The Washington Post's Barton Gellman and Greg Miller detail the vast sums of money America spends on intelligence operations, far from public scrutiny.
Among the notable revelations in the budget summary:
•Spending by the CIA has surged past that of every other spy agency, with $14.7 billion in requested funding for 2013. The figure vastly exceeds outside estimates and is nearly 50 percent above that of the National Security Agency, which conducts eavesdropping operations and has long been considered the behemoth of the community.
•The CIA and NSA have launched aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as “offensive cyber operations.”
•The NSA planned to investigate at least 4,000 possible insider threats in 2013, cases in which the agency suspected sensitive information may have been compromised by one of its own. The budget documents show that the U.S. intelligence community has sought to strengthen its ability to detect what it calls “anomalous behavior” by personnel with access to highly classified material.
•U.S. intelligence officials take an active interest in foes as well as friends. Pakistan is described in detail as an “intractable target,” and counterintelligence operations “are strategically focused against [the] priority targets of China, Russia, Iran, Cuba and Israel.”
Don't miss this incredible, clarifying interactive chart.
Techdirt is in the throes of a two-part revelation: 1. the US government's works are public domain and can be freely commercialized, and; 2. many of the weird things that spy agencies make can be turned into ironic, cool, and sometimes fun and/or beautiful objects of commerce.
Government Attic used the Freedom of Information Act to force the NSA to cough up its "old security posters from the 1950s and 1960s"; after two years' delay, the NSA finally delivered 139 pages' worth of gorgeous, weird, revealingly paranoid internal materials, produced by an incredibly prolific internal security office who constantly refreshed their poster […]
One effect of the Snowden leaks is that the NSA now makes an annual disclosure of the extent of its domestic surveillance operations; that's how we know that the NSA collected 534 million phone call and text message records (time, date, location, from, to -- but not the content), which more than triples its surveillance […]
Your pet might be photogenic, but getting them to stare long enough at your camera to snap that Instagram-worthy photo isn’t as simple as telling them to sit. Bribing your pets with their favorite treat, however, might just do the trick, and with the Adjustable Pet Selfie Smartphone Attachment, you can do just that while getting […]
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]
The human eye is a powerful thing, but it’s not so great at seeing in the dark or around tight spaces, which is partially why most of us struggle with unplugging drains, cleaning under the fridge, and other hard-to-reach jobs. This 1080p HD Waterproof WiFi Wireless Endoscopic Camera, however, gives you the flexibility necessary to get […]