#national-security-agency

[ follow ]
#cybersecurity
fromSilicon Canals
11 hours ago
Information security

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

fromTechCrunch
1 day ago
Information security

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromComputerWeekly.com
3 days ago

NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks | Computer Weekly

High-risk individuals must reduce exposure to social engineering attacks targeting encrypted messaging apps like Signal, WhatsApp, and Facebook Messenger.
Information security
fromWIRED
6 hours ago

The Hack That Exposed Syria's Sweeping Security Failures

Syrian government accounts on X were hacked, revealing significant vulnerabilities in the state's cybersecurity practices.
Information security
fromSilicon Canals
11 hours ago

The man who discovered the ILOVEYOU virus is now fighting Russian drones using the same playbook - Silicon Canals

Mikko Hyppönen has transitioned from cybersecurity to anti-drone defense, focusing on systems for law enforcement and military clients.
Information security
fromTechCrunch
1 day ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Privacy professionals
fromTechRepublic
6 days ago

Iran-Linked Hackers Breach FBI Director Kash Patel's Email, Leak Messages Online

An Iran-linked hacking group breached FBI Director Kash Patel's personal email, releasing non-sensitive information as a retaliatory cyber attack.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromComputerWeekly.com
3 days ago

NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks | Computer Weekly

High-risk individuals must reduce exposure to social engineering attacks targeting encrypted messaging apps like Signal, WhatsApp, and Facebook Messenger.
Intellectual property law
fromNextgov.com
1 day ago

Tech bills of the week: Limiting adversaries' access to US tech; and boosting cyber apprenticeships

New legislation aims to strengthen U.S. export controls on sensitive technologies to prevent adversaries from exploiting them for economic gain.
#fbi
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
US politics
fromWIRED
2 weeks ago

A Top Democrat Is Urging Colleagues to Support Trump's Spy Machine

Jim Himes advocates for preserving the FBI's warrantless search powers, citing reforms and compliance rates despite concerns over recent changes in oversight.
#dhs
US politics
fromNextgov.com
1 day ago

President's budget proposes folding beleaguered DHS intelligence office into headquarters

The Department of Homeland Security's intelligence office faces consolidation and potential workforce reductions under Trump's proposed budget for 2027.
SF politics
fromNextgov.com
6 days ago

DHS drops investigation into former acting CISA chief's failed polygraph exam

DHS closed an investigation into CISA staff who arranged a polygraph for the former acting director, clearing them of wrongdoing.
US politics
fromNextgov.com
1 day ago

President's budget proposes folding beleaguered DHS intelligence office into headquarters

The Department of Homeland Security's intelligence office faces consolidation and potential workforce reductions under Trump's proposed budget for 2027.
SF politics
fromNextgov.com
6 days ago

DHS drops investigation into former acting CISA chief's failed polygraph exam

DHS closed an investigation into CISA staff who arranged a polygraph for the former acting director, clearing them of wrongdoing.
Artificial intelligence
fromNextgov.com
4 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
fromNextgov.com
4 days ago

HHS reverses Biden-era restructuring of its IT and tech operations

HHS Chief Information Officer Clark Minor stated that consolidating the CTO, CDO, and CAIO roles within his office allows the department to move faster on shared platforms and protect systems more effectively.
Healthcare
fromThe Walrus
5 days ago

The Man Who Put AI at the Centre of America's War Machine | The Walrus

"War is terrible, war is terrible, war is terrible," he intones, holding my gaze and giving voice to a universal chorus.
DC food
Roam Research
fromThe Cipher Brief
5 days ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
SF politics
fromNextgov.com
5 days ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
fromwww.theguardian.com
4 days ago

US marine detained after TSA finds live explosive round in checked bag

The marine told investigators he found the round in the field about a year ago and kept it, thinking it wasn't live. Due to extensive rust and corrosion, the round's original identifying paint markings were no longer visible, making it difficult to determine whether it was an inert training munition or a live explosive device.
Los Angeles
#data-integrity
fromComputerworld
5 days ago
Data science

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
5 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
#cisa
US politics
fromTheregister
1 day ago

Trump wants to slash $707M from CISA's budget

CISA faces a proposed $707 million budget cut, risking national cybersecurity and critical infrastructure management.
US politics
fromTheregister
1 day ago

Trump wants to slash $707M from CISA's budget

CISA faces a proposed $707 million budget cut, risking national cybersecurity and critical infrastructure management.
fromWIRED
2 days ago

CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards

The public Quizlet set contained information about alleged codes for specific facility entrances. 'Checkpoint doors code?' asked one card, with a specific four-digit combination listed in response.
Privacy professionals
World politics
fromThe Cipher Brief
1 week ago

National Security Starts at Home - Not on the Battlefield

National security relies on enduring internal capacity rather than just accumulated hard power or visible instruments of power.
#anthropic
fromBreaking Defense
1 week ago
Intellectual property law

Judge grants Anthropic preliminary injunction but Pentagon CTO says ban still stands - Breaking Defense

fromAxios
2 weeks ago
Artificial intelligence

Pentagon: Anthropic's foreign workforce poses security risks

Intellectual property law
fromBreaking Defense
1 week ago

Judge grants Anthropic preliminary injunction but Pentagon CTO says ban still stands - Breaking Defense

Federal Judge Rita Lin granted a preliminary injunction favoring Anthropic against the US government, halting supply chain risk designations until the lawsuit concludes.
Artificial intelligence
fromAxios
2 weeks ago

Pentagon: Anthropic's foreign workforce poses security risks

Anthropic's employment of foreign nationals raises national security concerns, particularly regarding compliance with China's National Intelligence Law.
fromThe New Yorker
5 days ago

The Spy Who Helped Stop Iran from Getting the Bomb

Chalker claims that during his time at the C.I.A., he was instrumental in persuading Iranian scientists to defect, which provided crucial information that 'prevented Iran from getting a nuke.' His operations involved complex strategies and a deep understanding of the scientists' motivations.
Washington DC
#ai
Information security
fromNextgov.com
1 week ago

ODNI is building a framework to boost spy agencies' AI adoption

The Office of the Director of National Intelligence is enhancing AI adoption for cybersecurity within the intelligence community as part of a modernization effort.
Information security
fromNextgov.com
1 week ago

ODNI is building a framework to boost spy agencies' AI adoption

The Office of the Director of National Intelligence is enhancing AI adoption for cybersecurity within the intelligence community as part of a modernization effort.
fromComputerworld
1 day ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
US politics
fromwww.npr.org
2 days ago

As DOJ prepares to share state voter data with DHS, a key privacy officer resigns

The DOJ is acquiring sensitive voter registration data, raising privacy concerns, as a key privacy officer resigns amid ongoing legal challenges.
Privacy professionals
fromSecurityWeek
4 days ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

Foreign-developed mobile applications pose significant data security risks, particularly those from China, according to an FBI alert.
Washington DC
fromwww.mediaite.com
5 days ago

Top Trump Spox Asked About Massive Military Complex' Under New White House Ballroom

A massive military complex is being built under the new White House ballroom, with upgrades to facilities ongoing.
SF politics
fromAxios
6 days ago

Exclusive: Wind projects delayed as Trump's Pentagon reviews stall

At least 30 onshore wind farm projects are stalled due to Pentagon paperwork, affecting 7.5 gigawatts of capacity.
#ice
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
2 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
2 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
Privacy professionals
fromTechCrunch
3 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Information security
fromTheregister
2 days ago

Maude-HCS helps model and validate covert network designs

Maude-HCS, an open-source toolkit for covert communication networks, allows organizations to experiment with secure and anonymous communication systems.
Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
fromNextgov.com
2 weeks ago

The Pentagon's 'woke AI' problem

Department of War AI will not be woke. We're building war ready weapons and systems, not chatbots for an Ivy League faculty lounge. Later on, President Donald Trump lambasted Anthropic as a RADICAL LEFT, WOKE COMPANY.
Artificial intelligence
Law
fromThe Atlantic
3 weeks ago

The Unbearable Lightness of Signalgate

The Uniform Code of Military Justice enforces discipline across all military ranks through 158 articles covering both civilian crimes and military-specific offenses, with recent courts-martial demonstrating consistent enforcement of conduct standards.
Information security
fromSecurityWeek
3 days ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
US politics
fromwww.aljazeera.com
2 days ago

US Homeland Security shutdown to stretch on, despite Senate passing funding

The House has not voted on the Senate bill, prolonging the partial government shutdown affecting DHS funding and federal workers.
Intellectual property law
fromTechCrunch
2 weeks ago

DOD says Anthropic's 'red lines' make it an 'unacceptable risk to national security' | TechCrunch

The Department of Defense claims Anthropic poses an unacceptable national security risk, alleging the company might disable or alter its AI technology during military operations if its ethical guidelines are violated.
US politics
fromMail Online
3 days ago

Deadline issued for UFO videos as Congress warns of 'threat' to US

Lawmakers demand federal agencies release UFO videos by April 14, 2026, citing potential threats to US military forces.
Information security
fromTheregister
3 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Privacy professionals
fromSilicon Canals
6 days ago

The real US surveillance threat isn't AI - it's the data infrastructure we already built - Silicon Canals

The infrastructure for mass surveillance already exists, relying on pre-existing technology and data rather than new AI advancements.
Artificial intelligence
fromEngadget
2 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
Privacy professionals
fromFEDweek
6 days ago

Agencies Need More Complete Guidance on Privacy Considerations of AI Use, Says GAO

GAO identifies gaps in AI guidance, highlighting risks and the need for comprehensive privacy protections in agency implementations.
fromWIRED
1 month ago

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

The movements of a hard drive's components, keystrokes on a keyboard, even the electric charge in a semiconductor's wires produce radio waves, sound, and vibrations that transmit in all directions and can-when picked up by someone with sufficiently sensitive equipment and enough spycraft to decipher those signals-reveal your private data and activities.
Privacy technologies
Information security
fromTechRepublic
4 days ago

Google Warns Quantum Computers Could Crack Crypto Sooner Than Expected

Quantum computing poses an imminent threat to cryptocurrency security, with fewer resources needed to break current cryptographic protections than previously estimated.
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
Artificial intelligence
fromTechCrunch
2 weeks ago

The Pentagon is developing alternatives to Anthropic, report says | TechCrunch

The Pentagon is developing its own large language models to replace Anthropic's AI after their $200 million contract collapsed over disagreements on military access restrictions and weapons deployment safeguards.
Apple
fromComputerworld
1 month ago

NATO approves iPhone and iPad to handle classified info

BSI's comprehensive security assessments confirmed Apple's iOS and iPadOS systems meet NATO's 32-member states' security requirements for classified information environments.
Artificial intelligence
fromBusiness Insider
2 weeks ago

The Pentagon provided a rare inside look at Palantir's Project Maven and how the AI tool helps the military wage war

Pentagon's Project Maven integrates satellite imagery and AI to streamline military targeting from detection to strike execution within a single system.
Information security
fromTechRepublic
4 days ago

New North Korean AI Hiring Scheme Targets US Companies

A North Korean operative attempted to infiltrate a cybersecurity firm using a stolen identity and AI-generated resume, highlighting vulnerabilities in hiring processes.
Apple
fromThe Verge
1 month ago

NATO says iPhones are secure enough to handle classified data

iPhone and iPad with iOS 26 and iPadOS 26 are approved to store NATO-restricted classified information without special software or settings.
Information security
fromComputerWeekly.com
5 days ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
US politics
fromNextgov.com
2 weeks ago

Annual intelligence assessment doesn't address foreign threats to US elections

The Trump administration's annual intelligence assessment omitted foreign election threats for the first time in nearly a decade, marking a significant policy shift during a midterm election year.
Privacy professionals
fromNextgov.com
2 weeks ago

National cyber director doesn't envision industry doing offensive hacking

The U.S. National Cyber Director clarifies that private sector companies will not conduct offensive cyber operations on behalf of the government, but will instead provide intelligence and defensive support.
Privacy professionals
fromTechCrunch
2 weeks ago

Warren presses Pentagon over decision to grant xAI access to classified networks | TechCrunch

Senator Warren expresses national security concerns about the Pentagon granting xAI's Grok AI access to classified networks due to the chatbot's documented harmful outputs including violent and abusive content.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Information security
fromNextgov.com
1 week ago

New NSA director pushes for more intel-sharing with allies in internal meeting

Gen. Josh Rudd emphasizes enhanced intelligence-sharing with allies and a focus on foreign adversaries like Russia and China.
fromNextgov.com
1 month ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
Privacy professionals
fromTheregister
3 weeks ago

FBI investigating breach that reportedly hit wiretapping net

The FBI is investigating a breach of its wiretapping and surveillance systems, while Europol dismantled major cybercrime platforms including a phishing service and stolen data marketplace.
#fbi-cybersecurity
fromSecurityWeek
4 weeks ago
Privacy professionals

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

The FBI is investigating suspicious activities on an internal system containing sensitive surveillance data, with an unidentified actor using sophisticated techniques to exploit network security controls.
fromTechRepublic
4 weeks ago
Privacy professionals

FBI Investigates Suspicious Activity in Surveillance Platform

The FBI is investigating suspicious cyber activity on systems managing surveillance and wiretap warrants, highlighting critical vulnerabilities in sensitive law enforcement infrastructure.
Privacy professionals
fromSecurityWeek
4 weeks ago

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

The FBI is investigating suspicious activities on an internal system containing sensitive surveillance data, with an unidentified actor using sophisticated techniques to exploit network security controls.
Privacy professionals
fromTechRepublic
4 weeks ago

FBI Investigates Suspicious Activity in Surveillance Platform

The FBI is investigating suspicious cyber activity on systems managing surveillance and wiretap warrants, highlighting critical vulnerabilities in sensitive law enforcement infrastructure.
Information security
fromThe Cipher Brief
2 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
fromBreaking Defense
2 months ago

Pentagon CTO offers industry free use of 400 patents from gov't labs - for a start - Breaking Defense

Step one, effective immediately, is to make roughly 400 carefully picked patents available online for a free two-year trial period. Specifically, any company that wants to try out one of the 400 technologies in its own research, development, and products can get what's called a Commercial Evaluation License (CEL) without the usual fee. Those 400 technologies- everything from a Navy-developed drone tracking system to novel Army mortar fuses - were chosen out of the thousands of possibilities by Michael's staff.
Washington DC
Information security
fromSecurityWeek
4 weeks ago

James 'Aaron' Bishop Tapped to Serve as New Pentagon CISO

James Bishop assumes the role of Deputy Chief Information Officer for Cybersecurity and Chief Information Security Officer at the Department of Defense, bringing experience from the Air Force, Microsoft, and SAIC.
Information security
fromtechcrunch.com
1 month ago

FBI investigating hack on its wiretap and surveillance systems: report

Hackers breached FBI networks managing wiretaps and foreign intelligence surveillance warrants, marking another major U.S. government cybersecurity incident amid ongoing threats from Chinese and Russian threat actors.
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
fromNextgov.com
1 month ago

Why the convergence of AI and cybersecurity must be a top priority for the administration

AI is directly impacting blue team (defender) and red team (attacker) strategies, operations and tactics. Federal cybersecurity teams are increasingly relying on AI for anomaly detection, predictive threat intelligence and faster incident response. AI can flag suspicious behavior, such as access to sensitive systems from unusual locations, without depending on static rules.
Information security
US politics
fromNextgov.com
2 months ago

NSA alum returns to agency to serve as deputy director

Tim Kosiba was appointed NSA deputy director to lead operations, manage civilian leadership, set policy, and oversee execution of the agency's strategy.
US politics
fromNextgov.com
2 months ago

Experts see NSA nominee's Pacific experience as a boost to US cyber posture on China

Lieutenant General Joshua Rudd was nominated to lead the NSA and U.S. Cyber Command, bringing Indo-Pacific operational experience and China-focused insight despite limited cyber background.
fromTechzine Global
2 months ago

America puts an end to international cyber cooperation

On the instructions of President Donald Trump, the United States is withdrawing from international organizations that focus on cybersecurity and hybrid threats. There are concerns within the cybersecurity sector that this decision could undermine global resilience to digital threats. As reported by Computing, the US government claims that these partnerships are not sufficiently effective and are not in line with national interests.
US politics
Information security
fromThe Hacker News
1 month ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
US politics
fromEmptywheel
2 months ago

Quantum Leaps: The So-Called Whistleblower That Got NSA's Top Mathematician Fired

Tulsi Gabbard fired a top NSA mathematician based on a disorganized whistleblower complaint whose claims conflict with other officials' reviews.
US politics
fromNextgov.com
1 month ago

CIA announces new acquisition framework to speed tech adoption

The CIA implemented a centralized, streamlined acquisition framework to speed vendor vetting, IT authorization, and rapid procurement of breakthrough technologies for urgent national security missions.
fromComputerWeekly.com
2 months ago

NSA urges continuous checks to achieve zero trust | Computer Weekly

The US National Security Agency (NSA) has published its latest guidance on zero trust to secure US federal government IT networks and systems. This is the first of two guidance documents coming out of the NSA, providing "practical and actionable" recommendations that can be applied as best practice to secure corporate IT environments both in the public and private sectors.
Information security
fromwww.theguardian.com
1 month ago

State-sponsored hackers targeting defence sector employees, Google says

The report catalogues a relentless barrage of cyber operations, most by state-sponsored groups, against EU and US industrial supply chains. It suggests the range of targets for these hackers has grown to encompass the broader industrial base of the US and Europe from German aerospace firms to UK carmakers. State-linked hackers have long targeted the global defence industry, but Luke McNamara, an analyst for Google's threat intelligence group, said they had seen more personalised and direct to individual targeting of employees.
Information security
Information security
fromEmptywheel
2 months ago

I Con the Record Admits All This Spying Also Serves Counterintelligence

The Intelligence Community uses online anonymity and networking tools to collect foreign intelligence, including counterintelligence and cybersecurity, while asserting legal limits on targeting US citizens.
[ Load more ]