Originally reported by Schneier on Security, WIRED Security
TL;DR
Tech giants are spending unprecedented amounts on AI talent, draining academia of researchers while Apple becomes the first consumer device approved for NATO classified data. Meanwhile, bipartisan lawmakers are pushing to curtail FBI warrantless surveillance powers as Iranian hacktivist groups intensify state-sponsored cyberattacks under the guise of activism.
The Iranian state-sponsored hacktivist group conducting retaliatory cyberattacks and the broader surveillance policy implications represent active threats to critical infrastructure and privacy rights.
Big tech's astronomical AI investments are reshaping the research landscape in ways that extend far beyond corporate balance sheets. According to analysis by Bruce Schneier, Google, Amazon, Microsoft, and Meta collectively spent $380 billion on AI tools in 2025, with projections reaching $650 billion in 2026.
The talent acquisition war has reached extreme levels. Meta reportedly offered a single AI researcher a $250 billion compensation package over four years, while tech firms increasingly engage in "reverse-acquihires" to poach startup talent without acquiring the companies themselves.
Academic institutions are losing the battle for AI researchers. A 2025 study found that young, highly cited scholars were 100 times more likely to move to industry than veteran researchers, threatening academia's role in curiosity-driven innovation and independent ethical scrutiny.
The analysis argues that the "10x engineer" mythology driving these hiring practices contradicts research showing that scientific breakthroughs consistently emerge from team collaborations rather than individual genius. Major advances from gravitational wave detection to CRISPR gene editing resulted from collective efforts spanning dozens to thousands of researchers.
The proposed solution involves three strategies: maintaining public interest focus (exemplified by Switzerland's open Apertus language model), building equitable research networks rather than star-driven hierarchies, and offering distinctive intellectual and civic rewards beyond financial compensation.
Apple announced that iPhone and iPad devices have become the first consumer products approved for handling NATO classified information up to the "restricted" level without requiring special software or configuration changes.
This certification represents a significant milestone in government device security standards. Unlike previous solutions requiring specialized software or hardware modifications, Apple's devices meet NATO information assurance requirements out of the box.
The certification covers NATO restricted-level classified information, positioning Apple devices as viable options for government and military personnel across NATO member nations. No other consumer mobile device manufacturer has achieved this level of government certification for unmodified hardware.
US lawmakers are advancing legislation to eliminate the FBI's ability to conduct warrantless surveillance of Americans' digital communications, marking a significant privacy rights development ahead of critical April deadline discussions.
The bipartisan bill would require FBI agents to obtain warrants before accessing Americans' messages and communications data. Additionally, the legislation aims to ban federal agencies from purchasing commercial data on US residents from data brokers.
This legislative push comes as Section 702 of the Foreign Intelligence Surveillance Act faces reauthorization debates. The proposed reforms address long-standing concerns about government overreach in digital surveillance capabilities.
The timing proves crucial as Congress approaches the April deadline for surveillance authority renewals, creating momentum for privacy advocates seeking to constrain government surveillance powers.
The Iranian hacktivist group Handala has emerged as a prominent face of Iran's retaliatory cyberattack campaigns, recently conducting a paralyzing breach against medical technology firm Stryker.
Security researchers identify Handala as representing Iran's strategic use of "hacktivism" to provide plausible deniability for state-sponsored cyberattacks. The group's operations demonstrate how nation-states leverage activist messaging to mask government-directed cyber operations.
The Stryker breach highlights the group's capability to target critical healthcare infrastructure, raising concerns about patient safety and medical device security. The attack pattern suggests coordination with broader Iranian cyber strategy rather than independent hacktivist operations.
This development reflects Iran's evolving cyber warfare tactics, using hacktivist groups as proxies to conduct retaliatory attacks while maintaining diplomatic distance from direct attribution.
Originally reported by Schneier on Security, WIRED Security