NSA Creates Website and Games to Educate Young Children

In a mission to make government agencies more understandable to children, and the general public, the National Security Agency has created a website filled with interactive games, cartoon characters and puzzles. The goal is to educate children about spying, and spark an early interest in related career paths. The CryptoKids website for “future codemakers and codebreakers” is aimed to make these occupations seem cool, and even has a section entitled “How Can I Work for NSA?” Continue reading NSA Creates Website and Games to Educate Young Children

NSA and GCHQ Monitor Gaming Activity, Search for Terrorists

The National Security Agency and its UK sister agency GCHQ have been deploying real-life agents into fictional worlds like “World of Warcraft” and “Second Life,” collecting gamers’ chats and even attempting to recruit potential informants, according to documents leaked by Edward Snowden. The agencies claimed that real-life terrorists might be playing and plotting within these games, suggesting that the gamer communities may provide intelligence on terrorist activity. Continue reading NSA and GCHQ Monitor Gaming Activity, Search for Terrorists

Jeff Bezos Reveals Amazon’s Plans for Drone Delivery Service

Amazon CEO Jeff Bezos revealed some significant plans for the company on “60 Minutes” this week. In the not-too-distant future, Amazon plans to offer drone delivery service for its smaller packages headed for customers close to its distribution centers. Bezos expects packages weighing less than five pounds to be deliverable to addresses within a 10-mile radius by small helicopter-like devices. Amazon is calling the service “Prime Air.” Continue reading Jeff Bezos Reveals Amazon’s Plans for Drone Delivery Service

Amazon Web Services: Outage During Bid for CIA Contract

Amazon’s Web Services went down on Sunday due to a technical issue at a North Virginia data center. The outage was caused by a problem with a single networking device, and reveals that many companies do not distribute their Web services in different locations for service redundancy. This comes as Amazon is bidding on a CIA contract to manage their data services, and competitors are critical of whether Amazon can manage the demands of government data. Continue reading Amazon Web Services: Outage During Bid for CIA Contract

CIA Discusses Plans for Collecting and Analyzing Big Data

During a presentation at last week’s GigaOM Structure:Data conference in New York, Ira “Gus” Hunt, the CIA’s chief technology officer, detailed the Agency’s vision for collecting and analyzing information people put on the Internet. The presentation came just two days after it was reported that the CIA is about to sign a cloud computing contract with Amazon worth up to $600 million over 10 years. Continue reading CIA Discusses Plans for Collecting and Analyzing Big Data

Vengeful Librarians: Is the CIA Monitoring Your Tweets Every Day?

  • In an effort to strengthen its counterterrorism and counterproliferation measures, the U.S. Central Intelligence Agency actively monitors over 5 million of the 140 million tweets posted daily.
  • The CIA monitors Twitter and Facebook daily, regularly briefing President Obama on popular posts and trends.
  • The McLean, Virginia-based monitoring team — called the “Vengeful Librarians” — tracks news and social media sources, using language to pinpoint origin.
  • “The CIA team has also used Twitter to monitor reports of real-time events, and can focus on a few Tweeters who are publishing accurate reports,” reports Digital Trends. “The team found that, in these situations, other Twitter users actively stamp out erroneous information when it is reported, which proves the usefulness of Twitter as a primary source for breaking news.”

Proposal: Develop a New Internet to Address Cybersecurity

  • The U.S. may want to create a new, more secure Internet infrastructure that would support critical services like banking, suggests former CIA director Michael Hayden.
  • The public Web would not be able to access this network making it more secure from the threat of cyberattacks.
  • Visitors on the secure network would need certified credentials. There would be no privacy. And network operators could scan traffic content.
  • The Obama administration and Congressional lawmakers are working on cybersecurity legislation that would increase oversight of commercial and government networks.