BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
β€’
Β© 2026
β€’
blacktemple.net

Privacy & Surveillance

RSS
mediumPrivacy & Surveillance

Privacy Erosion Accelerates: DHS Ousts Whistleblower Officers, GPS Warfare Disrupts Civilian Infrastructure

Multiple privacy and surveillance developments this week highlight growing institutional pressures on digital rights. Most concerning is the Department of Homeland Security's removal of privacy officers who objected to illegal document classification practices.

Mar 11, 2026Schneier on Security, WIRED Security
privacysurveillancedhs
πŸ‡ΊπŸ‡ΈMeta PlatformsπŸ‡ΊπŸ‡ΈNear Intelligence
mediumPrivacy & Surveillance

Dutch Defense Secretary Proposes Jailbreaking F-35 Jets to Reduce US Software Dependency

The Dutch Defense Secretary has proposed jailbreaking F-35 fighter jets to accept third-party software, reflecting growing international concerns about dependency on US-controlled maintenance and software updates for critical defense systems.

Mar 10, 2026Schneier on Security
supply-chaindefense-systemsjailbreaking
mediumPrivacy & Surveillance

Prediction Markets Create New Vector for National Security Information Leaks

Prediction markets betting on military conflicts create financial incentives for individuals with classified intelligence to leak information for profit. This emerging threat vector could compromise operational security and endanger lives by revealing sensitive military planning through market movements.

Mar 8, 2026Hacker News (filtered)
prediction-marketsinsider-tradinginformation-security
🏴Anonymous
highPrivacy & Surveillance

Privacy-Surveillance Roundup: Pentagon AI Power Play, CBP Ad Tracking, Iran's Digital Blackout

The Trump administration severed Pentagon ties with Anthropic over the company's refusal to support mass surveillance and autonomous weapons, while CBP used commercial advertising data to track phone locations. Iran has shut down 99% of internet connectivity amid ongoing air strikes.

Mar 7, 2026Schneier on Security, WIRED Security
ai-governancelocation-trackinginternet-censorship
🏴Play
mediumPrivacy & Surveillance

Proton Transparency Report Reveals 94% Compliance Rate with Government Data Requests

Analysis of Proton's transparency reports reveals the company has complied with 94% of over 40,000 government data requests since 2017, including cases that helped law enforcement identify protesters. This compliance rate contradicts Proton's public messaging about protecting user privacy from surveillance.

Mar 7, 2026Sam Bent
protontransparency-reportgovernment-surveillance
highPrivacy & Surveillance

LLM-Assisted Government Breach and Camera Hijacking in Modern Warfare

An attacker used Anthropic's Claude AI to breach Mexican government networks, while multiple nations have adopted surveillance camera hijacking as standard cyber warfare tactics. These incidents highlight the evolving intersection of AI capabilities and nation-state surveillance operations.

Mar 6, 2026Schneier on Security, WIRED Security
llm-securitygovernment-breachsurveillance-cameras
informationalPrivacy & Surveillance

Music CEO Builds Open-Source Conflict Intelligence Platform Using Global Sensor Data

Music streaming CEO Elie Habib built World Monitor, an open-source intelligence platform that fuses aircraft transponder data, satellite imagery, and other global sensors to provide real-time conflict tracking. The project demonstrates how modern OSINT techniques can democratize geopolitical intelligence gathering.

Mar 5, 2026WIRED Security
osintgeopolitical-monitoringdata-fusion
mediumPrivacy & Surveillance

Companies Deploy Hidden AI Prompt Injection to Bias Assistant Recommendations

Microsoft identified over 50 unique prompt injection attempts from 31 companies across 14 industries, using hidden instructions in "Summarize with AI" buttons to manipulate AI assistants into remembering them as trusted sources. This manipulation technique affects critical decision-making domains including health, finance, and security recommendations.

Mar 4, 2026Schneier on Security
ai-manipulationprompt-injectionbias-attacks
mediumPrivacy & Surveillance

Congress Demands TEMPEST Investigation as 80-Year-Old Side-Channel Attacks Threaten Modern Systems

Two US lawmakers are demanding an investigation into how vulnerable modern computers are to TEMPEST-style attacks that exploit electromagnetic and acoustic emissions to steal data. The NSA-codenamed technique dates back 80 years but remains a significant threat to sensitive systems.

Mar 4, 2026WIRED Security
tempestside-channel-attackselectromagnetic-emissions
mediumPrivacy & Surveillance

Privacy Audit Reveals Extensive Data Collection by Popular Developer Tools

A comprehensive privacy audit of popular free developer tools revealed widespread collection of sensitive data including code snippets, project metadata, and user behavior patterns. The findings highlight significant privacy risks in the software development supply chain that most developers remain unaware of.

Mar 4, 2026Hacker News (filtered)
developer-toolsprivacy-auditdata-collection
highPrivacy & Surveillance

Digital Frontlines: AI Deception Networks, Iranian Internet Blackouts, and GPS Warfare

Analysis reveals human-controlled AI bots are creating widespread disinformation on social platforms, while Iranian authorities have implemented internet blackouts forcing journalists to rely on satellite links. Simultaneously, GPS jamming attacks have impacted over 1,100 vessels in the Middle East amid escalating regional conflict.

Mar 3, 2026Schneier on Security, WIRED Security
ai-manipulationinternet-shutdownsgps-jamming
mediumPrivacy & Surveillance

LLM Agents Achieve Scalable De-anonymization Across Social Platforms

Security researchers have shown that large language models can systematically de-anonymize users across social platforms like Reddit and Hacker News by inferring personal details from anonymous posts and cross-referencing web searches. The technique scales to tens of thousands of potential targets, representing a fundamental shift in the practical feasibility of mass de-anonymization.

Mar 2, 2026Schneier on Security
llmdeanonymizationprivacy
🏴Anonymous
πŸ‡ΊπŸ‡ΈLinkedInπŸ‡ΊπŸ‡ΈReddit
Prev123Next