Unclassified NSA memorandum provides further details on Snowden case

The hypothesis that Edward Snowden has operated using a simple web-crawler is very curious, how is it possible that a lonely consultant had access to a so huge collection of documents from NSA archives? Why Does the NSA engage a so huge quantity of external consultant giving them secret documentation? In my opinion, it is an unforgivable mistake to report that disclosure of the leaked documents could endanger national security, when the chain of custody of those documents has been managed in an obscene manner. A consultant is not NSA personnel, and assign him visibility on some documents is absurd.

The FBI and the CIA failed to connect the dots in the Boston Bombing

The FBI and the CIA are being criticized for not keeping better track of Tamerlan Tsarnaev in the months before the Boston Marathon bombings. How could they have ignored such a dangerous person? How do we reform the intelligence community to ensure this kind of failure doesn't happen again?

Microsoft Security Intelligence Report 14 released

The Microsoft Security Intelligence Report (SIR) analyzes the threat landscape of exploits, vulnerabilities, and malware using data from Internet services and over 600 million computers worldwide. Threat awareness can help you protect your organization, software, and people.

Bot-Trek Group-IB software: Botnet intelligence collector tool

Group-IB, Russia's leading computer security company, has announced Bot-Trek(TM), a comprehensive tool that gathers compromised data and intelligence from botnets and makes it available to the original Intellectual Property owners via a SaaS solution.

On the Run from the CIA: The Experiences of a Central Intelligence Agency Case Officer

Agee stated that his Roman Catholic social conscience had made him increasingly uncomfortable wit

Syrian intelligence official defects

Former head of public relations in the Syrian intelligence announces his defection while speaking

The “Intelligent Objects” that surround us

Article published on The Malta Indipendent on December 9th 2012

Technology in the last decade has assumed a fundamental role in our daily lives.  We are increasingly surrounded by discrete intelligent components designed to provide us with more sophisticated choices designed to enhance our personal experience and quality of life.  From our phones, to our home security system, to the refrigerator in our house, an increasing number of devices are constantly connected to the internet and with each other.

126 military secrets leaked in last four years: report

Over 100 items of classified military information have been leaked in the last four years but mos

The good and the bad of the Deep Web

Video Cyber snooping: A threat to freedom or a necessary safeguard?

 Recent government proposals to allow increased police and intelligence agencies' monitoring