#project-mogul

[ follow ]
World news
fromFortune
2 hours ago

CIA deception campaign in Iran helped the spy agency uncover the location of the downed F-15 airman, who was hiding in a mountain crevice | Fortune

The U.S. successfully rescued two aviators from Iran after their fighter jet was shot down, employing a complex extraction strategy.
fromwww.aljazeera.com
1 day ago

US satellite firm Planet Labs announces blackout on war on Iran images

Planet Labs stated it will withhold imagery dating back to March 9 and expects the policy to remain in effect until the end of the war, which began on February 28.
Science
#artificial-intelligence
fromNextgov.com
4 days ago
Artificial intelligence

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
fromPsychology Today
3 days ago
Artificial intelligence

Is War With AI Unavoidable?

The evolution of AI raises concerns about its potential for deception and manipulation, necessitating caution in its development and use.
Artificial intelligence
fromNextgov.com
4 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
#cybersecurity
Information security
fromThe Hacker News
2 days ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromThe Hacker News
1 week ago

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A China-nexus threat actor has embedded itself in telecom networks for espionage, utilizing stealthy access mechanisms and advanced malware tools.
Information security
fromThe Hacker News
2 days ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromThe Hacker News
1 week ago

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A China-nexus threat actor has embedded itself in telecom networks for espionage, utilizing stealthy access mechanisms and advanced malware tools.
Business
fromFortune
2 days ago

Leaders push for a 'Manhattan Project' and public-private solutions around AI and labor | Fortune

AI could create a talent and job crisis, necessitating collaboration between public and private sectors to manage the transition effectively.
#ice
fromSilicon Canals
3 days ago
US politics

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
#russian-intelligence
#cia
#iran
Privacy professionals
fromAxios
5 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromwww.aljazeera.com
2 weeks ago

War spirals as information control tightens

The war on Iran has escalated with increased leadership assassinations, a blockade of the Strait of Hormuz, and strikes on energy infrastructure.
Privacy professionals
fromAxios
5 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromwww.aljazeera.com
2 weeks ago

War spirals as information control tightens

The war on Iran has escalated with increased leadership assassinations, a blockade of the Strait of Hormuz, and strikes on energy infrastructure.
fromThe Walrus
5 days ago

The Man Who Put AI at the Centre of America's War Machine | The Walrus

"War is terrible, war is terrible, war is terrible," he intones, holding my gaze and giving voice to a universal chorus.
DC food
#ai-governance
SF politics
fromwww.nytimes.com
4 weeks ago

Video: Opinion | The Pentagon's Attack on Anthropic Is Political

The U.S. government threatens to destroy Anthropic to prevent AI systems from operating independently of government control and to establish precedent for other AI companies.
Artificial intelligence
fromBusiness Insider
1 month ago

The government's AI standoff could decide who really controls America's military tech

The Trump administration blacklisted Anthropic over refusal to allow military use of its AI for surveillance and autonomous weapons, while OpenAI secured a Pentagon defense contract, intensifying competition over AI control in national security.
Psychology
fromwww.theguardian.com
1 week ago

They feel true': political deepfakes are growing in influence even if people know they aren't real

Online content creators are fabricating people and images for propaganda and profit, blurring the lines between reality and fiction.
Information security
fromTechzine Global
4 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
World news
fromThe Washington Post
1 day ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
Media industry
fromIntelligencer
2 weeks ago

Why Iran Is Winning the Slop War

Information gaps about Middle East conflict are filled by government propaganda, citizen reporting, and AI-generated content, creating a distorted information landscape across social media platforms.
Silicon Valley
fromBusiness Insider
2 weeks ago

The Palantir guide to stopping World War III

Tech executives are increasingly integrating with the U.S. military through government contracts, leadership positions, and defense-focused startups, marking a shift from the industry's historical antiwar stance to active participation in weapons development and military operations.
fromThe New Yorker
3 weeks ago

War in the Age of the Online "Information Bomb"

On TikTok, the war against Iran began with a series of videos from influencer types in Dubai, Doha, and elsewhere in the Middle East. They sat on restaurant patios or on hotel-room balconies and pointed their phone cameras skyward to document missiles flying through the air of their respective cities, then disappearing into puffs of smoke as they were shot down.
Social media marketing
World politics
fromwww.aljazeera.com
3 weeks ago

The battle on the propaganda front intensifies

Iran employs asymmetric economic tactics against U.S.-Israeli military superiority while misinformation complicates public understanding of the conflict.
fromThe Cipher Brief
3 weeks ago

The Future of War Is Now: What Washington Needs to Hear from the Battlefield

I have been working in Ukraine since 2019, first as an active Green Beret advising in an official capacity, then after leaving that service, directing special operations on the ground and more recently carrying hard-won lessons back to NATO before they are forgotten or overtaken by the next news cycle.
Washington DC
UK news
fromwww.theguardian.com
4 weeks ago

UK counter-terrorism agents granted more time to question men suspected of spying for Iran

Four men arrested on suspicion of spying for Iran on Jewish community locations and individuals in Britain can be held in custody until 13 March for questioning.
Intellectual property law
fromwww.theguardian.com
4 weeks ago

What does the US military's feud with Anthropic mean for AI used in war?

Anthropic's refusal to allow Claude AI for domestic mass surveillance and autonomous weapons has triggered a Pentagon supply chain risk designation, highlighting tensions between tech company safety values and military demands.
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
fromwww.theguardian.com
3 weeks ago

Ex-CIA analyst David McCloskey on the Mossad's intelligence inside Iran: I was surprised'

From what I have seen on open-source intelligence, the Israelis had essentially developed a capability to tap existing public CCTV networks in Tehran and then layered on top of that, a bunch of data integration software that enable them to build targeting packages on senior leaders. My sense is that there was a US-sourced piece of humint that was then able to be fed into that model.
US politics
Science
fromArs Technica
4 weeks ago

Satellite firm pauses imagery after revealing Iran's attacks on US bases

Planet Labs implemented a 96-hour delay on satellite imagery from Gulf States, Iraq, and Kuwait to prevent adversarial actors from using damage assessment data during Middle East conflict.
#cyber-warfare
World news
fromenglish.elpais.com
3 weeks ago

Why Iran is targeting the artificial intelligence infrastructure of Gulf countries

Iran's drone attacks on Arab Gulf data centers represent unprecedented military targeting of digital infrastructure, exposing critical vulnerabilities in regional economic diversification and AI development strategies.
World news
fromenglish.elpais.com
3 weeks ago

Why Iran is targeting the artificial intelligence infrastructure of Gulf countries

Iran's drone attacks on Arab Gulf data centers represent unprecedented military targeting of digital infrastructure, exposing critical vulnerabilities in regional economic diversification and AI development strategies.
Information security
fromSecurityWeek
3 weeks ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
US politics
fromwww.theguardian.com
3 weeks ago

Anthropic-Pentagon battle shows how big tech has reversed course on AI and war

Anthropic sued the Pentagon over blacklisting, refusing to remove AI safety guardrails for domestic surveillance and autonomous weapons, forcing the tech industry to reconsider ethical boundaries around military applications.
Miscellaneous
fromThe Cipher Brief
1 month ago

Breaking Down our "Red October" Moment for AI

Deploying untested AI systems in national security without mission-specific evaluation frameworks risks catastrophic failures, requiring rigorous fit-for-purpose assessment before operational deployment.
#military-ai
fromEngadget
2 weeks ago
Artificial intelligence

The Defense Department reportedly plans to train AI models on classified military data

Artificial intelligence
fromEngadget
2 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
fromAxios
3 weeks ago

AI policy's new power center

The biggest question is: What kind of business partner does the government want to be? They need the AI companies. The government's a superpower but here it's trying to jam a lot of policy. This reflects tension between government dependence on private AI firms and its desire to impose regulatory requirements through procurement mechanisms rather than traditional legislative channels.
US politics
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
Artificial intelligence
fromBusiness Insider
2 weeks ago

The Pentagon provided a rare inside look at Palantir's Project Maven and how the AI tool helps the military wage war

Pentagon's Project Maven integrates satellite imagery and AI to streamline military targeting from detection to strike execution within a single system.
fromTheregister
3 weeks ago

Pentagon praises Palantir tech for battlefield strike speed

So we've gone from identifying the target to now coming up with a course of action, to now actioning that target, all from one system. This is revolutionary. We were having this done in about eight or nine systems where humans were literally moving detections left and right in order to get to our desired end state, in this case closing a kill chain.
World news
Artificial intelligence
fromIntelligencer
3 weeks ago

The Pentagon's Total War Against Anthropic

AI industry discussions conflate present capabilities with speculative futures, creating confusion about current impacts while regulatory and business decisions face uncertainty from competing timelines.
fromwww.theguardian.com
4 weeks ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
fromBusiness Insider
4 weeks ago

Pentagon official details the 'holy cow' moments that sparked rift with Anthropic

I was giving these scenarios, these Golden Dome scenarios, and so on. And he's like, 'Just call me if you need another exception.' And I'm like, 'But what if the balloon's going up at that moment and it's like a decisive action we have to take? I'm not going to call you to do something. It's not rational.'
US politics
#ai-in-military-operations
fromWIRED
3 weeks ago
Artificial intelligence

Palantir Demos Show How the Military Could Use AI Chatbots to Generate War Plans

AI assistants like Claude are being integrated into military defense systems to rapidly generate tactical options, from target identification to troop deployment strategies.
Artificial intelligence
fromFortune
1 month ago

Trump's strike on Iran and the new breed of AI wars means bombs can drop faster than the speed of thought | Fortune

AI systems are accelerating military targeting and decision-making processes, compressing the time from target identification to strike execution, fundamentally changing modern warfare operations.
fromWIRED
3 weeks ago
Artificial intelligence

Palantir Demos Show How the Military Could Use AI Chatbots to Generate War Plans

Artificial intelligence
fromFortune
1 month ago

Trump's strike on Iran and the new breed of AI wars means bombs can drop faster than the speed of thought | Fortune

AI systems are accelerating military targeting and decision-making processes, compressing the time from target identification to strike execution, fundamentally changing modern warfare operations.
World news
fromLondon Business News | Londonlovesbusiness.com
4 weeks ago

US and Israel 'consider special forces raid' to seize Iran's enriched uranium - London Business News | Londonlovesbusiness.com

The United States and Israel are discussing a potential special forces operation to seize Iran's highly enriched uranium stockpile to prevent nuclear weapon development.
fromBusiness Insider
1 month ago

What happened after Elon Musk took the Russian army offline

SpaceX began requiring verification of Starlink terminals on Feb. 4, blocking unverified Russian units from accessing its services. Almost immediately, Ukrainian eavesdroppers heard Russian soldiers complaining about the failure of "Kosmos" and "Sinka" - apparently code names for Starlink satellite internet and the messaging service Telegram.
Russo-Ukrainian War
Artificial intelligence
fromComputerWeekly.com
3 weeks ago

AI chooses nuclear escalation in 95% of simulated crises | Computer Weekly

Leading AI models initiated nuclear strikes in 95% of simulated crisis scenarios, treating nuclear weapons as coercive tools rather than deterrents and never choosing deescalation.
Artificial intelligence
fromWIRED
3 weeks ago

Anthropic Claims Pentagon Feud Could Cost It Billions

The US Department of Defense's supply-chain risk designation of Anthropic has caused current and prospective customers to demand new contract terms, cancel deals, and withdraw from negotiations, threatening hundreds of millions in expected Pentagon-related revenue and potentially billions in overall sales.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Information security
fromTheregister
1 month ago

Google and friends disrupt suspected Beijing espionage op

Google disrupted UNC2814, a China-linked group conducting widespread cyberattacks on telecommunications and government organizations across multiple continents using Google Sheets API for command-and-control operations.
Artificial intelligence
fromFortune
4 weeks ago

Top Pentagon official recalls the 'whoa moment' when defense leaders realized how indispensable Anthropic is and saw the of risk losing access | Fortune

The Pentagon's heavy reliance on Anthropic's Claude AI created vulnerability when the company questioned its use in military operations, prompting Trump to order the federal government to cease using it within six months.
#espionage
US politics
fromFuturism
1 month ago

Government Insiders Concerned by Musk's Erratic and Sycophantic Grok Being Deployed for Incredibly Sensitive Purposes

The Trump administration is replacing Claude with Grok across Pentagon systems despite federal officials' concerns about Grok's inferior performance, safety vulnerabilities, and susceptibility to data poisoning attacks.
US news
from24/7 Wall St.
2 months ago

Operation Absolute Resolve and Delta Force: Inside America's Most Secretive Missions

Delta Force and similar elite units execute highly discreet, precision-driven missions—hostage rescues, counterterrorism, and raids—shaping U.S. responses to high-risk crises.
fromThe New Yorker
2 months ago

Russia Is Swarming Europe with Young Agents

Russian military intelligence is recruiting young people online to carry out arson and other acts of sabotage across Europe. In this week's issue, Joshua Yaffa reports on the Kremlin's secret campaign to undermine the West's support for Ukraine-and breaks down how "single-use agents" are being deployed across the Continent. Some of their missions are small-putting up posters, or picking up a package-while others involve physical attacks, for example setting off explosives and starting fires.
Business
US politics
fromMail Online
1 month ago

CIA memo reveals plot to turn citizens into political assassins

Project Artichoke was a classified CIA mind control program from 1951-1956 that attempted to create unwitting assassins through psychological manipulation and drug administration.
US news
fromwww.scientificamerican.com
2 months ago

U.S. quietly declassifies ColdWar era JUMPSEAT' surveillance satellites

Declassified JUMPSEAT satellites, launched 1971–1987, provided space-based signals intelligence on adversary weapons and were decommissioned in 2006.
US politics
fromNextgov.com
1 month ago

It would take the Pentagon months to replace Anthropic's AI tools: sources

The Pentagon threatens to blacklist Anthropic's Claude AI if the company refuses to remove restrictions on mass surveillance and autonomous weapons use, potentially delaying military access to advanced AI tools for months.
Science
fromFuturism
2 months ago

CIA Will Neither Confirm Nor Deny Records on 3I/ATLAS

Interstellar object 3I/ATLAS is proposed as possibly technological due to anomalous size, rotation, and trajectory, prompting disputes and a nondisclosure CIA FOIA reply.
US politics
fromFortune
1 month ago

CIA's social media guide to evading Iranian internet restrictions racks up millions of views as Trump considers military action | Fortune

The CIA publicly recruited Iranian informants via social media in Farsi during escalating U.S.-Iran tensions and nuclear negotiations.
fromNextgov.com
1 month ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
fromThe Cipher Brief
2 months ago

I've Tracked Terrorist Networks for Decades. I've Never Seen Anything Like 764.

Within two years, it had spread to every continent. Members - a lot of them teenagers - were finding kids as young as nine on Minecraft and Roblox. They'd befriend them, earn their trust, then trap them. They forced children to hurt themselves on camera. To hurt animals. To do things I'm not going to describe here. That kid from Texas is serving eighty years now. But 764 didn't stop. It splintered and kept growing.
Miscellaneous
US politics
fromAxios
1 month ago

Scoop: Pentagon takes first step toward blacklisting Anthropic

The Pentagon is pressuring Anthropic to remove AI safeguards for military use, threatening supply chain risk declarations or Defense Production Act enforcement if the company refuses by Friday's deadline.
Information security
fromSecurityWeek
1 month ago

Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns

Hacktivists, state-sponsored actors, and cybercriminals are intensifying attacks on the global defense industrial base using espionage, ransomware, and LLM-assisted techniques.
fromThe Cipher Brief
1 month ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
fromSecurityWeek
1 month ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
Information security
fromSecurityWeek
1 month ago

Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries

A state-sponsored cyberespionage group TGR-STA-1030 (Shadow Campaign) compromised at least 70 organizations across 37 countries and targeted government infrastructure in 155 countries.
US politics
fromFast Company
1 month ago

Palantir is caught in the middle of a brewing fight between Anthropic and the Pentagon

Anthropic seeks limits on military uses of its AI; the Pentagon opposes restrictions and may label Anthropic a supply-chain risk, putting Palantir at risk.
US politics
fromEmptywheel
2 months ago

Massive Obama Administration Leaks on Covert CIA Program Training Syrian Rebels

Numerous anonymous U.S. officials disclosed detailed information about a covert CIA program to train Syrian rebels while the CIA declined to comment.
US politics
fromEmptywheel
2 months ago

The Scandal of Lying about "Thwarted" "Plots" Started 4 Years Ago

Only one or two U.S. terrorist plots were actually thwarted by the Section 215 call-detail dragnet; the widely cited figure of 54 is incorrect.
[ Load more ]