Latest in Covert Action

Cybersecurity

The Equation Group's Sophisticated Hacking and Exploitation Tools

This week, Kaspersky Labs published detailed information on what it calls the Equation Group -- almost certainly the NSA -- and its abilities to embed spyware deep inside computers, gaining pretty much total control of those computers while maintaining persistence in the face of reboots, operating system reinstalls, and commercial anti-virus products.

Covert Action: Legal Framework

The Legal Basis for the Mughniyah Killing

The Washington Post and Newsweek report that the CIA in 2008 worked with Israel’s Mossad to kill Imad Mughniyah, Hezbollah’s operations chief, in Damascus, Syria.  The Post says that Mughniyah “had been implicated in the killing of hundreds of Americans, stretching back to the embassy bombing in Beirut [in 1983] that killed 63 people, in

Covert Action

Thoughts on the SSCI Report, Part II: The Program's Brutality

I want to begin my review of the SSCI interrogation report and the responses from the CIA and the SSCI minority by addressing the area in which, in my view, the majority report is strongest: the allegation that the treatment of detainees was far more abusive, far less controlled, and far more brutal than the CIA has acknowledged.

Targeted Killing: Drones

Is JSOC About to Become More Transparent on Drone Strikes?

One frequently sees the claim that CIA drone operations should be handed over to the military because the military is more transparent. I have frequently disparaged that argument, not because the CIA is in fact transparent but rather because direct action undertaken by JSOC isn’t transparent either. But might that change soon?

Subscribe to Lawfare

EmailRSSKindle