The Bahraini government has been using sophisticated malware—complete with technical support from its manufacturer—to remotely conduct surveillance operations on its political dissidents living in the UK.
Is repeated failure actually the key to the success and endless expansion of the US intelligence community?
Though the US may be finally addressing some of the fictions propping up its security policies, the question remains: who rules Washington?
Will Navi Pillay's defiant stand on privacy be the first step to dismantling the dubious legal frameworks propping up the Five Eyes intelligence-sharing arrangement?
With focus on the government's grip over surveillance, the public debate over privacy has ignored citizen-led data initiatives to regain power in the digital age - and the war being waged against them.
With increased Internet access and smartphone use across Latin America, Asia and Africa, organized crime networks are exploiting vulnerabilities to extend their reach - sometimes with violent results. What's the impact inside and outside cyberspace?
The U.S. border is no longer static and 'homeland security' no longer stays in the homeland: it’s mobile, it’s rapid, and it's international. Todd Miller exposes the growing border-security complex.