Central Intelligence Agency

The risks from cyber attacks are not new. In fact, they’ve been around for about two decades. Warnings about the national security threat from cyber attacks are not new either.

What is new is the harsh tone of the warning messages that have been released lately. Keep reading →

It is hard not to notice the increase in activity and public information about cyber threats that has been in the media lately.

That concern was borne out by testimony during a Feb. 2 hearing in which the chairman of the House Intelligence Committee, Republican Mike Rogers of Michigan, warned of the severe consequences of a cyber attack on the United States. Keep reading →

The Government Printing Office has just recently released its latest edition of the CIA’s World Factbook–which marks its 50th anniversary in 2012 for the classified version and more than 40 years of publishing the public version.

The 810-page public edition of the CIA’s World Factbook provides not only a timely and valuable source of global information, it also allows us a glimpse into the times and events that necessitated its production. Keep reading →

At the beginning of his administration, President Obama created a minor controversy by insisting on using a personal mobile device. But much of that debate, such that it was, revolved around presidential records. Little was said, at least publicly, about the profound security implications of the commander in chief sending and receiving important, possibly vital, information through cyberspace.

Appropriately, even less was known about the type of data President Obama accesses, creates, and stores on the device, and the degree to which any such data is stored in “the cloud,” particularly in non-government-controlled cloud storage. What is known, however, is that mobile devices are the most prevalent, and most rapidly expanding, gateways to all types of cloud services. Keep reading →