The agents of cyber-warfare are trapped as much as liberated by the ambiguities surrounding what the nature of a cyber-weapon is at all, with what intent and for what purpose it was crafted, allowing its repercussions to seem anywhere from rapid to evanescent.

In the throng of American companies and their confused compliance with the National Security Agency’s controversial decade-long snooping on internal and international communications, The New York Times and ProPublica have unravelled one that actually bent over backwards to please the NSA: AT&T. The basis of their allegations is a tranche of NSA documents detailing the features […]

In the throng of American companies and their confused compliance with the National Security Agency’s controversial decade-long snooping on internal and international communications, The New York Times and ProPublica have unravelled one that actually bent over backwards to please the NSA: AT&T. The basis of their allegations is a tranche of NSA documents detailing the features […]

The Wire July 10, 2015 Bangalore: Indian intelligence agencies and police forces are listed among the customers of an Italian company accused of selling spyware to repressive regimes. Apart from the NIA, RAW, the intelligence wing of the Cabinet Secretariat and the Intelligence Bureau, the Gujarat, Delhi, Andhra and Maharashtra state police forces also earn a […]

The Wire July 10, 2015 Bangalore: Indian intelligence agencies and police forces are listed among the customers of an Italian company accused of selling spyware to repressive regimes. Apart from the NIA, RAW, the intelligence wing of the Cabinet Secretariat and the Intelligence Bureau, the Gujarat, Delhi, Andhra and Maharashtra state police forces also earn a […]

The Wire June 2, 2015 DUAL_EC_DRBG is the name of a program that played an important role in the National Security Agency’s infiltration of communication protocols, which was revealed by whistleblower Edward Snowden. The program, at the time, drew the suspicion of many cryptographers who wondered why it was being used instead of the NIST’s […]