitious backdoors into the popular open-source operating system, his father has disclosed to the European Parliament.
A new report reveals UK intelligence is using man-in-the-middle style attacks to target employees of GRX providers.
VPN provider CryptoSeal has shut down its service, over concerns that law enforcement may eventually compromise its user’s privacy with a court ordered request for information .
Top-secret documents disclosed to The Guardian, have revealed that both American and British intelligence agencies have been desperately trying to crack the online anonymity network, Tor.
The encryption method used by the majority of Tor servers and SSL, is likely readable by the NSA. This means that Tor may no longer be an anonymous safe haven on the internet.
Facebook releases first ‘Global Government Requests Report’, summarizing user data requests from governments
In a blog post on Tuesday, Facebook released its first “Global Government Requests Report”, summarizing the percentage of information requests received by Facebook from various governments around the world in the first six months of 2013.
In an interview with CNN President Obama said while some Americans might find the NSA’s capabilities “scary”, the oversight mechanisms do work.
On Wednesday, Congress almost passed an amendment intended to put a stop to NSA telecommunications surveillance practices. The amendment was just barely shot down by a 205-217 vote, which was populated by democrats and republicans on both sides.
The recent leaks regarding NSA’s PRISM program are harming U.S based cloud services, according to the data acquired by the Cloud Security Alliance (CSA) in a survey taken in late June, and earlier this month.
According to reports US officials use a variety of tactics, including regulatory threats, to coerce foreign owners of undersea fiber to allow the NSA access for eavesdropping.
MIT has created a visualization tool called Immersion that helps you understand how the NSA figures out your relationships based on your email correspondence.
According to a report, whistleblower Edward Snowden learned how to be a hacker during a course he took while working with the NSA in 2010.
An assembly 26 Republican and Democrat senators are asking for more information from the National Intelligence director, James Clapper, on the NSA’s PRISM program. These Senators are not happy with Clapper’s testimony from back in March of this year where he said that the NSA didn’t collect any data on Americans. Since that time more
Edward Snowden’s safe passage to Ecuador is anything quick, as the NSA whistle blower is purportedly still hiding away in Moscow’s airport awaiting confirmation of his asylum acceptance from Ecuador.
The South American nation of Ecuador has its own Internet surveillance program much like the NSA’s PRISM. This system called a “GSM interceptor” was purchased for SENAIN, which is Ecuador’s intelligence agency. The system said to be able to monitor and manipulate Internet data in real time.
South Korea has reported that many of their official government websites have been hit by powerful cyber-attacks that also coincide with the 63rd anniversary of the Korean War.
Once again more NSA leaks have been revealed by Edward Snowden, and this time he has presented material that purportedly shows that the NSA has directly hacked into China’s Tsinghua University. This University, which is located in Beijing, is highly regarded as Mainland China’s top tier of higher education, and has been a top priority