The FBI uses malware to combat online anonymity

Editor’s Note: Anonymity already compromised if using TOR – TOR Originally sponsored by the U.S. Naval Research Laboratory  Source: Engadget Online anonymity is a beautiful, terrible thing, so naturally governments and law enforcement types are eager to see what happens behind the web’s closed… Continue Reading

FBI, CIA Use Backdoor Searches To Warrentlessly Spy On Americans’ Communications

Source: Tech Dirt The other shoe just dropped when it comes to how the federal government illegally spies on Americans. Last summer, the details of the NSA’s “backdoor searches” were revealed. This involved big collections of content and metadata (so, no, not “just metadata”… Continue Reading

IMSI catcher: Eavesdropping Equipment Sucks All Data Off Your Phone

Source: Newsweek Call it the “IMSI catcher” war, with the acronym standing for International Mobile Subscriber Identity. Every device that communicates with a cell tower—mobile phone, smartphone or tablet—has one. What StingRay (manufactured by Florida-based Harris Corp.) and its competitors… Continue Reading

Meet the elite FBI unit likely involved in the Benghazi capture

Source: Washington Post The capture of one of the alleged leaders of the 2012 terrorist attacks in Benghazi, Libya, in a joint raid involving U.S. Special Operations troops and the FBI highlights the bureau’s role as an international anti-terrorism force.… Continue Reading

Did Israel steal bomb-grade uranium from the United States?

              Source: Bulletin of the Atomic Scientist Last month the Interagency Security Classification Appeals Panel (ISCAP), the nation’s highest classification authority, released a number of top-level government memoranda that shed additional light on the so-called NUMEC… Continue Reading

Inside the FBI’s Hostage and Rescue Team secret operations with JSOC

          Source: Washington Post The FBI’s transformation from a crime-fighting agency to a counterterrorism organization in the wake of the Sept. 11, 2001, attacks has been well-documented. Less widely known has been the bureau’s role in… Continue Reading

Repressive governments buy cheap spyware to keep tabs on critics

Source: SCMP Ethiopian journalist Mesay Mekonnen was at his desk at a news service based in the US when gibberish skittered across his computer screen in December. A sophisticated cyberattack was under way. But this wasn’t an attack from the… Continue Reading

US-Sponsored Drug-Plane Operation Had Global Reach

Source: NarcoSphere Aircraft Linked to “Mayan Jaguar” Flew Tons of Cocaine Into Africa — Gateway to the European Market US government intelligence agencies, in particular, the CIA, often have been accused of complicity in the drug trade, but public officials… Continue Reading

US expands reach of clandestine Special Ops

Source: DW The US is taking over the world – but not with mass armies and awe-inspiring firepower, but by stealth, with undercover teams of highly-trained, heavily-armed soldiers in night-vision goggles. Sometimes these Special Operations, like the killing of Osama… Continue Reading

Why Does the Environmental Protection Agency Need Its Own SWAT Team?

Source: The Trumpet Nestled in the tranquil Connecticut River watershed of southwest New Hampshire, the city of Keene has largely avoided the violent unrest common to many other urban areas. With a population of only 23,409 people, Keene’s violent crime… Continue Reading

Finland may soon have its own secret agents

Source: Helsinki Times A data security breach at the Ministry for Foreign Affairs has fuelled calls for foreign intelligence operations. THE BUNKER-LIKE colossal office building extends across a dreary industrial site in Zoetermeer, western Netherlands. Stakes, erected to prevent car bombings,… Continue Reading

Spy agencies in covert push to infiltrate virtual world of online gaming

Source: Guardian To the National Security Agency analyst writing a briefing to his superiors, the situation was clear: their current surveillance efforts were lacking something. The agency’s impressive arsenal of cable taps and sophisticated hacking attacks was not enough. What… Continue Reading