#influence-infiltration

[ follow ]
#cia
#fbi
Privacy professionals
fromNextgov.com
3 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
fromwww.mediaite.com
2 months ago
US politics

Senior FBI Official Describes Surreal' Call Where Kash Patel Dictated Social Media Strategy Right After Kirk Assassination

FBI Director Kash Patel prioritized scripting social-media responses over investigative actions following Charlie Kirk's assassination.
Privacy professionals
fromTechRepublic
3 days ago

FBI Declares Surveillance System Breach a 'Major Incident'

A China-linked breach of an FBI surveillance system has been classified as a major incident, posing significant risks to US national security.
Privacy professionals
fromSecuritymagazine
1 day ago

Breach of FBI Surveillance System Considered a "Major Incident," Security Experts Weigh In

FBI confirms major breach of surveillance system, exposing sensitive data and potentially revealing criminal probes and surveillance targets.
US politics
fromAdvocate.com
3 days ago

Did the FBI just post this propaganda video to save Kash Patel's job?

The FBI released a video celebrating Director Kash Patel's first year, criticized as propaganda for its cinematic portrayal of law enforcement successes.
Privacy professionals
fromNextgov.com
3 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
fromwww.mediaite.com
2 months ago
US politics

Senior FBI Official Describes Surreal' Call Where Kash Patel Dictated Social Media Strategy Right After Kirk Assassination

#misinformation
US politics
fromwww.theguardian.com
18 hours ago

Republicans fooled by AI-generated image of US crew member rescued in Iran

Republican politicians were misled by a fake AI-generated image of a US warplane crew member, highlighting the need for improved media literacy.
Information security
fromNextgov.com
1 month ago

Fake DOD memo about 'compromised' apps shows swift spread of deceptive messaging

A fake U.S. Cyber Command memo falsely claiming apps were compromised and revealing servicemembers' locations circulated during military channels, but DOD confirmed it was not authentic.
Artificial intelligence
fromNextgov.com
5 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
#cybersecurity
fromTechCrunch
2 weeks ago
Privacy professionals

FBI seizes pro-Iranian hacking group's websites after destructive Stryker hack | TechCrunch

Information security
fromNextgov.com
2 months ago

Analysts watch for heightened cyber, disinformation campaigns following Venezuela raid

U.S. capture of Nicolás Maduro triggered heightened cybersecurity vigilance and concern over potential retaliatory cyberattacks and waves of AI-generated disinformation from Latin America.
Information security
fromThe Hacker News
3 days ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromThe Hacker News
5 days ago

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don't See It Coming)

Cyber attackers increasingly exploit legitimate tools within environments, making detection difficult and expanding the attack surface organizations must manage.
Information security
fromThe Hacker News
1 week ago

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A China-nexus threat actor has embedded itself in telecom networks for espionage, utilizing stealthy access mechanisms and advanced malware tools.
Privacy professionals
fromTechCrunch
2 weeks ago

FBI seizes pro-Iranian hacking group's websites after destructive Stryker hack | TechCrunch

The FBI seized two websites operated by pro-Iranian hacktivist group Handala, which conducted cyberattacks against U.S. companies and published information about individuals linked to Israeli military and defense contractors.
#disinformation
Media industry
fromThe Cipher Brief
4 days ago

Iran Is Building the Disinformation Architecture of the Future-Right Now

Iran's disinformation tactics demonstrate the potential of AI in conflict, emphasizing speed, encryption, and narrative manipulation.
World news
fromThe Cipher Brief
2 weeks ago

When Deepfakes Become Doctrine

Artificial intelligence is being used to create and spread disinformation during the U.S. and Israeli strikes against Iranian military and nuclear infrastructure.
Media industry
fromThe Cipher Brief
4 days ago

Iran Is Building the Disinformation Architecture of the Future-Right Now

Iran's disinformation tactics demonstrate the potential of AI in conflict, emphasizing speed, encryption, and narrative manipulation.
World news
fromThe Cipher Brief
2 weeks ago

When Deepfakes Become Doctrine

Artificial intelligence is being used to create and spread disinformation during the U.S. and Israeli strikes against Iranian military and nuclear infrastructure.
Roam Research
fromThe Cipher Brief
6 days ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
Psychology
fromwww.theguardian.com
1 week ago

They feel true': political deepfakes are growing in influence even if people know they aren't real

Online content creators are fabricating people and images for propaganda and profit, blurring the lines between reality and fiction.
Information security
fromTechzine Global
5 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
#ice
fromSilicon Canals
4 days ago
US politics

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

NYC parents
fromWIRED
1 week ago

Why ICE Is Allowed to Impersonate Law Enforcement

ICE agents misled campus security to detain a student without proper identification or judicial warrant.
US politics
fromTechCrunch
4 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
4 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
Python
fromAntocuni
1 week ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
Relationships
fromPsychology Today
1 week ago

5 Manipulation Tactics You Might Not See Until It's Too Late

Gaslighting, guilt-tripping, moving the goalposts, and triangulation are manipulative tactics that undermine reality and self-worth in relationships.
#iran
Right-wing politics
fromPoynter
1 week ago

Trump says Iran is 'based on disinformation.' Experts say its influence operations go far beyond that. - Poynter

The Iranian regime is using generative AI to spread disinformation, complicating the misinformation landscape during the Iran war.
Privacy professionals
fromAxios
6 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromwww.aljazeera.com
2 weeks ago

War spirals as information control tightens

The war on Iran has escalated with increased leadership assassinations, a blockade of the Strait of Hormuz, and strikes on energy infrastructure.
Right-wing politics
fromPoynter
1 week ago

Trump says Iran is 'based on disinformation.' Experts say its influence operations go far beyond that. - Poynter

The Iranian regime is using generative AI to spread disinformation, complicating the misinformation landscape during the Iran war.
Privacy professionals
fromAxios
6 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromwww.aljazeera.com
2 weeks ago

War spirals as information control tightens

The war on Iran has escalated with increased leadership assassinations, a blockade of the Strait of Hormuz, and strikes on energy infrastructure.
fromwww.bbc.com
3 weeks ago

Overseas 'content farms' creating political deepfakes uncovered

I don't think you'll find a politician who hasn't had this done to them... to say it out loud makes me feel quite sad. Several Welsh politicians told the BBC about their experiences as victims of deepfakes, highlighting the widespread nature of AI-generated manipulated content targeting elected officials across the UK political landscape.
UK politics
fromThe New Yorker
3 weeks ago

War in the Age of the Online "Information Bomb"

On TikTok, the war against Iran began with a series of videos from influencer types in Dubai, Doha, and elsewhere in the Middle East. They sat on restaurant patios or on hotel-room balconies and pointed their phone cameras skyward to document missiles flying through the air of their respective cities, then disappearing into puffs of smoke as they were shot down.
Social media marketing
Law
fromThe Atlantic
4 weeks ago

The Unbearable Lightness of Signalgate

The Uniform Code of Military Justice enforces discipline across all military ranks through 158 articles covering both civilian crimes and military-specific offenses, with recent courts-martial demonstrating consistent enforcement of conduct standards.
World politics
fromwww.aljazeera.com
3 weeks ago

The battle on the propaganda front intensifies

Iran employs asymmetric economic tactics against U.S.-Israeli military superiority while misinformation complicates public understanding of the conflict.
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
Media industry
fromwww.mediaite.com
3 weeks ago

War Propaganda Is Now Made for the Algorithm. Journalism Can't Keep Up.

Foreign and domestic propaganda spreads through social media when users amplify content that aligns with their existing beliefs, regardless of its manipulative intent or source.
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
World politics
fromNextgov.com
3 weeks ago

Russia-linked hackers appear on Iran war's cyber front, but their impact is murky

Russia-linked hacktivist groups supporting Iran have increased cyber activity against U.S. and Israeli targets during the Middle East conflict, though their impact remains unclear and largely unverified.
Information security
fromSecurityWeek
3 weeks ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
fromwww.scientificamerican.com
1 month ago

How to win The Traitors, according to science

We watch people lying, and we know they're lying. And also, you watch people dealing with lying not very well and not enjoying it. The lying, backstabbing and manipulation the game inspires does indeed make for delightful TV viewing.
Television
Artificial intelligence
fromFuturism
1 month ago

AI Tools Are Supercharging Hackers

AI systems are increasingly weaponized for cybercrime, enabling hackers to exploit vulnerabilities at scale with minimal technical expertise, as demonstrated by recent attacks on Mexican government networks and global firewall systems.
Information security
fromTheregister
3 weeks ago

Hackers: Democracy's last line of cyber defense

The hacker mindset—analytical curiosity combined with systemic thinking—can defend democracy by creating decentralized communication tools that resist censorship and empower oppressed communities.
Information security
fromTechCrunch
4 weeks ago

The mystery of a globetrotting iPhone-hacking toolkit

A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
Privacy professionals
fromTheregister
4 weeks ago

FBI investigating breach that reportedly hit wiretapping net

The FBI is investigating a breach of its wiretapping and surveillance systems, while Europol dismantled major cybercrime platforms including a phishing service and stolen data marketplace.
Information security
fromTheregister
4 weeks ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
fromwww.theguardian.com
1 month ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
US politics
fromMail Online
1 month ago

CIA memo reveals plot to turn citizens into political assassins

Project Artichoke was a classified CIA mind control program from 1951-1956 that attempted to create unwitting assassins through psychological manipulation and drug administration.
Information security
fromtechcrunch.com
1 month ago

FBI investigating hack on its wiretap and surveillance systems: report

Hackers breached FBI networks managing wiretaps and foreign intelligence surveillance warrants, marking another major U.S. government cybersecurity incident amid ongoing threats from Chinese and Russian threat actors.
US politics
fromFortune
1 month ago

CIA's social media guide to evading Iranian internet restrictions racks up millions of views as Trump considers military action | Fortune

The CIA publicly recruited Iranian informants via social media in Farsi during escalating U.S.-Iran tensions and nuclear negotiations.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Information security
fromThe Hacker News
1 month ago

Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

Iranian state-sponsored hacking group MuddyWater infiltrated U.S. and Israeli networks across banks, airports, and defense contractors using previously unknown backdoors Dindoor and Fakeset.
fromThe New Yorker
2 months ago

Russia Is Swarming Europe with Young Agents

Russian military intelligence is recruiting young people online to carry out arson and other acts of sabotage across Europe. In this week's issue, Joshua Yaffa reports on the Kremlin's secret campaign to undermine the West's support for Ukraine-and breaks down how "single-use agents" are being deployed across the Continent. Some of their missions are small-putting up posters, or picking up a package-while others involve physical attacks, for example setting off explosives and starting fires.
Business
fromThe Local Germany
1 month ago

German spy chief warns of Russian threat to local polls

Elections in Moldova and Romania are recent examples, and we expect more hybrid campaigns throughout this election year in Germany,
Germany news
fromNextgov.com
1 month ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
Psychology
fromBackyard Garden Lover
1 month ago

Modern Day Mind Control: 16 Hidden Ways Society Is Steering Our Thoughts

Subtle influence tactics, from targeted advertising to social proof, shape beliefs, choices, and autonomy, requiring awareness and critical thinking to resist.
fromComputerWeekly.com
1 month ago

Spyware suppliers exploit more zero-days than nation states | Computer Weekly

Historically, traditional state-sponsored cyber espionage groups have been the most prolific attributed users of zero-day vulnerabilities. [But] over the last few years, the increase of zero-day exploitation attributed to CSVs and their customers has demonstrated the growing ability of these vendors to provide zero-day access to a wider range of threat actors than ever before.
Information security
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
fromThe Cipher Brief
2 months ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
Media industry
fromEurasia Review
1 month ago

'Anti-Social Media': The Changing Tech Of Terror - Analysis

Engagement-driven social media algorithms amplify incendiary content, making hate and misinformation profitable while undermining public safety and complicating regulation.
World news
fromEmptywheel
2 months ago

Hybrid or Ambiguous, Asymmetric Warfare is Here to Stay

Asymmetric and ambiguous warfare doctrines from China and Russia anticipated cyber and hybrid attacks that the U.S. failed to adequately prepare for.
US politics
fromThe Atlantic
1 month ago

The Trump Administration's War on Data

The CIA World Factbook website has been shut down, removing a longstanding public global-data resource and reflecting an administration effort to curtail publicly available information.
Information security
fromTheregister
1 month ago

Google and friends disrupt suspected Beijing espionage op

Google disrupted UNC2814, a China-linked group conducting widespread cyberattacks on telecommunications and government organizations across multiple continents using Google Sheets API for command-and-control operations.
fromWIRED
2 months ago

AI-Powered Disinformation Swarms Are Coming for Democracy

We are moving into a new phase of informational warfare on social media platforms where technological advancements have made the classic bot approach outdated,
US politics
#cyberespionage
US politics
fromEmptywheel
2 months ago

Massive Obama Administration Leaks on Covert CIA Program Training Syrian Rebels

Numerous anonymous U.S. officials disclosed detailed information about a covert CIA program to train Syrian rebels while the CIA declined to comment.
US politics
fromEmptywheel
2 months ago

The Scandal of Lying about "Thwarted" "Plots" Started 4 Years Ago

Only one or two U.S. terrorist plots were actually thwarted by the Section 215 call-detail dragnet; the widely cited figure of 54 is incorrect.
fromElectronic Frontier Foundation
2 months ago

Beware: Government Using Image Manipulation for Propaganda

A short while later, the White House posted the same photo - except that version had been digitally altered to darken Armstrong's skin and rearrange her facial features to make it appear she was sobbing or distraught. The Guardian one of many media outlets to report on this image manipulation, created a handy slider graphic to help viewers see clearly how the photo had been changed.
US politics
US politics
fromThe Cipher Brief
2 months ago

The Country's First 'Cognitive Advantage' Chief: Influence Is the New Battlefield

Integrates information, perception, culture, and behavior operations to provide nonkinetic strategic options and counter adversary cognitive campaigns.
US politics
fromEmptywheel
2 months ago

Should Ex-Senator Tied to CIA "Accountability" Be Involved in This Kind of Propaganda?

A new American Security Initiative ad uses nuclear fear-mongering about Iran, echoing LBJ's "Daisy" tactic to pressure policy and public opinion.
fromEmptywheel
2 months ago

Igor Danchenko Would Have Been a Crucial Witness to Understanding the Disinformation in the Dossier

As one supervisory special agent has agreed, "one of the upshots [of the Crossfire Hurricane Investigation] has been a relationship with [Mr. Danchenko] which has provided the FBI insights into individuals and to areas that it otherwise was lacking [ ] because of the difficulty with which the FBI has in recruiting people from that part of the world." The agent further agreed that the FBI's relationship with Mr. Danchenko was "one thing that in terms of usefulness really did result from this [investigation]."
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
fromSecuritymagazine
2 months ago

Is Email the Entry Point to a Well-Rounded Disinformation Attack?

Generative models learn an executive's tone and syntax from public posts, press releases and meeting transcripts. Attackers then craft messages indistinguishable from authentic correspondence. But the real innovation isn't the text, it's the choreography. A fraudulent email may serve only as the opening move. Within minutes, the target receives a confirming voice message that sounds like the executive whose name appears in the signature block. A deepfaked video may follow, asking for "final authorization." Email opens the door; other channels walk through it.
Information security
US politics
fromLos Angeles Times
1 month ago

He worked for and romanced Arcadia councilwoman, and he was a covert agent for China

A Southern California man acted as a covert agent for China and was sentenced to four years after aiding a local council member's election.
Information security
fromTechRepublic
1 month ago

Asian Cyber Espionage Campaign Hit 37 Countries

A state-aligned Asian hacking group ran a large cyber espionage campaign compromising government agencies and critical infrastructure across 37 countries to gather economic and geopolitical intelligence.
fromZDNET
1 month ago

This new 'sleeperware' doesn't set off alarms or crash your system - it sneaks in and waits

In its annual Red Report, a body of research that analyzes real-world attacker techniques using large-scale attack simulation data, Picus Labs warns cybersecurity professionals that threat actors are rapidly shifting away from ransomware encryption to parasitic "sleeperware" extortion as their means to loot organizations for millions of dollars per attack. Released today and now in its sixth year, the 278-page Red Report gets its name from Picus-organized cybersecurity exercises that take the perspective of the attacker's team, otherwise known as the "red team."
Information security
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
Information security
fromTechzine Global
2 months ago

Researchers hack malware gang via its own weak spot

An XSS flaw in StealC’s web panel allowed takeover of operator sessions, revealing millions of stolen cookies, passwords, and YouTube-based malware distribution.
[ Load more ]