Loading...
Loading...
A growing wave of security stories is underscoring how hype collides with real-world vetting. In cryptography, critics warn of a “quantum security” gold rush, with vendors selling costly post-quantum fixes to organizations that may not face near-term quantum risks, even as new schemes like FLOE publish specs and reference code for closer technical review. In parallel, intelligence-related reporting highlights how institutions assess—and sometimes mishandle—uncertain threats: renewed disputes over Havana Syndrome evidence and alleged CIA downplaying, accounts of stressful, subjective polygraph screening, and long-tail clearance consequences from innocent crypto activity. Together, the trend is toward demanding proof, transparency, and accountability.
Robert S. Mueller III, former FBI director and later special counsel who investigated ties between Russia and Donald Trump’s 2016 presidential campaign, has died at 81, according to a family statement reported by the Associated Press. Mueller died Friday night, March 20, 2026, and his family requested privacy. Mueller led the FBI for 12 years, beginning his tenure one week before the Sept. 11, 2001 attacks, and is credited with reshaping the bureau into a stronger counterterrorism-focused organization while serving under presidents of both parties. The article also notes his high-profile congressional testimony on July 24, 2019, related to the special counsel investigation. Details on cause of death were not provided.
Former FBI Director Robert S. Mueller III has died at age 81, according to a family statement reported by The Associated Press. Mueller led the FBI for 12 years, beginning just one week before the Sept. 11, 2001 attacks, and is credited with reshaping the bureau into a stronger counterterrorism-focused agency while serving under presidents from both parties. He later served as special counsel investigating ties between Russia and Donald Trump’s 2016 presidential campaign, a probe that made him a central figure in U.S. politics and national security debates. AP reported Mueller died Friday night, March 20, 2026, and his family requested privacy. The article includes file photos from his July 24, 2019 congressional testimony.
A Hacker News thread discusses a War on the Rocks article titled “We were right about Havana syndrome,” but commenters say the piece offers little concrete evidence about the cause or responsible party. Several participants argue the symptoms could reflect mass psychogenic illness, emphasizing that psychogenic conditions can produce real, debilitating effects and are difficult to communicate without stigma. Others contend that indirect official responses can resemble a cover-up and that clearer public messaging could support treatment and mitigation. Commenters also cite recent reporting from CNN (Jan. 13, 2026) and The Washington Post (Feb. 14, 2026) suggesting renewed plausibility for a physical mechanism, including claims the Pentagon acquired a suspected device via an undercover operation and tested it for over a year, reportedly observing brain damage patterns in animals. Skeptics warn of confirmation bias.
An article titled “We were right about Havana syndrome” has been published, but no body text is available to verify its claims or identify the author, outlet, or evidence cited. Based on the title alone, the piece appears to argue that earlier conclusions or reporting about Havana syndrome—a set of unexplained health incidents reported by diplomats and government personnel since 2016—have been validated. Without additional details, it is not possible to determine what specific explanation is being endorsed (for example, environmental factors, medical causes, or directed energy), which agencies or researchers are referenced, or what new data, dates, or numbers are presented. The limited information prevents a fuller assessment of why the article says prior views were correct.
Former senior CIA officer Marc Polymeropoulos argues that earlier U.S. intelligence judgments dismissing Havana Syndrome (officially “Anomalous Health Incidents”) were wrong and shaped harmful medical and analytic bias. He recounts his own 2017 Moscow incident and years of contested care, alleging CIA leaders disparaged victims. New developments since late 2024 — including a House Permanent Select Committee unclassified summary, an NSC review, and statements by Rep. Mike Turner asserting likely foreign involvement — suggest a reversal of prior conclusions and point to analytic failures and possible suppression of evidence. Polymeropoulos calls attention to a lack of accountability within the intelligence community and evolving congressional scrutiny of potential foreign culpability.
An article by journalist Michael Weiss, dated 8 March 2026, reports on alleged efforts by the US Central Intelligence Agency (CIA) to downplay or conceal information related to “Havana Syndrome.” The piece is framed as an investigation and is headlined with a quote describing it as “the biggest cover-up of my adult life,” suggesting claims from sources or affected individuals that the agency sought to make the issue “disappear.” The only additional detail provided is a photo caption referencing the CIA seal at its Langley, Virginia headquarters. With no further reporting details included in the supplied text—such as specific actions, internal documents, findings, or named officials—the available information is limited to the article’s central allegation and publication date.
A report titled “CIA Station Hit in Drone Attack” indicates that a CIA station was struck by a drone, suggesting an attack on a U.S. intelligence facility. No additional details are available from the provided material, including the location of the station, the date of the incident, the extent of damage, casualties, the type of drone used, or who may be responsible. Without an article body or sourcing, it is also unclear whether the target was a CIA-operated site, a facility hosting CIA personnel, or a broader compound. If confirmed, a drone strike on an intelligence outpost would be significant because it would highlight the growing use of unmanned systems to target sensitive government infrastructure and could affect security posture and regional risk assessments.
A CIA station was reportedly hit in a drone attack, according to the article title “CIA Station Hit in Drone Attack.” No additional details are available about the location, date, casualties, damage, or the group or state responsible. If confirmed, an attack on a CIA facility would be significant for U.S. national security and could indicate escalating use of drones against intelligence and military infrastructure. The lack of an article body prevents verification of the incident, assessment of operational impact, or understanding of any official response from the CIA, the U.S. government, or local authorities. Further reporting would be needed to establish the facts and context.
The article, titled “They Fought for the CIA in Afghanistan. In America, They're Living in Fear,” reports that some Afghans who worked with or fought alongside the U.S. Central Intelligence Agency during the Afghanistan war are now in the United States and fear for their safety. Based on the title alone, the focus appears to be on risks these former partners face even after relocation, potentially including threats, retaliation, or insecurity tied to their past CIA affiliation. No further details are available about the individuals involved, the nature of the threats, where in the U.S. they are located, or any dates, figures, or policy actions. The limited information suggests a story about post-war resettlement and security concerns for former U.S. intelligence allies.
An item titled “Official specification and reference code for Fast Lightweight Online Encryption (FLOE)” indicates the release or availability of an official technical specification alongside reference implementation code for a cryptographic scheme called FLOE. Based on the title alone, the material likely defines how FLOE works and provides sample code intended to help developers and researchers implement, test, and validate compatibility across platforms. If FLOE is designed for “fast,” “lightweight,” and “online” encryption, the publication could be relevant for performance-sensitive or resource-constrained environments where data is encrypted as it is processed or transmitted. No further details are available about the authors, licensing, target use cases, security claims, or publication date due to the absence of article body text.
In a 1 April 1988 RISKS mailing list post, Les Earnest recounts how a childhood cryptography hobby created an FBI record that later complicated his security clearance process. In 1943, after reading Fletcher Pratt’s 1942 book “Secret and Urgent,” Earnest and a friend built a jargon cipher and carried a typed “code key.” Earnest hid his copy in his eyeglasses case, which he lost on a San Diego streetcar. A citizen found the key, assumed it belonged to a Japanese spy amid wartime paranoia and Japanese American internment, and turned it over to the FBI. An FBI investigator later questioned Earnest’s mother. Earnest says the incident resurfaced decades later, teaching him that full disclosure could jeopardize clearance approval.
A CIA analyst described her pre-employment polygraph during CIA applicant screening, in a personal statement dated 4 October 2018. She said she prepared by reading David T. Lykken’s book “A Tremor in the Blood” to understand control and relevant questions, but did not use countermeasures. Already holding CIA TS/SCI clearances as a defense contractor, she feared failing could cost her clearance and job. During two days of screening in Vienna, Virginia, the examiner questioned her about false statements and prior polygraph knowledge, then conducted the test, which she said caused pain and physical strain. After the examiner consulted a supervisor, she was told she was reacting to a question about lying to a boss and ultimately failed, returning the next day. The account highlights perceived subjectivity and stress in polygraph-based vetting.
The article critiques the current landscape of post-quantum cryptography (PQC) solutions, highlighting how vendors are capitalizing on fears surrounding potential quantum threats. It argues that many of these solutions are not only premature but also costly and often address problems that businesses do not currently face. The analysis suggests that the rush to adopt PQC may be more about exploiting market fears than providing genuine security improvements. This discussion is crucial as organizations navigate the evolving cybersecurity landscape in anticipation of quantum computing advancements.