#human-intelligence-gathering

[ follow ]
World news
fromThe Washington Post
13 hours ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
#artificial-intelligence
Artificial intelligence
fromNextgov.com
3 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Business intelligence
fromNextgov.com
3 days ago

Survey: Human capital is a key barrier to government AI adoption

Federal leaders view AI as essential for improving agency efficiency, but many initiatives remain in early stages due to various implementation barriers.
#fbi
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
#ice
fromSilicon Canals
2 days ago
US politics

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

US politics
fromTechCrunch
2 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
2 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
NYC parents
fromWIRED
1 week ago

Why ICE Is Allowed to Impersonate Law Enforcement

ICE agents misled campus security to detain a student without proper identification or judicial warrant.
#palantir
Business
from24/7 Wall St.
1 day ago

Here's Why Palantir Is Winning Everywhere, Except in the Stock Market

Palantir's stock has declined over 28% despite strong earnings, as the market has become desensitized to its performance.
fromWIRED
2 months ago
Privacy professionals

Palantir Defends Work With ICE to Staff Following Killing of Alex Pretti

Business
from24/7 Wall St.
1 day ago

Here's Why Palantir Is Winning Everywhere, Except in the Stock Market

Palantir's stock has declined over 28% despite strong earnings, as the market has become desensitized to its performance.
fromWIRED
2 months ago
Privacy professionals

Palantir Defends Work With ICE to Staff Following Killing of Alex Pretti

Information security
fromTheregister
2 days ago

Maude-HCS helps model and validate covert network designs

Maude-HCS, an open-source toolkit for covert communication networks, allows organizations to experiment with secure and anonymous communication systems.
Software development
fromArs Technica
3 days ago

Here's what that Claude Code source leak reveals about Anthropic's plans

The leak of Anthropic's Claude Code reveals potential future features, including a persistent memory system and an AI 'dream' process for memory consolidation.
#cia
fromThe Walrus
4 days ago

The Man Who Put AI at the Centre of America's War Machine | The Walrus

"War is terrible, war is terrible, war is terrible," he intones, holding my gaze and giving voice to a universal chorus.
DC food
#data-integrity
fromComputerworld
4 days ago
Data science

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
4 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
4 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
SF politics
fromNextgov.com
5 days ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
fromTechCrunch
1 day ago

Anthropic ramps up its political activities with a new PAC | TechCrunch

Anthropic's political activities have ramped up as the company continues to be enmeshed in a nasty legal battle with the Defense Department. The dispute erupted earlier this year over the government's use of Anthropic's AI models and what guidelines (if any) should exist for that usage.
Artificial intelligence
Python
fromAntocuni
1 week ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
Roam Research
fromThe Cipher Brief
4 days ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
#espionage
Germany news
fromenglish.elpais.com
1 week ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Germany news
fromenglish.elpais.com
1 week ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
#dhs
SF politics
fromNextgov.com
5 days ago

DHS drops investigation into former acting CISA chief's failed polygraph exam

DHS closed an investigation into CISA staff who arranged a polygraph for the former acting director, clearing them of wrongdoing.
US politics
fromNextgov.com
1 day ago

President's budget proposes folding beleaguered DHS intelligence office into headquarters

The Department of Homeland Security's intelligence office faces consolidation and potential workforce reductions under Trump's proposed budget for 2027.
SF politics
fromNextgov.com
5 days ago

DHS drops investigation into former acting CISA chief's failed polygraph exam

DHS closed an investigation into CISA staff who arranged a polygraph for the former acting director, clearing them of wrongdoing.
US politics
fromNextgov.com
1 day ago

President's budget proposes folding beleaguered DHS intelligence office into headquarters

The Department of Homeland Security's intelligence office faces consolidation and potential workforce reductions under Trump's proposed budget for 2027.
Information security
fromSecuritymagazine
3 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
#cybersecurity
fromSecurityWeek
5 days ago
Information security

Hacked Hospitals, Hidden Spyware: Iran Conflict Shows How Digital Fight Is Ingrained in Warfare

Information security
fromThe Hacker News
5 days ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
fromNextgov.com
1 week ago
Information security

Ex-NSA leaders say Americans are becoming 'numb' to cyber threats

American society is increasingly apathetic to cyberattacks, lacking a strong strategy to deter foreign adversaries and their hackers.
Privacy professionals
fromTechRepublic
5 days ago

Iran-Linked Hackers Breach FBI Director Kash Patel's Email, Leak Messages Online

An Iran-linked hacking group breached FBI Director Kash Patel's personal email, releasing non-sensitive information as a retaliatory cyber attack.
Information security
fromSecurityWeek
5 days ago

Hacked Hospitals, Hidden Spyware: Iran Conflict Shows How Digital Fight Is Ingrained in Warfare

Iranian cyber operations exploit missile strikes to deploy spyware via fake texts, showcasing a blend of digital and physical warfare tactics.
Information security
fromThe Hacker News
5 days ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
Information security
fromNextgov.com
1 week ago

Ex-NSA leaders say Americans are becoming 'numb' to cyber threats

American society is increasingly apathetic to cyberattacks, lacking a strong strategy to deter foreign adversaries and their hackers.
#ai
fromEntrepreneur
2 days ago
Artificial intelligence

Anthropic Accidentally Leaked Its Own Claude Code. Now the Company Is Scrambling to Contain the Damage.

fromComputerworld
5 days ago
Artificial intelligence

Leak reveals Anthropic's 'Mythos,' a powerful AI model aimed at cybersecurity use cases

Artificial intelligence
fromEntrepreneur
2 days ago

Anthropic Accidentally Leaked Its Own Claude Code. Now the Company Is Scrambling to Contain the Damage.

Anthropic accidentally exposed proprietary instructions for Claude Code, enabling competitors to replicate its features without reverse-engineering.
Artificial intelligence
fromComputerworld
5 days ago

Leak reveals Anthropic's 'Mythos,' a powerful AI model aimed at cybersecurity use cases

Anthropic plans to cautiously roll out its advanced LLM, Mythos, starting with enterprise security teams due to cybersecurity concerns.
Information security
fromNextgov.com
1 week ago

ODNI is building a framework to boost spy agencies' AI adoption

The Office of the Director of National Intelligence is enhancing AI adoption for cybersecurity within the intelligence community as part of a modernization effort.
Intellectual property law
fromThe Verge
3 weeks ago

Anthropic doesn't trust the Pentagon, and neither should you

Anthropic sued the Pentagon over a supply chain risk designation, citing First and Fifth Amendment violations, amid broader concerns about government surveillance authority and AI oversight.
fromwww.independent.co.uk
3 weeks ago

Police given more time to question three men arrested on suspicion of spying for Iran

This investigation continues at pace with a number of lines of inquiry being pursued by our detectives. The warrants of further detention for these three men will allow us to continue the investigation, while mitigating any potential risk to the public as we do so. This has been a long-running investigation and part of our ongoing work to disrupt malign activity where we suspect it.
UK news
Law
fromThe Atlantic
3 weeks ago

The Unbearable Lightness of Signalgate

The Uniform Code of Military Justice enforces discipline across all military ranks through 158 articles covering both civilian crimes and military-specific offenses, with recent courts-martial demonstrating consistent enforcement of conduct standards.
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
UK news
fromwww.theguardian.com
4 weeks ago

UK counter-terrorism agents granted more time to question men suspected of spying for Iran

Four men arrested on suspicion of spying for Iran on Jewish community locations and individuals in Britain can be held in custody until 13 March for questioning.
fromNextgov.com
2 weeks ago

The Pentagon's 'woke AI' problem

Department of War AI will not be woke. We're building war ready weapons and systems, not chatbots for an Ivy League faculty lounge. Later on, President Donald Trump lambasted Anthropic as a RADICAL LEFT, WOKE COMPANY.
Artificial intelligence
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
fromWIRED
1 month ago

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

The movements of a hard drive's components, keystrokes on a keyboard, even the electric charge in a semiconductor's wires produce radio waves, sound, and vibrations that transmit in all directions and can-when picked up by someone with sufficiently sensitive equipment and enough spycraft to decipher those signals-reveal your private data and activities.
Privacy technologies
fromAxios
2 weeks ago

Scoop: Anthropic meets with House Homeland Security behind closed doors

The discussion focused largely on issues like model distillation - shrinking powerful AI systems into smaller versions - and export controls. The Pentagon dispute was not a central focus of the conversation, per two sources. The tone of the meeting was "friendly," according to multiple sources.
Artificial intelligence
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
Artificial intelligence
fromEngadget
2 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
fromTechCrunch
3 weeks ago

Hacker broke into FBI and compromised Epstein files, report says | TechCrunch

An unidentified foreign hacker broke into the FBI's field office in New York in 2023 and compromised files related to the bureau's investigation into the sex offender Jeffrey Epstein, according to Reuters. The hack took advantage of a server at the Child Exploitation Forensic Lab in the FBI's New York Field Office that was left inadvertently vulnerable by an FBI special agent working on the case.
Privacy professionals
Information security
fromThe Cipher Brief
2 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
Privacy professionals
fromenglish.elpais.com
3 weeks ago

How the CIA used a former Spanish soldier to keep tabs on Julian Assange

A Spanish security company owner conducted illegal surveillance of Julian Assange at Ecuador's London embassy on behalf of the CIA, placing hidden microphones and monitoring his communications.
fromWIRED
3 weeks ago

Palantir Demos Show How the Military Could Use AI Chatbots to Generate War Plans

When the user asks "What enemy military unit is in the region?" the AIP Assistant guesses that it's "likely an armor attack battalion based on the pattern of the equipment." This prompts the analyst to request a MQ-9 Reaper drone to survey the scene. They then ask the AIP Assistant to "generate 3 courses of action to target this enemy equipment," and within moments, the assistant suggests attacking the unit with either an "air asset," a "long range artillery," or a "tactical team."
Artificial intelligence
Privacy professionals
fromTheregister
3 weeks ago

FBI investigating breach that reportedly hit wiretapping net

The FBI is investigating a breach of its wiretapping and surveillance systems, while Europol dismantled major cybercrime platforms including a phishing service and stolen data marketplace.
US politics
fromwww.mediaite.com
1 month ago

High Alert': DHS and FBI Monitoring Potential Threats on US Soil During Strikes on Iran

U.S. homeland security officials are coordinating enhanced monitoring and threat prevention measures following military action against Iran.
Information security
fromTechCrunch
3 weeks ago

The mystery of a globetrotting iPhone-hacking toolkit

A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
#fbi-cybersecurity
fromSecurityWeek
4 weeks ago
Privacy professionals

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

The FBI is investigating suspicious activities on an internal system containing sensitive surveillance data, with an unidentified actor using sophisticated techniques to exploit network security controls.
fromTechRepublic
4 weeks ago
Privacy professionals

FBI Investigates Suspicious Activity in Surveillance Platform

The FBI is investigating suspicious cyber activity on systems managing surveillance and wiretap warrants, highlighting critical vulnerabilities in sensitive law enforcement infrastructure.
Privacy professionals
fromSecurityWeek
4 weeks ago

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

The FBI is investigating suspicious activities on an internal system containing sensitive surveillance data, with an unidentified actor using sophisticated techniques to exploit network security controls.
Privacy professionals
fromTechRepublic
4 weeks ago

FBI Investigates Suspicious Activity in Surveillance Platform

The FBI is investigating suspicious cyber activity on systems managing surveillance and wiretap warrants, highlighting critical vulnerabilities in sensitive law enforcement infrastructure.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Artificial intelligence
fromFortune
4 weeks ago

Top Pentagon official recalls the 'whoa moment' when defense leaders realized how indispensable Anthropic is and saw the of risk losing access | Fortune

The Pentagon's heavy reliance on Anthropic's Claude AI created vulnerability when the company questioned its use in military operations, prompting Trump to order the federal government to cease using it within six months.
US politics
fromMail Online
1 month ago

CIA memo reveals plot to turn citizens into political assassins

Project Artichoke was a classified CIA mind control program from 1951-1956 that attempted to create unwitting assassins through psychological manipulation and drug administration.
Information security
fromTheregister
3 weeks ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
fromNextgov.com
1 month ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
Information security
fromtechcrunch.com
4 weeks ago

FBI investigating hack on its wiretap and surveillance systems: report

Hackers breached FBI networks managing wiretaps and foreign intelligence surveillance warrants, marking another major U.S. government cybersecurity incident amid ongoing threats from Chinese and Russian threat actors.
US politics
fromAxios
1 month ago

Scoop: Pentagon takes first step toward blacklisting Anthropic

The Pentagon is pressuring Anthropic to remove AI safeguards for military use, threatening supply chain risk declarations or Defense Production Act enforcement if the company refuses by Friday's deadline.
Business intelligence
fromSecuritymagazine
2 months ago

Private Sector Intelligence Careers

Private-sector intelligence roles require public-sector analytic skills plus explicit training in cognitive tradecraft, decision support, and structured reasoning for business contexts.
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
fromThe New Yorker
1 month ago

Russia Is Swarming Europe with Young Agents

Russian military intelligence is recruiting young people online to carry out arson and other acts of sabotage across Europe. In this week's issue, Joshua Yaffa reports on the Kremlin's secret campaign to undermine the West's support for Ukraine-and breaks down how "single-use agents" are being deployed across the Continent. Some of their missions are small-putting up posters, or picking up a package-while others involve physical attacks, for example setting off explosives and starting fires.
Business
fromDataBreaches.Net
1 month ago

CISA Releases New Guidance on Assembling Multi-Disciplinary Insider Threat Management Teams - DataBreaches.Net

CISA's guidance is intended to assist critical infrastructure stakeholders, which includes private sector entities across various sectors, with implementing an insider threat mitigation program that combines physical security, cybersecurity, personnel awareness, and community partnerships. Although framed for critical infrastructure, CISA's guidance is relevant to a broader range of organizations, including those outside of critical infrastructure sectors.
Information security
US news
fromwww.scientificamerican.com
2 months ago

U.S. quietly declassifies ColdWar era JUMPSEAT' surveillance satellites

Declassified JUMPSEAT satellites, launched 1971–1987, provided space-based signals intelligence on adversary weapons and were decommissioned in 2006.
fromElectronic Frontier Foundation
2 months ago

How Hackers Are Fighting Back Against ICE

ICE has been invading U.S. cities, targeting, surveilling , assaulting , and people who are undocumented immigrants. They also have targeted people with work permits , asylum seekers , permanent residents (people holding "green cards"), naturalized citizens , and even citizens by birth. ICE has spent hundreds of millions of dollars on surveillance technology to spy on anyone - and potentially everyone-in the United States.
Privacy technologies
US politics
fromWIRED
1 month ago

DHS Wants a Single Search Engine to Flag Faces and Fingerprints Across Agencies

DHS plans to build a unified biometric matching system combining face, fingerprint, iris, and other identifiers across multiple enforcement agencies.
US politics
fromWIRED
1 month ago

DHS Opens a Billion-Dollar Tab With Palantir

DHS signed a $1 billion blanket purchasing agreement enabling department-wide purchases of Palantir software, services, and implementation while internal staff tensions over DHS/ICE work persist.
Information security
fromThe Hacker News
1 month ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
US politics
fromwww.nytimes.com
1 month ago

Video: Opinion | The President's Personal Spy Chief

Tulsi Gabbard, as director of national intelligence, is undermining the independence and credibility of U.S. intelligence through politicized actions involving the 2020 election.
Privacy professionals
fromTechCrunch
1 month ago

Senator, who has repeatedly warned about secret U.S. government surveillance, sounds new alarm over 'CIA activities' | TechCrunch

Sen. Ron Wyden, with access to classified intelligence, expressed deep concerns about CIA activities, highlighting secrecy, oversight limits, and a contentious agency response.
US politics
fromTheregister
2 months ago

CISA insider-threat warning comes with an ironic twist

Insider threats are among the most serious security risks and require multidisciplinary teams and decisive action to detect, mitigate, and prevent damage.
US politics
fromNextgov.com
2 months ago

NSA alum returns to agency to serve as deputy director

Tim Kosiba was appointed NSA deputy director to lead operations, manage civilian leadership, set policy, and oversee execution of the agency's strategy.
US politics
fromEmptywheel
2 months ago

Upstream US Person Collection: EO 12333 and/or FISA?

NSA uses multiple distinct Section 702 collection methods; PRISM is not the sole source of internet content collection, and upstream collection captures backbone traffic.
US politics
fromThe Cipher Brief
1 month ago

From Secrets to Sensors: Why Open Source Data Must Drive Modern Intelligence

The intelligence community must rebuild on open-source data and commercial technology to enable DoD enterprise command-and-control and remain relevant to warfighters.
Information security
fromArs Technica
2 months ago

US cyber defense chief accidentally uploaded secret government info to ChatGPT

CISA acting director Madhu Gottumukkala uploaded sensitive, "for official use only" contracting documents to a public ChatGPT, triggering DHS cybersecurity warnings.
US politics
fromEmptywheel
2 months ago

Massive Obama Administration Leaks on Covert CIA Program Training Syrian Rebels

Numerous anonymous U.S. officials disclosed detailed information about a covert CIA program to train Syrian rebels while the CIA declined to comment.
Information security
fromEmptywheel
2 months ago

I Con the Record Admits All This Spying Also Serves Counterintelligence

The Intelligence Community uses online anonymity and networking tools to collect foreign intelligence, including counterintelligence and cybersecurity, while asserting legal limits on targeting US citizens.
fromDataBreaches.Net
2 months ago

Cyber Counterintelligence (CCI): Resecurity releases data on John Erin Binns (IRDev) - DataBreaches.Net

It may be a bit of an understatement to say that Resecurity has been up in the faces of ScatteredLapsus$Hunters and ShinyHunters. Not Only did they recently embarrass the former by deceiving them with a honeypot and providing law enforcement with details about the threat actor attempting to access the synthetic data, but now they have followed up with a new article about Connor Riley Moucka ("Waifu," "Judische," "Ellyel8"), Cameron John Wagenius ("Kiberphant0m"), and John Erin Binns ("IRDev," "IntelSecrets").
US politics
fromNextgov.com
1 month ago

CIA announces new acquisition framework to speed tech adoption

The CIA implemented a centralized, streamlined acquisition framework to speed vendor vetting, IT authorization, and rapid procurement of breakthrough technologies for urgent national security missions.
fromNextgov.com
1 month ago

AI info-sharing center is in development, CISA official says

We just want to make sure we've got the right elements of, how do we pull together people, and how do we take advantage of the leadership position that we have
Information security
[ Load more ]