Archives:

Laser Leaks

The GCHQ (Government Communications Headquarters) in the UK, demanded the return or the destruction of the Guardians’ Snowden files. They were acting on behalf of the British government, citing that the use of lasers by foreign agents could monitor conversations in the room.
The Guardian had secured the files by insuring that they were never connected …

Everything Returns

“After the scandal with the spread of secret documents by WikiLeaks, the revelations of Edward Snowden, reports of listening to Dmitry Medvedev during his visit to the G20 summit in London, the practice of creating paper documents will increase,” reports Izvestia; one of the most widely read newspapers in Russia. The daily is owned by State …

Floppy Discs, Canadian Agent and Ru...

Upon discovering that his wife of 19 years was having an affair, Canadian Sub-Lt. Jeffrey Paul Delisle, decided to walk into the Russian Embassy in 2007 and offer his services. Thus began Jeff Delisle’s double life in espionage that abruptly ended when he aroused the suspicion of the border agent who noticed that he was carrying …

Iranian Doctoral Student Being Trie...

By Daria Carmon

Omid Kokabee, an Iranian Ph.D. candidate in physics at the University of Texas in Austin, is standing trial on espionage charges in his homeland, after being held in custody since the end of January or February. It is believed he was picked up at the Tehran airport en route to continuing his graduate …

15 yrs in slammer for China-born en...

Seven months after Dongfan 'Greg' Chung, a Chinese-born naturalized U.S. citizen in his seventies, was put on trial for economic espionage, he has been issued a sentence of 15 years. His trial was a quick affair – 10 days in Santa Ana, California – and he was declared guilty of...

China poised to win cyber war?

Google shocked the Chinese government – not to mention all us gmail users – by announcing on January 12 that the company had suffered a serious cyber security breach, likely perpetrated by China. Encouraged by Google’s bold step, other companies are now coming forward, and so we see...

CIA turns to open-source intel

logo_visible_technologiesWeb 2.0 means that there’s a plethora of user-generated information out there to monitor – blog posts, tweets, commentary on news pieces, videos, reviews of books, etc. But the CIA’s not interested in any of that harmless chatter, right? Wrong. The investment arm of the U.S. intelligence community, In-Q-Tel – which serves...

Hacker hunter turns bad

Credit card theftAlbert Gonzalez once used his wily computer skills to help the U.S. government track down hackers. Now it seems he’s crossed over to the other side, where instead of spying to protect U.S. citizens, he’s been spying to steal millions...

China says has conclusive evidence ...

China China has surprised just about everyone with its recent arrest of four employees of the world’s second largest mining company, Rio Tinto. The detainees – one Australian and three Chinese – have been accused...

Rush of cyber attacks in South Kore...

Zombie computers is a DOS attackThe websites in South Korea that have recently been crashing under a series of Denial of Service (DoS) cyber attacks seem to be operating regularly again, since last Thursday’s assault. As a result, South Korea’s National Intelligence...

Goldman code spy out on bail

goldmansachslogoSergey Aleynikov – a Russian computer programmer who started working at Goldman Sachs in May 2007 and was recently accused of stealing code from the company – was released on $750,000 bail. In addition to...

UK: Deloitte in the counter-espiona...

Deloitte LogoThe international consultancy Deloitte has announced the launch of a new corporate counter-espionage team within its Security, Privacy & Resilience department. Corporate espionage is on the rise, and Deloitte has cautioned others that this sort of spying can have severe affects on...

First U.S. economic espionage trial...

Greg Chung In 1996, the U.S. Economic Espionage Act was passed, making the theft or misappropriation of a trade secret a federal crime. No one suspected of economic espionage has gone to trial (six settlements) – until Tuesday, when a...

Terrorists use Facebook to recruit ...

Facebook LogoSo while the FBI is using Facebook and other online marketing tools to help catch fugitives and find missing children, terrorists have decided there may be something in these sites for...

The Hip Face of the FBI

Twitter LogoFacebook and Twitter have been mainstream for quite some time, but it’s still surprising – and refreshing – to see the stuffy FBI embrace next generation...