UK may cut Huawei out of 5G networks this yearIt would happen much sooner than expected.By J. Fingas, 07.05.2020
UK investigates if cyberattack led to stock exchange outageGCHQ isn't fully convinced the failure was due to a glitch.By J. Fingas, 01.05.2020
Apple, Google and others condemn UK plan to view encrypted chatsThey say GCHQ's 'ghost protocol' undermines user trust and security.By R. England, 05.30.2019
European Court rules UK surveillance program violated human rightsBut the sharing of intelligence with foreign governments is still a-okay.By S. Shah, 09.13.2018
UK collected social media data as part of its mass surveillanceThere are few safeguards in place to prevent its misuse.By S. Krishna, 10.17.2017
Leaked memo says hackers may have compromised UK power plantsUK energy industry appears to have been targeted by state-sponsored threats.By R. England, 07.18.2017
Workplace AI makes it all too easy to track you on the jobIt helps with security and productivity, but it could also pose a serious privacy risk.By J. Fingas, 01.30.2017
The NSA has been listening to in-flight cell phone calls for yearsWatch what you say if you use your phone in the sky.By N. Ingraham, 12.08.2016
UK spies paid a New Zealand firm to help tap key internet linesEndace's technology helped GCHQ ramp up its mass surveillance plans.By J. Fingas, 10.23.2016
UK spies violated privacy laws with bulk data collectionA tribunal finds that GCHQ, MI5 and MI6 ran afoul of European rights for 17 years.By J. Fingas, 10.17.2016
UK spies tracked Middle East activists with a web link shortenerGCHQ used the tech to both foster and monitor groups during Arab Spring revolutions.By J. Fingas, 08.01.2016
UK spies may have risked lives by collecting too much dataMass surveillance could make it harder to find vital information.By J. Fingas, 06.08.2016
US, UK intelligence agencies cracked Israeli drone dataThe program, code-named "Anarchist," has been going on for years. By C. Velazco, 01.29.2016
Researcher warns of backdoor in GCHQ-developed encryptionIt's not as secure as end-to-end encryption, he claims.By N. Summers, 01.21.2016