#bait-operations

[ follow ]
fromThe Cipher Brief
15 hours ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
fromwww.mediaite.com
11 hours ago

Weird Obsession With Death': Current and Former Defense Officials Sound the Alarm on Hegseth

Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Right-wing politics
#cia
US politics
fromBusiness Insider
2 months ago

How CIA black ops actually work, according to a former CIA spy

Former CIA counterterrorism chief in Pakistan who captured Al Qaeda members, survived an assassination attempt, disclosed CIA torture, and now consults, writes, and hosts podcasts.
World politics
fromThe Cipher Brief
1 month ago

Standing Up to a Spy: My Run-In with Aldrich Ames

A mid-level CIA analyst refused to approve a risky overseas conference, confronted aggressively by Aldrich Ames, and gained lasting professional and personal lessons.
#drones
fromThe Cipher Brief
2 days ago
Russo-Ukrainian War

Drones Are Changing Warfare And America Isn't Ready

Drones have transformed warfare, making surface assets vulnerable and necessitating a shift in defense strategies and infrastructure protection.
fromThe Atlantic
1 week ago
Russo-Ukrainian War

Who Is Spying on America's Nuclear Triad?

Ukraine effectively uses small drones in warfare, raising concerns about U.S. military preparedness for drone threats.
#us-military
US news
fromNextgov.com
2 days ago

As aircraft losses mount, Pentagon wants a software fix to see through the fog of war

U.S. planes in the Middle East lack a common operating picture, leading to communication errors and aircraft losses.
World news
fromwww.businessinsider.com
4 days ago

Why the US military risks so much to save downed airmen stuck behind enemy lines

US forces conducted high-risk missions in Iran to rescue a downed pilot, reaffirming the commitment to never leave an American behind.
World news
fromThe Walrus
4 days ago

A Daring US Rescue in Iran Highlights a War Going Sideways | The Walrus

The successful rescue of a downed US airman from Iran was crucial for military reputation and political standing amid an ongoing war.
World news
fromFortune
5 days ago

CIA deception campaign in Iran helped the spy agency uncover the location of the downed F-15 airman, who was hiding in a mountain crevice | Fortune

The U.S. successfully rescued two aviators from Iran after their fighter jet was shot down, employing a complex extraction strategy.
US news
fromNextgov.com
2 days ago

As aircraft losses mount, Pentagon wants a software fix to see through the fog of war

U.S. planes in the Middle East lack a common operating picture, leading to communication errors and aircraft losses.
World news
fromwww.businessinsider.com
4 days ago

Why the US military risks so much to save downed airmen stuck behind enemy lines

US forces conducted high-risk missions in Iran to rescue a downed pilot, reaffirming the commitment to never leave an American behind.
World news
fromThe Walrus
4 days ago

A Daring US Rescue in Iran Highlights a War Going Sideways | The Walrus

The successful rescue of a downed US airman from Iran was crucial for military reputation and political standing amid an ongoing war.
World news
fromFortune
5 days ago

CIA deception campaign in Iran helped the spy agency uncover the location of the downed F-15 airman, who was hiding in a mountain crevice | Fortune

The U.S. successfully rescued two aviators from Iran after their fighter jet was shot down, employing a complex extraction strategy.
Privacy professionals
fromWIRED
3 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
#ice
fromSilicon Canals
1 week ago
US politics

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

fromWIRED
2 months ago
US politics

ICE Pretends It's a Military Force. Its Tactics Would Get Real Soldiers Killed

ICE and other immigration enforcement agencies are adopting military-style equipment, tactics, and appearances, blurring civilian policing and combat roles and requiring evaluation as paramilitary forces.
fromTruthout
2 months ago
US politics

Who Are the Shadowy Contractors That Are Training ICE's Attack Teams?

Private security and weapons firms were contracted to train ICE snipers and special response teams amid expanded deportation funding and relaxed hiring and training standards.
US politics
fromSilicon Canals
1 week ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
1 week ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
fromWIRED
2 months ago
US politics

ICE Pretends It's a Military Force. Its Tactics Would Get Real Soldiers Killed

Roam Research
fromThe Cipher Brief
1 week ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
Artificial intelligence
fromNextgov.com
1 week ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Psychology
fromwww.theguardian.com
1 week ago

They feel true': political deepfakes are growing in influence even if people know they aren't real

Online content creators are fabricating people and images for propaganda and profit, blurring the lines between reality and fiction.
Information security
fromThe Hacker News
2 weeks ago

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A China-nexus threat actor has embedded itself in telecom networks for espionage, utilizing stealthy access mechanisms and advanced malware tools.
Python
fromAntocuni
2 weeks ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
Relationships
fromPsychology Today
2 weeks ago

5 Manipulation Tactics You Might Not See Until It's Too Late

Gaslighting, guilt-tripping, moving the goalposts, and triangulation are manipulative tactics that undermine reality and self-worth in relationships.
Fashion & style
fromWIRED
2 weeks ago

How American Camouflage Conquered the World

MultiCam, designed by Brooklyn creatives, has become a widely used camouflage pattern across various sectors, from military to civilian apparel.
History
from24/7 Wall St.
3 weeks ago

25 Weapons That Changed Warfare Over the Last Century

Technological breakthroughs over the last century transformed warfare by introducing tanks, missiles, stealth aircraft, and precision-guided weapons that forced armies to continuously adapt tactics and reshape military doctrine globally.
World news
fromThe Washington Post
1 week ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
Information security
fromSecurityWeek
3 weeks ago

Security Firm Executive Targeted in Sophisticated Phishing Attack

A C-level executive at Outpost24 was targeted by a sophisticated phishing attack using the Kratos phishing-as-a-service kit that exploited legitimate services like Cisco and Nylas to bypass security defenses.
Arts
fromFast Company
1 month ago

How camouflage became 'the original deception'

The International Spy Museum's camouflage exhibition explores deception techniques across nature and human applications, from animal coloration to military uniforms and espionage tactics.
Artificial intelligence
fromEngadget
3 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
World politics
fromwww.aljazeera.com
3 weeks ago

The battle on the propaganda front intensifies

Iran employs asymmetric economic tactics against U.S.-Israeli military superiority while misinformation complicates public understanding of the conflict.
Intellectual property law
fromwww.theguardian.com
1 month ago

What does the US military's feud with Anthropic mean for AI used in war?

Anthropic's refusal to allow Claude AI for domestic mass surveillance and autonomous weapons has triggered a Pentagon supply chain risk designation, highlighting tensions between tech company safety values and military demands.
fromMail Online
4 weeks ago

How Iran can bring the war to US soil in just days: Key targets MAPPED

All you would need is a ship under a foreign flag positioned offshore to launch hundreds of drones, or even a truck carrying them. When I served as deputy administrator at the National Nuclear Security Administration, overseeing nuclear programs, the drone threat was something we were deeply concerned about.
US politics
Information security
fromThe Hacker News
4 weeks ago

How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs

Modern phishing campaigns exploit trusted infrastructure and encrypted traffic, requiring SOCs to scale detection capabilities to prevent credential theft and operational disruption before attackers gain authenticated access.
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
World politics
fromwww.bbc.com
1 month ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
Information security
fromThe Hacker News
4 weeks ago

Attackers Don't Just Send Phishing Emails. They Weaponize Your SOC's Workload

Attackers deliberately overwhelm SOC analysts with high-volume phishing campaigns to delay investigations and create windows for successful breaches, making analyst capacity a critical vulnerability.
US politics
fromFortune
1 month ago

U.S. considers idea of special operation to seize Iran's uranium | Fortune

Trump administration considers deploying special forces to seize Iran's near-bomb-grade uranium as uncertainty grows about its location following military strikes.
World politics
fromThe Atlantic
1 month ago

An Air-Campaign Primer

Air campaigns offer unique advantages in concentration, speed, and flexibility, but differ fundamentally from ground operations in their goals, strengths, and inherent limitations.
Information security
fromThe Cipher Brief
1 month ago

The Drone War's Real Problem Isn't Technology - It's Speed

Defense acquisition reforms implement recommended changes but fail to address the fundamental cycle-time gap between rapidly evolving adversary capabilities and the military's ability to deploy countermeasures.
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
fromwww.scientificamerican.com
1 month ago

How to win The Traitors, according to science

We watch people lying, and we know they're lying. And also, you watch people dealing with lying not very well and not enjoying it. The lying, backstabbing and manipulation the game inspires does indeed make for delightful TV viewing.
Television
fromThe Cipher Brief
1 month ago

Cheap Drones, Expensive Consequences: The New Economics of War

For most of the twentieth century, airpower was one of the most costly components of military strength. Fighter jets, strategic bombers, and advanced missile systems necessitated massive financial investments, highly skilled personnel, and sophisticated logistical support networks. Only great military forces had the ability to sustain these capabilities.
World politics
Information security
fromTheregister
1 month ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
fromwww.theguardian.com
1 month ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
#navy-seals
Canada news
fromFuturism
2 months ago

Canadian Military Exploring Taliban-Like Insurgent Tactics to Repel American Invasion

Canada is pivoting away from the United States by forming a strategic partnership with China and drafting military plans to repel a potential US invasion.
World politics
fromBusiness Insider
1 month ago

The war with Iran is more evidence that winning the fights you can't see is critical in modern combat

US military operations increasingly rely on space and cyber forces to disrupt enemy capabilities before kinetic strikes, making non-kinetic warfare critical to modern combat effectiveness.
from24/7 Wall St.
2 months ago

How Precision Sniper Technology Reduced the Need for Massed Infantry

Infantry once relied on numbers to solve uncertainty. When soldiers could not see or hit targets precisely, the answer was more troops and more fire. Sniper technologies quietly overturned that logic. By extending range, improving accuracy, and increasing awareness, they allowed small teams to dominate space once controlled only by massed formations. Precision replaced presence, and patience became a battlefield advantage. Here, 24/7 Wall St. is taking a look at the sniper technologies that totally changed the game.
Science
fromInfoWorld
2 months ago

Stop treating force multiplication as a side gig. Make it intentional

Lead without authority. You may not have direct reports, yet you shape architecture, quality and the roadmap. Your leverage comes from artifacts, reviews and clear standards, not from title.I started by publishing a lightweight architecture template and a rollout checklist that the team could copy. That reduced ambiguity during design and cut review cycles by nearly 30 percent
DevOps
fromThe New Yorker
2 months ago

Russia Is Swarming Europe with Young Agents

Russian military intelligence is recruiting young people online to carry out arson and other acts of sabotage across Europe. In this week's issue, Joshua Yaffa reports on the Kremlin's secret campaign to undermine the West's support for Ukraine-and breaks down how "single-use agents" are being deployed across the Continent. Some of their missions are small-putting up posters, or picking up a package-while others involve physical attacks, for example setting off explosives and starting fires.
Business
US politics
fromMail Online
1 month ago

CIA memo reveals plot to turn citizens into political assassins

Project Artichoke was a classified CIA mind control program from 1951-1956 that attempted to create unwitting assassins through psychological manipulation and drug administration.
#precision-weapons
fromWashingtonian - The website that Washington lives by.
2 months ago

The Spy Museum's New Exhibit Explores the Hidden World of Camouflage - Washingtonian

The International Spy Museum will unveil its newest special exhibit, " Camouflage: Designed to Deceive," on March 1. The museum has previously featured artifacts that used elements of camouflage, like the Aston Martin V12 Vanquish with "adaptive camouflage" that appeared in the 2024 exhibit "Bond in Motion." For the first time, however, the Spy Museum will dedicate an all-new exhibit to exploring the history of camouflage, in an installation that will be on display for the next three years.
History
Information security
fromNextgov.com
1 month ago

Intelligence firms watch for uptick in Iran cyber activity after US, Israel strikes

Tehran-linked hackers are escalating digital reconnaissance and preparing potentially disruptive cyber operations following recent U.S. and Israeli strikes on Iran.
Information security
fromNextgov.com
1 month ago

Fake DOD memo about 'compromised' apps shows swift spread of deceptive messaging

A fake U.S. Cyber Command memo falsely claiming apps were compromised and revealing servicemembers' locations circulated during military channels, but DOD confirmed it was not authentic.
US politics
fromFortune
1 month ago

CIA's social media guide to evading Iranian internet restrictions racks up millions of views as Trump considers military action | Fortune

The CIA publicly recruited Iranian informants via social media in Farsi during escalating U.S.-Iran tensions and nuclear negotiations.
fromNextgov.com
2 months ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
US politics
fromEmptywheel
2 months ago

Drone War Secrecy and Kill or Capture

The NDAA and Obama-era drone program emphasize secrecy, legal resistance to declassification, and reliance on presidential authority for targeted killings.
World news
fromEmptywheel
2 months ago

Hybrid or Ambiguous, Asymmetric Warfare is Here to Stay

Asymmetric and ambiguous warfare doctrines from China and Russia anticipated cyber and hybrid attacks that the U.S. failed to adequately prepare for.
US politics
fromEmptywheel
2 months ago

Massive Obama Administration Leaks on Covert CIA Program Training Syrian Rebels

Numerous anonymous U.S. officials disclosed detailed information about a covert CIA program to train Syrian rebels while the CIA declined to comment.
fromThe Cipher Brief
2 months ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
US politics
fromThe Cipher Brief
2 months ago

The Country's First 'Cognitive Advantage' Chief: Influence Is the New Battlefield

Integrates information, perception, culture, and behavior operations to provide nonkinetic strategic options and counter adversary cognitive campaigns.
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
World news
fromTruthout
2 months ago

Pentagon Conducted Lethal Boat Strike With Aircraft Disguised as Civilian Plane

Disguising military aircraft as civilian planes constitutes perfidy and can be a war crime under international law and U.S. military rules.
fromwww.aljazeera.com
1 month ago

Are drones, AI making it harder to fight armed groups in the Sahel?

The brazen attack on the international airport and nearby military airbase in Niamey, Niger's capital, came overnight between January 28 and 29. Balls of orange fire flew across the sky as the Nigerien army attempted to respond while residents ducked for cover and whispered prayers, as shown in videos on social media. ISIL (ISIS) in Sahel Province, or ISSP a Niger-based outfit earlier known as the ISIL affiliate in the Greater Sahara or ISGS has since claimed responsibility
World news
US politics
fromThe Cipher Brief
1 month ago

Defending the Homeland: Pentagon Shifts Strategy on Drone Threats

DoD policy empowers commanders to use defensive measures, extend perimeters beyond installation fences, and counter UAS threats after an uncoordinated CBP laser incident.
US politics
fromABC7 Chicago
1 month ago

US military strikes another alleged drug boat in eastern Pacific, killing 3

U.S. military struck a reportedly drug-trafficking vessel in the Eastern Pacific, killing three and raising the strikes' known death toll to at least 148.
US politics
fromwww.mediaite.com
2 months ago

Senior FBI Official Describes Surreal' Call Where Kash Patel Dictated Social Media Strategy Right After Kirk Assassination

FBI Director Kash Patel prioritized scripting social-media responses over investigative actions following Charlie Kirk's assassination.
[ Load more ]