The FBI uses malware to combat online anonymity

Editor’s Note: Anonymity already compromised if using TOR – TOR Originally sponsored by the U.S. Naval Research Laboratory  Source: Engadget Online anonymity is a beautiful, terrible thing, so naturally governments and law enforcement types are eager to see what happens behind the web’s closed… Continue Reading

FBI, CIA Use Backdoor Searches To Warrentlessly Spy On Americans’ Communications

Source: Tech Dirt The other shoe just dropped when it comes to how the federal government illegally spies on Americans. Last summer, the details of the NSA’s “backdoor searches” were revealed. This involved big collections of content and metadata (so, no, not “just metadata”… Continue Reading

IMSI catcher: Eavesdropping Equipment Sucks All Data Off Your Phone

Source: Newsweek Call it the “IMSI catcher” war, with the acronym standing for International Mobile Subscriber Identity. Every device that communicates with a cell tower—mobile phone, smartphone or tablet—has one. What StingRay (manufactured by Florida-based Harris Corp.) and its competitors… Continue Reading

Meet the elite FBI unit likely involved in the Benghazi capture

Source: Washington Post The capture of one of the alleged leaders of the 2012 terrorist attacks in Benghazi, Libya, in a joint raid involving U.S. Special Operations troops and the FBI highlights the bureau’s role as an international anti-terrorism force.… Continue Reading

Did Israel steal bomb-grade uranium from the United States?

              Source: Bulletin of the Atomic Scientist Last month the Interagency Security Classification Appeals Panel (ISCAP), the nation’s highest classification authority, released a number of top-level government memoranda that shed additional light on the so-called NUMEC… Continue Reading

Inside the FBI’s Hostage and Rescue Team secret operations with JSOC

          Source: Washington Post The FBI’s transformation from a crime-fighting agency to a counterterrorism organization in the wake of the Sept. 11, 2001, attacks has been well-documented. Less widely known has been the bureau’s role in… Continue Reading