#undercover-work

[ follow ]
Artificial intelligence
fromNextgov.com
3 days ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
#fbi
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
fromwww.mediaite.com
2 months ago
US politics

Senior FBI Official Describes Surreal' Call Where Kash Patel Dictated Social Media Strategy Right After Kirk Assassination

FBI Director Kash Patel prioritized scripting social-media responses over investigative actions following Charlie Kirk's assassination.
Privacy professionals
fromNextgov.com
1 day ago

Suspected Chinese breach of FBI system exposed surveillance targets' phone numbers

A breach linked to China exposed phone numbers of FBI surveillance targets, raising concerns about counterintelligence risks.
fromwww.mediaite.com
2 months ago
US politics

Senior FBI Official Describes Surreal' Call Where Kash Patel Dictated Social Media Strategy Right After Kirk Assassination

World news
fromThe Washington Post
18 hours ago

Chinese firms market Iran war intelligence 'exposing' U.S. forces

Chinese firms are leveraging AI and open-source data to track U.S. military movements, posing potential security risks amid the Iran conflict.
#ice
fromSilicon Canals
2 days ago
US politics

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

US politics
fromSilicon Canals
2 days ago

ICE confirms it deployed Paragon spyware inside the United States for drug trafficking cases - Silicon Canals

ICE is using commercial spyware domestically, raising constitutional concerns about warrantless surveillance and lack of oversight.
US politics
fromTechCrunch
2 days ago

ICE says it bought Paragon's spyware to use in drug trafficking cases | TechCrunch

ICE has utilized spyware from Paragon Solutions to combat drug trafficking and foreign terrorist organizations' use of encrypted communications.
NYC parents
fromWIRED
1 week ago

Why ICE Is Allowed to Impersonate Law Enforcement

ICE agents misled campus security to detain a student without proper identification or judicial warrant.
#cybersecurity
fromTechCrunch
1 day ago
EU data protection

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

Information security
fromArs Technica
4 days ago

Iran's hackers are on the offensive against the US and Israel

Iran has launched coordinated cyber attacks against Israel, but has not targeted critical infrastructure decisively during the current conflict.
Privacy professionals
fromTechCrunch
2 weeks ago

FBI seizes pro-Iranian hacking group's websites after destructive Stryker hack | TechCrunch

The FBI seized two websites operated by pro-Iranian hacktivist group Handala, which conducted cyberattacks against U.S. companies and published information about individuals linked to Israeli military and defense contractors.
Information security
fromThe Hacker News
1 day ago

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

TA416 has intensified cyberattacks on European government and diplomatic organizations since mid-2025, utilizing advanced malware delivery techniques.
EU data protection
fromTechCrunch
1 day ago

Europe's cyber agency blames hacking gangs for massive data breach and leak | TechCrunch

A cybercriminal group known as TeamPCP hacked the EU's executive body, stealing 92 gigabytes of data, including personal information.
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

The ThreatsDay Bulletin provides a concise overview of current cybersecurity threats and trends affecting system safety.
Privacy professionals
fromTechRepublic
5 days ago

Iran-Linked Hackers Breach FBI Director Kash Patel's Email, Leak Messages Online

An Iran-linked hacking group breached FBI Director Kash Patel's personal email, releasing non-sensitive information as a retaliatory cyber attack.
Information security
fromArs Technica
4 days ago

Iran's hackers are on the offensive against the US and Israel

Iran has launched coordinated cyber attacks against Israel, but has not targeted critical infrastructure decisively during the current conflict.
Privacy professionals
fromTechCrunch
2 weeks ago

FBI seizes pro-Iranian hacking group's websites after destructive Stryker hack | TechCrunch

The FBI seized two websites operated by pro-Iranian hacktivist group Handala, which conducted cyberattacks against U.S. companies and published information about individuals linked to Israeli military and defense contractors.
London politics
fromwww.theguardian.com
2 days ago

Overwhelmed' Prevent at risk of missing threats as referrals rise, UK counter-terror chief says

Prevent scheme faces overwhelming referrals, risking identification of genuine threats due to increased volume and lack of triage system.
#russian-intelligence
fromwww.dw.com
2 days ago

Hungary's Watergate: Secret service spied on opposition

Many have described it as a 'return to dictatorship and Communist times.' The intelligence service is said to have tried to recruit technicians in charge of maintaining the party's IT system, in order to access internal party information and use it to rig the election.
Europe politics
#cia
SF politics
fromNextgov.com
5 days ago

New contract for background investigations raises concerns about scale and risk

DCSA is modernizing its Case Processing Operations Center to enhance background investigations and incorporate Continuous Vetting for national security.
Remote teams
fromTheregister
5 days ago

Security contractor blew the whistle on shabby support crew

Brad, a security contractor, faced challenges with antivirus alerts while working in a labor hire company's office without proper IT support.
Python
fromAntocuni
1 week ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
#espionage
Germany news
fromenglish.elpais.com
1 week ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
fromNew York Post
1 month ago
US politics

Love-struck suspected Moscow mole in NYC tells FBI agent, 'Catch me, baby' - only to land behind bars

Germany news
fromenglish.elpais.com
1 week ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
fromNew York Post
1 month ago
US politics

Love-struck suspected Moscow mole in NYC tells FBI agent, 'Catch me, baby' - only to land behind bars

Privacy professionals
fromAxios
4 days ago

Cyber warfare starts to get personal in war between U.S., Israel and Iran

Iran-linked hackers are using data leaks and intimidation tactics against individuals to influence public perception during the current conflict.
London politics
fromwww.theguardian.com
1 week ago

Undercover police officer exposed by his own blunder, spycops inquiry hears

An undercover officer was exposed after accidentally recording himself discussing activists during a covert operation infiltrating leftwing groups.
Information security
fromSecuritymagazine
4 days ago

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Companies are increasingly investing in executive protection due to rising threats, making it a strategic necessity for business continuity and resilience.
fromwww.independent.co.uk
3 weeks ago

Police given more time to question three men arrested on suspicion of spying for Iran

This investigation continues at pace with a number of lines of inquiry being pursued by our detectives. The warrants of further detention for these three men will allow us to continue the investigation, while mitigating any potential risk to the public as we do so. This has been a long-running investigation and part of our ongoing work to disrupt malign activity where we suspect it.
UK news
Information security
fromTechzine Global
3 days ago

North Korea behind social engineering attack on Axios project

Attackers compromised the Axios maintainer's account through social engineering, publishing malicious versions that installed a Remote Access Trojan on victims' systems.
NYC LGBT
fromwww.theguardian.com
3 weeks ago

Undercover officer deceived women with grotesque and cruel' lies, spycops inquiry told

An undercover police officer engaged in long-term sexual relationships with women through emotional manipulation, deception about his personal life, and fraudulent use of taxpayer funds.
Privacy technologies
fromInfoWorld
1 month ago

What I learned as an undercover agent on Moltbook

OpenClaw AI agents on Moltbook social network pose severe cybersecurity risks through unauthorized access to sensitive user data and financial systems.
fromSecuritymagazine
2 weeks ago

Trump's Former Counter-Terrorism Official Investigated Over Alleged Leaks

Joe Kent, President Trump's former top counter-terrorism official, is under investigation by the FBI's Criminal Division for allegedly improperly sharing classified information. The investigation began months before Kent's recent resignation, according to four individuals with direct knowledge of the probe who spoke to Semafor.
US politics
#counter-terrorism
UK news
fromwww.theguardian.com
4 weeks ago

UK counter-terrorism agents granted more time to question men suspected of spying for Iran

Four men arrested on suspicion of spying for Iran on Jewish community locations and individuals in Britain can be held in custody until 13 March for questioning.
UK news
fromwww.theguardian.com
4 weeks ago

UK counter-terrorism agents granted more time to question men suspected of spying for Iran

Four men arrested on suspicion of spying for Iran on Jewish community locations and individuals in Britain can be held in custody until 13 March for questioning.
DC food
fromBusiness Insider
1 month ago

How infiltrating the mafia actually works, according to a former FBI agent

FBI agent Joaquin Garcia spent 24 of 26 years undercover, infiltrating the Gambino crime family as 'Jack Falcone' and successfully indicting 32 mobsters.
US news
fromwww.theguardian.com
1 month ago

The Russian honeytrap: alleged spy for Moscow faces five years in US prison

Nomma Zarubina, an FSB-recruited Russian intelligence operative, pleaded guilty to lying to the FBI about her contacts with Russian intelligence while posing as a legitimate activist to infiltrate American political and academic circles.
#undercover-policing
fromABC7 Chicago
4 weeks ago

4 men arrested in UK on suspicion of aiding Iran by spying on Jewish community

We understand the public may be concerned, in particular the Jewish community, and as always, I would ask them to remain vigilant and if they see or hear anything that concerns them, then to contact us. The men, who were arrested at addresses in and around north London shortly after 1 a.m, are suspected on spying on locations and individuals.
UK news
Privacy professionals
fromenglish.elpais.com
3 weeks ago

How the CIA used a former Spanish soldier to keep tabs on Julian Assange

A Spanish security company owner conducted illegal surveillance of Julian Assange at Ecuador's London embassy on behalf of the CIA, placing hidden microphones and monitoring his communications.
Privacy professionals
fromTheregister
3 weeks ago

FBI investigating breach that reportedly hit wiretapping net

The FBI is investigating a breach of its wiretapping and surveillance systems, while Europol dismantled major cybercrime platforms including a phishing service and stolen data marketplace.
US politics
fromwww.mediaite.com
1 month ago

High Alert': DHS and FBI Monitoring Potential Threats on US Soil During Strikes on Iran

U.S. homeland security officials are coordinating enhanced monitoring and threat prevention measures following military action against Iran.
Privacy professionals
fromSecurityWeek
4 weeks ago

FBI Investigating 'Suspicious' Cyber Activity on System Holding Sensitive Surveillance Information

The FBI is investigating suspicious activities on an internal system containing sensitive surveillance data, with an unidentified actor using sophisticated techniques to exploit network security controls.
UK politics
fromwww.bbc.com
1 month ago

Asylum seeker accused of MI5 fake dynamite alert

A failed asylum seeker placed a fake explosive outside MI5 headquarters after losing his final asylum appeal, prompting a counterterrorism response and arrest.
US politics
fromMail Online
1 month ago

CIA memo reveals plot to turn citizens into political assassins

Project Artichoke was a classified CIA mind control program from 1951-1956 that attempted to create unwitting assassins through psychological manipulation and drug administration.
fromThe New Yorker
1 month ago

Russia Is Swarming Europe with Young Agents

Russian military intelligence is recruiting young people online to carry out arson and other acts of sabotage across Europe. In this week's issue, Joshua Yaffa reports on the Kremlin's secret campaign to undermine the West's support for Ukraine-and breaks down how "single-use agents" are being deployed across the Continent. Some of their missions are small-putting up posters, or picking up a package-while others involve physical attacks, for example setting off explosives and starting fires.
Business
Information security
fromTechCrunch
3 weeks ago

The mystery of a globetrotting iPhone-hacking toolkit

A sophisticated iPhone hacking toolkit called Coruna, likely developed by U.S. military contractor L3Harris, was stolen and used by Russian and Chinese hackers to target victims in Ukraine and China.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Science
fromFuturism
2 months ago

CIA Will Neither Confirm Nor Deny Records on 3I/ATLAS

Interstellar object 3I/ATLAS is proposed as possibly technological due to anomalous size, rotation, and trajectory, prompting disputes and a nondisclosure CIA FOIA reply.
fromWashingtonian - The website that Washington lives by.
2 months ago

The Spy Museum's New Exhibit Explores the Hidden World of Camouflage - Washingtonian

The International Spy Museum will unveil its newest special exhibit, " Camouflage: Designed to Deceive," on March 1. The museum has previously featured artifacts that used elements of camouflage, like the Aston Martin V12 Vanquish with "adaptive camouflage" that appeared in the 2024 exhibit "Bond in Motion." For the first time, however, the Spy Museum will dedicate an all-new exhibit to exploring the history of camouflage, in an installation that will be on display for the next three years.
History
fromNextgov.com
1 month ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
fromComputerworld
4 weeks ago

FBI wiretap system tapped by hackers

The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond.
Information security
Business intelligence
fromSecuritymagazine
2 months ago

Private Sector Intelligence Careers

Private-sector intelligence roles require public-sector analytic skills plus explicit training in cognitive tradecraft, decision support, and structured reasoning for business contexts.
Information security
fromtechcrunch.com
4 weeks ago

FBI investigating hack on its wiretap and surveillance systems: report

Hackers breached FBI networks managing wiretaps and foreign intelligence surveillance warrants, marking another major U.S. government cybersecurity incident amid ongoing threats from Chinese and Russian threat actors.
Information security
fromBusiness Insider
1 month ago

Former FBI agent who infiltrated mafia, cartels, and Russian crime fears 1 group above the rest

FBI undercover agent Joaquin Garcia fears Mexican cartels more than the Italian Mafia or other criminal organizations he infiltrated during his 24-year career.
US news
fromwww.scientificamerican.com
2 months ago

U.S. quietly declassifies ColdWar era JUMPSEAT' surveillance satellites

Declassified JUMPSEAT satellites, launched 1971–1987, provided space-based signals intelligence on adversary weapons and were decommissioned in 2006.
fromThe Cipher Brief
1 month ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
Information security
fromTechCrunch
1 month ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals | TechCrunch

Government-designed iPhone exploit kit Coruna leaked from surveillance vendor to cybercriminals, Russian espionage groups, and Chinese hackers, demonstrating how state-sponsored tools proliferate into criminal markets.
#cyberespionage
US politics
fromEmptywheel
2 months ago

The Scandal of Lying about "Thwarted" "Plots" Started 4 Years Ago

Only one or two U.S. terrorist plots were actually thwarted by the Section 215 call-detail dragnet; the widely cited figure of 54 is incorrect.
fromSecuritymagazine
1 month ago

Shadow AI: The Invisible Insider Threat

Shadow AI is the unsanctioned use of artificial intelligence tools outside of an organization's governance framework. In the healthcare field, clinicians and staff are increasingly using unvetted AI tools to improve efficiency, from transcription to summarization. Most of this activity is well-intentioned. But when AI adoption outpaces governance, sensitive data can quietly leave organizational control. Blocking AI outright isn't realistic. The more effective approach is to make safe, governed AI easier to use than unsafe alternatives.
Privacy professionals
US politics
fromwww.nytimes.com
1 month ago

Video: Opinion | The President's Personal Spy Chief

Tulsi Gabbard, as director of national intelligence, is undermining the independence and credibility of U.S. intelligence through politicized actions involving the 2020 election.
Privacy professionals
fromWIRED
2 months ago

ICE Agents Are 'Doxing' Themselves

ICE List claims a leaked database of nearly 4,500 DHS employees but mainly aggregates publicly posted information, includes inaccuracies, and operates as a crowdsourced wiki.
US politics
fromEmptywheel
2 months ago

Drone War Secrecy and Kill or Capture

The NDAA and Obama-era drone program emphasize secrecy, legal resistance to declassification, and reliance on presidential authority for targeted killings.
[ Load more ]