#world-war-ii-secrecy

[ follow ]
#us-military
World news
fromwww.aljazeera.com
1 day ago

US forces kill 4 people in latest strike on vessels in eastern Pacific

The US military conducted its fourth deadly strike in four days against vessels in the eastern Pacific, claiming the targets were narco-terrorists.
World politics
fromwww.dw.com
2 weeks ago

US rebuilding WWII Pacific airfields amid China threat

US is repairing WWII airstrips in the Pacific to enhance defense against China's growing military presence.
World news
fromwww.aljazeera.com
1 day ago

US forces kill 4 people in latest strike on vessels in eastern Pacific

The US military conducted its fourth deadly strike in four days against vessels in the eastern Pacific, claiming the targets were narco-terrorists.
World politics
fromwww.dw.com
2 weeks ago

US rebuilding WWII Pacific airfields amid China threat

US is repairing WWII airstrips in the Pacific to enhance defense against China's growing military presence.
fromianVisits
3 days ago

Britain's 'other Bletchley Park' opens to the public this summer

Trent Park House was transformed into a covert interrogation centre, where captured senior German officers were held in comfortable surroundings. Unknown to them, their conversations were secretly recorded using an extensive network of hidden microphones embedded throughout the house.
London
fromThe Cipher Brief
5 days ago

Why Australia Needs a National Spy Museum

Many of the foundations that have underpinned Australia's security, prosperity and democracy are being tested: social cohesion is eroding, trust in institutions is declining, intolerance is growing, even truth itself is being undermined by conspiracy, mis- and disinformation.
World politics
fromwww.mediaite.com
5 days ago

Weird Obsession With Death': Current and Former Defense Officials Sound the Alarm on Hegseth

Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Right-wing politics
US news
fromSecuritymagazine
6 days ago

Top Secret Clearance Holder Charged With Leaking Classified National Defense Information

Courtney Williams was arrested for allegedly sharing classified national defense information with unauthorized individuals, including a journalist, from 2022 to 2025.
UK news
fromwww.aljazeera.com
6 days ago

UK says three Russian submarines tracked during covert' operation

British Defence Minister John Healey confirmed no damage to undersea infrastructure by Russian vessels after a month-long operation tracking submarines in UK waters.
fromTheregister
1 week ago

SG-41 cipher machine recreated online with 3D model

Martin Gillow describes his recreation of the SG-41 cipher machine as 'part digital preservation, part engineering archaeology, and part 'how on earth did this thing even work?''
Germany news
US news
fromwww.npr.org
6 days ago

Nations tried to impose a digital fog of war in Iran. The results are mixed

Governments often restrict information during conflicts, complicating verification efforts for researchers and journalists.
UK news
fromwww.bbc.com
1 week ago

UK says Russia ran submarine operation over cables and pipelines

Three Russian submarines conducted covert operations near UK cables, prompting a British military response to deter potential threats.
Artificial intelligence
fromNextgov.com
2 weeks ago

Old-school spycraft could make a comeback as AI undermines trust

AI may enhance intelligence gathering but also revive traditional espionage methods due to reliability issues with digital communications.
#russian-intelligence
#cia
Python
fromAntocuni
3 weeks ago

Inside SPy, part 2: Language semantics

SPy aims to enhance Python's performance while integrating static typing, balancing between an interpreter and a compiler.
SF politics
from48 hills
3 weeks ago

The US war economy and the 'threat of peace' - 48 hills

Peace has historically been viewed as a threat to the military-industrial complex and economic stability.
#espionage
Germany news
fromwww.dw.com
3 weeks ago

Germany detains two suspected of spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Germany news
fromenglish.elpais.com
3 weeks ago

Security forces arrest two suspected Russian spies in Germany and Spain

Two individuals were arrested for allegedly spying on a businessman supplying drones to Ukraine, with intentions possibly including his assassination.
Germany news
fromwww.dw.com
3 weeks ago

Germany detains two of suspected spying for Russia

Two suspects have been accused of spying for Russia, targeting a German national supplying drones to Ukraine.
Germany news
fromwww.dw.com
4 weeks ago

Germany news: Ukrainians on trial over Russia spying claims

Three Ukrainian men residing in Germany face trial for allegedly planting GPS devices on postal packages to gather shipping intelligence for Moscow and attempting to plant explosives in packages.
Information security
fromThe Cipher Brief
4 weeks ago

America Is Digitally Fragile - and Our Adversaries Know It

America faces unprecedented vulnerability as critical infrastructure systems are digitally dependent and interconnected, while adversaries possess capabilities to penetrate and pre-position for exploitation before conflict begins.
Silicon Valley
fromBusiness Insider
4 weeks ago

The Palantir guide to stopping World War III

Tech executives are increasingly integrating with the U.S. military through government contracts, leadership positions, and defense-focused startups, marking a shift from the industry's historical antiwar stance to active participation in weapons development and military operations.
History
from24/7 Wall St.
1 month ago

25 Weapons That Changed Warfare Over the Last Century

Technological breakthroughs over the last century transformed warfare by introducing tanks, missiles, stealth aircraft, and precision-guided weapons that forced armies to continuously adapt tactics and reshape military doctrine globally.
fromTheregister
3 weeks ago

Only Trump decides when cyberwar turns into real war

The president should have a lot of leeway in which he determines whether or not the nation's going to respond kinetically. This flexibility is crucial in the evolving landscape of cyber warfare.
World politics
fromwww.theguardian.com
3 weeks ago

Iranian among two charged over alleged attempt to enter UK nuclear submarine base

A 34-year-old Iranian man and a 31-year-old Romanian woman have been arrested and charged in connection with the incident at HM Naval Base Clyde, known as Faslane.
UK news
Information security
fromSecurityWeek
1 month ago

Iran-Linked Hackers Take Aim at US and Other Targets, Raising Risk of Cyberattacks During War

Pro-Iranian hackers are expanding cyberattacks from the Middle East into the United States, targeting defense contractors, medical device companies, and critical infrastructure like power stations and water plants.
Artificial intelligence
fromEngadget
4 weeks ago

The Defense Department reportedly plans to train AI models on classified military data

The Pentagon plans to train AI models on classified information in secure facilities for exclusive military use to enhance warfighting capabilities.
Law
fromThe Atlantic
1 month ago

The Unbearable Lightness of Signalgate

The Uniform Code of Military Justice enforces discipline across all military ranks through 158 articles covering both civilian crimes and military-specific offenses, with recent courts-martial demonstrating consistent enforcement of conduct standards.
from24/7 Wall St.
1 month ago

The Warplanes and Ordinance That Carried Out Operation Epic Fury

Air campaigns today are built around cooperation between many different aircraft, each performing a specific task. Stealth fighters lead the way into contested airspace, electronic warfare aircraft disrupt enemy radar, and bombers or strike fighters deliver precision weapons. Supporting aircraft provide intelligence, command and control, and the fuel needed to keep the entire operation moving.
Roam Research
Right-wing politics
fromThe American Conservative
1 month ago

Is It Still the Department of 'War' or Not?

The Trump administration renamed the Department of Defense to Department of War and subsequently engaged in military conflict with Iran while Republican Congress members avoided formally acknowledging it as war.
Artificial intelligence
fromBusiness Insider
4 weeks ago

The Pentagon provided a rare inside look at Palantir's Project Maven and how the AI tool helps the military wage war

Pentagon's Project Maven integrates satellite imagery and AI to streamline military targeting from detection to strike execution within a single system.
US politics
fromMail Online
1 month ago

Trump's WW3 nuclear escape plan to flee to secret sites revealed

The U.S. government maintains secret underground bunkers to ensure government continuity during nuclear war, with three primary facilities in Colorado, Pennsylvania, and Virginia actively funded and staffed.
fromWIRED
1 month ago

How Vulnerable Are Computers to an 80-Year-Old Spy Technique? Congress Wants Answers

The movements of a hard drive's components, keystrokes on a keyboard, even the electric charge in a semiconductor's wires produce radio waves, sound, and vibrations that transmit in all directions and can-when picked up by someone with sufficiently sensitive equipment and enough spycraft to decipher those signals-reveal your private data and activities.
Privacy technologies
fromWIRED
1 month ago

Palantir Demos Show How the Military Could Use AI Chatbots to Generate War Plans

When the user asks "What enemy military unit is in the region?" the AIP Assistant guesses that it's "likely an armor attack battalion based on the pattern of the equipment." This prompts the analyst to request a MQ-9 Reaper drone to survey the scene. They then ask the AIP Assistant to "generate 3 courses of action to target this enemy equipment," and within moments, the assistant suggests attacking the unit with either an "air asset," a "long range artillery," or a "tactical team."
Artificial intelligence
World news
fromLondon Business News | Londonlovesbusiness.com
1 month ago

US and Israel 'consider special forces raid' to seize Iran's enriched uranium - London Business News | Londonlovesbusiness.com

The United States and Israel are discussing a potential special forces operation to seize Iran's highly enriched uranium stockpile to prevent nuclear weapon development.
fromwww.theguardian.com
1 month ago

North Korean agents using AI to trick western firms into hiring them, Microsoft says

The scam typically involves state-backed fraudsters applying for remote IT work in the west, using fake identities and the help of facilitators in the country where the company targeted is based. Once hired, they send their wages back to Kim Jong-un's state and have even been known to threaten to release sensitive company data after being fired.
Information security
fromMail Online
1 month ago

Historian reveals the three signs that a world war has already begun

Anthony Glees, Emeritus Professor at the University of Buckingham, called the US and Israeli decision to attack Iran a 'war of choice' and the first red flag which previously led to the last two world wars. He claimed that the conflict in the Middle East did not start out of necessity or self-defense, but as a deliberate decision by two leaders focused on gaining power and keeping it.
World politics
History
fromFortune
1 month ago

Why America may not have won World War II without its secret weapon: Greenland | Fortune

Greenland's strategic location and rare cryolite resource made it critical to U.S. World War II airpower and national security, prompting military protection and sovereignty challenges.
#apple-security-certification
Artificial intelligence
fromComputerWeekly.com
1 month ago

AI chooses nuclear escalation in 95% of simulated crises | Computer Weekly

Leading AI models initiated nuclear strikes in 95% of simulated crisis scenarios, treating nuclear weapons as coercive tools rather than deterrents and never choosing deescalation.
fromThe New Yorker
2 months ago

National Security Begins Behind the Toaster

Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
Humor
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
Information security
fromNextgov.com
1 month ago

Potential US-built hacking tools obtained by foreign spies and cybercriminals, research says

A sophisticated iPhone hacking toolkit called Coruna, likely originating from U.S. government development, has proliferated to foreign intelligence agencies and criminal groups, compromising iOS devices through multiple exploit chains.
History
fromWorld History Encyclopedia
1 month ago

12 Maps of World War II in Europe and Africa

World War II emerged from post-WWI tensions, economic instability, and totalitarian regimes, resulting in unprecedented destruction and reshaping the global balance of power.
Germany news
fromwww.dw.com
1 month ago

Is Germany increasingly targeted by Iranian intelligence?

German security authorities warn of potential Iranian retaliatory attacks targeting Jewish institutions, Israeli sites, and Iranian opposition members following US-Israeli strikes on Iran.
Apple
fromThe Verge
1 month ago

NATO says iPhones are secure enough to handle classified data

iPhone and iPad with iOS 26 and iPadOS 26 are approved to store NATO-restricted classified information without special software or settings.
US politics
fromMail Online
1 month ago

CIA memo reveals plot to turn citizens into political assassins

Project Artichoke was a classified CIA mind control program from 1951-1956 that attempted to create unwitting assassins through psychological manipulation and drug administration.
#jumpseat
World politics
fromLondon Business News | Londonlovesbusiness.com
1 month ago

Former NATO commander fears the world is living through the outbreak of WWIII - London Business News | Londonlovesbusiness.com

Former NATO deputy commander warns current geopolitics represents the most perilous moment in his lifetime, with escalating Middle East tensions risking uncontrolled conflict involving nuclear-armed powers.
from24/7 Wall St.
1 month ago

The Most Powerful Battleships, Aircraft Carriers, and Submarines of World War II

WWII began with most naval powers still believing the battleship ruled the seas. Fleets were built around heavily armored ships with massive guns meant to destroy enemy navies in decisive surface battles. By the war's end, that thinking had changed dramatically. Aircraft carriers could strike targets hundreds of miles away, while submarines choked off supply lines across entire oceans.
History
US news
fromMail Online
1 month ago

Air Force spy jet circling over states home to America's missile silos

A US Air Force RC-135W Rivet Joint spy plane flew over America's nuclear missile fields in the Dakotas, coinciding with stalled Iran nuclear negotiations and Trump's stated dissatisfaction with talks.
fromZDNET
1 month ago

The iPhone in your pocket is now trusted for classified NATO data

The devices are now officially approved to handle classified NATO information up to the 'restricted' level. This is not about specialized, rugged phones built for the military or locked-down, government-only hardware. It applies to regular iPhones and iPads running standard iOS 26 and iPadOS 26. According to Apple, no other consumer devices currently have this distinction.
Apple
fromSecurityWeek
2 months ago

Cyber Insights 2026: Cyberwar and Rising Nation State Threats

Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
Information security
fromThe Cipher Brief
2 months ago

The Kremlin Files: Russian Double Agents and Operational Games

A double agent, by contrast, is an intelligence asset who is knowingly and deliberately directed by one service to engage another in espionage. The controlling service uses that agent to feed information (called feed material) -true, false, or mixed-to the adversary. They do so to simultaneously study the adversary's tradecraft, collection priorities, and decision-making. In the Russian system, double agents also serve a bureaucratic function: they generate statistics, "success stories," and operational narratives that demonstrate effectiveness to political overseers and ultimately to Putin himself.
World news
fromNextgov.com
2 months ago

Now accepting applications - for classified intel

Over the past year, waves of federal layoffs have left thousands of government employees and contractor clients suddenly out of work. For foreign intelligence services, that disruption has opened new opportunities. With more former U.S. officials seeking employment or freelance work - often in specialized national security fields - adversaries, namely China, have stepped in, posing as consulting firms, research groups and recruiters.
US news
UK news
fromLondon Business News | Londonlovesbusiness.com
1 month ago

Security incidents at UK nuclear submarine base increase since Ukraine war - London Business News | Londonlovesbusiness.com

Security breaches at Britain's main nuclear submarine facility HMNB Clyde increased from 16 incidents in 2021 to 149 in 2024, with similar rises at nearby nuclear weapons storage facilities following Russia's invasion of Ukraine.
fromwww.theguardian.com
2 months ago

State-sponsored hackers targeting defence sector employees, Google says

The report catalogues a relentless barrage of cyber operations, most by state-sponsored groups, against EU and US industrial supply chains. It suggests the range of targets for these hackers has grown to encompass the broader industrial base of the US and Europe from German aerospace firms to UK carmakers. State-linked hackers have long targeted the global defence industry, but Luke McNamara, an analyst for Google's threat intelligence group, said they had seen more personalised and direct to individual targeting of employees.
Information security
Information security
fromArs Technica
2 months ago

US cyber defense chief accidentally uploaded secret government info to ChatGPT

CISA acting director Madhu Gottumukkala uploaded sensitive, "for official use only" contracting documents to a public ChatGPT, triggering DHS cybersecurity warnings.
World news
fromwww.npr.org
2 months ago

Israel accuses two of using military secrets to place Polymarket bets

Israeli authorities arrested several people and charged a civilian and a military reservist for allegedly using classified military information to place bets on Polymarket.
fromFuturism
1 month ago

Something Very Alarming Happens When You Give AI the Nuclear Codes

A lot of countries have nuclear weapons. Some say they should disarm them, others like to posture. We have it! Let's use it. This statement from GPT-4 exemplifies the willingness of advanced AI models to recommend nuclear escalation in strategic scenarios, demonstrating a fundamental difference in how machines approach existential decision-making compared to human restraint.
Artificial intelligence
Information security
fromComputerWeekly.com
1 month ago

Western cyber alliances risk fragmenting in new world order | Computer Weekly

Geopolitical fragmentation in 2025 drove cyber shifts toward coercion, disrupted alliances and intelligence sharing, decentralised resilient cybercrime, and intensified US–China AI competition.
[ Load more ]