By Spencer Ackerman and Noah Shachtman Wired | July 19, 2010 Read More http://www.wired.com/dangerroom/2010/07/search-through-top-secret-americas-network-o
By Daniel Tencer Raw Story | June 19th, 2010 The Pentagon's spy unit has quietly begun to rebuild a database for tracking potential terrorist threats that
By Declan McCullagh | CNet News | June 22, 2010 To nab a pair of men accused of robbing banks in Connecticut, court documents show the FBI turned to a nove
The average motorist has the details of 200 of their journeys stored on the Government’s controversial vehicle surveillance database, new figures have s
foia.fbi.gov Edward “Ted” Moore Kennedy served as U.S. senator for the state of Massachusetts from November 7, 1962 until his death. He was a long-time
By Brad Friedman | Brad's Blog | May 27, 2010 Remember the disingenuous snit fits that Rightwing con-man Andrew Breitbart and his Tea Bag Boyz were on abou
By Lewis Page | The Register | May 2010 Our old friends at DARPA - the US military research bureau - have broached another intriguing and mildy upsetting s
" ... Most of the CIA’s recruitment of foreign spies now takes place in the United States. Hundreds of CIA officers working out of cover offices and com
by emptywheel | FireDogLake | April 19, 2010 FISA Court Encourages Government to Stop Collecting Some Metadata National Security Agency Director Keith B.
By Viki Malik Indian Express | April 5, 2010 All of a sudden a long forgotten American spy plane called U-2, which had a stellar role during the Cold War,
By Andrew Becker
Politics Daily, April 3, 2010
President Gerald Ford secretly authorized the use of warrantless domestic wiretaps for foreign intellige
AllGov.com | March 31, 2010 After concealing highly-secretive investigations for more than 60 years, the FBI has released a small volume of documents from
Marc Ambinder | The Atlantic | Mar 31 2010 The National Security Agency broke the law when it wiretapped two American lawyers working for the El-Haramain
Keeping online jihadists where you can see them is one thing – but the ethics of creating honeypot sites are far more debatable By Tim Stevens | Guardi
Hotmail hacking how-to for spooks and cops By John Leyden The Register | 25th February 2010 Updated Long-established privacy and cryptology website Crypt