#shadow-war

[ follow ]
#russia
Europe politics
fromwww.thelocal.se
8 hours ago

Swedish intelligence says Russia manipulates economic data

Russia is manipulating economic data to project resilience despite a weak economy and ongoing strategic military objectives.
Russo-Ukrainian War
fromwww.aljazeera.com
1 day ago

Russia claims Ukraine-linked bomb plot foiled, German woman arrested

Russia's FSB arrested a German woman linked to a thwarted bomb plot against security services, allegedly orchestrated by Ukraine.
Artificial intelligence
fromTechCrunch
1 day ago

NSA spies are reportedly using Anthropic's Mythos, despite Pentagon feud | TechCrunch

The NSA is reportedly using Anthropic's Mythos model for cybersecurity despite previous tensions over access to AI capabilities.
#iran
World politics
fromwww.aljazeera.com
5 days ago

Why the Iran war did not go according to US plans

Washington miscalculated Iran's strategy, leading to a prolonged conflict with significant military, economic, and political costs.
Privacy professionals
fromAxios
2 weeks ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
World politics
fromwww.aljazeera.com
5 days ago

Why the Iran war did not go according to US plans

Washington miscalculated Iran's strategy, leading to a prolonged conflict with significant military, economic, and political costs.
Privacy professionals
fromAxios
2 weeks ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
US news
fromwww.npr.org
1 day ago

U.K police investigating if attacks in London are the work of Iranian proxies

London police investigate arson attacks on Jewish sites, suspecting Iranian proxies may be involved.
World news
fromSlate Magazine
6 hours ago

The Surprisingly Anticlimactic End to America's War Against al-Qaida

Sayf al-Adl, an al-Qaida operative, remains elusive despite U.S. military actions, raising questions about the group's leadership and operational strength.
fromLondon Business News | Londonlovesbusiness.com
1 day ago

SAS soldiers quit amid fears of 'witch hunts' over the 'betrayal' of war crimes probes - London Business News | Londonlovesbusiness.com

Many sources have informed The Telegraph that personnel have submitted applications for premature voluntary release, with departures from the regiment described as significant and even considered a 'threat to national security.'
SF politics
#cia
#anthropic
fromAxios
1 day ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

fromAxios
1 day ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

#trump
US Elections
fromwww.mediaite.com
1 day ago

Trump Sidelined by His Own Aides in Daring Iran Rescue Over Fears He'd Jeopardize Mission: WSJ

Trump's aides kept him away from the Situation Room during a rescue mission to avoid jeopardizing the operation due to his impatience.
fromThe Local Germany
1 day ago

Russia arrests German woman in alleged bomb plot

The FSB security agency stated that the woman, born in 1969, had been dragged into the alleged plot by a citizen from a Central Asian country, who was working on orders from Ukraine.
Germany news
fromwww.aljazeera.com
1 day ago

Did the US misjudge Iran? A military strategist answers

Washington's military objectives have shifted significantly, moving from a focus on regime change to merely claiming success in its operations against Iran.
World politics
London politics
fromwww.aljazeera.com
1 day ago

Met Police investigate potential Iran links to London arson attacks

Recent arson attacks on Jewish sites in London may be linked to Iranian proxies, with investigations led by Counter Terrorism Policing.
Cryptocurrency
fromArs Technica
3 days ago

Russia-friendly exchange says "western special service" behind $15 million cyberattack

Grinex halts operations after a $13 million heist attributed to western special services hackers, impacting Russian users and financial sovereignty.
fromwww.theguardian.com
4 days ago

Police investigate security incident near Israeli embassy in London

Counter Terrorism Policing London is aware of a video shared online overnight in which a group claimed to have targeted the embassy with drones carrying dangerous substances.
UK news
US politics
fromTruthout
4 days ago

US Carries Out Fifth Boat Strike in Under a Week, Bringing Death Toll to 177

The Trump administration's military actions against alleged drug traffickers lack evidence and have resulted in civilian casualties in Latin America.
#us-foreign-policy
Right-wing politics
fromwww.theguardian.com
6 days ago

Even the neocons have turned against wars in the Middle East | Owen Jones

US involvement in the Middle East has fueled terrorism rather than being a response to it, according to influential figures like Robert Kagan.
Right-wing politics
fromwww.theguardian.com
6 days ago

Even the neocons have turned against wars in the Middle East | Owen Jones

US involvement in the Middle East has fueled terrorism rather than being a response to it, according to influential figures like Robert Kagan.
#surveillance
fromWIRED
5 days ago
Privacy professionals

Congress Turns Up Pressure on DHS Over Palantir's Role in Immigration Crackdown

Privacy professionals
fromWIRED
5 days ago

Congress Turns Up Pressure on DHS Over Palantir's Role in Immigration Crackdown

Members of Congress demand DHS and ICE disclose details on surveillance tools used in immigration enforcement.
US politics
fromwww.theguardian.com
5 days ago

Fisa surveillance vote sparks fierce debate as Congress splits on warrantless monitoring

A controversial law allowing warrantless surveillance is set to expire, sparking intense debate over its renewal and potential reforms.
Social media marketing
fromAxios
6 days ago

The first AI-era war is a "slopaganda" battle to control memes

AI-generated content is rapidly spreading propaganda, making it easier for influencers to adopt conspiracy theories.
Roam Research
fromAxios
6 days ago

Exclusive: U.K.-Ukraine duo beats Americans at their own drone game

Skycutter achieved a score of 99.3 at the Gauntlet drone competition, outperforming competitors and securing a contract for over 2,500 drones.
fromSecurityWeek
5 days ago

Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

Sweden's minister for civil defense, Carl-Oskar Bohlin, stated that the cyberattack targeted a heating plant in western Sweden but ultimately failed. He did not provide further details.
Europe news
US news
fromWIRED
1 day ago

The Weird, Twisting Tale of How China Spied on Alysa Liu and Her Dad

A Chinese operative stalked a US figure skater's family, attempting to gather personal information under false pretenses.
#ukraine
fromLondon Business News | Londonlovesbusiness.com
3 weeks ago
Russo-Ukrainian War

Investigations of Russian spy rings and assassination groups grow from UK to Europe - London Business News | Londonlovesbusiness.com

Ukraine uncovered a Russian intelligence network planning contract killings of military commanders and public figures in Kyiv.
Russo-Ukrainian War
fromwww.businessinsider.com
3 days ago

This Ukrainian counter-drone company is worried about missing its moment in the Iran war

Ukraine's drone technology faces export restrictions, risking lost opportunities amid rising demand from US allies due to drone threats from Iran.
Russo-Ukrainian War
fromwww.theguardian.com
2 days ago

Investigators examine whether Ukraine terrorist attack was directed by Russia

A terrorist attack in Kyiv resulted in six deaths, with investigators examining potential links to Moscow and the perpetrator's background.
fromPsychology Today
3 days ago

The Effects of Media Depictions or Mediaspeak on War

A whole vocabulary of mediaspeak terms applied to real life has gradually emerged. Included here, among others, are: collateral damage, neutralized, canceled, surgical strike, playbook, rules of the game, high-value target, and gamechanger.
World politics
US politics
fromNextgov.com
4 days ago

Secret Service is embracing new solutions to combat malicious drones, director says

The U.S. Secret Service is adopting kinetic mitigation technologies to counter drone threats for upcoming large-scale events.
#cybersecurity
fromAxios
1 hour ago
Information security

Scoop: Top U.S. cyber agency doesn't have access to Anthropic's powerful hacking model

fromTechCrunch
6 days ago
Russo-Ukrainian War

Sweden blames Russian hackers for attempting 'destructive' cyberattack on thermal plant | TechCrunch

Information security
fromThe Hacker News
1 week ago

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

A Russian threat actor is conducting a spear-phishing campaign targeting Ukraine using a new malware suite called PRISMEX, exploiting zero-day vulnerabilities.
Information security
fromSecurityWeek
1 week ago

Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long

Cyberattacks by Iranian-backed hackers will continue despite a ceasefire, targeting Israel and potentially the U.S. when deemed appropriate.
fromAxios
1 hour ago
Information security

Scoop: Top U.S. cyber agency doesn't have access to Anthropic's powerful hacking model

Information security
fromThe Cipher Brief
5 days ago

Copy of Trump's Cyber Strategy Is a Strong Playbook, but It's All in the Execution

The National Cyber Strategy aims to enhance U.S. national security through aggressive defense and collaboration with the private sector.
Russo-Ukrainian War
fromTechCrunch
6 days ago

Sweden blames Russian hackers for attempting 'destructive' cyberattack on thermal plant | TechCrunch

Russian-linked hackers attempted to disrupt a Swedish thermal power plant, highlighting increasing risks of hybrid attacks beyond cyberspace.
Information security
fromThe Hacker News
1 week ago

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

A Russian threat actor is conducting a spear-phishing campaign targeting Ukraine using a new malware suite called PRISMEX, exploiting zero-day vulnerabilities.
Information security
fromSecurityWeek
1 week ago

Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long

Cyberattacks by Iranian-backed hackers will continue despite a ceasefire, targeting Israel and potentially the U.S. when deemed appropriate.
US news
fromMail Online
2 days ago

Death of whistleblower set to reveal UFO secrets declared 'suspicious'

A former US Air Force intelligence officer's suspicious death raises calls for an FBI investigation into potential foul play regarding UFO testimony.
Information security
fromComputerWeekly.com
1 hour ago

Sans Institute preps live systems for Nato cyber exercise | Computer Weekly

The Sans Institute is providing a real operational cyber range for the NATO Locked Shields exercise to enhance cyber security training and readiness.
World politics
fromwww.aljazeera.com
5 days ago

US military kills three in new Eastern Pacific boat strike

US military strikes against alleged narco-traffickers raise concerns of extrajudicial killings and legality of targeting vessels in the Eastern Pacific.
Artificial intelligence
fromFortune
6 days ago

A retired general's warning: America can't fight the AI arms race on tech it doesn't control | Fortune

The U.S. faces a critical AI arms race affecting military power and national security, highlighted by the Anthropic-Pentagon standoff over AI usage control.
#russian-intelligence
fromThe Cipher Brief
1 week ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
fromenglish.elpais.com
3 weeks ago

Security forces arrest two suspected Russian spies in Germany and Spain

The German Federal Prosecutor's Office ordered the arrest of two individuals accused of spying on a businessman supplying drones to Ukraine for military use.
Germany news
World news
fromThe Washington Post
2 weeks ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
Artificial intelligence
fromNextgov.com
2 weeks ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
fromMail Online
1 month ago

How Iran can bring the war to US soil in just days: Key targets MAPPED

All you would need is a ship under a foreign flag positioned offshore to launch hundreds of drones, or even a truck carrying them. When I served as deputy administrator at the National Nuclear Security Administration, overseeing nuclear programs, the drone threat was something we were deeply concerned about.
US politics
UK news
fromwww.theguardian.com
1 month ago

UK counter-terrorism agents granted more time to question men suspected of spying for Iran

Four men arrested on suspicion of spying for Iran on Jewish community locations and individuals in Britain can be held in custody until 13 March for questioning.
#russian-military-intelligence
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
US politics
fromLos Angeles Times
1 month ago

Iran's threats on U.S. soil: sleeper cells, lone wolves, cyberattacks and eerie numbers code

U.S. federal counterterrorism authorities warn Iran may launch retaliatory strikes on American soil through sleeper cells, terrorist groups, lone wolves, or cyberattacks following offensive operations against Iran.
fromIntelligencer
1 month ago

All Modern Warfare Is Chemical Warfare

On the night of Saturday, March 6, Israeli forces struck three sets of oil depots ringing Tehran - west, east, and south - simultaneously. The explosions were massive. Nearby residential areas were destroyed. Millions of liters of gasoline, diesel, and petroleum derivatives ignited, sending columns of black smoke thousands of feet into the air.
World politics
#cyber-warfare
World politics
fromwww.bbc.com
1 month ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
World politics
fromwww.bbc.com
1 month ago

What role has cyber warfare played in Iran?

Cyber operations play a significant but largely undisclosed role in US and Israeli military actions against Iran, complementing conventional strikes across multiple domains.
World news
fromwww.aljazeera.com
1 month ago

How do you track a war in real time?

Real-time open-source intelligence tools democratize military information access, fundamentally shifting narrative control and accountability in modern conflict reporting.
US politics
fromEmptywheel
2 months ago

Massive Obama Administration Leaks on Covert CIA Program Training Syrian Rebels

Numerous anonymous U.S. officials disclosed detailed information about a covert CIA program to train Syrian rebels while the CIA declined to comment.
Information security
fromSecurityWeek
1 month ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
World news
fromEmptywheel
2 months ago

Hybrid or Ambiguous, Asymmetric Warfare is Here to Stay

Asymmetric and ambiguous warfare doctrines from China and Russia anticipated cyber and hybrid attacks that the U.S. failed to adequately prepare for.
fromwww.theguardian.com
1 month ago

A war foretold: how the CIA and MI6 got hold of Putin's Ukraine plans and why nobody believed them

William Burns had travelled halfway around the world to speak with Vladimir Putin, but in the end he had to make do with a phone call. It was November 2021, and US intelligence agencies had been picking up signals in the preceding weeks that Putin could be planning to invade Ukraine. President Joe Biden dispatched Burns, his CIA director, to warn Putin that the economic and political consequences if he did so would be disastrous.
World news
US politics
fromFortune
1 month ago

CIA's social media guide to evading Iranian internet restrictions racks up millions of views as Trump considers military action | Fortune

The CIA publicly recruited Iranian informants via social media in Farsi during escalating U.S.-Iran tensions and nuclear negotiations.
World politics
fromBusiness Insider
1 month ago

The war with Iran is more evidence that winning the fights you can't see is critical in modern combat

US military operations increasingly rely on space and cyber forces to disrupt enemy capabilities before kinetic strikes, making non-kinetic warfare critical to modern combat effectiveness.
Information security
fromThe Hacker News
1 month ago

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

APT28, a Russian state-sponsored hacking group, has deployed BEARDSHELL and COVENANT malware since April 2024 to conduct long-term surveillance of Ukrainian military personnel.
fromThe Cipher Brief
2 months ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
Information security
fromNextgov.com
1 month ago

Intelligence firms watch for uptick in Iran cyber activity after US, Israel strikes

Tehran-linked hackers are escalating digital reconnaissance and preparing potentially disruptive cyber operations following recent U.S. and Israeli strikes on Iran.
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
Information security
fromComputerWeekly.com
2 months ago

Western cyber alliances risk fragmenting in new world order | Computer Weekly

Geopolitical fragmentation in 2025 drove cyber shifts toward coercion, disrupted alliances and intelligence sharing, decentralised resilient cybercrime, and intensified US–China AI competition.
[ Load more ]