NSA

NSA

soldiers screens

Signals intelligence (SIGINT) provides military troops with actionable intelligence and critical information. It is intelligence-gathering by interception of signals, whether communications between people or...
quantum

Experts say that when quantum computers are fully operational, they will upend the use of password-protected systems, artificial intelligence and other areas of information...

The US National Security Agency (NSA) has been systematically moving most of the mission data it collects, analyzes and stores into a classified cloud...
special forces

Special forces around the world are interested in ISR capabilities, which is often associated with on-the-ground targeting and drone surveillance during operations. Recently, there...
military cybersecurity

Changes are expected in the US military cybersecurity infrastructure. After months of delay, the Trump administration is finalizing plans to revamp US military command...
big data

The operational world that interests governments the most nowadays is the intelligence world. Unlike the “national/military” intelligence of the past, the current intelligence realm...
intelligence agencies

In its final days, the Obama administration has expanded the power of the National Security Agency (N.S.A.) to share globally intercepted personal communications with...

The NSA wants to monitor and collection information from pacemakers and other biomedical devices for national security purposes, The Verge reports. The idea, it...

Is there anything the US National Security Agency can’t do? It can tap undersea fibre optic cables in real time, track the locations of...

Edward Snowden, the infamous NSA whistleblower, has found an unlikely supporter in former US Attorney General Eric Holder, who has said that Snowden performed...

US can’t be successful in banning encryption as it is a global phenomenon, according to Harvard study. Despite over two years’ efforts by the...

The US National Security Agency (NSA) is about to undergo a major reorganisation, according to past and current agency officials. The world’s largest electronic...

ISIS likes to tout itself as extremely technologically proficient. The organisation releases apps, instructions on online behaviour, and has recently released a video showing...

Researchers at the Computer Science and Artificial Intelligence Laboratory (CSAIL) at the Massachusetts Institute of Technology (MIT) have developed a new online text messaging...

For years digital security experts have worried over possible backdoors implemented into equipment manufactured at Chinese factories. Over the years there have been several...

Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...

It is now widely known that governments the world over eavesdrop on citizens’ electronic communication. Until last year, governmental spying was thought to be...

Facebook has released its biannual report on government data requests, indicating that total law enforcement requests are at their highest level ever at 41,214...

A standardisation of common protocols and interconnections is required if the US Department of Defense (DoD) is to take advantage of the Internet of...

The US National Security Agency (NSA) overstepped an intelligence-sharing agreement with Germany by requesting German technicians to snoop on allied governments‘ emails, a top-level...

Today’s small wars and border conflicts are being fought online and under the radar, but the conflicts could escalate into real world wars. Last year,...

The right for privacy or the general interest to safeguard the public's privacy – which one wins in case of a clash? After failing...