News tagged with national intelligence

Some in NSA warned of a backlash

Current and former intelligence officials say dissenters within the National Security Agency warned in 2009 that secretly collecting American phone records wasn't providing enough intelligence to justify ...

dateNov 20, 2014 in Security
shares0 comments 0

National security vs. online privacy

One method for safeguarding online anonymity is Tor, "the onion router", whose name comes from its method of adding and stripping away encryption layer by layer as messages pass from one node to another ...

dateNov 07, 2014 in Security
shares0 comments 0

Cameron: UK public has shrugged off NSA leaks

Prime Minister David Cameron said Thursday he believes the British public has largely shrugged off the espionage disclosures of former National Security Agency contractor Edward Snowden, telling lawmakers that people seem ...

dateJan 30, 2014 in Security
shares0 comments 0

NSA phone data control may come to end

A senior administration official says President Barack Obama will call for stripping the National Security Agency's ability to store phone data from millions of Americans.

dateJan 17, 2014 in Internet
shares0 comments 4

Obama nearing a decision on intelligence review

President Barack Obama is hosting a series of meetings this week with lawmakers, privacy advocates and intelligence officials as he nears a final decision on changes to the government's controversial surveillance programs.

dateJan 08, 2014 in Internet
shares0 comments 0

Obama to meet with lawmakers, intel leaders on NSA

President Barack Obama is inviting lawmakers and intelligence officials to the White House to discuss National Security Agency programs as Obama prepares to unveil what changes he's prepared to make to the programs.

dateJan 07, 2014 in Internet
shares0 comments 0

Report says NSA intercepts computer deliveries (Update)

A German magazine lifted the lid on the operations of the National Security Agency's hacking unit Sunday, reporting that American spies intercept computer deliveries, exploit hardware vulnerabilities, and even hijack Microsoft's ...

dateDec 29, 2013 in Internet
shares0 comments 57