Newly revealed documents show that the NSA has circumvented or cracked much of the encryption that automatically secures the emails, Web searches, Internet chats and phone calls of Americans and others around the world. The project, referred to internally by the codename Bullrun, also includes efforts to weaken the encryption standards adopted by software developers. More »
The White House has opposed efforts to rein in NSA snooping, but only five years ago, Sen. Obama supported substantial reforms. More »
Officials say National Security Agency intercepts stopped David Coleman Headley's planned attack in Denmark, but sources say a tip from the British led to his capture after the U.S. failed for years to connect multiple reports of terror ties.More »
- Show All (52)
- Blair Hickman (1)
- Christie Thompson (1)
- Cora Currier (1)
- Jeff Larson (4)
- Julia Angwin (6)
- Justin Elliott (8)
- Kara Brandeisky (4)
- Megha Rajagopalan (7)
- Paul Steiger (1)
- Peter Maass (4)
- ProPublica (4)
- Richard Tofel (1)
- Sebastian Rotella (2)
- Sisi Wei (1)
- Stephen Engelberg (1)
- Stephen Suen (1)
- Theodoric Meyer (5)
All 41 Stories (0)updates since last visit
One lesson of the Heartbleed bug is that the U.S. needs to stop running Internet security like a Wikipedia volunteer project.
All the plans purport to end the bulk phone records collection program, but there are big differences.
This hand-drawn graphic, which is undated, was made by the East German secret police and appears to show the social connections the Stasi gleaned about a poet they were spying on.
Files obtained from the archives of the East German secret police show how far technology of spycraft has come.
ProPublica’s Jeff Larson and Steve Engelberg discuss how “leaky apps” – like Google Maps, Facebook and Angry Birds – are allowing the NSA and its British counterpart to access your personal data.
Data brokers don't make it easy to see the data they hold about you. Here's what you can do to opt-out.
We lay out more from our story about how the NSA and its British counterpart have been scouring smartphone apps.
New documents show the NSA and its British counterpart have access to advertiser data on smartphone apps, which can include your gender, income, and even whether you're a "swinger."
The conventional wisdom about how to build strong passwords can be counter-productive. Here are some better ways to build passwords that are hard to crack.
President Obama, who delivered a speech on surveillance policy today, has made a series of misleading statements about the NSA.
It’s not easy to keep your data private while surfing the Internet, but here are a few tools that can help.
From subpoenas to secret court orders, the government has an arsenal of legal tools for sweeping up your personal data.
A new ruling supporting the NSA's metadata surveillance program points to the 9/11 report as evidence for the necessity of such a program. Except the 9/11 report doesn’t contain the evidence the judge says it does.
A panel of experts appointed by President Obama says the U.S. government should get out of the business of weakening technology used to secure communications.
American and British spies have infiltrated online fantasy games, thinking they are ripe for use by militants. Justin Elliott joins Stephen Engelberg in the Storage Closet Studio this week to talk about avatars, spies, and the punchline-inspiring intersection of the two.
Snowden documents show intelligence agencies conducting surveillance and grabbing data in virtual worlds.
The federal institute that sets national standards for data encryption has announced it is reviewing all of its previous recommendations.
The agency, President Obama, and members of Congress have all said NSA spying programs have thwarted more than 50 terrorist plots. But there’s no evidence the claim is true.
A review of official statements shows the NSA has been inconsistent about how many plots have actually been thwarted by spying programs and what the role they actually played. Despite a lack of evidence, Congress and the media have rushed to repeat the most extreme version of the NSA’s claims.
The decision follows revelations about the NSA’s covert influence on computer security standards.
The university, which works closely with the NSA, apologizes to a professor after he was asked to remove his post.
Newly revealed documents show that the NSA has circumvented or cracked much of the encryption that automatically secures the emails, Web searches, Internet chats and phone calls of Americans and others around the world.
We explain why publishing this story about U.S. and U.K. government efforts to decode enormous amounts of internet traffic previously thought to have been safe is in the public interest.
The White House has opposed efforts to rein in NSA snooping, but only five years ago, Sen. Obama supported substantial reforms.
A detailed snapshot of what's known about the NSA surveillance programs.
Since Edward Snowden leaked documents detailing the NSA's surveillance programs, the Director of National Intelligence acknowledged that part of his congressional testimony was "erroneous." But that's not the only questionable comment by administration officials.
A measure to end one NSA program was just defeated in the House by a surprisingly narrow margin. Here are other proposals on the table.
In response to a public records request, the super-snooping spy agency says it doesn’t have the technology.
In a secret effort, the National Security Agency appears to be vacuuming up large swathes of the Internet.
The recent disclosure of sweeping surveillance by NSA whistleblower Edward Snowden has prompted a new wave of legal challenges to the U.S. government's intelligence-gathering programs.
The debate about National Security Agency eavesdropping has left European investigators bemused. U.S. technology collects mountains of data that often aids their cases, they say. But there's no substitute for real human spying.
In the face of claims that the National Security Agency’s data collection program had prevented terrorist plots, ProPublica’s Sebastian Rotella took a closer look at one of those: David Coleman Headley’s foiled plan to attack a Danish newspaper.
Officials say National Security Agency intercepts stopped David Coleman Headley's planned attack in Denmark, but sources say a tip from the British led to his capture after the U.S. failed for years to connect multiple reports of terror ties.
The evolution of the National Security Agency’s dragnet under Presidents Bush and Obama.
For background on the National Security Agency’s collection of phone and web records, here’s the best reporting on what else the government has been tracking.
When a D.C. video store revealed the Supreme Court nominee’s list of video rentals, it sparked a privacy backlash and a new law. Similarly, the Petraeus affair has put the government’s vast surveillance powers – even of elites – in a critical context.
The Federal Trade Commission called the penalty for privacy violations "substantial," but it amounts to a mere five hours' worth of revenue for the search colossus.
The trade commission now says it was looking into Google "well before" the company was outed by published reports saying the company secretly tracked Internet users.
Companies and law enforcement can mine your phone’s data for intimate details. ProPublica readers let us know what they think about it.
As the Senate considers a bill to strengthen the nation's cybersecurity, some questionable numbers keep creeping into the discussion.
Your phone tracks where you go and what you do. Are you worried about it?
Cellular systems constantly record the location of phones in their networks, data treasured by police and advertisers alike. The surveillance and privacy implications are simple: If someone knows where you are, they probably know what you are doing.
What We Still Don’t Know About Cellphone Surveillance
Hobbled by government filters, a withering budget and limited legal clout, the Federal Trade Commission struggles to police an army of data miners bent on exploiting our online footprints.
Who does your location information really belong to?
Google announced that it would notify Gmail users if they might be the target of a "state-sponsored attack." Help ProPublica figure out who's being targeted on Gmail and why.
As long suspected, the Stuxnet cyberattacks on Iran’s nuclear enrichment program were a joint U.S.-Israeli project, but the computer worm’s release to the Internet at large was unintended, The New York Times reports.
Years after the world’s scariest computer virus attack, not much has changed.
Privacy advocates say the House-passed cybersecurity bill falls short of safeguards needed to protect personal data collected while surfing the net.
Our rundown on the debate over the latest controversial Internet bill and what CISPA could mean for you.
Our Hottest Stories
- Segregation Now
- Beyond Ratings: More Tools Coming to Pick Your Doctor
- Rocky Mountain High or Reefer Madness? Legal Pot in Colorado Comes with Risks
- Even After Doctors Are Sanctioned or Arrested, Medicare Keeps Paying
- Long After Sandy, Red Cross Post-Storm Spending Still a Black Box
- Shake-Up Inside Forensic Credentialing Org
- The U.S. Government: Paying to Undermine Internet Security, Not to Fix It
- How the Labor Department Has Let Companies Off the Hook for Unpaid Internships
- Brooklyn DA Moves to Free Man after Long-Buried Evidence Surfaces
- Labor Department Intervenes on Behalf of Hearst Interns