espionage

See the following -

3 Ways To Strengthen Press Freedom At The U.S. Justice Department

Josh Stearns | MediaShift | July 2, 2013

One of the most troubling things about the politicians and pundits who are calling for Guardian journalist Glenn Greenwald’s prosecution, calling him an accomplice to Edward Snowden’s leaks, is that just a month ago we saw the same language coming out of the Justice Department itself. [...] Read More »

After Stuxnet: The New Rules Of Cyberwar

Robert L. Mitchell | Computerworld | November 5, 2012

Critical infrastructure providers face off against a rising tide of increasingly sophisticated and potentially destructive attacks emanating from hacktivists, spies and militarized malware. Read More »

China Isn’t Wrong To Call The U.S. "The Real Hacking Empire"

Lily Kuo | Nextgov | May 9, 2013

The cyberwar between China and the US has spread from computers into the halls of diplomacy. In a report this week, the Pentagon said for the first time that the Chinese government and military have been launching cyber attacks against the US. Today, Chinese state media called the US “the real hacking empire” and said the country has “an extensive espionage network.” Read More »

Congress' Plan To Stop Exporting Technology To Repressive Regimes

Brian Fung | Nextgov | February 7, 2013

When a U.S. company wants to export military technology, it has to go through a rigorous approval process in Washington. That’s because, of course, if it ends up in the wrong hands, the technology could interfere with U.S. foreign policy, destabilize conflict-prone regions, or worse... Read More »

FBI Agent to CHIME Attendees: The Cybersecurity Environment Is Becoming More Dangerous

Mark Hagland | Healthcare Informatics | August 15, 2016

The level of cybersecurity threat is growing exponentially in healthcare right now, but there are some very clear strategies that the leaders of patient care organizations can and should do in order to fight back. That was the core of the message that Timothy J. Wallach, a supervisory special agent in the Cyber Task Force in the Seattle Field Office of the Federal Bureau of Investigation (FBI) told attendees Monday morning at the CHIME/AEHIS LEAD Forum Event, being held at the Seattle Marriott Waterfront in Seattle...

Read More »

How The US Government Uses Information From Spying On Foreign Companies

Josh Meyer | Nextgov | July 18, 2013

There’s no longer doubt that the US government spies on foreign multinational corporations as well as governments, thanks to the disclosures by former National Security Agency contractor turned international fugitive Edward Snowden. [...] Read More »

In Secret, Court Vastly Broadens Powers Of N.S.A.

Eric Lichtblau | New York Times | July 6, 2013

In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans while pursuing not only terrorism suspects, but also people possibly involved in nuclear proliferation, espionage and cyberattacks [...]. Read More »

Pentagon: China Views Information Warfare As Key To Countering U.S. Pacific Forces

Bob Brewin | Nextgov | May 6, 2013

China views cyber warfare as the essential element to attack U.S. forces operating in the western Pacific, the Defense Department reported today in its annual analysis of that country’s military capabilities. Read More »

Q&A: Why Was The VA Hacked?

Anthony Brino | Government Health IT | June 25, 2013

In early June, a former Department of Veterans Affairs IT manager told members of the House Veterans Affairs Committee that the VA’s databases have been hacked by at least eight foreign organizations — notably by organizations linked with the Chinese military, which may have viewed (or taken) veterans’ personal identifying data, like Social Security numbers. Read More »

Stallman: How Much Surveillance Can Democracy Withstand?

Richard Stallman | Wired | October 14, 2013

The current level of general surveillance in society is incompatible with human rights. To recover our freedom and restore democracy, we must reduce surveillance to the point where it is possible for whistleblowers of all kinds to talk with journalists without being spotted. To do this reliably, we must reduce the surveillance capacity of the systems we use. Read More »