Detailed US intelligence community's $52.6 billion budget leaked
Posted on 30 August 2013.
Leaked by NSA whistleblower Edward Snowden and analyzed by The Washington Post reporters, the summary of the $52.6 billion US National Intelligence Program budget for the 2013 fiscal year reveals that, among other things:

  • the CIA requested almost double the funding than the NSA
  • these two agencies have "begun aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems"
  • the US intelligence community was worried about insiders leaking confidential information even before the Snowden incident, and that they planned to investigate some 4,000 employees and contractors that have been given high-level security clearances
  • the five mission objectives of the US intelligence community are to combat terrorism, warn US leaders about critical events, stop the spread of illicit weapons, conduct cyber operations, and defend against foreign espionage.
  • "The documents make clear that U.S. spy agenciesí long-standing reliance on technology remains intact. If anything, their dependence on high-tech surveillance systems to fill gaps in human intelligence has intensified."
  • the NSA intended to spend some $49 million of research aimed at helping the cope with information overload
  • some 35,000 employees from across the NSA, Air Force, Army, Navy and Marines have been involved in a "Consolidated Cryptologic Program"
  • the CIA is working on creating tracking systems ďthat minimize or eliminate the need for physical access"
  • "The NSA is planning high-risk covert missions, a lesser-known part of its work, to plant what it calls 'tailored radio frequency solutions' ó close-in sensors to intercept communications that do not pass through global networks."
For more details, I suggest you check out WaPo's original article, and if you are interested in delving deep into this "Black Budget", check out the redacted version, which is the only one currently available.









Spotlight

How to keep your contactless payments secure

Posted on 19 September 2014.  |  Fraudsters can pickpocket a victimís financial data using low-cost electronics that can fit into a rucksack. Here are the top security threats you should be aware of if youíre using a RF-based card, along with our top safety tips to keep your payments secure.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //