Featured in encryptionBYJessica EvansApr 3, 2023ShareFrom signal flags to satellites, military comms keep advancingIt’s time to go back in time and explore the evolution of military communication technology. From signal flags to encrypted communications, the military has come a long way in terms… BYJessica EvansApr 3, 2023ShareBYJessica EvansSep 18, 2022ShareHow Navajo Code Talkers helped win World War IIFriday, August 14, honors the contributions of Indigenous people who helped the war effort during WWII. Today also marks the observance of US code relating to Indigenous languages and the participation of First nations tribe members in U.S. military… BYJessica EvansSep 18, 2022ShareBYLogan NyeAug 7, 2022ShareHow spies use radio stations to communicate secretsWhile spies typically try to hide as much of their communication as possible, there is one method of intelligence communication that is literally broadcasted so that everyone for thousands of miles around can listen in to the messages, but no one el… BYLogan NyeAug 7, 2022ShareBYMiguel OrtizOct 25, 2022Share6 rules about military email to keep you out of troubleWork email is often more of an annoyance than anything else. It lets people reach you whenever they want, ignore you if they so choose, and provides the new hire… BYMiguel OrtizOct 25, 2022ShareBYTeam MightyJan 26, 2021ShareSpies can now use modified DNA to send secret messagesThe world of espionage requires two equally important things: access to information and a means of getting that information back to the other side. Modified DNA might make that a little… BYTeam MightyJan 26, 2021ShareBYBusiness InsiderApr 29, 2020ShareLeaked documents reportedly show the CIA secretly bought an encryption company and used it to spy on clients — while turning a profitIn leaked documents, newly published by The Washington Post and ZDF, the CIA describes how it pulled off… BYBusiness InsiderApr 29, 2020Share
BYJessica EvansApr 3, 2023ShareFrom signal flags to satellites, military comms keep advancingIt’s time to go back in time and explore the evolution of military communication technology. From signal flags to encrypted communications, the military has come a long way in terms… BYJessica EvansApr 3, 2023Share
BYJessica EvansSep 18, 2022ShareHow Navajo Code Talkers helped win World War IIFriday, August 14, honors the contributions of Indigenous people who helped the war effort during WWII. Today also marks the observance of US code relating to Indigenous languages and the participation of First nations tribe members in U.S. military… BYJessica EvansSep 18, 2022Share
BYLogan NyeAug 7, 2022ShareHow spies use radio stations to communicate secretsWhile spies typically try to hide as much of their communication as possible, there is one method of intelligence communication that is literally broadcasted so that everyone for thousands of miles around can listen in to the messages, but no one el… BYLogan NyeAug 7, 2022Share
BYMiguel OrtizOct 25, 2022Share6 rules about military email to keep you out of troubleWork email is often more of an annoyance than anything else. It lets people reach you whenever they want, ignore you if they so choose, and provides the new hire… BYMiguel OrtizOct 25, 2022Share
BYTeam MightyJan 26, 2021ShareSpies can now use modified DNA to send secret messagesThe world of espionage requires two equally important things: access to information and a means of getting that information back to the other side. Modified DNA might make that a little… BYTeam MightyJan 26, 2021Share
BYBusiness InsiderApr 29, 2020ShareLeaked documents reportedly show the CIA secretly bought an encryption company and used it to spy on clients — while turning a profitIn leaked documents, newly published by The Washington Post and ZDF, the CIA describes how it pulled off… BYBusiness InsiderApr 29, 2020Share