#cloaking-tactics

[ follow ]
#anthropic
fromAxios
10 hours ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

fromAxios
10 hours ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

fromPsychology Today
2 days ago

The Effects of Media Depictions or Mediaspeak on War

A whole vocabulary of mediaspeak terms applied to real life has gradually emerged. Included here, among others, are: collateral damage, neutralized, canceled, surgical strike, playbook, rules of the game, high-value target, and gamechanger.
World politics
#cybersecurity
fromThe Hacker News
6 days ago
Information security

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
fromThe Hacker News
3 weeks ago
Information security

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A China-nexus threat actor has embedded itself in telecom networks for espionage, utilizing stealthy access mechanisms and advanced malware tools.
Information security
fromThe Cipher Brief
4 days ago

Copy of Trump's Cyber Strategy Is a Strong Playbook, but It's All in the Execution

The National Cyber Strategy aims to enhance U.S. national security through aggressive defense and collaboration with the private sector.
Information security
fromThe Hacker News
6 days ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Information security
fromThe Hacker News
3 weeks ago

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A China-nexus threat actor has embedded itself in telecom networks for espionage, utilizing stealthy access mechanisms and advanced malware tools.
Social media marketing
fromAxios
5 days ago

The first AI-era war is a "slopaganda" battle to control memes

AI-generated content is rapidly spreading propaganda, making it easier for influencers to adopt conspiracy theories.
US politics
fromTruthout
3 days ago

US Carries Out Fifth Boat Strike in Under a Week, Bringing Death Toll to 177

The Trump administration's military actions against alleged drug traffickers lack evidence and have resulted in civilian casualties in Latin America.
#drones
fromAxios
4 days ago
Roam Research

Exclusive: U.K.-Ukraine duo beats Americans at their own drone game

fromAxios
4 days ago
Roam Research

Exclusive: U.K.-Ukraine duo beats Americans at their own drone game

#us-military
World news
fromwww.aljazeera.com
4 days ago

US forces kill 4 people in latest strike on vessels in eastern Pacific

The US military conducted its fourth deadly strike in four days against vessels in the eastern Pacific, claiming the targets were narco-terrorists.
World news
fromFortune
2 weeks ago

CIA deception campaign in Iran helped the spy agency uncover the location of the downed F-15 airman, who was hiding in a mountain crevice | Fortune

The U.S. successfully rescued two aviators from Iran after their fighter jet was shot down, employing a complex extraction strategy.
World news
fromwww.aljazeera.com
4 days ago

US forces kill 4 people in latest strike on vessels in eastern Pacific

The US military conducted its fourth deadly strike in four days against vessels in the eastern Pacific, claiming the targets were narco-terrorists.
World news
fromFortune
2 weeks ago

CIA deception campaign in Iran helped the spy agency uncover the location of the downed F-15 airman, who was hiding in a mountain crevice | Fortune

The U.S. successfully rescued two aviators from Iran after their fighter jet was shot down, employing a complex extraction strategy.
#drone-warfare
Germany news
fromThe Atlantic
3 weeks ago

Who Needs Tanks In the Age of Drones?

Rheinmetall's CEO dismisses Ukraine's drone innovations, viewing them as simplistic compared to traditional military technology.
Germany news
fromThe Atlantic
3 weeks ago

Who Needs Tanks In the Age of Drones?

Rheinmetall's CEO dismisses Ukraine's drone innovations, viewing them as simplistic compared to traditional military technology.
Philosophy
fromPsychology Today
6 days ago

When Leaders Go to War, Their Psychology Goes With Them

Narcissistic leaders often emerge due to fragile egos, leading to decisions that prioritize self-preservation over the well-being of others.
Artificial intelligence
fromFortune
4 days ago

A retired general's warning: America can't fight the AI arms race on tech it doesn't control | Fortune

The U.S. faces a critical AI arms race affecting military power and national security, highlighted by the Anthropic-Pentagon standoff over AI usage control.
Privacy professionals
fromWIRED
1 week ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
World politics
fromThe Atlantic
5 days ago

How Should the U.S. Military Fight?

General McChrystal's directive for restraint in Afghanistan aimed to win local support and avoid civilian casualties, despite pushback from frontline troops.
Roam Research
fromwww.businessinsider.com
6 days ago

The US Army surged its largest counter-drone training deployment to the Middle East during the Iran war

The US Army has launched its largest counter-drone training mission in the Middle East amid the Iran war, utilizing the Merops system.
#cia
Psychology
fromwww.theguardian.com
3 weeks ago

They feel true': political deepfakes are growing in influence even if people know they aren't real

Online content creators are fabricating people and images for propaganda and profit, blurring the lines between reality and fiction.
Fashion & style
fromWIRED
3 weeks ago

How American Camouflage Conquered the World

MultiCam, designed by Brooklyn creatives, has become a widely used camouflage pattern across various sectors, from military to civilian apparel.
Relationships
fromPsychology Today
3 weeks ago

5 Manipulation Tactics You Might Not See Until It's Too Late

Gaslighting, guilt-tripping, moving the goalposts, and triangulation are manipulative tactics that undermine reality and self-worth in relationships.
Artificial intelligence
fromNextgov.com
2 weeks ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
World news
fromThe Washington Post
2 weeks ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
History
from24/7 Wall St.
1 month ago

25 Weapons That Changed Warfare Over the Last Century

Technological breakthroughs over the last century transformed warfare by introducing tanks, missiles, stealth aircraft, and precision-guided weapons that forced armies to continuously adapt tactics and reshape military doctrine globally.
Arts
fromFast Company
1 month ago

How camouflage became 'the original deception'

The International Spy Museum's camouflage exhibition explores deception techniques across nature and human applications, from animal coloration to military uniforms and espionage tactics.
Miscellaneous
fromBusiness Insider
1 month ago

NATO's Arctic artillery forces are learning to dig, hide, and move to dodge drones

NATO artillery units are adapting tactics from Ukraine's drone warfare, prioritizing camouflage and strategic positioning over traditional mobility-based defense strategies.
World news
fromwww.aljazeera.com
4 weeks ago

War spirals as information control tightens

The war on Iran has escalated with increased leadership assassinations, a blockade of the Strait of Hormuz, and strikes on energy infrastructure.
fromMail Online
1 month ago

How Iran can bring the war to US soil in just days: Key targets MAPPED

All you would need is a ship under a foreign flag positioned offshore to launch hundreds of drones, or even a truck carrying them. When I served as deputy administrator at the National Nuclear Security Administration, overseeing nuclear programs, the drone threat was something we were deeply concerned about.
US politics
Artificial intelligence
The Pentagon awarded $200 million each to four tech companies for advanced AI models, with Anthropic later imposing restrictions on military use for domestic surveillance and autonomous weapons.
fromThe New Yorker
1 month ago

War in the Age of the Online "Information Bomb"

On TikTok, the war against Iran began with a series of videos from influencer types in Dubai, Doha, and elsewhere in the Middle East. They sat on restaurant patios or on hotel-room balconies and pointed their phone cameras skyward to document missiles flying through the air of their respective cities, then disappearing into puffs of smoke as they were shot down.
Social media marketing
Russo-Ukrainian War
fromBusiness Insider
1 month ago

US Marines are on the hunt for a cloak they can wear to hide themselves from thermal-imaging sensors

The Marine Corps is developing a multispectral camouflage overgarment to shield Marines from thermal-imaging detection used by drones and surveillance systems on modern battlefields.
Artificial intelligence
fromEngadget
1 month ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
World news
fromwww.npr.org
1 month ago

Cheap drones are reshaping modern warfare and catching the U.S. off guard

Iran's relatively inexpensive drones are depleting U.S. interceptor missile supplies faster than anticipated, raising concerns about sustained defense capability in the Middle East.
World politics
fromwww.aljazeera.com
1 month ago

The battle on the propaganda front intensifies

Iran employs asymmetric economic tactics against U.S.-Israeli military superiority while misinformation complicates public understanding of the conflict.
Intellectual property law
fromwww.theguardian.com
1 month ago

What does the US military's feud with Anthropic mean for AI used in war?

Anthropic's refusal to allow Claude AI for domestic mass surveillance and autonomous weapons has triggered a Pentagon supply chain risk designation, highlighting tensions between tech company safety values and military demands.
#precision-weapons
Information security
fromSecurityWeek
1 month ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
fromwww.scientificamerican.com
1 month ago

How to win The Traitors, according to science

We watch people lying, and we know they're lying. And also, you watch people dealing with lying not very well and not enjoying it. The lying, backstabbing and manipulation the game inspires does indeed make for delightful TV viewing.
Television
Media industry
fromFortune
2 months ago

I'm a war gamer for the Navy and I know why you don't trust the media anymore. It's fighting yesterday's battles | Fortune

Journalism struggles to keep pace with real-time war information, causing perceived bias due to temporal lag and eroding public trust.
Canada news
fromFuturism
2 months ago

Canadian Military Exploring Taliban-Like Insurgent Tactics to Repel American Invasion

Canada is pivoting away from the United States by forming a strategic partnership with China and drafting military plans to repel a potential US invasion.
fromNextgov.com
2 months ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
fromwww.dw.com
1 month ago

Fact check: Are China's robot soldiers just AI fakes?

A dozen humanoid robots stand in front of a snow-covered mountain range. They hold machine guns and run across a shooting range, kneeling down to shoot at targets and change magazines, then maneuvering through an obstacle course. The setting for these scenes in a 48-second video currently circulating on social media is supposedly China, with the national flag flying in the background. But is it real? In many languages, such as Turkish shown here, the claim spread that the video shows a real military exercise.
Tech industry
Gadgets
from24/7 Wall St.
2 months ago

How Navy SEAL Weapons Reveal the Evolution of Modern Warfare

Navy SEAL weapon choices shifted toward modular, precise, adaptable systems prioritizing mobility, night capability, and speed to meet urban, indoor, and close-quarters modern combat requirements.
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
#cyber-warfare
World politics
fromwww.bbc.com
1 month ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
World politics
fromwww.bbc.com
1 month ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
Information security
fromThe Hacker News
1 month ago

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

APT28, a Russian state-sponsored hacking group, has deployed BEARDSHELL and COVENANT malware since April 2024 to conduct long-term surveillance of Ukrainian military personnel.
US politics
fromThe Cipher Brief
2 months ago

Defending the Homeland: Pentagon Shifts Strategy on Drone Threats

DoD policy empowers commanders to use defensive measures, extend perimeters beyond installation fences, and counter UAS threats after an uncoordinated CBP laser incident.
Information security
fromThe Cipher Brief
1 month ago

The Drone War's Real Problem Isn't Technology - It's Speed

Defense acquisition reforms implement recommended changes but fail to address the fundamental cycle-time gap between rapidly evolving adversary capabilities and the military's ability to deploy countermeasures.
Science
fromThe Cipher Brief
2 months ago

Autonomy on the Battlefield

Autonomy enables commanders to delegate control to machines while retaining command, requiring a fundamental mindset shift and clear frameworks for authority and responsibility.
World politics
fromThe Atlantic
1 month ago

An Air-Campaign Primer

Air campaigns offer unique advantages in concentration, speed, and flexibility, but differ fundamentally from ground operations in their goals, strengths, and inherent limitations.
US politics
fromFortune
1 month ago

CIA's social media guide to evading Iranian internet restrictions racks up millions of views as Trump considers military action | Fortune

The CIA publicly recruited Iranian informants via social media in Farsi during escalating U.S.-Iran tensions and nuclear negotiations.
Information security
fromTheregister
1 month ago

Manage attack infrastructure? AI agents can now help

AI agents enable cybercriminals and nation-state hackers to automate reconnaissance, infrastructure management, and attack planning, significantly increasing the speed and scale of cyberattacks.
US politics
fromEmptywheel
2 months ago

Drone War Secrecy and Kill or Capture

The NDAA and Obama-era drone program emphasize secrecy, legal resistance to declassification, and reliance on presidential authority for targeted killings.
fromTheregister
1 month ago

US struck Iran with copies of its own drones

The first hours of the operation included precision munitions launched from air, land, and sea. Additionally, CENTCOM's Task Force Scorpion Strike employed low-cost one-way attack drones for the first time in combat.
Russo-Ukrainian War
World news
fromEmptywheel
2 months ago

Hybrid or Ambiguous, Asymmetric Warfare is Here to Stay

Asymmetric and ambiguous warfare doctrines from China and Russia anticipated cyber and hybrid attacks that the U.S. failed to adequately prepare for.
fromwww.theguardian.com
1 month ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
World politics
fromBusiness Insider
1 month ago

The war with Iran is more evidence that winning the fights you can't see is critical in modern combat

US military operations increasingly rely on space and cyber forces to disrupt enemy capabilities before kinetic strikes, making non-kinetic warfare critical to modern combat effectiveness.
fromWIRED
2 months ago

ICE Pretends It's a Military Force. Its Tactics Would Get Real Soldiers Killed

As a veteran of the war on terror, I have spent the past year watching Immigration and Customs Enforcement officers expand their operations across the country on a heretofore unprecedented scale and with a new faux-military bearing. From equipment to weapons to tactics, ICE and other immigration enforcement bodies want to be seen as combat forces carrying out their missions.
US politics
Artificial intelligence
fromBusiness Insider
1 month ago

The government's AI standoff could decide who really controls America's military tech

The Trump administration blacklisted Anthropic over refusal to allow military use of its AI for surveillance and autonomous weapons, while OpenAI secured a Pentagon defense contract, intensifying competition over AI control in national security.
World politics
fromBusiness Insider
1 month ago

Used by Iran, Russia, and now the US, the cheap Shahed is reshaping modern war

The Shahed drone, an inexpensive Iranian-designed weapon, has become a defining weapon of modern conflict, adopted and copied by Russia and the United States, fundamentally changing warfare tactics and defense strategies.
Artificial intelligence
fromTheregister
1 month ago

AIs are happy to launch nukes in simulated combat scenarios

Advanced AI models repeatedly escalated to nuclear warfare in crisis simulations, revealing they lack understanding of mutual destruction deterrence and engage in deceptive strategic behavior.
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
Information security
fromSecurityWeek
1 month ago

In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators

Predator spyware suppresses iOS indicators through kernel-level access, Russian cyberattacks on Ukraine's energy grid gather intelligence for missile targeting, and Treasury launches AI cybersecurity initiative for financial services.
Information security
fromNextgov.com
1 month ago

Fake DOD memo about 'compromised' apps shows swift spread of deceptive messaging

A fake U.S. Cyber Command memo falsely claiming apps were compromised and revealing servicemembers' locations circulated during military channels, but DOD confirmed it was not authentic.
Information security
fromNextgov.com
1 month ago

Intelligence firms watch for uptick in Iran cyber activity after US, Israel strikes

Tehran-linked hackers are escalating digital reconnaissance and preparing potentially disruptive cyber operations following recent U.S. and Israeli strikes on Iran.
Information security
fromSecurityWeek
2 months ago

Hacktivists, State Actors, Cybercriminals Target Global Defense Industry, Google Warns

Hacktivists, state-sponsored actors, and cybercriminals are intensifying attacks on the global defense industrial base using espionage, ransomware, and LLM-assisted techniques.
[ Load more ]