Security officials today use the politically-correct term “insider threat” to describe what were once called traitors, and no one was more aggressive in pursuing them than counterintelligence types at the National Security Agency.
American intelligence agencies must conduct a formal review of the damage to U.S. security caused by the disclosure of secrets on Hillary Clinton’s unsecure email server, according a to Republican senator.
The North Korean regime of Kim Jong-un is spending hundreds of millions of dollars to develop nuclear weapons and missiles at the same time the government is begging international aid groups to provide flood relief.
The U.S. intelligence community declined to conduct a required assessment of the damage to national security caused by former secretary of state Hillary Clinton sending and receiving secrets on a private email server.
The FBI’s once-secret report on former Secretary of State Hillary Clinton’s email system reveals that messages sent to aides were compromised by hostile foreign actors.
The Obama administration will seek a formal political agreement at the United Nations that would legally bind the United States to a nuclear test ban treaty rejected by the Senate 17 years ago.
Former secretary of state Hillary Clinton turned away a high-ranking Chinese defector who sought political asylum after the communist police chief sought refuge in a U.S. consulate in southwestern China four years ago.
Photos of Chinese ships deployed near a key disputed reef in the South China Sea surfaced over the weekend as U.S. and Chinese leaders met at the Group of 20 nations summit and discussed maritime disputes.
Battlefield successes against the Islamic State could force the group to shift away from nation-state status to a less visible terror threat, the commander of the U.S. Central Command said this week.
Years ago during lunch with a recently-retired National Security Agency cyber security official, I immediately noticed the former official’s iPhone as he placed it on the table next to his fork. Wow, I thought, if an NSA electronic spook is using an iPhone, those babies must be secure. Days later I traded in my cell phone for an iPhone and have been using them ever since.