The two rival businesses gained the same ability last year to remotely break into iPhones, according to the five sources, meaning that both firms could compromise Apple phones without an owner needing to open a malicious link. That two firms employed the same sophisticated hacking technique – known as a “zero-click” – shows that phones...
HAPPENING NOW:
What the Russia-Ukraine War Means for the Future of Cyberwar
The Jan. 6 Insurrection: A Chronology
CIA Chief Says Ukraine War ‘Unsettles’ China
Israel-Iran Shadow War on Verge of Exploding Into the Open
Was the Assassination in Iran a Mossad Operation to Sabotage the Iranian Nuclear Deal?
Was There Another Russian Mole Inside the CIA?
Five Charged With Running MSS Operation Against Chinese DIssidents in U.S.
Ukraine Information War: An Army of Techies Hone Their Skills Battling Russia
The Dark Side of a CIA ‘Black Ops’ Memoir
UK Wages Information War in 20 Countries Around Russia
Russian Intelligence Warns of U.S. Plots to Partition Ukraine
Microsoft on the Hybrid War in Ukraine
Vicious Blame Game Erupts Among Putin’s Security Forces
Iran Nuclear Negotiations at Stalemate over IRGC Terror Listing
Five Eyes Warns Russia May Escalate Cyberwar
Are Directed Energy Weapons Behind Havana Syndrome?
Sex, Lies, and UFOs: Pentagon Counterintelligence Chief Ousted
Microsoft Disables Sites of Russian Hacking Group Linked to GRU
DDoSecrets Publishes the Email From Russia’s Ministry of Culture
Category: Surveillance
How to Protect Yourself From NSO Spyware
The U.S. government has advice for journalists and activists: Watch out for spyware. The National Counterintelligence and Security Center doesn’t mention NSO, the Israeli company whose Pegasus spyware has been implicated in policies of surveillance and repression around the world. But the warning described Pegasus’ powers exactly. Companies and individuals have been selling commercial surveillance...
With NSA Training, UAE Spies Monitored Rights Activists and Michelle Obama
From a New York Times story and additional reporting by Al Jazeera: Known as Project Raven, hackers employed state-of-the-art cyber-espionage tools to help the UAE engage in surveillance of other governments, armed groups, and human rights activists critical of the monarchy. Interviews by Reuters news agency in 2019 with former Raven operatives, along with a...
‘Eyes in the Sky’: The Scary Realities of Wide Area Surveillance
“Someday most major developed cities in the world will live under the unblinking gaze of some form of wide-area surveillance,” writes Arthur Holland Michel in Eyes in the Sky, a startling, disturbing, and deeply reported account of the powerful new technologies that promise safety and imperil privacy on an unprecedented scale. Imagine an aerial video...
12 Steps to Controlling the U.S. Surveillance State
(Image Credit; Just Security) A team of writers at the Just Security blog, have a 12-step program for reining in the U.S. surveillance system that has expanded relentlessly beyond the control of Congress and the people. Whether President-elect Biden and his national security team will be interested is another question. The Biden intelligence transition team...