September 12, 2012 For years, the U.S. Army has been using sophisticated data analysis to identify "high-value" targets and dismantle the groups that plant IEDs. With billions of dollars at stake, however, a major battle has erupted over which software the Army should use.
August 24, 2012 An alleged war plan leaked to a blogger says the attack is designed to take out Iran's Internet, telephones, radio and television transmissions and electrical grid. Although a cyberattack of that scale makes sense in theory, it's unclear whether Israel has such a capacity.
August 10, 2012 A common cybercriminal tactic appears to have been adopted by a nation-state for classic espionage purposes. The Kaspersky Lab in Moscow says the Gauss virus is targeting several large banks in Lebanon. Though the nation-state behind the virus hasn't been identified, analysts say it may be part of a U.S. effort.
July 31, 2012 The Obama administration has initiated more prosecutions against leakers than all previous administrations combined. But Mitt Romney is focusing on what he alleges is the administration's record of leaking classified information for political purposes. Republicans cite the details of the raid that killed Osama bin Laden as one example.
May 23, 2012 The CIA took considerable heat over Iraq, where no weapons of mass destruction were found. Now, as the agency assesses Iran and its nuclear program, it invites an NPR correspondent to its headquarters for a rare chat about its analysis of Iran and Iraq intelligence.
May 23, 2012 The United States has stopped buying Iranian oil, and the European Union is set to do so at the end of next month. There are sanctions on Iran's central bank and punishments for companies that help Iran ship its oil. Experts says Iran's oil exports are now in serious jeopardy.
May 10, 2012 It's boom time for cybersecurity companies that specialize in going after Chinese hackers. The top competitors in the sector have been taking a nontraditional approach. Instead of focusing on protecting clients from malware, these firms are learning more about the attackers — and going after them.
May 9, 2012 For the top brass of companies such as Dell and Hewlett-Packard, talk of cyberweapons and cyberwar could be abstract. But at a classified security briefing in spring 2010, it suddenly became quite real. "We can turn your computer into a brick," government officials reportedly told the startled executives.