The terrible writing and design of spook memos and Powerpoint slides have come to the fore since June 2013. However, that doesn't mean that there's not some pretty good style guides available for America's brave spooks. USA USA USA.
Bruce Schneier writes, "National Security Counselors law firm has obtained a copy of the CIA
Directorate of Intelligence Style Manual, Eighth Edition, 2011. It is
entitled Style Manual & Writers Guide for Intelligence Publications. There's also the NSA SIGINT Style Guide."
If you think that your phone may have been hacked so that your adversaries can watch you through the cameras and listen through the mics, one way to solve the problem is to remove the cameras and microphones, and only use the phone with a headset that you unplug when it’s not in use.
Random number generators are the foundation of cryptography — that’s why the NSA secretly sabotaged the RNG standard that the National Institute for Standards and Technology developed.
Investigative journalist Mark Hertsgaard’s new book Bravehearts: Whistle-Blowing in the Age of Snowden tells the story of modern intelligence community whistleblowing; in a fantastic longread excerpted from the book, he recounts how the US military’s program of punishing whistleblowers, and the officials charged with protecting them, convinced Snowden that he should take a thumbdrive full […]
If you’ve got a killer app idea, but don’t have the technical expertise to pull it off, get a crash course in all things app development with the Comprehensive Android Development Bundle, now over 90% off in the Boing Boing Store. Across 83 hours of training, you’ll learn to develop for the world’s most popular mobile OS, mastering […]
Jared Sinclair developed the RSS reader app Unread, which made $10,000 in its first 24 hours on the iOS market. And we’ve all heard the story of Flappy Bird developer Dong Nguyen, whose creation was reportedly earning $50,000 a day at the height of its 2013 explosion. While those are rare examples, they’re also testament to the […]
If you or your company’s IT system are besieged by black hat cyber attacks, an ethical hacker might be all that stands between crippling damage and a company’s long-term prosperity. It’s no wonder that the market for IT security specialists is exploding. Certification is the key – so learn the tenets of ethical hacking and get […]