idga stats


Read Defence IQ's military articles and defence articles for late-breaking military news and analysis. Through each defence article or military article, Defence IQ provides military personnel and the defence community throughout the world with vital military and defence information and insights. Start Exploring now! 
70 results
of 6
April 3, 2015 by IDGA Staff
IDGA Staff
Take a look at the cyber experts who we expect will join us at the upcoming event to discuss the ever-growing need to combat the intense rise of cyber attacks on the government and military
Tags: Cyber Security | Defense | Intelligence | Hacking | Government | Cyber Defense | Information Technology | Information Operations | Information Assurance | Shoulder Surfing | Cyber Command | T-1 Circuit | Ethernet Installation
June 11, 2013 by John M. Doyle
John M. Doyle
The uproar over the National Security Agency's wide-ranging cell phone and Internet surveillance has revived a national debate about the necessity of intelligence gathering and what the federal government does with what it learns. Actionable intelligence is simply that: information gleaned from a range of sources that enables decision makers Read more
Tags: actionable intelligence | John M Doyle | NSA
March 8, 2013 by John M. Doyle
John M. Doyle
Abstract: In the days since the March 5 death of Venezuelan President Hugo Chavez, security analysts have speculated on whether regime change will have any effect on transnational narcotics cartels operating in that Latin American country. Read on...
Tags: Counter Terrorism | TOC | Organized Crime
March 3, 2013 by Paul de Souza
Paul de Souza
When directed by the proper authorities in support of the mission and in the protection of the American people, the United States of America must be capable of conducting Offensive Cyberspace Operations (OCO) to cause effects against its adversaries.
Tags: Cyber Security | Network Defense | Data Center
February 22, 2013 by Max M Houck

Max M. Houck from the Department of Forensic Sciences is working to re-define 'forensic intelligence' in a way that makes it more useful to the end-users but also makes sense to the IC. The following interview examines the state of the art forensic 'crime lab' managed by Mr. Houck in Washington D.C. and also highlights the need for a national Read more
Tags: Forensics | Forensic Science | Crime Lab
February 12, 2013 by John M. Doyle
John M. Doyle
A flight of Israeli warplanes swoop in over northern Syria and destroy a suspected nuclear weapon manufacturing site without being noticed until their bombs are dropping on the facility. How? The Israelis have never admitted it, but news accounts revealed that Israeli technicians jammed Syria anti-aircraft radar and brought down the computer Read more
Tags: electronic warfare | Cyber Warfare | Counter IED | IED | John M Doyle
February 10, 2013 by Mike O'Brien
Mike O'Brien
It’s a true 21st Century expression, but information overload is now a global phenomenon with government agencies, corporations and even small businesses coming to terms with data of Herculean proportions.
Tags: Big Data | cloud computing | Cyber Security | Data Center
February 6, 2013 by Mike O'Brien
Mike O'Brien
Footage reportedly taken from a CIA spy drone that was captured in 2011 has been broadcast on Iran’s state TV. The RQ-170 Sentinel was seized when it entered Iranian airspace from the border with Afghanistan. Iranian authorities say they are now capable of producing its own version of the unmanned aircraft.
Tags: electronic warfare | Special Operations | Tactical Vehicles
70 results
of 6