RSS Feeds dedicated to Spy Gadgets, Security and Intelligence related Topics

  • Spymaster Ajit Doval Reappointed NSA For Record Third Term In Modi 3.0

    by Press Trust of India  June 13, 2024 New Delhi- Ajit Doval, one of India’s most celebrated spymasters, has been part of many key decisions taken by the Modi government in its first and second terms as the country’s National Security Adviser (NSA). He was on Thursday re-appointed as the NSA for a record third term, the […]

  • Army Contract To Develop Electronic Warfare Systems

    SAIC Secures $232 MlL U.S. RTTNews May. 9, 2024, 08:48 AM (RTTNews) – Science Applications International Corp. (SAIC) announced on Thursday that it secured a five-year contract worth $232 million to develop signals intelligence and electronic warfare systems for the U.S. Army. Under this agreement, SAIC will pinpoint gaps, vulnerabilities, and threats, and propose strategies […]

  • The Intelligence | Global news

    After years of bungling, Russia’s spies are back—with a vengeance Also on the daily podcast: an expected commodities boom may not boom and the Saudi money in north-east England Feb 29th 2024 Share Listen to this podcast  Enjoy more audio and podcasts on iOS or Android Listen on: Apple Podcasts | Spotify Podcast Episode Aslew of spycraft mishaps Russia’s once-great intelligence services […]

  • History of Espionage

    The history of espionage shows how spying contributes to a free society JASON BELL SPECIAL TO THE GLOBE AND MAIL PUBLISHED YESTERDAY Jason Bell is an associate professor of philosophy at the University of New Brunswick and author of Cracking the Nazi Code: The Untold Story of Canada’s Greatest Spy. Citizens of liberal democracies sometimes complain that […]

  • World War II Women CodeBreakers

    The award-winning New York Times bestseller about the American women who secretly served as codebreakers during World War II–a “prodigiously researched and engrossing” (New York Times) book that “shines a light on a hidden chapter of American history” (Denver Post). Recruited by the U.S. Army and Navy from small towns and elite colleges, more than ten thousand […]

  • The Unsung Second Spy involved in Movie”Argo”

    CIA reveals Ed Johnson as the second spy involved in ‘Argo’ mission to rescue US diplomats stuck in Tehran during the Iran hostage crisis Story by Keith Griffith For Dailymail The CIA has revealed the name of the second officer involved in the daring rescue of six American diplomats from Tehran amid the 1979 Iran hostage crisis, […]

  • The Code Break

    PBS: The Codebreaker American Experience Season 33 Episode 1  52 minutes video Based on the book The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine Who Outwitted America’s Enemies, The Codebreaker reveals the fascinating story of Elizebeth Smith Friedman, the groundbreaking cryptanalyst whose painstaking work to decode thousands of […]

  • ‘The Mother of Cryptology’

    “A scholar of both Shakespeare and Mayan archaeology, Elizebeth Friedman was a pioneering codebreaking genius who stood at the vanguard of her field through Prohibition and two world wars.“ Elizebeth Smith Friedman (August 26, 1892 – October 31, 1980) was an American cryptanalyst and author who deciphered enemy codes in both World Wars and helped to […]

  • Human Intelligence

    Human Intelligence Collection plays a key role in national security. It’s a form of intelligence gathering. The process uncovers potential threats. Hidden agendas come to light. It also helps to prevent attacks. Information is gathered from various human sources. This includes informants, defectors, and undercover agents. The data collected in this way is of immense […]

  • TECHNICAL COLLECTION METHODS

    Surveillance and Reconnaissance The surveillance and reconnaissance methods involve observing people’s behaviour or movements to obtain intelligence information covertly. Such operations involve using various technologies such as drones or satellites with high-resolution cameras that help get close-up images from long distances. Surveillance can also include the use of GPS trackers attached to vehicles used by […]