The mystery of a globetrotting iPhone-hacking toolkit
Tools used in a series of hacking campaigns by hackers in Russia, Ukraine, and China may have originated inside U.S. government contractor L3Harris, TechCrunch has learned.
SCOOP: The iPhone mass hacking toolkit used by Russian spies was developed at U.S. military contractor L3Harris, former employees said.
The Coruna toolkit was used against Ukrainians and by Chinese cybercriminals, according to Google. But the toolkit was initially developed for Western governments.
10.03.2026 02:01
👍 214
🔁 122
💬 7
📌 14
Britain is the latest country to be plunged into yet another espionage scandal after an MP’s husband was arrested on suspicion of spying for China. Beijing’s long been known for its ‘thousand grains of sand’ strategy relying on amateur intelligence collectors, but it’s now increasingly … (1/3)
06.03.2026 07:09
👍 7
🔁 4
💬 1
📌 0
AI turns Nepal’s election into ‘digital battleground’ - Taipei Times
Bringing Taiwan to the World and the World to Taiwan
Nepal’s vote unfolded in a “digital battleground,” says Samik Kharel @techschmuck.bsky.social, with #AI-generated fakes, deepfakes, & manipulated campaign content spreading fast online, and even experts struggling to separate truth from fiction.
www.taipeitimes.com/News/world/a...
06.03.2026 15:01
👍 3
🔁 2
💬 0
📌 0
The Rise of AI in PRC Influence Operations: Nine Takeaways from the GoLaxy Documents
Leaked GoLaxy files reveal PRC attempts to deploy AI-driven influence ops targeting Taiwan and the U.S., from profiling to bot distribution.
How is the PRC using AI to profile individuals and predict & shape behavior at scale?
Our team, with Athena Tong, analyzed leaked GoLaxy documents showing how PRC influence operations have shifted from bot farms to AI-driven systems that profile & target audiences with precision.
dtl.tw/golaxy 🧵
05.03.2026 07:11
👍 8
🔁 5
💬 1
📌 1
#Graphika assessed AI likely enabled bilingual content to be produced at the scale observed, making translation, illustrations, & cross-platform election interference faster and cheaper. #认知域作战
05.03.2026 02:22
👍 4
🔁 0
💬 1
📌 0
On X, 103 coordinated inauthentic behaviour accounts also posted #AI-generated cartoons portraying candidates negatively, using the same hashtags for those candidates’ names.
05.03.2026 02:20
👍 1
🔁 0
💬 2
📌 0
#Graphika says Tumblr accounts it assessed with high confidence as part of the Chinese state-linked influence operation #Spamouflage ( #公安部912专项工作组) published AI-generated articles simultaneously in English and Tibetan targeting candidates in the CTA election.
05.03.2026 02:19
👍 4
🔁 1
💬 1
📌 0
Analysis by Graphika.com describes online influence activity in the run up February’s election for the Sikyong in the Central Tibetan Administration, the #Tibetan diaspora’s governing body based in India.
05.03.2026 02:15
👍 6
🔁 3
💬 1
📌 1
BBC Live updates: Polls have just opened in #Nepal's first general election since deadly youth-led anti-corruption protests toppled the government last year www.bbc.co.uk/news/live/cv...
05.03.2026 00:33
👍 4
🔁 3
💬 1
📌 0
Detecting and preventing distillation attacks
Anthropic is an AI safety and research company that's working to build reliable, interpretable, and steerable AI systems.
#DeepSeek used Claude without authorisation to generate censorship safe responses to queries about dissidents, party leaders, & digital authoritarianism, building political censorship training data from a US frontier model. #Anthropic has named specific researchers.
24.02.2026 02:09
👍 0
🔁 2
💬 1
📌 1
ICT urges G7 sherpas to include Tibet in talks on China, arguing that human rights abuses in #Tibet (religious repression, forced assimilation, #surveillance) are not just moral issues but *security indicators* that reveal systemic risk, affect regional stability, & should shape G7 policy on China:
24.02.2026 00:48
👍 8
🔁 3
💬 0
📌 0
… but they left in that hackers targeted Czechia after its president met the Dalai Lama.
#Attribution matters. (That’s exactly why it was softened.)
12.02.2026 23:26
👍 5
🔁 0
💬 0
📌 1
Worth noting: TCRC isn’t new to this sort of research. It has long run security operations and incident response against Chinese #APT #malware activity. That operational discipline now being applied to counter- #IO #disinformation is significant (and apparently increasingly necessary.)
09.02.2026 19:06
👍 1
🔁 1
💬 0
📌 0
China’s role in digital repression in Iran ⬇️
Our new report reveals how China has helped build Iran’s surveillance, censorship, and infrastructure of information control inside the country.
09.02.2026 09:02
👍 9
🔁 5
💬 1
📌 0
Nature security assessment on global biodiversity loss, ecosystem collapse and national security
This strategic assessment explores how global biodiversity loss and the collapse of critical ecosystems could affect the UK’s resilience, security and prosperity.
The UK’s Nature Security Assessment flags ecosystem collapse as a national security risk. Degradation of the Himalayan water system risks destabilising rivers that support billions, increasing water stress, food insecurity, & climate migration pressures with global impact
www.gov.uk/government/p...
04.02.2026 06:06
👍 5
🔁 3
💬 1
📌 0
UK investigating first suspected breach of cyber sanctions
HM Treasury said the Office of Financial Sanctions Implementation (OFSI) has recorded up to five potential breaches of cyber sanctions, all involving firms in the financial services sector.
Little scoop: British authorities have opened their first investigation into a suspected breach of the country’s cyber sanctions regime since the measures took effect more than five years ago, according to information obtained by Recorded Future News under freedom of information laws.
03.02.2026 16:47
👍 9
🔁 4
💬 0
📌 0
At @turquoiseroof.org we’re experimenting with machine learning x #Sentinel-1 radar to monitor infrastructure when snow, cloud, & sun glare limit optical imagery. #geoAI
02.02.2026 23:55
👍 3
🔁 1
💬 0
📌 0
We talked with Dr. Valentin Weber about his research on secure messenger services inside the PLA, their flaws and limitation and how a system obsessed with surveillance, even compromises on security to keep tabs on what their soldiers talk about: open.substack.com/pub/netaskar...
28.01.2026 16:17
👍 3
🔁 1
💬 0
📌 0
BTS on the data science, geospatial methods, & engineering behind transnational threat investigations matters. Transparency about *how* evidence is built strengthens the work & the field.
Turquoise Roof uses C4ADS' investigative platform to power our open source/PAI research and investigative work:
27.01.2026 18:28
👍 5
🔁 3
💬 0
📌 0
AI is turning electricity into a strategic input like semiconductors: whoever can route vast, reliable, low carbon power to dense data centre clusters can scale model training, inference, & industrial automation faster & cheaper. The UHV corridor bridges frontier generation & coastal compute:
22.01.2026 19:56
👍 3
🔁 2
💬 1
📌 0
It was a privilege contributing to this report on transnational repression in the EU. I learned a great deal working with @nateschenkkan.bsky.social, @zecsaky.bsky.social, & @alexdukalskis.bsky.social. A special thank you to the victims of TNR who shared their experiences & expertise with us.
23.01.2026 15:19
👍 5
🔁 6
💬 0
📌 0