The contractor the NSA pays to help hack your cell phone has an interesting history woven within the larger story of the explosive growth of cyberwarfare companies in the Post 9/11 era. The massive growth of the cyberweapons industry has been driven by governments, principally the United States, who in the name of defense have instigated an arms race for offensive weapons.
|By: DSWright Tuesday July 2, 2013 3:20 pm|
|By: Kevin Gosztola Sunday June 30, 2013 6:45 am|
Retired General James “Hoss” Cartwright had been described as “Obama’s favorite general.” He was a four-star Marine Corps general who served as the vice chairman of the Joint Chiefs. He had apparently “impressed the White House with his intellect and expertise on the modern technology of national security, including on nuclear weapons, missile defense and cyberwarfare,” according to The New York Times.
|By: DSWright Tuesday June 25, 2013 1:05 pm|
Have you ever heard of Endgame Systems? Well, they have heard of you – or at least your data. According to an expose by Wired on the NSA, Endgame Systems provides the NSA with capabilities to break into your internet connected devices such as cell phones, tablets, desk tops, and lap tops. Your digital life is at their fingertips.
|By: DSWright Tuesday June 18, 2013 2:00 pm|
John Michael “Mike” McConnell, the former Director of National Intelligence and now Vice Chairman of Booz Allen Hamilton, is making a lot of money off you. Nothing in the information age is more valuable than information and McConnell is working hard to create value for himself.
|By: Kevin Gosztola Monday February 4, 2013 2:05 pm|
A recently published story from the New York Times reports a “secret legal review” has been conducted on the use of cyber warfare by the United States. It concluded President Barack Obama has “the broad power to order a preemptive strike if the United States detects credible evidence of a major digital attack looming from abroad.”
|By: Kevin Gosztola Sunday January 27, 2013 9:47 am|
FBI investigators are extensively analyzing the email accounts and phone records of current and former government officials “in a search for links to journalists,” according to a recent story published by the Washington Post. The investigation is searching for sources who provided information on cyber warfare against Iran to the New York Times for a story written by David Sanger and published on June 1 of last year. Much more information on the secret virus, Stuxnet, used to destabilize Iran’s critical infrastructure was eventually published in Sanger’s book, Confront and Conceal.
|By: David Dayen Friday June 1, 2012 2:02 pm|
This is the week where the President, through coordinated leaks at the highest levels, admits to ruthlessness when it comes to “fighting the bad guys.”
|By: emptywheel Saturday June 11, 2011 7:00 pm|
Do our cyberwarriors consider it a legitimate “win” to simply delay the publication of a transnational internet operation for a week or so? At what cost? And by “cost,” I mean both the tens of millions we’re investing to develop, apparently, the capability to engage in juvenile pranks. And also the cost in credibility as a purported defender of free speech wastes its time harassing, but not preventing, the free speech of groups it doesn’t like.
|By: emptywheel Tuesday May 31, 2011 6:11 am|
On the first news day after the holiday weekend reporting on Lockheed Martin, WSJ reports that the US is moving towards making cyberattacks an act of war.
|By: WilliamOckham Thursday February 17, 2011 5:10 pm|
William Ockham, who knows a whole lot more about coding than many of us, shares some interesting thoughts with us about the Stuxnet virus in this post.