#cia-cooperation

[ follow ]
#cia
World politics
fromThe Cipher Brief
2 months ago

Standing Up to a Spy: My Run-In with Aldrich Ames

A mid-level CIA analyst refused to approve a risky overseas conference, confronted aggressively by Aldrich Ames, and gained lasting professional and personal lessons.
US politics
fromBusiness Insider
2 months ago

How CIA black ops actually work, according to a former CIA spy

Former CIA counterterrorism chief in Pakistan who captured Al Qaeda members, survived an assassination attempt, disclosed CIA torture, and now consults, writes, and hosts podcasts.
World news
fromSlate Magazine
2 hours ago

The Surprisingly Anticlimactic End to America's War Against al-Qaida

Sayf al-Adl, an al-Qaida operative, remains elusive despite U.S. military actions, raising questions about the group's leadership and operational strength.
Artificial intelligence
fromTechCrunch
20 hours ago

NSA spies are reportedly using Anthropic's Mythos, despite Pentagon feud | TechCrunch

The NSA is reportedly using Anthropic's Mythos model for cybersecurity despite previous tensions over access to AI capabilities.
#anthropic
fromAxios
1 day ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

fromAxios
1 day ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

US news
fromwww.npr.org
1 day ago

U.K police investigating if attacks in London are the work of Iranian proxies

London police investigate arson attacks on Jewish sites, suspecting Iranian proxies may be involved.
fromwww.aljazeera.com
1 day ago

Did the US misjudge Iran? A military strategist answers

Washington's military objectives have shifted significantly, moving from a focus on regime change to merely claiming success in its operations against Iran.
World politics
#cybersecurity
fromSilicon Canals
1 week ago
Information security

How Russia's GRU turned $50 routers into a global intelligence platform spanning 120 countries - Silicon Canals

Information security
fromThe Cipher Brief
5 days ago

Copy of Trump's Cyber Strategy Is a Strong Playbook, but It's All in the Execution

The National Cyber Strategy aims to enhance U.S. national security through aggressive defense and collaboration with the private sector.
Information security
fromSilicon Canals
1 week ago

How Russia's GRU turned $50 routers into a global intelligence platform spanning 120 countries - Silicon Canals

Russia's GRU hijacked consumer routers to create a global intelligence platform, compromising 18,000 devices for surveillance and credential harvesting.
US politics
fromNextgov.com
4 days ago

Secret Service is embracing new solutions to combat malicious drones, director says

The U.S. Secret Service is adopting kinetic mitigation technologies to counter drone threats for upcoming large-scale events.
Privacy professionals
fromWIRED
4 days ago

Congress Turns Up Pressure on DHS Over Palantir's Role in Immigration Crackdown

Members of Congress demand DHS and ICE disclose details on surveillance tools used in immigration enforcement.
World news
fromwww.theguardian.com
3 hours ago

US restricts intelligence sharing with South Korea' after minister identified suspected nuclear site

The US has restricted intelligence sharing with South Korea after a minister identified a suspected North Korean nuclear site publicly.
#pentagon
Washington DC
fromNextgov.com
5 days ago

Pentagon announces senior appointments to CIO's office

Five officials appointed to the Pentagon's CIO office to enhance technology management and drive transformation.
Washington DC
fromNextgov.com
5 days ago

Pentagon announces senior appointments to CIO's office

Five officials appointed to the Pentagon's CIO office to enhance technology management and drive transformation.
fromThe Cipher Brief
1 week ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
#iran
fromwww.mediaite.com
1 day ago
World news

Expert Tells 60 Minutes That Thousands of U.S. Troops Would Be Needed To Retrieve Iran's Highly-Enriched Uranium

Privacy professionals
fromAxios
2 weeks ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromTechCrunch
2 weeks ago

Iran threatens 'Stargate' AI data centers | TechCrunch

Iran threatens retaliation against U.S. data centers in response to ongoing military actions and threats from the United States.
fromwww.mediaite.com
1 day ago
World news

Expert Tells 60 Minutes That Thousands of U.S. Troops Would Be Needed To Retrieve Iran's Highly-Enriched Uranium

Privacy professionals
fromAxios
2 weeks ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World news
fromTechCrunch
2 weeks ago

Iran threatens 'Stargate' AI data centers | TechCrunch

Iran threatens retaliation against U.S. data centers in response to ongoing military actions and threats from the United States.
Roam Research
fromThe Cipher Brief
3 weeks ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
Artificial intelligence
fromFortune
3 days ago

AI cybersecurity capabilities require urgent international cooperation, AI godfather Bengio says | Fortune

Yoshua Bengio emphasizes the urgent need for international cooperation in addressing AI's risks, particularly with the release of Anthropic's Mythos model.
#ice
fromTechCrunch
2 weeks ago
US politics

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
fromSilicon Canals
2 weeks ago
US politics

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
2 weeks ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
US politics
fromSilicon Canals
2 weeks ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
#us-military
World news
fromwww.aljazeera.com
6 days ago

US forces kill 4 people in latest strike on vessels in eastern Pacific

The US military conducted its fourth deadly strike in four days against vessels in the eastern Pacific, claiming the targets were narco-terrorists.
World news
fromFortune
2 weeks ago

CIA deception campaign in Iran helped the spy agency uncover the location of the downed F-15 airman, who was hiding in a mountain crevice | Fortune

The U.S. successfully rescued two aviators from Iran after their fighter jet was shot down, employing a complex extraction strategy.
World news
fromwww.aljazeera.com
6 days ago

US forces kill 4 people in latest strike on vessels in eastern Pacific

The US military conducted its fourth deadly strike in four days against vessels in the eastern Pacific, claiming the targets were narco-terrorists.
World news
fromFortune
2 weeks ago

CIA deception campaign in Iran helped the spy agency uncover the location of the downed F-15 airman, who was hiding in a mountain crevice | Fortune

The U.S. successfully rescued two aviators from Iran after their fighter jet was shot down, employing a complex extraction strategy.
#espionage
Germany news
fromenglish.elpais.com
3 weeks ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Germany news
fromenglish.elpais.com
3 weeks ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Artificial intelligence
fromNextgov.com
2 weeks ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
fromNextgov.com
3 weeks ago

ODNI is building a framework to boost spy agencies' AI adoption

"Protecting our nation's most sensitive information from those who seek to exploit it, while making sure our intelligence professionals have the tools and access they need to do their jobs, is not optional; it is essential to our national security."
Information security
fromTheregister
3 weeks ago

Indian government probes CCTV espionage linked to Pakistan

Indian authorities have reportedly ordered an audit of the nation's CCTV cameras, after police uncovered what they claim was a Pakistan-backed surveillance operation involving cameras aimed at railway stations and other infrastructure.
Privacy professionals
Information security
fromNextgov.com
3 weeks ago

New NSA director pushes for more intel-sharing with allies in internal meeting

Gen. Josh Rudd emphasizes enhanced intelligence-sharing with allies and a focus on foreign adversaries like Russia and China.
World news
fromThe Washington Post
2 weeks ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
fromBusiness Insider
1 month ago

Ex-CIA Chief Officer shares a near-death mission that ended in a rush, followed shortly by his divorce

His first wife wasn't in the CIA, and didn't know he worked for the government agency. He couldn't tell her where he'd actually been that day or why he'd sometimes come home late. Even harmless details he couldn't share with her, he said. He'd come home, and she'd ask how his day was, what he'd done, and who he'd interacted with, and he recalled only giving one-word answers like "great," "nothing," and "nobody."
London politics
World politics
fromThe Cipher Brief
1 month ago

How GEOINT Can Sustain US Advantages in Africa

Geospatial intelligence enables the US Intelligence Community to monitor African security, economic, and humanitarian challenges across dispersed regions with limited physical access.
#counter-terrorism
UK news
fromwww.theguardian.com
1 month ago

UK counter-terrorism agents granted more time to question men suspected of spying for Iran

Four men arrested on suspicion of spying for Iran on Jewish community locations and individuals in Britain can be held in custody until 13 March for questioning.
UK news
fromwww.theguardian.com
1 month ago

UK counter-terrorism agents granted more time to question men suspected of spying for Iran

Four men arrested on suspicion of spying for Iran on Jewish community locations and individuals in Britain can be held in custody until 13 March for questioning.
Information security
fromThe Cipher Brief
1 month ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
fromwww.theguardian.com
1 month ago

Ex-CIA analyst David McCloskey on the Mossad's intelligence inside Iran: I was surprised'

From what I have seen on open-source intelligence, the Israelis had essentially developed a capability to tap existing public CCTV networks in Tehran and then layered on top of that, a bunch of data integration software that enable them to build targeting packages on senior leaders. My sense is that there was a US-sourced piece of humint that was then able to be fed into that model.
US politics
Science
fromArs Technica
1 month ago

Satellite firm pauses imagery after revealing Iran's attacks on US bases

Planet Labs implemented a 96-hour delay on satellite imagery from Gulf States, Iraq, and Kuwait to prevent adversarial actors from using damage assessment data during Middle East conflict.
#cyber-warfare
World politics
fromwww.bbc.com
1 month ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
World news
fromenglish.elpais.com
1 month ago

Why Iran is targeting the artificial intelligence infrastructure of Gulf countries

Iran's drone attacks on Arab Gulf data centers represent unprecedented military targeting of digital infrastructure, exposing critical vulnerabilities in regional economic diversification and AI development strategies.
World politics
fromwww.bbc.com
1 month ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
World news
fromenglish.elpais.com
1 month ago

Why Iran is targeting the artificial intelligence infrastructure of Gulf countries

Iran's drone attacks on Arab Gulf data centers represent unprecedented military targeting of digital infrastructure, exposing critical vulnerabilities in regional economic diversification and AI development strategies.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
US politics
fromwww.mediaite.com
1 month ago

Trump Claims to Know Where Iran's Sleeper Cells Are. Why Isn't He Arresting Them?

President Trump claimed federal authorities have identified and are monitoring Iranian operatives who entered the U.S. during Biden's presidency, but reporters failed to press him on this significant national security assertion.
fromThe New Yorker
2 months ago

Russia Is Swarming Europe with Young Agents

Russian military intelligence is recruiting young people online to carry out arson and other acts of sabotage across Europe. In this week's issue, Joshua Yaffa reports on the Kremlin's secret campaign to undermine the West's support for Ukraine-and breaks down how "single-use agents" are being deployed across the Continent. Some of their missions are small-putting up posters, or picking up a package-while others involve physical attacks, for example setting off explosives and starting fires.
Business
Germany news
fromwww.dw.com
1 month ago

Is Germany increasingly targeted by Iranian intelligence?

German security authorities warn of potential Iranian retaliatory attacks targeting Jewish institutions, Israeli sites, and Iranian opposition members following US-Israeli strikes on Iran.
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
Information security
fromSecurityWeek
1 month ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
fromNextgov.com
2 months ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
Washington DC
fromThe Washington Post
1 month ago

CIA station in Saudi capital hit in drone attack

Iranian drones struck the CIA station at the U.S. Embassy in Riyadh, causing structural damage and roof collapse, though no personnel were reported wounded.
#iran-nuclear-program
World news
fromLondon Business News | Londonlovesbusiness.com
1 month ago

US and Israel 'consider special forces raid' to seize Iran's enriched uranium - London Business News | Londonlovesbusiness.com

The United States and Israel are discussing a potential special forces operation to seize Iran's highly enriched uranium stockpile to prevent nuclear weapon development.
US news
fromwww.scientificamerican.com
2 months ago

U.S. quietly declassifies ColdWar era JUMPSEAT' surveillance satellites

Declassified JUMPSEAT satellites, launched 1971–1987, provided space-based signals intelligence on adversary weapons and were decommissioned in 2006.
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
Privacy professionals
fromTechCrunch
2 months ago

Senator, who has repeatedly warned about secret U.S. government surveillance, sounds new alarm over 'CIA activities' | TechCrunch

Sen. Ron Wyden, with access to classified intelligence, expressed deep concerns about CIA activities, highlighting secrecy, oversight limits, and a contentious agency response.
fromIrish Independent
1 month ago

Hostages, sanctions and CIA coups: How the US and Iran became sworn enemies

For more than 40 years, the relationship between the United States and Iran has been defined by hostility, sanctions, proxy wars and the ever-present fear of nuclear escalation. But it was not always that way. In fact, America once backed the Shah of Iran, helped develop the country's nuclear programme under its Atoms for Peace initiative and counted Tehran as one of its key Middle Eastern allies.
World politics
Information security
fromTheregister
1 month ago

Iran intelligence backdoored US bank, airport networks

Iranian MOIS-linked MuddyWater cyber crew embedded in US and international networks since February, including banks, software firms, and airports, with increased activity following US-Israeli military strikes.
US politics
fromFortune
1 month ago

CIA's social media guide to evading Iranian internet restrictions racks up millions of views as Trump considers military action | Fortune

The CIA publicly recruited Iranian informants via social media in Farsi during escalating U.S.-Iran tensions and nuclear negotiations.
US politics
fromEmptywheel
2 months ago

Massive Obama Administration Leaks on Covert CIA Program Training Syrian Rebels

Numerous anonymous U.S. officials disclosed detailed information about a covert CIA program to train Syrian rebels while the CIA declined to comment.
fromwww.aljazeera.com
1 month ago

US downplays reports Russia gave Iran intel to help Tehran strike US assets

Since the war began on February 28, Russia has passed Iran the locations of US military assets, including warships and aircraft, three officials, who spoke on the condition of anonymity, told The Washington Post. It does seem like it's a pretty comprehensive effort, one of the sources told the newspaper.
World news
fromDataBreaches.Net
1 month ago

CISA Releases New Guidance on Assembling Multi-Disciplinary Insider Threat Management Teams - DataBreaches.Net

CISA's guidance is intended to assist critical infrastructure stakeholders, which includes private sector entities across various sectors, with implementing an insider threat mitigation program that combines physical security, cybersecurity, personnel awareness, and community partnerships. Although framed for critical infrastructure, CISA's guidance is relevant to a broader range of organizations, including those outside of critical infrastructure sectors.
Information security
fromNextgov.com
2 months ago

AI info-sharing center is in development, CISA official says

We just want to make sure we've got the right elements of, how do we pull together people, and how do we take advantage of the leadership position that we have
Information security
US politics
fromNextgov.com
2 months ago

CIA announces new acquisition framework to speed tech adoption

The CIA implemented a centralized, streamlined acquisition framework to speed vendor vetting, IT authorization, and rapid procurement of breakthrough technologies for urgent national security missions.
US politics
fromEmptywheel
2 months ago

Drone War Secrecy and Kill or Capture

The NDAA and Obama-era drone program emphasize secrecy, legal resistance to declassification, and reliance on presidential authority for targeted killings.
Information security
fromNextgov.com
1 month ago

Intelligence firms watch for uptick in Iran cyber activity after US, Israel strikes

Tehran-linked hackers are escalating digital reconnaissance and preparing potentially disruptive cyber operations following recent U.S. and Israeli strikes on Iran.
US politics
fromWIRED
2 months ago

Inside the Homeland Security Forum Where ICE Agents Talk Shit About Other Agents

HSI forum members criticize ERO's paramilitary tactics, express discomfort with mass deportations, debate agent-public interactions, and complain about working conditions.
US politics
fromwww.mediaite.com
1 month ago

High Alert': DHS and FBI Monitoring Potential Threats on US Soil During Strikes on Iran

U.S. homeland security officials are coordinating enhanced monitoring and threat prevention measures following military action against Iran.
US politics
fromTheregister
2 months ago

CISA insider-threat warning comes with an ironic twist

Insider threats are among the most serious security risks and require multidisciplinary teams and decisive action to detect, mitigate, and prevent damage.
fromThe Cipher Brief
2 months ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
US politics
fromMail Online
1 month ago

CIA memo reveals plot to turn citizens into political assassins

Project Artichoke was a classified CIA mind control program from 1951-1956 that attempted to create unwitting assassins through psychological manipulation and drug administration.
World news
fromThe Washington Post
2 months ago

Pentagon conducts strikes on three more alleged drug boats, killing 11

U.S. strikes on small suspected drug boats increased, killing 11 in three attacks as warships are redirected from Venezuela to the Middle East.
US politics
fromwww.nytimes.com
2 months ago

Video: Opinion | The President's Personal Spy Chief

Tulsi Gabbard, as director of national intelligence, is undermining the independence and credibility of U.S. intelligence through politicized actions involving the 2020 election.
US politics
fromEmptywheel
2 months ago

The Scandal of Lying about "Thwarted" "Plots" Started 4 Years Ago

Only one or two U.S. terrorist plots were actually thwarted by the Section 215 call-detail dragnet; the widely cited figure of 54 is incorrect.
[ Load more ]