Pete Hegseth’s Signal Scandal Spirals Out of Control

As the Trump administration’s aggressive immigration policy ramps up, people have started to seriously consider their privacy and security when crossing into the United States. That’s especially true when it comes to searches of travelers’ phones and other devices, which US Customs and Border Protection agents have broad authority toContinue Reading

Protecting Your Phone—and Your Privacy—at the US Border

Lauren Goode: I think Katie should go first. She’s the boss. Katie Drummond: So as you all know, because I can’t stop talking about it, I recently returned from France, and one thing in particular that I am now pathologically fixated on, that I am recommending to all of you,Continue Reading

How to Protect Yourself From Phone Searches at the US Border

Privacy and digital rights advocates largely prefer the approach of building a travel device from scratch, but they caution that a phone that is too squeaky clean, too much like a burner phone, can arouse suspicion. “You have to ‘seed’ the device. Use the phone for a day or evenContinue Reading

Florida Man Enters the Encryption Wars

Just three months into the Trump administration’s promised crackdown on immigration to the United States, Immigrations and Customs Enforcement now has a $30 million contract with Palantir to build a “near-real time” surveillance platform called ImmigrationOS that would track information about people self-deporting (electing to leave the US). Meanwhile, theContinue Reading

Here’s What Happened to Those SignalGate Messages

The US Treasury Department was initially alone in providing the court a timeline of the messages that it was able to retrieve. Treasury Secretary Scott Bessent had received a preservation memo on March 26, his acting general counsel said, as well as advice regarding his fundamental duty to preserve records.Continue Reading

Brass Typhoon: The Chinese Hacking Group Lurking in the Shadows

As China continues its digital gambit around the world, researchers are warning that hacking activity from long-tracked groups is evolving and blending together. On top of that, attackers are hiding their campaigns more effectively and blurring the lines between cybercriminals and state-backed hacking. Last year, revelations rocked the United StatesContinue Reading

Gamaredon: The Turncoat Spies Relentlessly Hacking Ukraine

Russian state hackers, perhaps more than those of any other nation, tend to show off. The notorious Sandworm unit within Russia’s GRU military intelligence agency, for instance, has triggered unprecedented blackouts and released destructive, self-replicating code. The FSB’s ingenious Turla group has hijacked satellite internet connections to steal victims’ dataContinue Reading

CyberAv3ngers: The Iranian Saboteurs Hacking Water and Gas Systems Worldwide

That initial wave of CyberAv3ngers hacking, both real and fabricated, appears to have been part of a tit-for-tat with another highly aggressive hacker group that is widely believed to work on behalf of Israeli military or intelligence agencies. That rival group, known as Predatory Sparrow, repeatedly targeted Iranian critical infrastructureContinue Reading