Join my exclusive Dead Drop Digest with the most popular spy stories, tips, & tricks.

close
Breaking news

A Russia-linked cyber-espionage group has hacked into the controls of electricit...read more What is metadata, how is it used and why is it important? When we interact over ...read more Mass surveillance is the subjection of a population or significant component of ...read more

Chinese agency linked to cyber-espionage operations will review source code of foreign firms

According to a new law voted in 2016 and which came into effect starting June 1, 2017, foreign companies activating in China could be forced to provide access to their source code to a state agency that has been recently linked to China’s nation-state ...

Drones are the new insurance inspectors, what’s next?

When Melinda Roberts found shingles in her front yard after a storm, her insurer didn’t dispatch a...

Why we need spy blogs

It’s an open secret that the US intelligence community has its own classified, highly secure ...

7 ways to spot a work-from-home scam

Working from home is the ideal career experience for many Americans. In fact, 3.7 million U.S employ...

Hackers gain control of US power network

A Russia-linked cyber-espionage group has hacked into the controls of electricity distribution netwo...

5 utterly ridiculous “Nigerian” email scams we hope no one fell for

The aim of an advance fee “Nigerian” email scam is to trick an email recipient into believing th...

Zersetzung psychological oppression and persecution

Zersetzung essentially as a means of psychological oppression and persecution. More at GeoEngineeri...

Identity Theft Protection In Five Important Tips

Identity theft can and does literally happen everywhere and anywhere and it happens so often that it...

AI-Powered body cams give cops the power to Google everything they see

The police body camera industry is the latest to jump on the artificial intelligence bandwagon, brin...