NSA

NSA

military cybersecurity

10
Changes are expected in the US military cybersecurity infrastructure. After months of delay, the Trump administration is finalizing plans to revamp US military command...
big data

163
The operational world that interests governments the most nowadays is the intelligence world. Unlike the “national/military” intelligence of the past, the current intelligence realm...
intelligence agencies

80
In its final days, the Obama administration has expanded the power of the National Security Agency (N.S.A.) to share globally intercepted personal communications with...

261
The NSA wants to monitor and collection information from pacemakers and other biomedical devices for national security purposes, The Verge reports. The idea, it...

242
Is there anything the US National Security Agency can’t do? It can tap undersea fibre optic cables in real time, track the locations of...

39
Edward Snowden, the infamous NSA whistleblower, has found an unlikely supporter in former US Attorney General Eric Holder, who has said that Snowden performed...

176
US can’t be successful in banning encryption as it is a global phenomenon, according to Harvard study. Despite over two years’ efforts by the...

208
The US National Security Agency (NSA) is about to undergo a major reorganisation, according to past and current agency officials. The world’s largest electronic...

441
ISIS likes to tout itself as extremely technologically proficient. The organisation releases apps, instructions on online behaviour, and has recently released a video showing...

452
Researchers at the Computer Science and Artificial Intelligence Laboratory (CSAIL) at the Massachusetts Institute of Technology (MIT) have developed a new online text messaging...

317
For years digital security experts have worried over possible backdoors implemented into equipment manufactured at Chinese factories. Over the years there have been several...

460
Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...

334
It is now widely known that governments the world over eavesdrop on citizens’ electronic communication. Until last year, governmental spying was thought to be...

105
Facebook has released its biannual report on government data requests, indicating that total law enforcement requests are at their highest level ever at 41,214...

128
A standardisation of common protocols and interconnections is required if the US Department of Defense (DoD) is to take advantage of the Internet of...

107
The US National Security Agency (NSA) overstepped an intelligence-sharing agreement with Germany by requesting German technicians to snoop on allied governments‘ emails, a top-level...

149
Today’s small wars and border conflicts are being fought online and under the radar, but the conflicts could escalate into real world wars. Last year,...

119
The right for privacy or the general interest to safeguard the public's privacy – which one wins in case of a clash? After failing...

285
Smartphone technology built by Lockheed Martin promises to verify a user's identity based on the swiftness and shape of the individual’s finger strokes on...

167
The need for cybersecurity solutions and experts is going to grow as more companies such as Sony Pictures, Target, Home Depot, and Chase are...

52
  By: Gad Elkin, Cyber Security Manager at EMEA It seems more and more people are interested in securing their personal computers and private information. The...

47
The secret hacking tactics of Canada’s intelligence agency Canada’s electronic surveillance agency has secretly developed an arsenal of cyber weapons capable of stealing data and...

iHLS Events

5

1009