27 Results for

counterintelligence

Article

CBS video: Cybersecurity at the Olympics

Joel Brenner, the U.S. national counterintelligence executive, talks with Bob Orr of CBS News about the threats that travelers to China could be facing and offers advice on how travelers can protect themselves.

By August 8, 2008

Video

CBS Evening News: Cyber-security at the Olympics

Overseas travelers are being warned that personal information sent out electronically can be stolen. Bob Orr talks with National Counterintelligence Executive Joel Brenner on cyber-security in China.

August 8, 2008

Article

CIA collecting bulk data on money transfers, reports say

Secret program involving counter-terrorism collects and stores data on cross-border money transfers handled by firms like Western Union, according to reports. Some Americans' data is swept up.

By November 14, 2013

Article

NSA system designed to attack 'millions' of computers -- report

The US government designed computerized hacking tools to automate the process of compromising computers with attacks that let it harvest data before it is encrypted, new documents show.

By March 12, 2014

Article

AT&T supplies CIA with customer data for a fee, says NY Times

The CIA is paying AT&T $10 million a year for call records used to help track down suspected terrorists, says The New York Times.

By November 7, 2013

Article

Judge orders Google to comply with FBI's secret NSL demands

A federal judge tells the company to comply with the FBI's warrantless National Security Letter requests for user details, despite ongoing concerns about their constitutionality.

By May 31, 2013

Article

Spy fears lead nuke lab to dump gear from HP unit, not Huawei

Los Alamos National Laboratory reportedly removes network switches made by H3C -- launched as a joint venture between Huawei and 3Com -- over security concerns. But Huawei no longer owns a piece of H3C.

By January 7, 2013

Article

Russia, China 'aggressive' cyberspies, U.S. report frets

Lots of players target the U.S. in economic and other espionage, but old Cold War foes stand out as both aggressive and capable.

By November 3, 2011

Article

NSA tracks Google ads to find Tor users

The National Security Agency uses a bit of jiu-jitsu to turn the structure of Web ad networks against people who run Tor to remain anonymous.

By October 4, 2013

Article

How the pros thwart computer spies with James Bond tricks

Whether they're jamming crushed Altoids mints into screw holes or prepping themselves to swallow Micro SD cards, some travelers are now going to extreme lengths to defend against foreign snoops.

By September 4, 2012