26 Results for

counterintelligence

Article

CIA collecting bulk data on money transfers, reports say

Secret program involving counter-terrorism collects and stores data on cross-border money transfers handled by firms like Western Union, according to reports. Some Americans' data is swept up.

By November 14, 2013

Article

NSA system designed to attack 'millions' of computers -- report

The US government designed computerized hacking tools to automate the process of compromising computers with attacks that let it harvest data before it is encrypted, new documents show.

By March 12, 2014

Article

AT&T supplies CIA with customer data for a fee, says NY Times

The CIA is paying AT&T $10 million a year for call records used to help track down suspected terrorists, says The New York Times.

By November 7, 2013

Article

Judge orders Google to comply with FBI's secret NSL demands

A federal judge tells the company to comply with the FBI's warrantless National Security Letter requests for user details, despite ongoing concerns about their constitutionality.

By May 31, 2013

Article

Spy fears lead nuke lab to dump gear from HP unit, not Huawei

Los Alamos National Laboratory reportedly removes network switches made by H3C -- launched as a joint venture between Huawei and 3Com -- over security concerns. But Huawei no longer owns a piece of H3C.

By January 7, 2013

Article

NSA tracks Google ads to find Tor users

The National Security Agency uses a bit of jiu-jitsu to turn the structure of Web ad networks against people who run Tor to remain anonymous.

By October 4, 2013

Article

Russia, China 'aggressive' cyberspies, U.S. report frets

Lots of players target the U.S. in economic and other espionage, but old Cold War foes stand out as both aggressive and capable.

By November 3, 2011

Article

U.S. government targets ex-contractor over NSA leaks

Edward Snowden was a system administrator with a security clearance at Booz Allen Hamilton. Now he's on the run from the world's most powerful intelligence agency.

By June 11, 2013

Article

How the pros thwart computer spies with James Bond tricks

Whether they're jamming crushed Altoids mints into screw holes or prepping themselves to swallow Micro SD cards, some travelers are now going to extreme lengths to defend against foreign snoops.

By September 4, 2012

Article

Whistle-blower update: Snowden lands in Moscow; WikiLeaker's Gmail searched

U.S. asks Hong Kong to extradite PRISM leaker Edward Snowden; Snowden departs Hong Kong for Moscow; a WikiLeaks volunteer had his Gmail account searched; and more.

By June 22, 2013