NATO Adds Cyberattacks to the ‘Hit One, Hit Us All’ Code

This week, official representatives for the NATO international collective announced they would be implementing a new set of policies which would seek to match the same outlines that apply to real-world military action in the online battleground. As more countries begin to arm themselves with increasingly complex weapons of cyberwarfare which can be used for Read More


ICREACH – The NSA’s Google-Like Metadata Sharing Platform

New documents provided to The Intercept by Edward Snowden highlight the inner workings of ICREACH, a Google-like search engine feature which shares metadata of millions of foreign nationals and US citizens. The NSA has been using this search engine to secretly provide information to two dozen agencies of the US government including the DEA (Drug Read More


How Will NATO Adapt to Cyber Threats?

With increasing cyber attacks on government organizations, NATO (North Atlantic Treaty Organization) needs to wake up to the possibility of cyber warfare, said Boston Globe columnists James G. Stavridis and Dave Weinstein, and this would need clearly defined protocols and a standardized policy. Fortunately, NATO has acknowledged the rising demands of cyber awareness and announced Read More

New Whistleblower Following in Snowden’s Footsteps

And Thomas Drake, Mark Klein. Rustle Tice. Earlier this morning, Glenn Greenwald revealed the existence of freshly leaked classified documents in his publication The Intercept which have furthered indicted the NSA in a series of scandals fueled by illegal domestic surveillance on U.S citizens. The hot-off-the-presses leaks go into extensive detail about the existence of Read More

9/11 Commission Report Authors Caution The US Against Cyber Threats

The authors of the original 9/11 Commission report covering the events surrounding the 9/11 attacks inform us that cyber-terrorism is the next big threat to the US. The group has updated the recommendations made by the committee ten years ago, and reassessed whether those recommendations were translated into law or adopted as policy. “The threat Read More


The History of Domestic Surveillance in WWI America

9/11, The PATRIOT Act, Dick Cheney. These are the people, the places, and the events that one normally associates with the beginning of mass surveillance in America, and while to a certain extent you’d be correct, you’d also be missing the mark by about 90 years or so in the longer scope of things. In Read More

Cell Phone Tracking Without Warrant Illegal, Rules Court

This week, the United States Court of Appeals for the Eleventh Circuit ruled that any data the government wants to gather off a cellphone must first be approved in full by a warrant before any officer of the law gets the opportunity to track valuable information. In a landmark decision this Wednesday in Miami, Judge Read More

NSA Uses Radio Frequencies to Crack Disconnected Devices

As of this writing, the NSA has worked its way into around 100,000 personal computers and mobile devices around the world, a far cry from the 50,000 we initially reported on just a few short months ago. Dubbed “Quantum“, the program lays out an intricate map of each infected machine, which networks it’s connected to, Read More

Older Posts