#undercover-surveillance

[ follow ]
World news
fromFortune
7 hours ago

CIA deception campaign in Iran helped the spy agency uncover the location of the downed F-15 airman, who was hiding in a mountain crevice | Fortune

The U.S. successfully rescued two aviators from Iran after their fighter jet was shot down, employing a complex extraction strategy.
Privacy technologies
fromFortune
19 hours ago

Your neighbor just got a home security system, but should you be worried? 'It's inherently a little creepy' says surveillance expert | Fortune

Consumers are increasingly concerned about privacy and data control regarding home surveillance technology.
#fbi
Privacy professionals
fromNextgov.com
2 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
fromwww.theguardian.com
2 weeks ago
Privacy professionals

How the FBI can conduct mass surveillance even without AI

The FBI can conduct mass surveillance by purchasing data on citizens without AI assistance, despite concerns over privacy and legal protections.
fromSecuritymagazine
2 weeks ago
Privacy professionals

The FBI Buys Data to Track Movement, Location History

FBI and Defense Intelligence Agency purchase commercially available data to track individuals, raising concerns about privacy and Fourth Amendment rights.
Privacy professionals
fromNextgov.com
2 days ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
#ice
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
NYC parents
fromWIRED
1 week ago

Why ICE Is Allowed to Impersonate Law Enforcement

ICE agents misled campus security to detain a student without proper identification or judicial warrant.
US politics
fromTechCrunch
3 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
3 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
NYC parents
fromWIRED
1 week ago

Why ICE Is Allowed to Impersonate Law Enforcement

ICE agents misled campus security to detain a student without proper identification or judicial warrant.
Artificial intelligence
fromNextgov.com
4 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
#cybersecurity
fromTechCrunch
2 days ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

fromTechCrunch
1 day ago
Information security

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Information security
fromThe Hacker News
6 days ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
fromMail Online
2 weeks ago
Information security

FBI exposes three signs your smart devices have been secretly hijacked

Cybercriminals can hijack smart devices, leading to increased data usage and internet charges, while turning devices into part of a botnet.
EU data protection
fromTechCrunch
2 days ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromTechCrunch
1 day ago

After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch

Mikko Hyppönen emphasizes the invisible nature of cybersecurity work, comparing it to Tetris where successes vanish and failures accumulate.
Information security
fromThe Hacker News
3 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Information security
fromThe Hacker News
6 days ago

Weekly Recap: Telecom Sleeper Cells, LLM Jailbreaks, Apple Forces U.K. Age Checks and More

A critical Citrix vulnerability is actively exploited, and the FBI confirms a hack of Director Kash Patel's email account by an Iran-linked group.
Information security
fromMail Online
2 weeks ago

FBI exposes three signs your smart devices have been secretly hijacked

Cybercriminals can hijack smart devices, leading to increased data usage and internet charges, while turning devices into part of a botnet.
NYC parents
fromwww.mediaite.com
3 days ago

Feds Storm NYC Councilmember's Home, Seize Devices in Pre-Dawn Raid

Federal agents raided the homes of Councilmember Farah Louis and her sister as part of a corruption investigation into migrant shelter contracts.
Careers
fromSecuritymagazine
4 days ago

Beyond the Certificate: Why Real Expertise in Investigative Interviewing Comes from Practice

Training and certifications signal competence, but true effectiveness in investigative interviewing requires disciplined application and real-world experience.
London politics
fromwww.theguardian.com
4 days ago

Overwhelmed' Prevent at risk of missing threats as referrals rise, UK counter-terror chief says

Prevent scheme faces overwhelming referrals, risking identification of genuine threats due to increased volume and lack of triage system.
Roam Research
fromThe Cipher Brief
5 days ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
fromwww.dw.com
4 days ago

Hungary's Watergate: Secret service spied on opposition

Many have described it as a 'return to dictatorship and Communist times.' The intelligence service is said to have tried to recruit technicians in charge of maintaining the party's IT system, in order to access internal party information and use it to rig the election.
Europe politics
#cia
SF politics
fromNextgov.com
6 days ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
fromwww.independent.ie
6 days ago

Two men in court over alleged 6,400 drone drug delivery to Cloverhill Prison

Craig Doyle, 25, of The Paddocks Way, Adamstown, Lucan, and 30-year-old Adam Aspel, with an address at Corkagh Grange Way, Clondalkin, were arrested by gardai carrying out surveillance of drone activity on March 28.
Law
US news
fromFuturism
1 week ago

Ominous Surveillance "Scarecrows" Appearing Across America

Police technology, including COWs, is rapidly growing, with the law enforcement equipment market projected to reach $11.7 billion by 2025.
fromFast Company
23 hours ago

Why AI-powered city cameras are sounding new privacy alarms

The expansion of automatic license plate readers as a source of deep concern is evident as government authorities seek ways to target immigrant and transgender communities.
Privacy technologies
Remote teams
fromTheregister
6 days ago

Security contractor blew the whistle on shabby support crew

Brad, a security contractor, faced challenges with antivirus alerts while working in a labor hire company's office without proper IT support.
World news
fromThe Washington Post
1 day ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
Python
fromAntocuni
1 week ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
#espionage
Germany news
fromenglish.elpais.com
1 week ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
fromNew York Post
1 month ago
US politics

Love-struck suspected Moscow mole in NYC tells FBI agent, 'Catch me, baby' - only to land behind bars

Germany news
fromenglish.elpais.com
1 week ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
fromNew York Post
1 month ago
US politics

Love-struck suspected Moscow mole in NYC tells FBI agent, 'Catch me, baby' - only to land behind bars

Privacy professionals
fromAxios
5 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
#drones
US news
fromwww.mediaite.com
2 weeks ago

Alarming Number of Unauthorized Drones' Spotted Over US Air Base

Unidentified drones were spotted over Barksdale Air Force Base, prompting a shelter-in-place order and raising security concerns amid tensions with Iran.
NYC parents
fromFuturism
2 weeks ago

Quadcopter Drone Caught Trying to Deliver Hunting Knives to Inmates in Prison

Drones are increasingly used to smuggle contraband into prisons, posing a significant security threat.
US politics
fromElectronic Frontier Foundation
2 days ago

The FAA's "Temporary" Flight Restriction for Drones is a Blatant Attempt to Criminalize Filming ICE

The Trump administration's flight restriction limits the First Amendment right to record law enforcement using drones near ICE and CBP vehicles.
fromComputerworld
2 days ago

A core infrastructure engineer pleads guilty to federal charges in insider attack

Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
Information security
San Francisco
fromABC7 San Francisco
2 weeks ago

SFPD credits surveillance drones with aiding crime decline but some have privacy concerns

San Francisco experiences a decline in crime attributed to new technology like drones, despite privacy concerns raised by critics.
Washington DC
fromwww.mediaite.com
2 weeks ago

Mysterious Drones Spotted Over Military Base Housing Hegseth and Rubio: Report

Unidentified drones spotted over Fort Lesley J. McNair prompted White House officials to consider relocating Defense Secretary Hegseth and State Secretary Rubio, though they ultimately remained in place.
US politics
fromThe New Yorker
1 week ago

ICE-Tracking Apps Have Helped People Avoid Immigration Agents. Are They Legal?

ICEBlock is an app designed to help users avoid ICE enforcement by reporting sightings in real-time.
Information security
fromSecuritymagazine
5 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
NYC LGBT
fromwww.theguardian.com
4 weeks ago

Undercover officer deceived women with grotesque and cruel' lies, spycops inquiry told

An undercover police officer engaged in long-term sexual relationships with women through emotional manipulation, deception about his personal life, and fraudulent use of taxpayer funds.
Information security
fromSecurityWeek
5 days ago

The Next Cybersecurity Crisis Isn't Breaches-It's Data You Can't Trust

Data integrity now encompasses data trust, emphasizing the importance of reliable data in AI-driven decision-making.
fromwww.bbc.com
1 month ago

Gang which used drones for prison drops jailed

This highly organised gang thought they were outsmarting the police and prison authorities. What they didn't know is they were subject to sustained specialist surveillance by Met officers. All seven men admitted their roles in a serious, organised, and prolific enterprise to supply Class B and C drugs, and conveying list A and B articles into prisons.
UK news
Privacy professionals
fromCNET
2 weeks ago

FBI Confirms Buying Data That Could Be Used to Track Americans

FBI Director Kash Patel admitted under oath that the agency purchases commercially available data to track Americans, circumventing Fourth Amendment protections without warrants.
fromSecuritymagazine
2 weeks ago

Trump's Former Counter-Terrorism Official Investigated Over Alleged Leaks

Joe Kent, President Trump's former top counter-terrorism official, is under investigation by the FBI's Criminal Division for allegedly improperly sharing classified information. The investigation began months before Kent's recent resignation, according to four individuals with direct knowledge of the probe who spoke to Semafor.
US politics
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
fromWIRED
1 month ago

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

The movements of a hard drive's components, keystrokes on a keyboard, even the electric charge in a semiconductor's wires produce radio waves, sound, and vibrations that transmit in all directions and can-when picked up by someone with sufficiently sensitive equipment and enough spycraft to decipher those signals-reveal your private data and activities.
Privacy technologies
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
Privacy professionals
fromTheregister
4 weeks ago

FBI investigating breach that reportedly hit wiretapping net

The FBI is investigating a breach of its wiretapping and surveillance systems, while Europol dismantled major cybercrime platforms including a phishing service and stolen data marketplace.
#fbi-cybersecurity
fromTechRepublic
4 weeks ago
Privacy professionals

FBI Investigates Suspicious Activity in Surveillance Platform

The FBI is investigating suspicious cyber activity on systems managing surveillance and wiretap warrants, highlighting critical vulnerabilities in sensitive law enforcement infrastructure.
fromSecurityWeek
4 weeks ago
Privacy professionals

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

The FBI is investigating suspicious activities on an internal system containing sensitive surveillance data, with an unidentified actor using sophisticated techniques to exploit network security controls.
Privacy professionals
fromTechRepublic
4 weeks ago

FBI Investigates Suspicious Activity in Surveillance Platform

The FBI is investigating suspicious cyber activity on systems managing surveillance and wiretap warrants, highlighting critical vulnerabilities in sensitive law enforcement infrastructure.
Privacy professionals
fromSecurityWeek
4 weeks ago

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

The FBI is investigating suspicious activities on an internal system containing sensitive surveillance data, with an unidentified actor using sophisticated techniques to exploit network security controls.
Information security
fromTechCrunch
3 weeks ago

The mystery of a globetrotting iPhone-hacking toolkit

A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
Information security
fromThe Cipher Brief
3 weeks ago

The Drone War's Real Problem Isn't Technology - It's Speed

Defense acquisition reforms implement recommended changes but fail to address the fundamental cycle-time gap between rapidly evolving adversary capabilities and the military's ability to deploy countermeasures.
Gadgets
fromThe Verge
2 months ago

Ring claims it's not giving ICE access to its cameras

Ring’s partnership with Flock sparked backlash over fears government agencies could access users’ footage; Ring says integration isn’t live and ICE receives no video.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
fromThe New Yorker
2 months ago

Russia Is Swarming Europe with Young Agents

Russian military intelligence is recruiting young people online to carry out arson and other acts of sabotage across Europe. In this week's issue, Joshua Yaffa reports on the Kremlin's secret campaign to undermine the West's support for Ukraine-and breaks down how "single-use agents" are being deployed across the Continent. Some of their missions are small-putting up posters, or picking up a package-while others involve physical attacks, for example setting off explosives and starting fires.
Business
Information security
fromtechcrunch.com
1 month ago

FBI investigating hack on its wiretap and surveillance systems: report

Hackers breached FBI networks managing wiretaps and foreign intelligence surveillance warrants, marking another major U.S. government cybersecurity incident amid ongoing threats from Chinese and Russian threat actors.
Business intelligence
fromSecuritymagazine
2 months ago

Private Sector Intelligence Careers

Private-sector intelligence roles require public-sector analytic skills plus explicit training in cognitive tradecraft, decision support, and structured reasoning for business contexts.
fromComputerworld
1 month ago

FBI wiretap system tapped by hackers

The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond.
Information security
UK politics
fromwww.theguardian.com
1 month ago

Senior police praised undercover officer who lied to court about identity, papers at spycops inquiry show

Senior police authorised undercover officers to lie in court, concealing identities and prejudicing activists' fair-trial rights, prompting overturned convictions and a public inquiry.
Information security
fromTechCrunch
1 month ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
fromNextgov.com
1 month ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
fromThe Cipher Brief
1 month ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
fromTheregister
2 months ago

How hackers fight back against ICE surveillance tech

The Electronic Frontier Foundation (EFF) has rounded up several of these counter surveillance projects, and perhaps unsurprisingly many of these have to do with Flock, best known for its automated license plate reader (ALPR). Flock operates the largest network of surveillance cameras in America, and, while it has contracts with thousands of police departments and municipalities across the US, sometimes ICE gains access to this footage, according to US Senator Ron Wyden (D-OR) and those who have looked into Flock's misuse.
Privacy technologies
US news
fromEmptywheel
2 months ago

NYPD's Spooks Didn't Find Two of the Most Significant Terrorists to Attempt Attacks on NYC

The NYPD built a secret intelligence unit targeting Muslim communities, using Israeli-derived mapping, informants in mosques, shredded records, and unofficial CIA links.
#ice-surveillance
US politics
fromEmptywheel
2 months ago

Drone War Secrecy and Kill or Capture

The NDAA and Obama-era drone program emphasize secrecy, legal resistance to declassification, and reliance on presidential authority for targeted killings.
Privacy professionals
fromWIRED
2 months ago

ICE Agents Are 'Doxing' Themselves

ICE List claims a leaked database of nearly 4,500 DHS employees but mainly aggregates publicly posted information, includes inaccuracies, and operates as a crowdsourced wiki.
US politics
fromThe Atlantic
2 months ago

The Real Reason ICE Agents Wear Masks

Federal agents empowered to use force must be publicly identifiable to ensure accountability; anonymity for such public servants is unjustified.
fromSecuritymagazine
1 month ago

Shadow AI: The Invisible Insider Threat

Shadow AI is the unsanctioned use of artificial intelligence tools outside of an organization's governance framework. In the healthcare field, clinicians and staff are increasingly using unvetted AI tools to improve efficiency, from transcription to summarization. Most of this activity is well-intentioned. But when AI adoption outpaces governance, sensitive data can quietly leave organizational control. Blocking AI outright isn't realistic. The more effective approach is to make safe, governed AI easier to use than unsafe alternatives.
Privacy professionals
US politics
fromwww.nytimes.com
1 month ago

Video: Opinion | The President's Personal Spy Chief

Tulsi Gabbard, as director of national intelligence, is undermining the independence and credibility of U.S. intelligence through politicized actions involving the 2020 election.
Privacy professionals
fromWIRED
2 months ago

Palantir Defends Work With ICE to Staff Following Killing of Alex Pretti

Palantir employees pressed leadership for transparency and reconsideration of the company's work with ICE after federal agents fatally shot Minneapolis nurse Alex Pretti.
US politics
fromEmptywheel
2 months ago

The Scandal of Lying about "Thwarted" "Plots" Started 4 Years Ago

Only one or two U.S. terrorist plots were actually thwarted by the Section 215 call-detail dragnet; the widely cited figure of 54 is incorrect.
US politics
fromEngadget
1 month ago

The Morning After: DOJ may face investigation over removal of ICE agent tracking apps

House Judiciary Committee requests DOJ communications with Apple and Google regarding removal of apps that shared sightings of US Immigration and Customs Enforcement officers.
Information security
fromEmptywheel
2 months ago

I Con the Record Admits All This Spying Also Serves Counterintelligence

The Intelligence Community uses online anonymity and networking tools to collect foreign intelligence, including counterintelligence and cybersecurity, while asserting legal limits on targeting US citizens.
US politics
fromThe Cipher Brief
1 month ago

From Secrets to Sensors: Why Open Source Data Must Drive Modern Intelligence

The intelligence community must rebuild on open-source data and commercial technology to enable DoD enterprise command-and-control and remain relevant to warfighters.
fromTechCrunch
2 months ago

Informant told FBI that Jeffrey Epstein had a 'personal hacker' | TechCrunch

A confidential informant told the FBI in 2017 that Jeffrey Epstein had a "personal hacker," according to a document released by the Department of Justice on Friday. The document, which was released as part of the Justice Department's legally required effort to publish documents related to its investigation into the late sex offender, does not identify who the alleged hacker was, but does include several details about them.
Information security
US politics
fromSlate Magazine
1 month ago

The Frightening, Very Real Tool ICE Agents Have to Add You to a "Nice Little Database" if You Attend a Protest

Federal agencies, led by DHS, have expanded use of administrative subpoena power to access individuals' information and track protesters without judicial oversight.
[ Load more ]