#sigint

[ follow ]
#fbi
Privacy professionals
fromNextgov.com
16 hours ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
fromwww.theguardian.com
1 week ago
Privacy professionals

How the FBI can conduct mass surveillance even without AI

The FBI can conduct mass surveillance by purchasing data on citizens without AI assistance, despite concerns over privacy and legal protections.
fromSecuritymagazine
2 weeks ago
Privacy professionals

The FBI Buys Data to Track Movement, Location History

FBI and Defense Intelligence Agency purchase commercially available data to track individuals, raising concerns about privacy and Fourth Amendment rights.
Privacy professionals
fromNextgov.com
16 hours ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
Artificial intelligence
fromNextgov.com
2 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
#cybersecurity
fromThe Hacker News
1 day ago
Information security

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

Information security
fromTechzine Global
2 days ago

AI gives attackers superpowers, so defenders must use it too

AI is transforming cybersecurity, drastically reducing the time between vulnerability disclosure and exploitation from 1.5 years to mere hours.
Information security
fromThe Hacker News
3 days ago

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

A campaign targets Chinese-speaking users with typosquatted domains to deliver the AtlasCross RAT, impersonating trusted software brands.
Information security
fromThe Hacker News
14 hours ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
Information security
fromComputerWeekly.com
1 day ago

NCSC warns high-risk individuals of Signal and WhatsApp social engineering attacks | Computer Weekly

High-risk individuals must reduce exposure to social engineering attacks targeting encrypted messaging apps like Signal, WhatsApp, and Facebook Messenger.
Information security
fromThe Hacker News
1 day ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Privacy professionals
fromTechRepublic
4 days ago

Iran-Linked Hackers Breach FBI Director Kash Patel's Email, Leak Messages Online

An Iran-linked hacking group breached FBI Director Kash Patel's personal email, releasing non-sensitive information as a retaliatory cyber attack.
Information security
fromTechzine Global
2 days ago

AI gives attackers superpowers, so defenders must use it too

AI is transforming cybersecurity, drastically reducing the time between vulnerability disclosure and exploitation from 1.5 years to mere hours.
Information security
fromThe Hacker News
3 days ago

Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains

A campaign targets Chinese-speaking users with typosquatted domains to deliver the AtlasCross RAT, impersonating trusted software brands.
Law
fromABA Journal
1 day ago

Sanctions ramping up in cases involving AI hallucinations

Monetary sanctions against attorneys for AI-generated hallucinations in case documents are increasing as courts take these issues more seriously.
#ice
US politics
fromSilicon Canals
1 day ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
1 day ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
1 day ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
1 day ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
#surveillance
fromSilicon Canals
5 days ago
Privacy professionals

The real US surveillance threat isn't AI - it's the data infrastructure we already built - Silicon Canals

SF politics
fromNextgov.com
1 day ago

Single-member surveillance watchdog backs 702 powers, raising independence questions

The report praises Section 702's intelligence value while raising concerns about civil liberties and compliance with the Fourth Amendment.
Privacy professionals
fromSilicon Canals
5 days ago

The real US surveillance threat isn't AI - it's the data infrastructure we already built - Silicon Canals

The infrastructure for mass surveillance already exists, relying on pre-existing technology and data rather than new AI advancements.
#ai
Privacy technologies
fromComputerWeekly.com
1 day ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
fromNextgov.com
1 week ago
Information security

ODNI is building a framework to boost spy agencies' AI adoption

The Office of the Director of National Intelligence is enhancing AI adoption for cybersecurity within the intelligence community as part of a modernization effort.
Privacy technologies
fromComputerWeekly.com
1 day ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromNextgov.com
1 week ago

ODNI is building a framework to boost spy agencies' AI adoption

The Office of the Director of National Intelligence is enhancing AI adoption for cybersecurity within the intelligence community as part of a modernization effort.
Roam Research
fromThe Cipher Brief
3 days ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
fromThe New Yorker
4 days ago

The Spy Who Helped Stop Iran from Getting the Bomb

Chalker claims that during his time at the C.I.A., he was instrumental in persuading Iranian scientists to defect, which provided crucial information that 'prevented Iran from getting a nuke.' His operations involved complex strategies and a deep understanding of the scientists' motivations.
Washington DC
#data-integrity
fromComputerworld
3 days ago
Data science

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
3 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
Data science
fromComputerworld
3 days ago

IT lesson from the Iran war: AI makes your data problems so much worse

AI can exacerbate existing data issues in enterprises, as demonstrated by the US military's bombing due to outdated intelligence.
Information security
fromSecurityWeek
3 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
fromThe Walrus
3 days ago

The Man Who Put AI at the Centre of America's War Machine | The Walrus

"War is terrible, war is terrible, war is terrible," he intones, holding my gaze and giving voice to a universal chorus.
DC food
#iran
World news
fromTNW | Me
3 days ago

Iran's IRGC names 18 US tech firms including Apple, Microsoft, Nvidia as military targets

The IRGC named 18 US tech firms as targets for retaliation against alleged roles in assassinations in Iran.
Privacy professionals
fromAxios
3 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromTNW | Me
3 days ago

Iran's IRGC names 18 US tech firms including Apple, Microsoft, Nvidia as military targets

The IRGC named 18 US tech firms as targets for retaliation against alleged roles in assassinations in Iran.
Privacy professionals
fromAxios
3 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
DevOps
fromThe Hacker News
4 days ago

3 SOC Process Fixes That Unlock Tier 1 Productivity

Fragmented workflows and manual triage slow down Tier 1 SOC performance more than the threats themselves.
Remote teams
fromTheregister
5 days ago

Security contractor blew the whistle on shabby support crew

Brad, a security contractor, faced challenges with antivirus alerts while working in a labor hire company's office without proper IT support.
US news
fromFuturism
6 days ago

Ominous Surveillance "Scarecrows" Appearing Across America

Police technology, including COWs, is rapidly growing, with the law enforcement equipment market projected to reach $11.7 billion by 2025.
fromComputerworld
13 hours ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
fromWIRED
23 hours ago

CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards

The public Quizlet set contained information about alleged codes for specific facility entrances. 'Checkpoint doors code?' asked one card, with a specific four-digit combination listed in response.
Privacy professionals
Python
fromAntocuni
1 week ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
Science
fromWIRED
1 week ago

When Satellite Data Becomes a Weapon

Satellite infrastructure in the Gulf is increasingly contested, affecting the reliability of information during conflicts.
fromenglish.elpais.com
1 week ago

Security forces arrest two suspected Russian spies in Germany and Spain

The German Federal Prosecutor's Office ordered the arrest of two individuals accused of spying on a businessman supplying drones to Ukraine for military use.
Germany news
SF politics
fromNextgov.com
4 days ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
#dhs
US politics
fromNextgov.com
14 hours ago

President's budget proposes folding beleaguered DHS intelligence office into headquarters

The Department of Homeland Security's intelligence office faces consolidation and potential workforce reductions under Trump's proposed budget for 2027.
SF politics
fromNextgov.com
4 days ago

DHS drops investigation into former acting CISA chief's failed polygraph exam

DHS closed an investigation into CISA staff who arranged a polygraph for the former acting director, clearing them of wrongdoing.
US politics
fromNextgov.com
14 hours ago

President's budget proposes folding beleaguered DHS intelligence office into headquarters

The Department of Homeland Security's intelligence office faces consolidation and potential workforce reductions under Trump's proposed budget for 2027.
SF politics
fromNextgov.com
4 days ago

DHS drops investigation into former acting CISA chief's failed polygraph exam

DHS closed an investigation into CISA staff who arranged a polygraph for the former acting director, clearing them of wrongdoing.
Information security
fromTheregister
1 day ago

Maude-HCS helps model and validate covert network designs

Maude-HCS, an open-source toolkit for covert communication networks, allows organizations to experiment with secure and anonymous communication systems.
#whatsapp
Privacy professionals
fromSilicon Canals
2 days ago

Italian surveillance firm SIO built fake WhatsApp app with government spyware, Meta says - Silicon Canals

WhatsApp notified 200 users in Italy about a fake app containing spyware linked to surveillance firm SIO.
Privacy professionals
fromTechCrunch
2 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
Privacy professionals
fromSilicon Canals
2 days ago

Italian surveillance firm SIO built fake WhatsApp app with government spyware, Meta says - Silicon Canals

WhatsApp notified 200 users in Italy about a fake app containing spyware linked to surveillance firm SIO.
Privacy professionals
fromTechCrunch
2 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
US politics
fromMail Online
2 days ago

Deadline issued for UFO videos as Congress warns of 'threat' to US

Lawmakers demand federal agencies release UFO videos by April 14, 2026, citing potential threats to US military forces.
Privacy professionals
fromSecurityWeek
2 days ago

FBI Warns of Data Security Risks From China-Made Mobile Apps

Foreign-developed mobile applications pose significant data security risks, particularly those from China, according to an FBI alert.
US politics
fromABC7 San Francisco
2 days ago

CA senators demand answers from DHS after ICE arrest tied to TSA data at San Francisco Airport

Senators Padilla and Schiff demand answers from DHS regarding TSA data use for immigration enforcement after an airport arrest.
fromNextgov.com
2 weeks ago

The Pentagon's 'woke AI' problem

Department of War AI will not be woke. We're building war ready weapons and systems, not chatbots for an Ivy League faculty lounge. Later on, President Donald Trump lambasted Anthropic as a RADICAL LEFT, WOKE COMPANY.
Artificial intelligence
Law
fromThe Atlantic
3 weeks ago

The Unbearable Lightness of Signalgate

The Uniform Code of Military Justice enforces discipline across all military ranks through 158 articles covering both civilian crimes and military-specific offenses, with recent courts-martial demonstrating consistent enforcement of conduct standards.
Artificial intelligence
fromEngadget
2 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
Information security
fromTechzine Global
2 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
US politics
fromThe New Yorker
6 days ago

ICE-Tracking Apps Have Helped People Avoid Immigration Agents. Are They Legal?

ICEBlock is an app designed to help users avoid ICE enforcement by reporting sightings in real-time.
Artificial intelligence
fromSilicon Canals
2 weeks ago

AI companies are hiring chemical weapons experts for safety - while embedded in military systems - Silicon Canals

AI companies hire weapons experts to prevent misuse of AI systems, creating structural contradictions between safety principles and commercial deployment in military operations.
fromWIRED
1 month ago

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

The movements of a hard drive's components, keystrokes on a keyboard, even the electric charge in a semiconductor's wires produce radio waves, sound, and vibrations that transmit in all directions and can-when picked up by someone with sufficiently sensitive equipment and enough spycraft to decipher those signals-reveal your private data and activities.
Privacy technologies
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
Artificial intelligence
fromFuturism
2 weeks ago

The Military's AI Fever Is Leading Into Disaster, Critics Say

The US military's rapid AI deployment risks unsafe systems causing excessive civilian harm, wrongful arrests, and civil liberties violations without adequate human oversight safeguards.
fromTheregister
1 week ago

Indian government probes CCTV espionage linked to Pakistan

Indian authorities have reportedly ordered an audit of the nation's CCTV cameras, after police uncovered what they claim was a Pakistan-backed surveillance operation involving cameras aimed at railway stations and other infrastructure.
Privacy professionals
fromSecuritymagazine
2 weeks ago

Trump's Former Counter-Terrorism Official Investigated Over Alleged Leaks

Joe Kent, President Trump's former top counter-terrorism official, is under investigation by the FBI's Criminal Division for allegedly improperly sharing classified information. The investigation began months before Kent's recent resignation, according to four individuals with direct knowledge of the probe who spoke to Semafor.
US politics
Information security
fromSecurityWeek
3 days ago

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Stolen credentials significantly enhance ransomware attacks, enabling illegitimate access and operational disruption within networks.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
fromNextgov.com
1 month ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
Privacy professionals
fromTheregister
3 weeks ago

FBI investigating breach that reportedly hit wiretapping net

The FBI is investigating a breach of its wiretapping and surveillance systems, while Europol dismantled major cybercrime platforms including a phishing service and stolen data marketplace.
Information security
fromThe Cipher Brief
2 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
#fbi-cybersecurity
fromSecurityWeek
4 weeks ago
Privacy professionals

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

Privacy professionals
fromSecurityWeek
4 weeks ago

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

The FBI is investigating suspicious activities on an internal system containing sensitive surveillance data, with an unidentified actor using sophisticated techniques to exploit network security controls.
Privacy professionals
fromTechRepublic
4 weeks ago

FBI Investigates Suspicious Activity in Surveillance Platform

The FBI is investigating suspicious cyber activity on systems managing surveillance and wiretap warrants, highlighting critical vulnerabilities in sensitive law enforcement infrastructure.
Science
fromThe Cipher Brief
2 months ago

America's Intelligence Satellites are Proliferating: Their Protection is Not, With Exceptions

Many sensitive U.S. national-security satellites remain dangerously exposed to hostile action despite rapid launch cadence and plans for proliferated constellations.
fromTheregister
2 months ago

How hackers fight back against ICE surveillance tech

The Electronic Frontier Foundation (EFF) has rounded up several of these counter surveillance projects, and perhaps unsurprisingly many of these have to do with Flock, best known for its automated license plate reader (ALPR). Flock operates the largest network of surveillance cameras in America, and, while it has contracts with thousands of police departments and municipalities across the US, sometimes ICE gains access to this footage, according to US Senator Ron Wyden (D-OR) and those who have looked into Flock's misuse.
Privacy technologies
US news
fromwww.scientificamerican.com
2 months ago

U.S. quietly declassifies ColdWar era JUMPSEAT' surveillance satellites

Declassified JUMPSEAT satellites, launched 1971–1987, provided space-based signals intelligence on adversary weapons and were decommissioned in 2006.
Law
fromEmptywheel
2 months ago

Yet More Cell Phones IDed in Program that Purportedly Doesn't Get Cell Phones

FBI phone-dragnet data frequently relied on cellphone connections—including T-Mobile and AT&T numbers—and mixed EO 12333 and Section 215 data, contradicting claims of no cell collection.
Information security
fromTechCrunch
3 weeks ago

The mystery of a globetrotting iPhone-hacking toolkit

A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
Information security
fromtechcrunch.com
4 weeks ago

FBI investigating hack on its wiretap and surveillance systems: report

Hackers breached FBI networks managing wiretaps and foreign intelligence surveillance warrants, marking another major U.S. government cybersecurity incident amid ongoing threats from Chinese and Russian threat actors.
fromComputerworld
4 weeks ago

FBI wiretap system tapped by hackers

The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond.
Information security
#iphone-security-vulnerabilities
Information security
fromTechCrunch
1 month ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
Information security
fromTechCrunch
1 month ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
US politics
fromNextgov.com
2 months ago

NSA alum returns to agency to serve as deputy director

Tim Kosiba was appointed NSA deputy director to lead operations, manage civilian leadership, set policy, and oversee execution of the agency's strategy.
US politics
fromwww.nytimes.com
1 month ago

Video: Opinion | The President's Personal Spy Chief

Tulsi Gabbard, as director of national intelligence, is undermining the independence and credibility of U.S. intelligence through politicized actions involving the 2020 election.
US politics
fromEmptywheel
2 months ago

Quantum Leaps: The So-Called Whistleblower That Got NSA's Top Mathematician Fired

Tulsi Gabbard fired a top NSA mathematician based on a disorganized whistleblower complaint whose claims conflict with other officials' reviews.
Information security
fromThe Hacker News
1 month ago

Manual Processes Are Putting National Security at Risk

Over half of national security organizations rely on manual sensitive data transfers, creating critical security vulnerabilities that adversaries actively exploit in contested operational environments.
US politics
fromThe Cipher Brief
1 month ago

From Secrets to Sensors: Why Open Source Data Must Drive Modern Intelligence

The intelligence community must rebuild on open-source data and commercial technology to enable DoD enterprise command-and-control and remain relevant to warfighters.
Information security
fromEmptywheel
2 months ago

I Con the Record Admits All This Spying Also Serves Counterintelligence

The Intelligence Community uses online anonymity and networking tools to collect foreign intelligence, including counterintelligence and cybersecurity, while asserting legal limits on targeting US citizens.
Information security
fromArs Technica
2 months ago

US cyber defense chief accidentally uploaded secret government info to ChatGPT

CISA acting director Madhu Gottumukkala uploaded sensitive, "for official use only" contracting documents to a public ChatGPT, triggering DHS cybersecurity warnings.
fromComputerWeekly.com
2 months ago

NSA urges continuous checks to achieve zero trust | Computer Weekly

The US National Security Agency (NSA) has published its latest guidance on zero trust to secure US federal government IT networks and systems. This is the first of two guidance documents coming out of the NSA, providing "practical and actionable" recommendations that can be applied as best practice to secure corporate IT environments both in the public and private sectors.
Information security
[ Load more ]