Is Canada a cyber-superpower?
                
The secret hacking tactics of Canada’s intelligence agency
Canada’s electronic surveillance agency has secretly developed an arsenal of cyber weapons capable of stealing data and...            
            
        NSA Surveillance Software Infecting Thousands of Computers Worldwide
                
A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from...            
            
        Law Enforcement and National Security vs. Global Business Interests
                Yoram Hacohen
Three interesting processes are underway as a direct result of Edward Snowden’s revelations about the extent of the access by US security services...            
            
        NSA surveillance is about to go on trial
                
A federal Appeals Court this week will review the government's controversial domestic spying program that collects the phone records of virtually all Americans, a...            
            
        Microsoft says NSA spying hit trust in the cloud
                
A senior Microsoft spokesman says that government surveillance has damaged trust in the cloud and in the company itself, pushing the latter to focus...            
            
        NSA Says intelligence on the Islamic state could have been ‘stronger’
                The nation’s top spies, including the head of the CIA, the NSA, the Geospatial Intelligence Agency and the Defense Intelligence Agency took the stage...            
            
        Digital jihad: ISIS, Al Qaeda seek a cyber caliphate to launch...
                Jihadists in the Middle East are ramping up efforts to mount a massive cyber attack on the U.S., with leaders from both Islamic State...            
            
        iHLS TV – NSA, Undersea sensors, GHOST unmanned system, Domestic...
                
In this weekly episode (02 Sep 2014):
- NSA and its new tracking software
- Undersea sensors
- GHOST: The unmanned system
- Domestic extremists
- Ambulance drivers safety
	תוכנה...            
            
        How to be friends with the NSA again
                
Relations between Silicon Valley and Washington have never been easy, but the technology sector’s fury about hacking by the National Security Agency has company...            
            
        NSA’s ‘MonsterMind’ could automate cyber war
                
The National Security Agency is developing a cybersecurity machine that could detect and automatically counter attacks against U.S. computers by blocking access to American networks, according...            
            
        Snowden: US attempt to monitor emails in Syria botched
                
Exiled leaker Edward Snowden strikes once more. In a new interview, he disclosed that the NSA caused a massive internet blackout in Syria following...            
            
        NSA eavesdropping as business opportunity
                
To many Americans, online eavesdropping by the U.S. National Security Agency is an outrage, a threat to privacy and freedom.  To some, it's a business opportunity.
A small but...            
            
        Caught in the Net of the NSA
                Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital...            
            
        NSA Records Every Phone Call in the Bahamas
                The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the...            
            
        Spy Agencies too Busy with Russia and China
                The potential threats from Russia and China leave less time for British security bodies to pry in citizen private lives.
In recent months, GCHQ –...            
            
        U.S. High Court to Discuss Snowden Case?
                Statements made by U.S. High Justices might point to their intentions involving the large-scale NSA espionage program, revealed to the public following unprecedented leaks...            
            
        NSA Exploited HeartBleed Vulnerability
                The NSA knew about and exploited the Heartbleed vulnerability for two years before it was publicly exposed this week, and used it to steal...            
            
        New Encryption to Defend Against U.S. Spying
                The U.S. intelligence agencies' activities are already infamous, although their depth and scope are not yet clear. According to a Microsoft researcher new encryption...            
            
        iHLS TV – Hackers, Spies and Commercial UAVs
                
 Articles and issues discussed in this episode:
Facebook's new facial recognition software
Kremlin official website hacked
Commercial UAV use in the U.S. lags behind
NSA records all...            
            
        NSA Program Captures, Replays Phone Calls
                The NSA’s MYSTIC program, created in 2009, deploys a “retrospective retrieval” (RETRO) tool which allows agents to rewind and playback all phone conversations that...            
            
        U.S. License Plate Tracking Plan collapsed
                Only days after the US Department of Homeland Security began seeking a company to help it track license plates nationwide, the agency has reportedly...            
            
        Former NSA Agent Becomes Cyber-Privacy Guru
                Two brothers, John and Will Ackerly - a former NSA employee and a George W. Bush White House insider - have launched a cyber-privacy...            
            
        
 
            
