Micah Lee, The Intercept

Micah Lee

The Intercept

Chicago, IL, United States

Contact Micah

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • The Intercept
  • firstlook.org

Past articles by Micah:

Russian Hackers Have Been Inside Austin City Network for Months

Russia appears to have used Austin’s network as infrastructure to stage additional cyberattacks. → Read More

Protesters, Here’s How to Set Up a Cheap Burner Phone

The Intercept’s security director shows how to safeguard a secondary Android phone for an anti-police protest. → Read More

The U.S. Government’s Indictment of Julian Assange Poses Grave Threats to Press Freedom

The Trump DOJ is exploiting animosity toward Assange to launch a thinly disguised effort to criminalize core functions of investigative journalism. → Read More

Everybody Does It: The Messy Truth About Infiltrating Computer Supply Chains

The danger of China compromising hardware supply chains is very real, judging from classified intelligence documents, even if a Bloomberg story on the matter is highly disputed. → Read More

United Nations Accidentally Exposed Passwords and Sensitive Information to the Whole Internet

A security researcher discovered private data lurking on 60 Trello boards belonging to the United Nations. Sensitive information was also found in public Google documents. → Read More

What We Learned About Russian and U.S. Spycraft From Mueller’s Indictment of Hackers

The indictment contains a surprising amount of technical information about alleged Russian cyberattacks during the 2016 elections — by far the most detailed and plausible picture yet of what exactly occurred, → Read More

Police Broke Into Chelsea Manning’s Home with Guns Drawn — in a “Wellness Check”

Video obtained by The Intercept shows police officers pointing their guns as they searched Chelsea Manning's empty apartment. → Read More

In Apple Mail, There’s No Protecting PGP-Encrypted Messages

Turning off remote content loading is supposed to mitigate against an attack known as EFAIL, which can steal encrypted messages. But the attack can still happen even if you do this. → Read More

It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out.

I spent two years trying to get someone to tamper with my laptop, so I could then detect it. Somewhere along the way, I realized this might never happen. → Read More

NSA Used Porn to “Break Down Detainees” in Iraq — and Other Revelations From 297 Snowden Documents

The documents, from an internal NSA newsletter, also reveal problems recruiting Arabic speakers to the spy agency and evidence of election fraud in Egypt. → Read More

Snowden’s New App Uses Your Smartphone To Physically Guard Your Laptop

"Haven" guards against so-called "evil maid" attacks, in which your boot software is surreptitiously modified to defeat encryption. → Read More

How to Protect Yourself Against Spearphishing: A Comic Explanation.

A trick called "phishing" was used to snare emails from the Hillary Clinton campaign and other Democrats. Here's how to protect yourself. → Read More

Why We Reinstalled SecureDrop

Last week, engineers at Freedom of the Press Foundation discovered a three-year-old vulnerability in the whistleblower submission system. → Read More

How to Use Signal Without Giving Out Your Phone Number

A step-by-step guide to protecting your private phone number while enjoying the security of encrypted texting app Signal. → Read More

Sloppy U.S. Spies Misused a Covert Network for Personal Shopping — and Other Stories from Internal NSA Documents

Campaigns to spy on internet cafes and tap Iraqi communications, as well as an intimate NSA examination of Czech spying, are detailed in NSA newsletters. → Read More

NSA Broke the Encryption on File-Sharing Apps Kazaa and eDonkey

The spy agency didn’t care about copyright violations; it was trying to determine if it could find valuable intelligence. → Read More

How Right-Wing Extremists Stalk, Dox, and Harass Their Enemies

Leaked chat logs reveal a campaign to dig up personal information on "antifa" and other leftist activists. → Read More

Cybersecurity for the People: How to Keep Your Chats Truly Private With Signal

A comprehensive video and text guide to ensuring that your private conversations are actually private. → Read More

Why Soviet Weather Was Secret, a Critical Gap in Korea, and Other NSA Newsletter Tales

The latest batch of SIDtoday articles published by The Intercept covers the second half of 2004 and the beginning of 2005. → Read More

Cybersecurity for the People: How to Protect Your Privacy at a Protest

Watch this video for tips on how to prepare your phone before you go to a protest and on how to safely communicate with your friends. → Read More