#tactical-deception

[ follow ]
#ai
fromFuturism
3 hours ago
Artificial intelligence

Experts Warn of AI Swarms Hijacking Democracy With Fake Citizens

AI can manipulate public opinion on a large scale, posing significant threats to democratic institutions through misinformation campaigns.
fromwww.bbc.com
4 days ago
Information security

AI hacking tools like Mythos can be 'net positive' says top cyber official

AI tools can enhance cyber-security if secured properly, according to the UK's top cyber official.
Artificial intelligence
fromFuturism
3 hours ago

Experts Warn of AI Swarms Hijacking Democracy With Fake Citizens

AI can manipulate public opinion on a large scale, posing significant threats to democratic institutions through misinformation campaigns.
#iran
World news
fromwww.aljazeera.com
1 day ago

Iran's Infowar: Lego, AI and ever tightening control

The Iranian government employs innovative online strategies for international PR while enforcing strict internet controls domestically.
World news
fromwww.aljazeera.com
1 month ago

War spirals as information control tightens

The war on Iran has escalated with increased leadership assassinations, a blockade of the Strait of Hormuz, and strikes on energy infrastructure.
World news
fromwww.aljazeera.com
1 day ago

Iran's Infowar: Lego, AI and ever tightening control

The Iranian government employs innovative online strategies for international PR while enforcing strict internet controls domestically.
World news
fromwww.aljazeera.com
1 month ago

War spirals as information control tightens

The war on Iran has escalated with increased leadership assassinations, a blockade of the Strait of Hormuz, and strikes on energy infrastructure.
OMG science
fromwww.theguardian.com
1 day ago

Conspiracy theory over UFOs and missing scientists spreads from web to White House

The disappearances of US scientists linked to space and defense have sparked conspiracy theories involving state enemies and UFOs.
#cybersecurity
Information security
fromTheregister
2 days ago

China-linked crews turn routers into covert attack proxies

China-linked threat actors exploit compromised routers and IoT devices to create proxy networks for cyber intrusions and data theft.
Information security
fromTechRepublic
3 days ago

Hackers Impersonate IT Help Desk on Microsoft Teams to Gain Access, Steal Data

Hackers are increasingly using social engineering on Microsoft Teams to gain unauthorized access by impersonating IT support.
Information security
fromTheregister
4 days ago

Cheapskate cyber strategy won't stop Beijing's finest

State-sponsored cyberattacks from China represent a sophisticated and significant threat in modern warfare, necessitating preparedness for potential conflict.
Information security
fromThe Hacker News
1 month ago

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A China-nexus threat actor has embedded itself in telecom networks for espionage, utilizing stealthy access mechanisms and advanced malware tools.
Information security
fromTheregister
2 days ago

China-linked crews turn routers into covert attack proxies

China-linked threat actors exploit compromised routers and IoT devices to create proxy networks for cyber intrusions and data theft.
Information security
fromSecurityWeek
3 days ago

Chinese Cybersecurity Firm's AI Hacking Claims Draw Comparisons to Claude Mythos

A Chinese cybersecurity firm claims AI-driven vulnerability discovery capabilities rivaling Anthropic's Claude Mythos model.
Information security
fromTechRepublic
3 days ago

Hackers Impersonate IT Help Desk on Microsoft Teams to Gain Access, Steal Data

Hackers are increasingly using social engineering on Microsoft Teams to gain unauthorized access by impersonating IT support.
Information security
fromTheregister
4 days ago

Cheapskate cyber strategy won't stop Beijing's finest

State-sponsored cyberattacks from China represent a sophisticated and significant threat in modern warfare, necessitating preparedness for potential conflict.
Information security
fromThe Hacker News
1 month ago

China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

A China-nexus threat actor has embedded itself in telecom networks for espionage, utilizing stealthy access mechanisms and advanced malware tools.
fromMilitary.com
2 days ago

AI MAGA Influencer, Service Member Scams Fuel 'Digital Stolen Valor' Rise

The administrators behind Military Phony described 'digital stolen valor' as the online equivalent of wearing medals you didn't earn, using exaggerated or fabricated credentials to gain respect, sympathy or opportunity that would otherwise belong to someone else.
Social media marketing
World politics
fromwww.aljazeera.com
3 days ago

Infiltration from Within: Israelis recruited to spy for enemy countries

Israel's intelligence is exposed as flawed, revealing vulnerabilities from internal betrayals and arrogance leading to security failures.
fromFast Company
2 days ago

Officials charge a U.S. soldier for using intel on this $400K Polymarket bet

Gannon Ken Van Dyke was part of the operation to capture Maduro in January and used his access to classified information to make money on the prediction market site Polymarket, the federal prosecutor's office in New York said.
US Elections
Science
fromArs Technica
3 days ago

US Space Command: Russia is now operationalizing co-orbital ASAT weapons

Russia is deploying operational anti-satellite weapons targeting US satellites in low-Earth orbit.
#espionage
Germany news
fromwww.dw.com
3 days ago

Germany news: Bavarian police arrest suspected spies

Two suspected spies were arrested in Bavaria with various suspicious items, charged with espionage and linked to activities outside Germany.
Germany news
fromwww.dw.com
3 days ago

Germany news: Bavarian police arrest suspected spies

Two suspected spies were arrested in Bavaria with various suspicious items, charged with espionage and linked to activities outside Germany.
#ai-generated-content
Women in technology
fromWIRED
5 days ago

This Scammer Used an AI-Generated MAGA Girl to Grift 'Super Dumb' Men

A medical student generates income by selling AI-generated images of a conservative woman, targeting a niche audience with higher disposable income.
Women in technology
fromWIRED
5 days ago

This Scammer Used an AI-Generated MAGA Girl to Grift 'Super Dumb' Men

A medical student generates income by selling AI-generated images of a conservative woman, targeting a niche audience with higher disposable income.
Europe politics
fromwww.thelocal.se
5 days ago

Swedish intelligence says Russia manipulates economic data

Russia is manipulating economic data to project resilience despite a weak economy and ongoing strategic military objectives.
#anthropic
fromAxios
6 days ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

fromAxios
6 days ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

Information security
fromSecurityWeek
1 day ago

China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

GopherWhisper is a newly identified APT using legitimate services for command-and-control communication and data exfiltration, primarily targeting a Mongolian government entity.
World news
fromIndependent
1 day ago

Decryption tech breakthrough that helped snare Kinahan may now take down his army of hitmen

Deciphered phone messages led to the arrest of Daniel Kinahan and may help dismantle his criminal organization.
#artificial-intelligence
fromSecuritymagazine
3 days ago
Artificial intelligence

How Should Effective AI Red Teams Operate?

AI-specific red teaming is essential for organizations to understand and mitigate risks associated with AI tools.
fromNextgov.com
3 weeks ago
Artificial intelligence

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
Artificial intelligence
fromNextgov.com
3 weeks ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
#cia
fromPsychology Today
1 week ago

The Effects of Media Depictions or Mediaspeak on War

A whole vocabulary of mediaspeak terms applied to real life has gradually emerged. Included here, among others, are: collateral damage, neutralized, canceled, surgical strike, playbook, rules of the game, high-value target, and gamechanger.
World politics
fromwww.mediaite.com
2 weeks ago

Weird Obsession With Death': Current and Former Defense Officials Sound the Alarm on Hegseth

Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Right-wing politics
Artificial intelligence
fromTechCrunch
6 days ago

NSA spies are reportedly using Anthropic's Mythos, despite Pentagon feud | TechCrunch

The NSA is reportedly using Anthropic's Mythos model for cybersecurity despite previous tensions over access to AI capabilities.
World news
fromSlate Magazine
5 days ago

The Surprisingly Anticlimactic End to America's War Against al-Qaida

Sayf al-Adl, an al-Qaida operative, remains elusive despite U.S. military actions, raising questions about the group's leadership and operational strength.
Privacy professionals
fromWIRED
2 weeks ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
Social media marketing
fromAxios
1 week ago

The first AI-era war is a "slopaganda" battle to control memes

AI-generated content is rapidly spreading propaganda, making it easier for influencers to adopt conspiracy theories.
Media industry
fromThe Cipher Brief
3 weeks ago

Iran Is Building the Disinformation Architecture of the Future-Right Now

Iran's disinformation tactics demonstrate the potential of AI in conflict, emphasizing speed, encryption, and narrative manipulation.
Roam Research
fromThe Cipher Brief
3 weeks ago

The Chalk Mark Still Matters: Russian Espionage Handling in the Modern Era

Russian intelligence tradecraft has evolved in agent handling, incorporating advanced communication techniques and urban geography for signaling.
fromThe Cipher Brief
2 weeks ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
Psychology
fromPsychology Today
3 weeks ago

New Research: Some People Really Do Fall for Corporate BS

Employees impressed by corporate gibberish perform poorly in decision-making and confuse it with business savvy.
Information security
fromAxios
4 days ago

Exclusive: OpenAI briefs feds and Five Eyes on new cyber product

OpenAI demonstrated its GPT-5.4-Cyber model to federal cyber defense practitioners, emphasizing a dual-track access approach for government and commercial users.
Python
fromAntocuni
1 month ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
Psychology
fromwww.theguardian.com
4 weeks ago

They feel true': political deepfakes are growing in influence even if people know they aren't real

Online content creators are fabricating people and images for propaganda and profit, blurring the lines between reality and fiction.
Relationships
fromPsychology Today
1 month ago

5 Manipulation Tactics You Might Not See Until It's Too Late

Gaslighting, guilt-tripping, moving the goalposts, and triangulation are manipulative tactics that undermine reality and self-worth in relationships.
World news
fromFortune
2 weeks ago

CIA deception campaign in Iran helped the spy agency uncover the location of the downed F-15 airman, who was hiding in a mountain crevice | Fortune

The U.S. successfully rescued two aviators from Iran after their fighter jet was shot down, employing a complex extraction strategy.
World news
fromThe Washington Post
3 weeks ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
#lie-detection
Television
fromwww.scientificamerican.com
1 month ago

The secret psychology behind the best backstabs in The Traitors

Scientific research reveals behavioral and physiological indicators that can help identify liars, while also explaining techniques that make deception more effective.
Television
fromwww.scientificamerican.com
1 month ago

The secret psychology behind the best backstabs in The Traitors

Scientific research reveals behavioral and physiological indicators that can help identify liars, while also explaining techniques that make deception more effective.
Media industry
fromwww.mediaite.com
1 month ago

War Propaganda Is Now Made for the Algorithm. Journalism Can't Keep Up.

Foreign and domestic propaganda spreads through social media when users amplify content that aligns with their existing beliefs, regardless of its manipulative intent or source.
Arts
fromFast Company
1 month ago

How camouflage became 'the original deception'

The International Spy Museum's camouflage exhibition explores deception techniques across nature and human applications, from animal coloration to military uniforms and espionage tactics.
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
fromThe New Yorker
2 months ago

Russia Is Swarming Europe with Young Agents

Russian military intelligence is recruiting young people online to carry out arson and other acts of sabotage across Europe. In this week's issue, Joshua Yaffa reports on the Kremlin's secret campaign to undermine the West's support for Ukraine-and breaks down how "single-use agents" are being deployed across the Continent. Some of their missions are small-putting up posters, or picking up a package-while others involve physical attacks, for example setting off explosives and starting fires.
Business
US politics
fromFortune
1 month ago

CIA's social media guide to evading Iranian internet restrictions racks up millions of views as Trump considers military action | Fortune

The CIA publicly recruited Iranian informants via social media in Farsi during escalating U.S.-Iran tensions and nuclear negotiations.
fromNextgov.com
2 months ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
World politics
fromwww.aljazeera.com
1 month ago

The battle on the propaganda front intensifies

Iran employs asymmetric economic tactics against U.S.-Israeli military superiority while misinformation complicates public understanding of the conflict.
US politics
fromMail Online
1 month ago

CIA memo reveals plot to turn citizens into political assassins

Project Artichoke was a classified CIA mind control program from 1951-1956 that attempted to create unwitting assassins through psychological manipulation and drug administration.
Media industry
fromFortune
2 months ago

I'm a war gamer for the Navy and I know why you don't trust the media anymore. It's fighting yesterday's battles | Fortune

Journalism struggles to keep pace with real-time war information, causing perceived bias due to temporal lag and eroding public trust.
Psychology
fromPsychology Today
2 months ago

The Best Way to Stop Liars in Their Tracks

Trust and reciprocal social context determine whether people tell the truth, and perceived distrust can increase deception while openness encourages honest admission.
US politics
fromEmptywheel
2 months ago

The Scandal of Lying about "Thwarted" "Plots" Started 4 Years Ago

Only one or two U.S. terrorist plots were actually thwarted by the Section 215 call-detail dragnet; the widely cited figure of 54 is incorrect.
fromPinkNews | Latest lesbian, gay, bi and trans news | LGBTQ+ news
2 months ago

The Traitors is actually based on a Soviet-era psychological experiment

The reality TV show, which sees 22 people from across the UK participate in a weeks-long social deduction game to work out who amongst them is secretly a " Traitor ", aired the acclaimed finale to its tense fourth season on Friday (23 January). Contestants and this season's surviving Traitors, Stephen Libby and Rachel Duffy, bagged £95,750 during Friday night's conclusion, which was watched by over 9.6 million people according to the BBC.
Psychology
fromElectronic Frontier Foundation
2 months ago

Beware: Government Using Image Manipulation for Propaganda

A short while later, the White House posted the same photo - except that version had been digitally altered to darken Armstrong's skin and rearrange her facial features to make it appear she was sobbing or distraught. The Guardian one of many media outlets to report on this image manipulation, created a handy slider graphic to help viewers see clearly how the photo had been changed.
US politics
US politics
fromThe Atlantic
2 months ago

The Trump Administration's War on Data

The CIA World Factbook website has been shut down, removing a longstanding public global-data resource and reflecting an administration effort to curtail publicly available information.
US politics
fromEmptywheel
2 months ago

Drone War Secrecy and Kill or Capture

The NDAA and Obama-era drone program emphasize secrecy, legal resistance to declassification, and reliance on presidential authority for targeted killings.
fromThe Cipher Brief
2 months ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
World politics
fromThe Atlantic
1 month ago

An Air-Campaign Primer

Air campaigns offer unique advantages in concentration, speed, and flexibility, but differ fundamentally from ground operations in their goals, strengths, and inherent limitations.
Artificial intelligence
fromTheregister
1 month ago

AIs are happy to launch nukes in simulated combat scenarios

Advanced AI models repeatedly escalated to nuclear warfare in crisis simulations, revealing they lack understanding of mutual destruction deterrence and engage in deceptive strategic behavior.
Information security
fromAxios
2 months ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
World news
fromEmptywheel
2 months ago

Hybrid or Ambiguous, Asymmetric Warfare is Here to Stay

Asymmetric and ambiguous warfare doctrines from China and Russia anticipated cyber and hybrid attacks that the U.S. failed to adequately prepare for.
Information security
fromNextgov.com
1 month ago

Fake DOD memo about 'compromised' apps shows swift spread of deceptive messaging

A fake U.S. Cyber Command memo falsely claiming apps were compromised and revealing servicemembers' locations circulated during military channels, but DOD confirmed it was not authentic.
World politics
fromBusiness Insider
1 month ago

The war with Iran is more evidence that winning the fights you can't see is critical in modern combat

US military operations increasingly rely on space and cyber forces to disrupt enemy capabilities before kinetic strikes, making non-kinetic warfare critical to modern combat effectiveness.
fromwww.theguardian.com
1 month ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
World news
fromWIRED
1 month ago

X Is Drowning in Disinformation Following US and Israel's Attack on Iran

Disinformation about the US-Israel military operation against Iran spread rapidly on X, with misleading videos, AI-generated images, and misattributed footage accumulating millions of views from verified accounts.
Information security
fromTheregister
1 month ago

Iran is the first out-loud cyberwar the US has fought

Cyber operations have become a central component of US-Iran military conflict, marking a significant shift from their traditionally peripheral role in previous conflicts.
[ Load more ]