National Security Agency

How Classified Information Is Handled

But for the most part, Mr. Gerstell said, “You can’t go to a government computer and push a button and say, ‘Print out a list of all classified documents.’ There is no system that does that.” Is the classification system enforced by criminal law? Not directly — for the most part. ‌The legal basis for […]

Know More

Intelligence Agencies Say Russia Election Threat Persists Amid Ukraine War

Top national security officials warned on Tuesday about the continuing threat of election interference from abroad, emphasizing that Russia could still seek to meddle or promote disinformation during the 2022 midterm races even as it wages war in Ukraine. “I am quite confident the Russians can walk and chew gum,” Christopher A. Wray, the F.B.I. […]

Know More

Spy Agencies Cite Russia’s Setbacks but Say Putin Is ‘Unlikely to Be Deterred’

WASHINGTON — Top U.S. intelligence officials said on Tuesday that President Vladimir V. Putin of Russia had been surprised and unsettled by the problems that have hampered his military in Ukraine, issues that will make it more difficult for Russian forces to control the country. But Mr. Putin is determined to succeed in Ukraine, and […]

Know More

As Tanks Rolled Into Ukraine, So Did Malware. Then Microsoft Entered the War.

WASHINGTON — Last Wednesday, a few hours before Russian tanks began rolling into Ukraine, alarms went off inside Microsoft’s Threat Intelligence Center, warning of a never-before-seen piece of “wiper” malware that appeared aimed at the country’s government ministries and financial institutions. Within three hours, Microsoft threw itself into the middle of a ground war in […]

Know More

Math That Helped Solve Fermat’s Theorem Now Safeguards the Digital World

Defenses against digital snoopers keep getting stronger. Encryption is what keeps communications safe when you use Signal and other messaging apps, make online financial transactions, buy and sell cryptocurrencies like Bitcoin and trust that private information in your Apple iPhone will stay private. While a variety of end-to-end encryption techniques seek to protect the flows […]

Know More