A woman who falsely claimed to The Washington Post that Roy Moore, the Republican U.S. Senate candidate in Alabama, impregnated her as a teenager appears to work with an organization that uses deceptive tactics to secretly record conversations in an effort to embarrass its targets. In a series of interviews over two weeks, the woman shared a dramatic story about an alleged sexual relationship with
A white nationalist who participated in the torch-lit march through the University of Virginia’s campus this weekend has lost his job at a Berkeley, Calif., hot dog restaurant after Twitter users posted his photo and place of employment. The employee, Cole White, was identified online after he was photographed among a shouting and torch-wielding mob during the march Friday night in Charlottesville
A vast portion of the CIA’s computer hacking arsenal appeared to have been exposed Tuesday by the anti-secrecy organization WikiLeaks, which posted thousands of files revealing secret cyber-tools used by the agency to convert cellphones, televisions and other ordinary devices into implements of espionage. The trove appeared to lay bare the design and capabilities of some of the U.S. intelligence c
Editor’s Note: The Washington Post on Nov. 24 published a story on the work of four sets of researchers who have examined what they say are Russian propaganda efforts to undermine American democracy and interests. One of them was PropOrNot, a group that insists on public anonymity, which issued a report identifying more than 200 websites that, in its view, wittingly or unwittingly published or ech
Recent debate over U.S. government surveillance has focused on the information that American technology companies secretly provide to the National Security Agency. But that is only one of the ways the NSA eavesdrops on international communications. One is PRISM, the NSA program that collects information from technology companies, which was first revealed in reports by the Post and Britain's Guardi
U.S. surveillance architecture includes collection of revealing Internet, phone metadata Sorry, a summary is not available for this article at this time. Please try again later. The U.S. goverment is accessing top Internet companies’ servers to track foreign targets. Reporter Barton Gellman talks about the source who revealed this top-secret information and how he believes his whistleblowing was w
Last week, leaks revealed that the Web sites most people use every day are sharing users' private information with the government. Companies participating in the National Security Agency's program, code-named PRISM, include Google, Facebook, Apple and Microsoft. It wasn't supposed to be this way. During the 1990s, a "cypherpunk" movement predicted that ubiquitous, user-friendly cryptographic softw
He called me BRASSBANNER, a code name in the double-barreled style of the National Security Agency, where he worked in the signals intelligence directorate. Verax was the name he chose for himself, “truth teller” in Latin. I asked him early on, without reply, whether he intended to hint at the alternative fates that lay before him. Two British dissenters had used the pseudonym. Clement Walker, a 1
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く