Join my exclusive Dead Drop Digest with the most popular spy stories, tips, & tricks.

close
Breaking news

The US and Russia are in the midst of a boondoggle when it comes to bilateral r...read more A Russia-linked cyber-espionage group has hacked into the controls of electricit...read more

The creation and tools of a new Cyber Command

The Gov is finalizing plans to revamp the nation’s military command for defensive and offensive cyber operations in hopes of intensifying America’s ability to wage cyberwar against the Islamic State group and other foes. Here is what is needed and what it ...

NSA signal-surveillance success stories

These slides contain excerpts from an April 2013 National Security Agency presentation detailing signal surveillance techniques and successes. They reveal that the NSA and its British counterpart, Government Communications Headquarters (GCHQ), use a Google-spe...

How the NSA is tracking people right now

Documents obtained by The Washington Post indicate that the National Security Agency is collecting ...

Now you can find out if the NSA spied on you

You just know in your bones that the NSA spied on you and shared that data with Britain’s GCHQ spy...

The computers are listening, how the NSA converts spoken words into searchable text

Most people realize that emails and other digital communications they once considered private can no...

Meet the spies doing the NSA’s dirty work

This obscure FBI unit does the domestic surveillance that no other intelligence agency can touch. Wi...

The NSA has a plan to map the entire Internet. It’s called ‘Treasure Map’

Newly exposed Edward Snowden documents reveal the NSA’s in-depth plan to “map the entire Inter...

How the NSA snoop-proofs its Macs

The NSA (the National Security Agency, or, as some people prefer, No Such Agency) has found its...

Here’s the $2 Billion facility where the NSA stores and analyzes your communications

The National Security Agency (NSA) is in the information harvesting business — and business is...

XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

A top secret National Security Agency program allows analysts to search with no prior authorization ...