NSA

NSA

The NSA’s MYSTIC program, created in 2009, deploys a “retrospective retrieval” (RETRO) tool which allows agents to rewind and playback all phone conversations that...

Only days after the US Department of Homeland Security began seeking a company to help it track license plates nationwide, the agency has reportedly...

Two brothers, John and Will Ackerly - a former NSA employee and a George W. Bush White House insider - have launched a cyber-privacy...

An analysis of 225 terrorism cases inside the United States since the Sept. 11, 2001, attacks has concluded that the bulk collection of phone...

The Washington post revealed that NSA is spending a great effort to build a quantum computer that could break most types of encryption. The NSA...

Australian intelligence agencies may have had knowledge of a top secret U.S. NSA program for targeting iPhones, according to newly-released documents. Slides released recently by...

Der Spiegel revealed that the TAO unit of NSA planted backdoors to access computers, hard drives, routers, and other devices from principal vendors. Germany’s Der...

The U.S. National Security Agency (NSA) has collected sensitive data on key telecommunications cables between Europe, north Africa and Asia, German news magazine Der...

The U.S. National Security Agency's bulk collection and storage of phone metadata does not violate the U.S. Constitution, according to a federal judge's decision. The...

The NSA paid RSA $10 million to ensure a vulnerable encryption algorithm was used by default in RSA's BSAFE toolkit, this according to a...

The White House has decided to keep the positions of director of the National Security Agency and commander of U.S. Cyber Command together when...

So many spies in the chatrooms of games like World of Warcraft, they have to avoid running into each other. Now spies aren't just...

The U.S National Security Agency (NSA) is reported to have installed computer malware in 50,000 computer networks around the globe. Reports in theWashington Post,...

Revelations of the surveillance programs of the National Security Agency (NSA) and the U.K. Government Communications Headquarters (GCHQ) have sparked technical innovations, legal challenges,...

Digital privacy services such as encrypted e-mail, secure instant messaging, and services that provide hard-to-track IP addresses are enjoying a surge in demand as...

The National Security Agency is considering exposing the pornography viewing habits of Muslim "radicalizers," according to documents that the Huffington Post has obtained from...

An unprecedented MOU (Memorandum of Understanding) allowing Israel free access to raw data collected by the NSA, including all U.S. civilian communications, was secretly...

The National Security Agency (NSA) has repeatedly tried to develop attacks against people using Tor, a software tool designed to protect online anonymity –...

The government shutdown increases the risk of a cyber attack against the U.S. due to the fact that many workers who monitor threats have...

The recent disclosures about the U.S. intelligence agencies are causing more damage as time passes. As the nation’s spy agencies assess the fallout from disclosures...

The NSA used ‘man in the middle’ hack attacks to impersonate Google and fool web users, leaks have revealed. The technique circumvents encryption by...

Germany’s Der Spiegel newspaper –joining the NSA revelations train – reported that the intelligence agency is interested in international credit card transactions and may...