security
UK Warns Government Agencies to Avoid Kaspersky Products, Citing Russian Ties

Russian security software company Kaspersky Lab has been having a bad few months amid allegations its signature anti-virus software scans for and identifies files of interest to Russian cyber spies. Kaspersky publicly contends a high-profile incident in which it allegedly stole classified files from a National Security Agency contractor’s computer was due to dumb mistakes on that individual’s part, but that hasn’t stopped the U.S. government from banning the use of the company’s products at federal agencies. Read More >>

google
Russia Allegedly Threatens Retaliation Against Google if It Lowers RT or Sputnik’s Search Rankings

The ominous cloud of doom surrounding the ongoing U.S. investigations into alleged Russian interference in the 2016 election got a little darker on Tuesday, with Russian state communications agency Roskomnadzor allegedly threatening retaliation against Google for suggesting it could lower government-funded outlets RT and Sputnik in search rankings. Read More >>

north korea
North Korea’s Broadcasting Strange Codes on the Radio and Nobody Knows Why

Lately some strange radio broadcasts have been coming from North Korea, according to the South Korean government. Read More >>

3d printing
Spies Can Tell What a 3D Printer is Making by Listening to it

The latest bit of thinking in the industrial espionage world is really quite interesting, with analysts suggesting that the noises made by major brands of 3D printers could be reverse engineered to reveal the thing they're printing. Read More >>

hacking
US Justice League Warns of Chinese Cyberspy ‘Security Emergency’

Stories of Chinese government organisations hacking American corporations are not new. But in a segment aired on news investigation programme 60 Minutes , US business leaders, government officials and security experts paint a picture of a particularly sophisticated attack on the intellectual property of “thousands” of companies. Read More >>

monster machines
These Secret Cold War Radio Stations are Still Broadcasting

In the early days of espionage, long before the advent of burner phones, satcoms, and other modern-day spy gadgets, getting word to field agents—especially those working behind the Iron Curtain—proved a dangerous game with global consequences should the agent's cover be blown. But that's where number stations, and their uncrackable radio codes, come in. Read More >>

monster machines
This Electronic Stonehenge Once Divined the Secrets of Soviet Radio

In the early days of electronic espionage, the US intelligence community didn't have the benefit of all-seeing spy satellites; it had to intercept and interpret high-frequency radio waves transmitted by the Soviet Union. To do so, the Americans relied on a network of mysterious structures whose real purpose was kept highly classified throughout the Cold War. Read More >>

privacy
How Google Gives Information to the NSA

Ever since news of PRISM broke, there's been a lot of confusion and denial about exactly how the NSA is getting your information from the companies that have been collecting it. Now Google's fessed up to the details, and it's unsurprisingly simple: by FTP or even by hand. Read More >>

privacy
Why the Metadata the NSA Has on You Matters

In response to the recent news reports about the National Security Agency's surveillance program, President Barack Obama said, "When it comes to telephone calls, nobody is listening to your telephone calls." Instead, the government was just "sifting through this so-called metadata." The Director of National Intelligence James Clapper made a similarcomment last night: "The program does not allow the Government to listen in on anyone’s phone calls. The information acquired does not include the content of any communications or the identity of any subscriber." Read More >>

privacy
The Official US Government Fact Sheet on What PRISM Is and Does

When all the PRISM news broke, it didn't take long for the US Government to fess up. President Obama even made a (bummer of a) statement on it. Now, US Director of National Intelligence James Clapper has put out an official fact sheet about what PRISM is and isn't, according to the US Government. Think of it like an official FAQ. Read More >>

security
Cyber-Espionage Platform Red October Is Already Pulling Its Tendrils Back Into the Dark

Earlier this week, a sophisticated, capable, and seemingly freelance cyber-spying operation called Red October burst onto the scene. Well, it's probably been around for years, but we all only just found out about it. Now, it's already disappearing. After having the light shined on it, it's darting back into the shadows. Read More >>

security
Meet Red October: The Global Cyber-Espionage Ring That Spent 5 Years in the Shadows

There are plenty of cyberweapons floating around out there, like Stuxnet, Flame, and that whole gang. Now, Kapersky has turned up a cyber-espoinage operation its dubbed "Red October," and it's up there in the big leagues. But unlike its cohorts, it doesn't look state-sponsored. This is a freelance job, and it's professional grade. Read More >>

research
Dyson Accuses Bosch of Paying a Super-Secret Espionage Research Spy

Dyson is pointing the finger at rival Bosch, of apparently paying an employee to steal company secrets from inside its research division. Having filed legal proceedings against the German company, Dyson claims that a member of staff was handling secrets to Bosch for as long as two years. Not quite Bond, right? Read More >>

animals
Turkey Thinks This Bird Is an Israeli Spy Because Its Nostril Is Big Enough to Hold Microchips

Turkish authorities announced Tuesday that they have recovered the body of a daring Israeli spy—replete with feathers. And a belly full of bees. Read More >>

wikileaks
Wikileaks Opens Up New Privacy and Espionage-Focused Section Called The Spyfiles

We're all screwed according to Julian Assange and now he's revealed a new subsection of Wikileaks to prove it. "The Spyfiles" will specifically deal with surveillance and privacy violations, releasing documents related to the global activities of cyber spooks and the technology used to intercept your most private of Facebook messages. Read More >>