RSS Feeds dedicated to Spy Gadgets, Security and Intelligence related Topics

  • Women Cryptologists of World War II (U.S. 2022)

    Posted on  November 1, 2021 by VSC Announced November 1, 2022: This stamp honors all of the women cryptologists of World War II. One of the conflict’s best-kept secrets, their service played an inestimable role in the Allied victory. The stamp art features an image from a World War II–era WAVES recruitment poster with an […]

  • The Great Seal Bug AKA “The Thing”

    THEREMIN’S BUG: HOW THE SOVIET UNION SPIED ON THE US EMBASSY FOR 7 YEARS The man leaned over his creation, carefully assembling the tiny pieces. This was the hardest part, placing a thin silver plated diaphragm over the internal chamber. The diaphragm had to be strong enough to support itself, yet flexible enough to be affected by the slightest […]

  • CIA Spy Master of Disguises

    This Reston Resident Was Behind Some of the Most Influential (and Life-Saving) Disguises in CIA History Retired master spy Jonna Mendez’s new memoir chronicles her career changing the face of the CIA. By  Dawn KlavonJuly The group gathered outside the Oval Office, preparing for the upcoming briefing with President George H.W. Bush. Jonna Mendez was nervous. […]

  • CIA urges tourists to think like a spy: Travel with your own door stop

    by Celia Storey | June 13, 2022 at 2:51 a.m. The consumer-oriented Ask Molly column on the agency’s website offers tips it humorously calls “travel tradecraft.” Most are common sense, familiar advice, such as leaving valuables at home and not opening a hotel door unless you know who’s outside. It’s also sensible to learn basic phrases in […]

  • The Billion Dollar $$$ Spy

    The Billion Dollar Spy, by David E. Hoffman Summary & Analysis: A True Story of Cold War Espionage and Betrayal (Unabridged) Listen to Summary of Book Publisher Description The Billion Dollar Spy: A True Story of Cold War Espionage and Betrayal by David E. Hofflationship between the Central Intelligence Agency (CIA) and engineer Adolf Tolkachev, who […]

  • How to Encrypt E-Mails using Microsoft Outlook

    Sensitive data leaks are too common in the headlines these days, and there is no need to waste space explaining why it is essential to secure your sensitive information. Secure encryption is one such method to ensure your email messages are encrypted to be read-only by the intended recipients. Sending an encrypted email message is […]

  • Popular Espionage Podcast, SpyCast, joins the CyberWire Network

    Tue, February 1, 2022, 7:01 a.m.·3 min read FULTON, Md., Feb. 1, 2022 /PRNewswire/ — The CyberWire and the International Spy Museum announced today that the museum’s popular, long-running podcast, SpyCast, has joined the rapidly growing CyberWire Podcast Network. Hosted by International Spy Museum Historian and Curator Dr. Andrew Hammond, SpyCast puts listeners in the room for fascinating conversations with the spy […]

  • What is Encryption

    Mike Williams The online world can be a dangerous place, where it seems like just about everyone is trying to spy on your activities and steal personal data. Fortunately, you’re protected by a science so powerful that even nation-states struggle to get around it: encryption. Dig into the low-level details of how encryption works, and […]

  • Nov 20, 2021,06:30am EST|205,533 views

    Apple’s ‘Shock’ iPhone Update—Bad News For 2 Billion WhatsApp Users Zak Doffman Contributor CybersecurityI cover security and surveillance and co-host ‘Straight Talking Cyber’ Apple’s new iPhone update is a “shocking” change of direction for a billion iMessage users—but it’s also a serious warning for WhatsApp users, whether on iPhones or Androids, that everything is about […]

  • Client-Side Scanning are Like Bugs in Our Pockets

    by Sheena Kennedy, Ecole Polytechnique Federale de Lausanne Encryption provides a solution to security risks, but its flipside is that it can hinder law enforcement investigations. A new technology called client-side scanning (CSS) would enable targeted information to be revealed through on-device analysis, without weakening encryption or providing decryption keys. However, an international group of experts, […]