Tags » NSA

Mark Collins - Talk at Ottawa, Sept. 13: "China’s Rising Cyber Power: Assessing the Implications"

An e-mail received from SecDev: The Canadian International Council (CIC ) National Capital Branch, Canadian Association for Security and Intelligence Studies (CASIS [see end of the po… 17 more words

International Relations

Of Course Everyone's Already Using the Leaked NSA Exploits - LILY HAY NEWMANw 08.24.16 1:19 PM

Last week, an anonymous group calling itself the Shadow Brokers leaked a bunch of National Security Agency hacking tools. Whoever they are, the Shadow Brokers say they still have more data to dump. 236 more words

Point Of Interest

The EFCC has recently concluded arrangements to invite at least 25 officers for questioning over a N 5 billion Naira car loan scheme approved by the office of the National Security Adviser for the Nigerian Army under the administration of the Goodluck Jonathan administration . 159 more words


Rational Security, Episode #79: The "You're Nobody 'Til Somebody Hacks You" Edition

The New York Times and maybe the NSA get hacked. Is the U.S. turning the tide of the war on ISIS? And October surprises—what could happen between now and the election, and will it matter? 38 more words

Rational Security

Anti-Trump Republicans back former CIA officer Evan McMullin for president

Republicans opposed to Donald Trump are putting up a former CIA officer as a conservative alternative in the US presidential election.

Evan McMullin, who reportedly has the backing of some key Republican donors, has been a member of the “Never Trump” movement within the party. 578 more words


Official of South African Government pledges allegiance to the Central Intelligence Agency (CIA)

In Articles previous published in this blog, we had revealed  how the South African government had been infiltrated by the C.I.A  from the United States of America, using the so-called defender of our democracy,  Thulisiwe Nomkhosi Madonsela. 269 more words


National Security Agency - Cryptography

That branch of cryptology which treats of the means, methods, and apparatus for converting or transforming plaintext messages into cryptograms, and for reconverting the cryptograms into their original plaintext form by a simple reversal of the steps used in their transformation.

Source: NSA.
Image: Unsplash.