RSS Feeds dedicated to Spy Gadgets, Security and Intelligence related Topics

  • Popular Espionage Podcast, SpyCast, joins the CyberWire Network

    Tue, February 1, 2022, 7:01 a.m.·3 min read FULTON, Md., Feb. 1, 2022 /PRNewswire/ — The CyberWire and the International Spy Museum announced today that the museum’s popular, long-running podcast, SpyCast, has joined the rapidly growing CyberWire Podcast Network. Hosted by International Spy Museum Historian and Curator Dr. Andrew Hammond, SpyCast puts listeners in the room for fascinating conversations with the spy […]

  • What is Encryption

    Mike Williams The online world can be a dangerous place, where it seems like just about everyone is trying to spy on your activities and steal personal data. Fortunately, you’re protected by a science so powerful that even nation-states struggle to get around it: encryption. Dig into the low-level details of how encryption works, and […]

  • Nov 20, 2021,06:30am EST|205,533 views

    Apple’s ‘Shock’ iPhone Update—Bad News For 2 Billion WhatsApp Users Zak Doffman Contributor CybersecurityI cover security and surveillance and co-host ‘Straight Talking Cyber’ Apple’s new iPhone update is a “shocking” change of direction for a billion iMessage users—but it’s also a serious warning for WhatsApp users, whether on iPhones or Androids, that everything is about […]

  • Client-Side Scanning are Like Bugs in Our Pockets

    by Sheena Kennedy, Ecole Polytechnique Federale de Lausanne Encryption provides a solution to security risks, but its flipside is that it can hinder law enforcement investigations. A new technology called client-side scanning (CSS) would enable targeted information to be revealed through on-device analysis, without weakening encryption or providing decryption keys. However, an international group of experts, […]

  • Bond 007 Myth vrs Reality

    James Bond and MI6: Is there fact in fiction? By Frank GardnerBBC NewsPublished Finally. After pandemic-induced delays and a sudden change of director, the latest long-awaited Bond movie is hitting the screens. No Time to Die is the 25th Bond movie and Daniel Craig’s final outing as James Bond. So does the Bond fantasy bear […]

  • Cold War Spy-Gadgets Part II off III

    Turd Transmitter This CIA turd transmitter, issued around 1970, was actually a homing beacon that transmitted a radio signal to pilots overhead to help direct them to bombing targets and reconnaissance sites. Pipe Pistol Issued by British Special Forces during World War II, this pipe could fire a small projectile designed to kill a person […]

  • Recommended Spy Fiction Novels

    A SUITABLY STRANGE SUMMER FOR SPY FICTION JULY 24, 2021 Escapist fiction is best shaken, not stirred, and thankfully in this strange summer, there are plenty of spy thrills that will take you away from the craziness and into worlds of intrigue and skullduggery. The spy thriller genre is a curiously mixed bag. On the […]

  • WhatsApp Self-Destructing Photos & Messages Feature

    WhatsApp takes on Snapchat: Messaging app launches ‘View Once’ photos and videos that DISAPPEAR from the chat straight after they’ve been opened View Once photos ‘self-destruct’ as soon as they’ve been opened This differs to ‘Disappearing Photos’ which disappear within seven days WhatsApp says it will be rolling out to users worldwide by the end […]

  • Cold War Spy Gear Part I of III

    A-12 Spurs These “spurs,” worn on airplanes, strapped over boot heels and were each attached to a ball connected to a cable beneath the plane seat. If the pilot had to pull the “D” ring (ejection handle) in an emergency, the cables would snap the wearer’s feet back under the seat to ensure a smooth […]

  • TEMPEST and Side Channel Attacks (2 of 5)

    Types of Side Channel Attacks: Electromagnetic Attacks Electromagnetic (EM) attacks are essentially power monitoring attacks with a further magnetic component, adding depth and detail to the signals being analyzed. EM attack methods combine power monitoring attacks with monitoring of the magnetic spectrum at various distances. Today’s low-power devices usually require that an attacker be near […]