NSA

NSA

military cybersecurity

1
Changes are expected in the US military cybersecurity infrastructure. After months of delay, the Trump administration is finalizing plans to revamp US military command...
big data

146
The operational world that interests governments the most nowadays is the intelligence world. Unlike the “national/military” intelligence of the past, the current intelligence realm...
intelligence agencies

72
In its final days, the Obama administration has expanded the power of the National Security Agency (N.S.A.) to share globally intercepted personal communications with...

253
The NSA wants to monitor and collection information from pacemakers and other biomedical devices for national security purposes, The Verge reports. The idea, it...

238
Is there anything the US National Security Agency can’t do? It can tap undersea fibre optic cables in real time, track the locations of...

35
Edward Snowden, the infamous NSA whistleblower, has found an unlikely supporter in former US Attorney General Eric Holder, who has said that Snowden performed...

167
US can’t be successful in banning encryption as it is a global phenomenon, according to Harvard study. Despite over two years’ efforts by the...

199
The US National Security Agency (NSA) is about to undergo a major reorganisation, according to past and current agency officials. The world’s largest electronic...

436
ISIS likes to tout itself as extremely technologically proficient. The organisation releases apps, instructions on online behaviour, and has recently released a video showing...

444
Researchers at the Computer Science and Artificial Intelligence Laboratory (CSAIL) at the Massachusetts Institute of Technology (MIT) have developed a new online text messaging...

310
For years digital security experts have worried over possible backdoors implemented into equipment manufactured at Chinese factories. Over the years there have been several...

447
Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...

321
It is now widely known that governments the world over eavesdrop on citizens’ electronic communication. Until last year, governmental spying was thought to be...

100
Facebook has released its biannual report on government data requests, indicating that total law enforcement requests are at their highest level ever at 41,214...

122
A standardisation of common protocols and interconnections is required if the US Department of Defense (DoD) is to take advantage of the Internet of...

98
The US National Security Agency (NSA) overstepped an intelligence-sharing agreement with Germany by requesting German technicians to snoop on allied governments‘ emails, a top-level...

141
Today’s small wars and border conflicts are being fought online and under the radar, but the conflicts could escalate into real world wars. Last year,...

113
The right for privacy or the general interest to safeguard the public's privacy – which one wins in case of a clash? After failing...

278
Smartphone technology built by Lockheed Martin promises to verify a user's identity based on the swiftness and shape of the individual’s finger strokes on...

159
The need for cybersecurity solutions and experts is going to grow as more companies such as Sony Pictures, Target, Home Depot, and Chase are...

41
  By: Gad Elkin, Cyber Security Manager at EMEA It seems more and more people are interested in securing their personal computers and private information. The...

41
The secret hacking tactics of Canada’s intelligence agency Canada’s electronic surveillance agency has secretly developed an arsenal of cyber weapons capable of stealing data and...

iHLS Events