‘Not the time to go poking around’: How former U.S. hackers view dealing with Russia – POLITICO
Fears of cyber warfare between the two former Cold War rivals have become a recurring concern amid Russias invasion of Ukraine, prompting Biden to warn that he would respond the same way to any hostile hacking from Moscow against the United States. But people with experience in U.S. cyber strategy say neither side is likely to leap to destructive attacks as a first move and any hard punch would be preceded by warnings and signals.
Theres gradations before you get to disrupting critical infrastructure, said Michael Daniel, who was the National Security Councils cybersecurity coordinator during the Obama administration.
Michael Daniel, former White House cybersecurity coordinator and special assistant to former President Barack Obama, testifies during a hearing before the Senate Intelligence Committee on June 20, 2018 in Washington, D.C.|Alex Wong/Getty Images
The U.S. also would most likely avoid going after civilian targets such as Russian citizens electricity, even in response to Russian cyberattacks on the United States or NATO. Instead, any U.S. action would be gradual, proportional and aimed at warning Russia to stop, said Robert M. Lee, who worked in cyber warfare operations with the National Security Agency until 2015.
Are they going to take down the power grid [in Moscow]? No, said Lee, who is now CEO of the cybersecurity firm Dragos. He added: Youre [just] trying to shape behavior and signal, Hey we see you, and were willing to escalate this. Please dont punch back or well go to the next phase.
At the moment, U.S. government hackers are probably avoiding taking any actions that Putins government could interpret as an escalation that would trigger a reprisal, Lee and two other former hackers said in interviews. Espionage will continue as usual, but burrowing deeper into critical infrastructure or going after new systems not already compromised would be discouraged.
For the same reason, they said, the U.S. would probably not assist Ukraines defense by launching offensive cyberattacks against Russias military or government to avoid being pulled into the conflict.
In interviews with POLITICO, Lee, two other former U.S. government hackers involved in cyber operations against foreign networks, and a former intelligence official who was involved in discussions about such operations, described the complications of wielding Washingtons formidable hacking arsenal. These include tools that intelligence agencies have implanted in foreign networks for espionage purposes, but which also could be repurposed to cripple a power plant serving a military installation, halt gas in a pipeline or cause a communication blackout for Russian command centers.
For decades, Russia was not a top hacking priority for the U.S., taking a backseat to countries such as Iran and China, three of the experts said. But that changed after Putins own hackers tried to interfere in the 2016 election, and the U.S. is deeply embedded in Russian infrastructure today.
The former government hackers and intelligence official, along with one former national security official, also discussed with POLITICO the extensive effort required to get into other countries core systems and the challenges of maintaining that secret access for years. And they described the difficulties a standoff with Putin brings, including the calculus of deciding when to launch destructive cyberattacks against an adversary that can respond in kind.
The U.S. has plenty of offensive hacking capability to do the things that we would need to do, to have the effects that we want to have, said the former U.S. intelligence official. But he expressed less certainty about how deeply Russia is embedded in American infrastructure, which could limit what the U.S. is willing to do.
Can they turn around and do it back to us? Can someone make some reasonable assertion that they cant? said the former official, who asked to remain anonymous because he is not authorized to speak on such matters. If people cant say that, then it gets very hard to summon, I think, the political will to execute [an] attack.
Its a conversation that senior U.S. leaders typically dont like to conduct in public details about Americas cyber capabilities and calculations about using them have long been closely held secrets.
The U.S. can only hope that Putins regime is exercising similar restraint, as both sides face the unpredictable dangers of a cyber conflict that could do lasting harm to both sides, Daniel said.
For as much damage as the [Western] sanctions are doing or might do to [Russias] economy, they are reversible, he said. The West can choose to turn them off. [But] you cant un-destruct something.
One huge caveat: If Putin gets to the point where he feels Russia has nothing left to lose, then he is more likely to order destructive attacks against the United States. But I dont think were all the way there yet, Daniel said.
Two intelligence agencies and one military division are the main arms of the U.S. government responsible for compromising foreign networks.
The National Security Agency and Central Intelligence Agency both have sophisticated hacking divisions with individual teams focused on specific countries or regions to collect intelligence. U.S. Cyber Command, launched in 2010 as part of the Defense Department, hacks networks for offensive operations related to battle, not intelligence collection. It also recently disrupted ransomware groups targeting the U.S.
The three entities operate under different legal authorities, generally limiting what each can do. But theres some overlap: In past years, if an NSA or CIA team needed to destroy or disrupt a system, it could get authorization from the White House, or a Cyber Command warrior could be tasked to work with them.
But in 2018, the leeway for the CIA to conduct such attacks expanded when then-President Donald Trump signed a secret finding that eliminated the need for the spy agency to get White House approval. Instead, the CIA could now give the go-ahead for cyberattacks against Russia, China, Iran and North Korea. This also potentially expanded the types of operations the CIA could conduct on its own authority, opening the door to attacks on banks and other financial institutions that previously had been off-limits for U.S. hackers, along with hack-and-leak operations similar to what Russia did with the Democratic National Committee in 2016.
The focus on Russia as a top priority for U.S. cyber intelligence efforts is a relatively recent phenomenon.
After the terrorist attacks on Sept. 11, 2001, intelligence agencies diverted resources and personnel to focus on counterterrorism and later on Iran and China, three of the experts told POLITICO. That remained the case for nearly 15 years. I wouldnt say Russia was a backwater, but it certainly wasnt heavily prioritized, said the former intelligence official who asked to remain anonymous.
Another of the sources that spoke to POLITICO, a former NSA intelligence analyst, confirmed that the NSAs Russia teams which included hackers, analysts who help determine targets and assess intelligence, and mission leaders lost a lot of their resources and people after 2001.
But the remaining people became more focused and disciplined as a result, the analyst said, and were no less effective. Unlike other teams, the ones focused on Russia had their own experts with special language and technical skills to help them understand the networks they targeted.
The analysts who worked on the Russian targets spoke Russian, he said. There were very few people in other groups who knew the national anthem of their target country, but all of the Russian team did.
Russian targets were harder to compromise and maintain than systems in many other countries, however.
Irans probably, from a technical perspective, [one of] the most compromised countries on earth, said the former intelligence official. There is nary a network inside that country that doesnt have an implant from the U.S. or some other countrys intelligence service sitting in it.
Russia is more challenging, both because of the size of the country and the number of networks worth targeting, and because of Russias own hacking and counterintelligence skills. Despite this, Lee said that theres not a world that exists where we are not deeply embedded in much of the Russian key infrastructure. I dont mean like power grid infrastructure. I just mean infrastructure, whether it be intelligence infrastructure or other. That should be pretty obvious with the extraordinary [information] weve been declassifying recently.
The hardest part often isnt gaining access to a system but maintaining it clandestinely, for months or years.
It is the thing that separates the most sophisticated cyber operators on the planet from the lesser ones, the former intelligence official said.
A software patch or upgrade to a new operating system can close a door to intruders. So NSA and CIA hackers will seek deeper access, such as planting spy tools at the core of a system where software upgrades wont affect them.
Even so, hardware containing spy implants can suddenly get taken offline, leaving the hackers to wonder if someone had discovered their backdoor. The Russian cybersecurity firm Kaspersky Lab has publicly exposed numerous espionage tools planted around the world by the U.S. and its allies over the years, including a six-year-long operation that had placed implants on routers in multiple countries to spy on ISIS and al-Qaeda terrorists. And sometimes rival spy agencies steal an agencys hacking tools, as reportedly occurred when a group known as the Shadow Brokers, believed to be a nation-state spy group from Russia, leaked pilfered NSA malware.
Theres the laypersons assumption that you just switch out the thing that has been compromised with the new thing that hasnt been compromised, said the former intelligence official. But the process of switching out tooling, in and of itself, can dramatically increase your chance of being [caught].
The NSA also has to watch out for other hackers nation-state and skilled cyber criminals who might be inside systems the agency wants to breach. Those hackers can potentially spy on the agencys activity inside an infected machine or grab their tools to study and reuse them.
Governments may not like it when foreign spies breach their networks to steal data, but its an acceptable and expected practice, even when it involves breaching critical infrastructure such as energy companies and electric grids for intelligence gathering. These targets can yield valuable information about how power is generated and distributed throughout the country, and how vulnerable parts of a grid might be to physical or digital harm. Both the U.S. and Russia and other countries compromise these networks.
We might like to scream and rant and rave about it when Russia hacks into those targets for spying purposes, but theyre perfectly valid targets, said the former intelligence official.
Gaining access to a power plant doesnt mean a foreign government is about to take it down, Lee said. Its quite literally their job to just develop access and maintain that for when people request it, he said.
But governments also contemplate more disruptive attacks on the electricity supply. This possibility gained new attention in 2019, when The New York Times reported that U.S. Cyber Command had planted potentially crippling malware in Russias grid systems on the chance that the U.S. might want to disrupt the grid in the future.
But Lee said the actions described in the article arent typically how the U.S. would carry out such an operation.
You dont place your offensive capabilities [in a network] before you leverage them, he said, because you risk having them discovered. Attackers will, however, leave implants for intelligence purposes that could later be leveraged to disrupt a system or plant destructive code.
Ideally, Cyber Commands offensive hackers wouldnt wage destructive attacks against a target using the same implants and compromised systems that the NSA and CIA employ for intelligence collection, so as not to burn their spying capabilities, Daniel said. But Lee said that during his time at the NSA, Cyber Command often piggybacked on the access that espionage teams had worked hard to obtain. We would have loved for Cyber Command to have their own capabilities and access, but that was not the reality of the situation.
Effective cyberattacks arent spontaneous, opportunistic events. It can take months or years to get access to some systems, and then may require extensive reconnaissance and research or even physical access to design and pull off an attack.
Flipping a relay is one thing. Understanding what happens when you flip the relay is something else, said Jake Williams, a former NSA hacker who was with the agency until 2013.
In the best-known destructive cyber operation, the covert Stuxnet attack that the U.S. and Israel launched between 2007 and 2010 to disrupt the Iranian nuclear program, the CIA and Mossad used a mole working for Dutch intelligence to carry spyware into the high-security facility and place it on computers that werent connected to the internet. After that spyware gathered intelligence about centrifuges used for enriching uranium gas, the mole planted destructive code onto the same systems. Researchers in Israel and the U.S. even built centrifuge test labs to study the potential effects various digital attacks might have on the devices. The operation successfully degraded between 1,000 and 2,000 centrifuges and caused temporary delays in Irans enrichment activities, though Iran recovered quickly from the setback.
Similarly, when Russian hackers took down parts of Ukraines electric grid for a few hours in 2015, they entered power plant networks by sending malware-laden emails to employees, then spent six months conducting reconnaissance, studying the various models of control systems at distribution plants and designing malware specific to each system.
For the U.S. to prepare to launch military cyberattacks against a foreign target in times of conflict, a Cyber Command team would make a list of systems they might need to access, then survey NSA and CIA hacking teams to see who already has access to them and whether additional networks need to be compromised.
But compromising new networks during the existing U.S.-Russian tension before conflict between the two countries has started is highly risky, and Lee said U.S. hackers would be exercising extra restraint right now. Russia could misinterpret new espionage intrusions as advance work for an attack, regardless of what the U.S. intends.
Lee said many people may assume that for a crisis like the Russian invasion, U.S. cyber warriors would be getting more aggressive inside Russian networks. But he said that my experience with U.S. intelligence is its quite the opposite. Now is not the time to go poking around. Unless you have a damn good need to be there, dont go doing something that could be perceived as escalatory.
Lee pointed to incidents his company uncovered in October when a Russian-based hacking group it calls Xenotime was found probing the networks of key electric and liquid natural gas sites in the United States. The hackers did nothing more than routine exploration for vulnerabilities the kind of activity that the U.S. also does but because of growing tensions with Russia and Xenotimes involvement in a previous disruptive attack, the information traveled up the ranks to senior officials in government. The episode occurred just months after Biden had warned Putin against offensive cyberattacks on U.S. critical infrastructure.
It turned into extraordinary concern, because its perceived as sort of signaling, Lee said. [The Russians were] showing they may have the intent to come after electric and natural gas sites.
No matter how dire the military invasion in Ukraine turns, the U.S. would not conduct disruptive or destructive cyberattacks against Russia, Lee believes. In the same way the U.S. has carefully avoided direct involvement in Ukraines defense, aside from supplying intelligence and equipment, it also would not want to enter into direct conflict with Russia in cyber space. This could change, however, if Russia attacks the U.S. or its NATO allies.
But Russia is probably making the same kinds of calculations about launching attacks against the U.S., said Daniel, the former NSC cyber coordinator. For example, to retaliate for the financial crisis that Western sanctions have introduced in Russia, Putins forces could launch sophisticated and potentially chaotic attacks against the integrity of U.S. or European financial data, but these kinds of attacks require extensive advance planning and its not clear Russia has done the work.
Daniel said Russia is also not likely to launch a destructive attack at the outset. Instead Russia might launch barrages of malicious online traffic to take down U.S. banking websites, as Iran has done in the past in retaliation for sanctions. Russia could also hijack banking traffic, redirecting it to Russian networks, or unleash cyber criminal gangs to conduct ransomware attacks on the financial sector.
Whatever Russia does, Daniel says the U.S. would want to be measured in any response it takes. Options could include leaking information about secret financial dealings of Putin and his cronies to further turn the Russian public against Putin, though the U.S. would have to be prepared for Russia to do the same.
The U.S. would be looking for actions that would impose some pain but wouldnt lead to physical destruction or loss of life or necessarily be permanent, so that if Russia backs off, the U.S. can as well, Daniel said.
And Daniel said any response from the United States would likely be targeted narrowly at the military or government contrary to a recent NBC News report, strongly disputed by the White House, that said U.S. cyber warriors had proposed to Biden options such as shutting off the power in Russia.
We would not want to take steps that would drive the Russian populace back towards a pro-Putin viewpoint, Daniel said.
Kim Zetter is the author of COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the Worlds First Digital Weapon.
CORRECTION: A previous version of this story incorrectly described the extent of the hacking group Xenotimes access to U.S. energy networks. The hackers were probing the networks for ways to get inside.
Continue reading here:
'Not the time to go poking around': How former U.S. hackers view dealing with Russia - POLITICO
- 'Dhurandhar 2 sets a new benchmark, it's going to be very difficult for anyone to match up': Former deputy NSA of India | Bollywood - Hindustan Times - April 1st, 2026 [April 1st, 2026]
- Rethinking the NSA Office beyond security coordination - The Nation Newspaper - April 1st, 2026 [April 1st, 2026]
- The $15 Billion Post-Quantum Migration: NIST Standards Are Final, NSA Deadlines Are Set, and Enterprise Cybersecurity Is About to Be Rebuilt from the... - April 1st, 2026 [April 1st, 2026]
- NSA kicks off sheep worrying awareness week - Agriland.co.uk - April 1st, 2026 [April 1st, 2026]
- Regime change only way to tackle Iran threat, says former US NSA John Bolton - CNBC TV18 - March 30th, 2026 [March 30th, 2026]
- The command centre: Why Nigerias NSA must evolve beyond coordination - guardian.ng - March 30th, 2026 [March 30th, 2026]
- Former NSA chiefs worry American offensive edge in cybersecurity is slipping - CyberScoop - March 28th, 2026 [March 28th, 2026]
- NSA and ASDs ACSC Release Joint Guidance on LEO SATCOM System Risks and Mitigations - National Security Agency (.gov) - March 28th, 2026 [March 28th, 2026]
- New NSA director pushes for more intel-sharing with allies in internal meeting - Nextgov/FCW - March 28th, 2026 [March 28th, 2026]
- "Trump Is Transactional, Doesn't Think Strategically": Former US NSA - NDTV - March 28th, 2026 [March 28th, 2026]
- Former NSA John Bolton urges Trump to cut Irans oil revenue after PM Modi call - The Indian EYE - March 28th, 2026 [March 28th, 2026]
- $HAREHOLDER ALERT: The M&A Class Action Firm Is Investigating The MergerULY, NSA, CTRA, and FONR - WBOC TV - March 28th, 2026 [March 28th, 2026]
- Rethinking the command centre: Why Nigerias NSA must evolve beyond coordination - The Sun Nigeria - March 28th, 2026 [March 28th, 2026]
- Constitutional freedoms cannot be exercised at the cost of human lives: Allahabad HC upholds preventive detention order under NSA - SCC Online - March 28th, 2026 [March 28th, 2026]
- Next Generation Shepherd of the Year Competition opens for NSA Scotsheep 2026 - The Scottish Farmer - March 28th, 2026 [March 28th, 2026]
- NSA (NSA) explains vesting, prorated FY2026 bonus and severance in merger with Public Storage - Stock Titan - March 20th, 2026 [March 20th, 2026]
- Sergio Gor meets NSA Ajit Doval discussing geopolitical issues - The Indian EYE - March 20th, 2026 [March 20th, 2026]
- National Storage Investor Alert: Kahn Swick & Foti, LLC Investigates Adequacy of Price and Process in Proposed Sale of National Storage Affiliates... - March 20th, 2026 [March 20th, 2026]
- Public Storage to Buy NSA: Is This a Smart Growth Move for Investors? - TradingView - March 20th, 2026 [March 20th, 2026]
- Was Russia an IMMINENT THREAT to US?: Rep Scott Perry grills NSA official on Ukraine war - The Economic Times - March 20th, 2026 [March 20th, 2026]
- NSA invoked against prime accused Aslam in banned meat supply case - thehitavada.com - March 20th, 2026 [March 20th, 2026]
- Watch | Indian Foreign Policy Confused; Were Not as Influential as We Used to Be: Former NSA - TheWire.in - March 20th, 2026 [March 20th, 2026]
- Russia Or Iran? Trumps NSA Cornered in Senate Over Military Action in Iran As War Enters 4th Week - Oneindia - March 20th, 2026 [March 20th, 2026]
- Need to Evolve The Office of the NSA Beyond Coordination to National Defence Strategy Nerve Centre - THISDAYLIVE - March 20th, 2026 [March 20th, 2026]
- Halper Sadeh LLC is Investigating Whether UNF, NSA, ULY, MPX are Obtaining Fair Deals for their ... - Bluefield Daily Telegraph - March 20th, 2026 [March 20th, 2026]
- Organized and technological: ICE resistance groups posing growing danger, warns former top NSA, DHS official - Fox News - March 18th, 2026 [March 18th, 2026]
- Declassified Report Reveals NSA Broke Surveillance Rules - Project On Government Oversight - March 18th, 2026 [March 18th, 2026]
- Gen. Joshua Rudd '93 confirmed as leader of U.S. Cyber Command, NSA; elevated to rank of general - Furman University - March 18th, 2026 [March 18th, 2026]
- Public Storage to Buy NSA: Is This a Smart Growth Move for Investors? - Zacks Investment Research - March 18th, 2026 [March 18th, 2026]
- National Storage (NSA) Climbs to Record High on $10.5-Billion Acquisition - Yahoo Finance - March 18th, 2026 [March 18th, 2026]
- Organized and technological: ICE resistance groups posing growing danger, warns former top NSA, DHS official - WFIN - March 18th, 2026 [March 18th, 2026]
- SHAREHOLDER ALERT: The M&A Class Action Firm Announces An Investigation of National Storage Affiliates Trust (NYSE: NSA) - PR Newswire - March 18th, 2026 [March 18th, 2026]
- National Storage Affiliates Trust (NYSE:NSA) Rating Increased to Neutral at BNP Paribas Exane - MarketBeat - March 18th, 2026 [March 18th, 2026]
- Is National Storage Affiliates Trust (NSA) Share Price Misaligned With Its DCF Estimate Today - Yahoo Finance - March 9th, 2026 [March 9th, 2026]
- Interview with 2026 AFI NSA Naples Spouse of the Year, Dannielle Niewald - Stripes Europe - March 9th, 2026 [March 9th, 2026]
- Iranian drones strike apartments in city thats home to NSA Bahrain - Stars and Stripes - March 7th, 2026 [March 7th, 2026]
- "At this point, US win is going to be pretty elusive," says former US Principal Dy NSA Jon Finer on Iran... - lokmattimes.com - March 7th, 2026 [March 7th, 2026]
- "Over next 5-10 years, you are likely to see emergence of new nuclear powers": Former US NSA official Jon... - lokmattimes.com - March 7th, 2026 [March 7th, 2026]
- China tends to pursue strategy of staying on good terms with everyone: Former US NSA official Finer - ANI News - March 7th, 2026 [March 7th, 2026]
- NSA (NSA) Executive Chair Fischer reports new OP unit awards and LTIP conversions - Stock Titan - March 4th, 2026 [March 4th, 2026]
- Cyber retaliation from Iran is a problem for U.S. companies 'It's in the hands of a 19-year-old hacker in a Telegram room,' ex-NSA operative says -... - March 4th, 2026 [March 4th, 2026]
- Ajit Doval Indias Most Useless NSA Ever Says Netizens: Zero Intel on Uri, Pulwama, Galwan, Iran War & More - indiaherald.com - March 4th, 2026 [March 4th, 2026]
- Sheep Village Cynefin to be launched by RWAS and NSA at the Royal Welsh Show - Shropshire Star - March 4th, 2026 [March 4th, 2026]
- Wyden blocks nominee to lead NSA and Cyber Command - Federal News Network - February 27th, 2026 [February 27th, 2026]
- Wyden blocks Rudd confirmation to lead Cyber Command, NSA - The Record from Recorded Future News - February 27th, 2026 [February 27th, 2026]
- NSA said to have seen security concerns in Grok - breakingthenews.net - February 27th, 2026 [February 27th, 2026]
- NSA: Solid Q4 Beat and Favorable 2026 Outlook, But Cost Pressures and High Expectations Justify Hold Rating - TipRanks - February 27th, 2026 [February 27th, 2026]
- Videotron and Samsung Expand Partnership Through 5G NSA and 4G LTE Core Gateway Deployment - samsung.com - February 24th, 2026 [February 24th, 2026]
- Videotron Taps Samsung for Cloud-Native 5G NSA and LTE Core Gateway Solution - The Fast Mode - February 24th, 2026 [February 24th, 2026]
- El-Rufai Demanded to Provide Evidence in NSA Hacking Claims - streamlinefeed.co.ke - February 24th, 2026 [February 24th, 2026]
- DSS to arraign El-Rufai on Feb. 25 over alleged NSA phone interception - Businessday NG - February 24th, 2026 [February 24th, 2026]
- Securus Technologies Supports Expansion of Sheriff-Led NSA I.G.N.I.T.E. Initiative to Improve Jail Safety and Reentry Outcomes - PR Newswire - February 7th, 2026 [February 7th, 2026]
- NSA set to deal with defiant parties, politicians, supporters on integrity of democratic process - ThePointNG - February 7th, 2026 [February 7th, 2026]
- Where NSA zero trust guidance aligns with enterprise reality - Help Net Security - February 4th, 2026 [February 4th, 2026]
- UNG third in Division 1 of NSA cyber event - University of North Georgia - February 4th, 2026 [February 4th, 2026]
- Green Beret Lieutenant General Joshua Rudd Tapped To Lead NSA and US Cyber Command - SOFREP - February 4th, 2026 [February 4th, 2026]
- SC Flags Health Concerns, Urges Rethink on Sonam Wangchuks NSA Detention - The Morning Voice - February 4th, 2026 [February 4th, 2026]
- What security teams need to know about the NSA's new zero trust guidelines - IT Pro - February 4th, 2026 [February 4th, 2026]
- 'India won't be bullied': NSA Ajit Doval told Marco Rubio that New Delhi would wait out Trump term for trade deal: Report - theweek.in - February 4th, 2026 [February 4th, 2026]
- When Protest becomes a Threat: Inside the Supreme Court hearing on Sonam Wangchuks NSA detention - SabrangIndia - February 4th, 2026 [February 4th, 2026]
- If NSA Commits Database Query Violations, But Nobody Audits Them, Do They Really Happen? - emptywheel - February 4th, 2026 [February 4th, 2026]
- Army general tapped to lead NSA vows to follow the law if confirmed - Military Times - February 1st, 2026 [February 1st, 2026]
- Overturned tractor-trailer shuts portion of Route 32 near NSA - WBAL-TV - February 1st, 2026 [February 1st, 2026]
- Nominee to lead NSA backs controversial spying law - Defense One - February 1st, 2026 [February 1st, 2026]
- NSA pick champions foreign spying law as nomination advances - The Record from Recorded Future News - February 1st, 2026 [February 1st, 2026]
- NSA Releases Phase One and Phase Two of the Zero Trust Implementation Guidelines - National Security Agency (.gov) - February 1st, 2026 [February 1st, 2026]
- Army General Tapped to Lead NSA Said He Doesnt Know Much About the Biggest NSA Controversy - The Intercept - February 1st, 2026 [February 1st, 2026]
- Trump's pick to lead the NSA vows to follow the law if confirmed - ABC News - February 1st, 2026 [February 1st, 2026]
- Trump's pick to lead the NSA vows to follow the law if confirmed - Oskaloosa Herald - February 1st, 2026 [February 1st, 2026]
- Trump's pick to lead the NSA vows to follow the law if confirmed - The Derrick - February 1st, 2026 [February 1st, 2026]
- Overturned tractor-trailer shuts westbound Maryland Route 32 near NSA exit, police say - WBAL News Radio - February 1st, 2026 [February 1st, 2026]
- SC to hear plea against Sonam Wangchuks NSA detention on February 2 - The New Indian Express - February 1st, 2026 [February 1st, 2026]
- Powys sheep sector to hear from Llyr Gruffydd at NSA meeting - County Times - February 1st, 2026 [February 1st, 2026]
- NSA calls for consultation on castration and tail docking to involve sheep farmers - cravenherald.co.uk - January 24th, 2026 [January 24th, 2026]
- NSA launches 13th annual survey for insight into cases of sheep worrying by dogs - Yahoo News UK - January 24th, 2026 [January 24th, 2026]
- NSA Ajit Doval says he doesn't use phone or internet. Here's why - MSN - January 14th, 2026 [January 14th, 2026]
- NSA Ajit Doval says he doesnt use phone or internet; shares views on Indias future and youth - WION - January 11th, 2026 [January 11th, 2026]
- Liberia: NSA Director's Special Assistant Suspended Amid Alleged Gang Sodomy of 15-Year-Old; Authorities Remain Silent - FrontPageAfrica - January 11th, 2026 [January 11th, 2026]
- 'Wars happen because some countries want to impose their will on others': NSA Ajit Doval - Deccan Herald - January 11th, 2026 [January 11th, 2026]
- We have to avenge our history: NSA Ajit Doval urges youth to make India great in every aspect - The Indian Express - January 11th, 2026 [January 11th, 2026]