Sunday May 22, 2016 .... When this newspaper began publishing the NSA documents in June 2013, it ignited a fierce political debate that continues to this d
"... The CIA's development of their corrupted version of Xcode was part of a multi-year plan to break the security of Apple's iPhone and iPads ..." The tec
The American Civil Liberties Union in concerned the CIA is hoovering up mass amounts of data on Americans as it conducts foreign surveillance operations.
In what is sure to cause further embarrassment for the Obama administration, WikiLeaks released documents on Monday that it says prove that the US Natio
Provisions of the Patriot Act passed after 9/11 that have enabled the bulk collection of cell phone and Internet usage exposed by the Edward Snowden leaks
With the NSA’s bulk surveillance ruled illegal, the debate on the Patriot Act should be reinvigorated – with Edward Snowden free to join in On 6 June 2
A new book reveals the extent to which J Edgar Hoover’s bureau kept files on well-known black writers between 1919 and 1972 Newly declassified documents
Google secretly gave the emails of WikiLeaks journalists to the US government in response to an espionage investigation targeting Julian Assange, according
"... Citing separate documents released by Snowden, a former NSA contractor, the Guardian also said that GCHQ had listed 'investigative journalists' as a t
The Strange Case of Alan Gross (Excerpt) By Philip Giraldi Washington Report of Middle Eastern Affairs, May/June 2011 Alan Gross ... was paid half a mill
Computer security researchers at Symantec say they have discovered a sophisticated piece of malware circulating the world that appears to be used for spyin
"... Political theorist Judith Shklar defined legalism as 'the ethical attitude that holds moral conduct to be a matter of rule following' — nearly regar
"... Government agents don’t have to break into an office to plant a bug. They can employ the latest electronic eavesdropping technology developed by the
"... An IG audit ... showed the USPS often approved requests to monitor a person’s mail without ensuring the request was properly authorized or adequate