Back to Entity Graph

🏢 National Security Agency Organization

19 articles First seen: Dec 16, 2025 Last seen: 11m ago
Activity Timeline (90 days)
Co-occurring Entities
Articles (19)
Your USB cable, the spy: Inside the NSA’s catalog of surveillance magic - Ars Technica
An Ars Technica report, based on NSA documents from 2007 and 2008, describes a wide range of surveillance and hacking tools used by the agency’s Tailored Access Operations and ANT divisions. The catal
Cyber Operations Aren’t Slow — Our Thinking Is
The article argues that U.S. Cyber Command is not inherently slow; rather, its thinking and force design are outdated. The author describes real-world crisis scenarios, such as hostage recoveries and
fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet | SentinelOne
SentinelLABS describes **fast16** as a previously undocumented cyber-sabotage framework dating to **2005**, making it an unusually early example of precision-targeted malware and, according to the rep
Defense Department Took 22 Days to Create 'Silly Bear' Meme to Roast Russian Hackers | Military.com
In October 2020, U.S. Cyber Command aimed to counter Russian malware threats with a meme just before Halloween. They identified two pieces of malware, ComRAT and X-Agent, attributed to Russian hackers
Hackers may have breached FBI wiretap network via supply chain | Malwarebytes
Investigators are concerned that a recent breach of the FBI's Digital Collection System Network could involve nation-state actors, particularly linked to the Chinese government. On February 17, the FB
FBI declares suspected Chinese hack of US surveillance system a ‘major cyber incident’ - POLITICO
The FBI has officially classified a recent cyber intrusion linked to Chinese hackers as a “major incident,” highlighting significant risks to U.S. national security. This breach involved a sensitive F
Drone Defense at Home: Closing the CUAS Rules of Engagement (ROE) Gap | Commercial UAV News
Counter Unmanned Aircraft Systems (CUAS) have emerged as a crucial area of security investment, driven by technological advancements, recent high-profile security incidents, and a growing recognition
U.S. military tested device that may be tied to Havana Syndrome on rats, sheep, confidential sources say - CBS News
The U.S. military has reportedly tested a device linked to the mysterious "Havana Syndrome," which has caused severe neurological symptoms in diplomats, spies, and military personnel since 2016. Victi
Van Eck phreaking - Wikipedia
Van Eck phreaking, or Van Eck radiation, is a method of eavesdropping that exploits the electromagnetic emissions from electronic devices, particularly cathode-ray tube (CRT) displays. This technique
Untitled
OpenAI CEO Sam Altman announced a revised agreement with the Pentagon aimed at enhancing protections against domestic surveillance using the company's AI services. The new contract stipulates that Ope
nbcnews.com
OpenAI CEO Sam Altman announced a revised agreement with the Pentagon aimed at enhancing protections against domestic surveillance using the company's AI services. The new contract stipulates that Ope
A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals | WIRED
A sophisticated iPhone hacking toolkit known as "Coruna" has emerged, previously used by Russian spies against Ukrainians and now in the hands of cybercriminals targeting Chinese-speaking cryptocurren
How the Pentagon Learned to Use Targeted Ads to Find Its Targets—and Vladimir Putin | WIRED
In 2019, technology consultant Mike Yeagley raised alarms about a significant national security risk posed by mobile apps like Grindr, which leaked sensitive geolocation data from its millions of user
Former Marine created high-tech Bluetooth signal sniffer to find Nancy Guthrie
David Kennedy, a former Marine and ethical hacker, developed a high-tech Bluetooth signal sniffer to assist in locating Nancy Guthrie, who went missing on February 1. The sniffer, which can detect Blu
ABC News – Breaking News, Latest News and Videos
The CIA has announced the cessation of its long-standing World Factbook reference manual, ending a publication that has served the public and government agencies for over 60 years. The decision, discl
Read Anything, Summarize Everything | Smry
"Read Anything, Summarize Everything" emphasizes the importance of effective summarization in processing and understanding information. The key points highlight that summarization is a skill that allo
Alan Turing’s Secret “Delilah” Project - IEEE Spectrum
The article discusses Alan Turing's lesser-known "Delilah" project, a secret voice-encryption system he worked on during World War II, alongside his assistant Donald Bayley. Recently, a collection of
Deployed 82nd Airborne unit told to use these encrypted messaging apps on government cell phones
In January 2020, troops from the 82nd Airborne Division deployed to the Middle East following heightened tensions after the assassination of Iranian General Qassem Soleimani. The division's Task Force
Senior official at Indo-Pacific Command is set to be Trump’s pick to lead Cyber Command, NSA
President Trump is set to nominate Army Lt. Gen. Joshua Rudd, currently the deputy chief of U.S. Indo-Pacific Command, to lead the Cyber Command and NSA, positions that have lacked a permanent leader
🏠Portal 📰Links Q&A 📅Events 💼Jobs