The two rival businesses gained the same ability last year to remotely break into iPhones, according to the five sources, meaning that both firms could compromise Apple phones without an owner needing to open a malicious link. That two firms employed the same sophisticated hacking technique – known as a “zero-click” – shows that phones...
HAPPENING NOW:
Inside the Discord Leak: U.S. Air Force Loves War Gamers Like Teixeira
British Intelligence Privately Says Israel Has Nuclear Weapons But Won’t Admit it Publicly
Mexican President Accuses Pentagon of Spying, Vows to Restrict Military Information
Daniel Ellsberg Week Honors Pentagon Whistleblower
How Twitter Became a Propaganda Tool of U.S. Central Command
Interview With the Father of a Palestinian Fighter Assassinated by Israeli Special Forces
Chinese Police Station in New York Is Part of a Vast Influence Operation
Catch-22 at Guantanamo, or How Due Process Got Undone
Wagner Group Leader Calls for End to Russia’s ‘Special Military Operation’
Once Ridiculed, the ‘October Surprise’ Deal Between Reagan and Iran Is Now Confirmed
Two Senators Allege ‘Secret’ CIA spying on Unwitting Americans
UK Spy Agency Says AI Chatbots Pose a Security Threat
How Aerial Surveillance Has Evolved Over the Past 200 Years
Wagner Mercenary Chief Says He Ran Russian Information War
Iranians Outraged After Shah-Era Secret-Police Official Attends U.S. Rally
Israeli-led Disinformation Team Meddled in Dozens of Elections
Director of National Intelligence Barred From Reporting on Domestic Extremists in U.S. Armed Forces
Iranian Intelligence Official Says China in Line to Buy Tehran’s Drones
Former Mossad Chief Urges Compromise on Judicial Shakeup
Category: Surveillance
How to Protect Yourself From NSO Spyware
The U.S. government has advice for journalists and activists: Watch out for spyware. The National Counterintelligence and Security Center doesn’t mention NSO, the Israeli company whose Pegasus spyware has been implicated in policies of surveillance and repression around the world. But the warning described Pegasus’ powers exactly. Companies and individuals have been selling commercial surveillance...
Suspicionless Surveillance: Suppressing Communities of Color and Political Dissent After 9/11
The expansive post-9/11 notion of “homeland security” – manifested most concretely in the creation of the Department of Homeland Security (DHS) – underpins suspicionless surveillance. DHS itself, “as part of its regular operations, conducts invasive physical searches of millions of Americans and their belongings each week without any predicate.” These programs, according to the...
The Afghan Intelligence Agency Was Raided: Who Got the Files?
The people who seized the files at the National Security Directorate and the Ministry of Communications may not have even been Taliban: The men did not speak Afghan languages, the officials said, and may have been agents of Pakistan’s military intelligence agency working in tandem with Taliban forces. Pakistan’s Inter-Services Intelligence agency has long supported...
Israeli Spyware Used to Surveil Activists World Wide
Military-grade spyware leased by the Israeli firm NSO Group to governments for tracking terrorists and criminals was used in attempted and successful hacks of 37 smartphones belonging to journalists, human rights activists, business executives and the two women closest to murdered Saudi journalist Jamal Khashoggi, according to an investigation by The Washington Post and 16...