cyber espionage

Print

The Rise of the Cyber-Mercenaries

What happens when private firms have cyberweapons as powerful as those owned by governments?

An employee walks behind a glass wall with coding symbols at the headquarters of Internet security giant Kaspersky in Moscow on October 17, 2016. (Kirill Kudryavtsev/AFP/Getty Images)

The Trump Administration Just Threw Out America’s Rules for Cyberweapons

U.S. cyberstrategy needs updating, but this isn’t the way to do it.

FP_podcast_article_artwork-1-globalthinkers

Does Kaspersky Have Something to Hide?

The Russian security giant faces scrutiny worldwide. Is there fire beneath the smoke?

The parents of 43 missing students from Ayotzinapa teachers school hold their portraits and torches during a march 18 months after their disappearance in Mexico City on April 26, 2016. / AFP / YURI CORTEZ        (Photo credit should read YURI CORTEZ/AFP/Getty Images)

Spyware Sold to Mexican Government Was Used to Target Experts Investigating Missing Students

The spyware is meant to track terrorists, but Mexico apparently turned it on journalists, activists and others.

Pro-Russian militiants attack a branch of Ukrainian bank Privatbank in the eastern Ukrainian city of Donetsk on April 28, 2014. Some 300 masked pro-Russian militants wielding baseball bats attacked a branch of the bank owned by an oligarch regional governor who has voiced criticism of Moscow. The gang attacked the Donetsk office of the powerful Private banking and metal industry holding belonging to Igor Kolomoisky, a billionaire who is also governor of the nearby region of Dnipropetrovsk. AFP PHOTO/ ALEXANDER KHUDOTEPLY        (Photo credit should read Alexander KHUDOTEPLY/AFP/Getty Images)

The Kremlin’s Newest Hybrid Warfare Asset: Gangsters

Russia and other states have taken to hiring street gangs and thugs to do the sort of dirty work that even spies don't want to touch.

GettyImages-56667887

Trove of Stolen NSA Data Is ‘Devastating’ Loss for Intelligence Community

Former intelligence officials say leaks are crippling U.S. espionage capabilities.

house-crop

House Intel Panel Agrees to Investigate Any Trump-Russia Ties

Intel committee leaders pledge to leave 'no stone unturned.'

french-crop

Wary of Russian Cyber Threat, France Plans to Bolster its Army of ‘Digital Soldiers’

With its own presidential election on the horizon, France could learn a thing or two from the U.S. election hacking debacle.

DES MOINES, IA - SEPTEMBER 29:  Democratic presidential nominee former Secretary of State Hillary Clinton speaks during a campaign rally on September 29, 2016 in Des Moines, Iowa. Hillary Clinton is campaigning in Iowa.  (Photo by Justin Sullivan/Getty Images)

Hacked Audio of Clinton Fundraiser Raises More Suspicions of Russian Meddling

The latest hack of the Democratic nominee’s campaign reveals Clinton has some misgivings about Obama’s push to modernize the nuclear arsenal.

bamford_Top_2

Every Move You Make

Over eight years, President Barack Obama has created the most intrusive surveillance apparatus in the world. To what end?

NEW YORK, NY - NOVEMBER 10:  Network cables are plugged in a server room on November 10, 2014 in New York City. U.S. President Barack Obama called on the Federal Communications Commission to implement a strict policy of net neutrality and to oppose content providers in restricting bandwith to customers.  (Photo by Michael Bocchieri/Getty Images)

The Same Russian Hackers Hit the DNC and the DCCC, Security Firms Say

Russian military intelligence appears to be behind the hack of the Democratic National Committee and the Democrats’ congressional campaign organization, experts say.

A woman walks past a mural on a restaurant wall depicting US  Presidential hopeful Donald Trump and Russian President Vladimir Putin greeting each other with a kiss in the Lithuanian capital Vilnius on May 13, 2016.
Kestutis Girnius, associate professor of the Institute of International Relations and Political Science in Vilnius university, told AFP -This graffiti expresses the fear of some Lithuanians that Donald Trump is likely to kowtow to Vladimir Putin and be indifferent to Lithuanias security concerns. Trump has notoriously stated that Putin is a strong leader, and that NATO is obsolete and expensive. 
 / AFP / Petras Malukas        (Photo credit should read PETRAS MALUKAS/AFP/Getty Images)

How Should the United States Respond to Russia’s Election Meddling?

Trump welcomed Russia's DNC email hack. Do those who seek to put America First really want the Russians to help them do that?

Elahi-HeaderInfiniteLoop2s

How to Invade Your Own Privacy So the Government Doesn’t Have To

In 2002, the FBI mistakenly identified Hasan Elahi as a terrorist. Since then, he’s offered free self-surveillance, posting more than 80,000 pictures online for the bureau — and the world — to see.

Kushner_image1

Fear This Man

To spies, David Vincenzetti is a salesman. To tyrants, he is a savior. How the Italian mogul built a hacking empire.

SYDNEY, NSW - AUGUST 11:  A fingerprint is scanned at Argus Soloutions August 11, 2005 in Sydney, Australia. The Australian Federal Government are considering including biometric data such as fingerprints, iris scans, or facial recognition on a national identity card in a bid to combat fraud, illegal immigration and terrorism. Details of individuals' biometrics would be stored on the card in an algorithmic code to prevent identity theft.   (Photo by Ian Waldie/Getty Images)

Clapper: ‘We Don’t Know Exactly What Was Taken in the OPM Breach’

Months after one of the biggest hacks in American history, Washington's top spy said the U.S. was still assessing the damage.

GettyImages-179598037

Dual U.S.-Russian Citizen Admits to Spying on the United States for Moscow

A dual U.S./Russian citizen has pleaded guilty to spying for the FSB.

Biometric Hardware Firms Display Security Solutions

To Catch a Spy

Biometrics is making it far more difficult for the U.S. intelligence community to conduct clandestine operations.

internet crop

Expert tips: How to follow cybersecurity

For those who are interested in keeping up-to-date on various goings-on in the cybersecurity realm, here’s a non-exhaustive list of interesting resources.

Load 10 More Articles

Want unlimited access? Subscribe today.