#operational-security

[ follow ]
US politics
fromNextgov.com
1 week ago

Hegseth broke rules, DODIG concludes, even though he said Yemen strike details were 'safe to declassify'

Pete Hegseth transmitted sensitive strike timing and location details via an unapproved messaging app on his personal phone, violating DoD policy and risking personnel and mission security.
US politics
fromWIRED
1 week ago

'Signalgate' Inspector General Report Wants Just One Change to Avoid a Repeat Debacle

Secretary of Defense Pete Hegseth used Signal to share sensitive, real-time strike details, potentially endangering US troops and operations.
#signalgate
fromwww.npr.org
1 week ago

Pentagon watchdog finds Hegseth broke policies by using Signal to discuss airstrikes

The 84-page report concludes that Hegseth's decision to share highly sensitive military plans on the commercially available encrypted messaging app, using his personal cell phone, could have jeopardized the safety of American servicemembers and the mission. "The Secretary sent nonpublic DoD information identifying the quantity and strike times of manned U.S. aircraft over hostile territory over an unapproved, unsecure network approximately 2 to 4 hours before the execution of those strikes," according to the report.
US politics
US politics
fromwww.mediaite.com
1 week ago

Why Pete Hegseth's Buffoonery Isn't a Bug for Trump It's the Job

Pete Hegseth remains Pentagon leader while cultivating chaos and loyalty-based side channels, rewarded by a president who values spectacle and ratings over competence and standards.
#signal-app
fromAxios
1 week ago
US politics

Signalgate report finds Hegseth potentially put U.S. forces at risk

fromAxios
1 week ago
US politics

Signalgate report finds Hegseth potentially put U.S. forces at risk

fromwww.aljazeera.com
1 week ago

Inspector general report raises concerns about Hegseth's use of Signal chat

The report, slated to be released on Thursday, is said to recommend further training in the handling of sensitive information. The Pentagon's inspector general has reportedly determined that Secretary of Defense Pete Hegseth improperly used the messaging app Signal to convey sensitive information, thereby putting a United States military operation at risk. Media reports, released on Wednesday, offered a preview of the inspector general's report, slated to be released in full on Thursday.
US politics
US politics
fromwww.npr.org
1 week ago

Pentagon watchdog finds Hegseth risked the safety of U.S. forces with use of Signal

Defense Secretary Pete Hegseth shared sensitive military targeting information on Signal, risking U.S. servicemembers and violating Pentagon policy.
Information security
fromTheregister
3 weeks ago

Pentagon and soldiers let too many secrets slip on socials

DoD failures in guidance and training allow social media posts, press releases, and public data to leak sensitive information that endangers personnel and operations.
US politics
fromSlate Magazine
1 month ago

I Went to Watch the Tiny Operation That's Making ICE Lose Its Mind. A Lot Can Happen in 24 Hours.

A covert volunteer group in Los Angeles conducts early-morning patrols to monitor and respond to nearby ICE operations, using aliases and organized, equipment-equipped rounds.
fromThe Hacker News
1 month ago

ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More

The activity of the Lumma Stealer (aka Water Kurita) information stealer has witnessed a "sudden drop" since last months after the identities of five alleged core group members were exposed as part of what's said to be an aggressive underground exposure campaign dubbed Lumma Rats since late August 2025. The targeted individuals are affiliated with the malware's development and administration, with their personally identifiable information (PII), financial records, passwords, and social media profiles leaked on a dedicated website.
Information security
UK news
fromTheregister
2 months ago

MI6 upgrades dark web portal to recruit new spies

MI6 launched Silent Courier, a Tor-accessible dark web portal and published security guidance to enable secure contact and recruit foreign informants worldwide.
Privacy technologies
fromWIRED
2 months ago

How to Set Up and Use a Burner Phone

Use a cash-bought, frequently rotated prepaid burner phone, isolated from personal accounts, to separate identity from device and reduce location and data tracking.
California
fromThe Oaklandside
3 months ago

OPD's decision to encrypt its radio feeds caught city officials by surprise

The Oakland Police Department is encrypting radio and dispatch channels, removing public access to live police communications.
Information security
fromSecuritymagazine
3 months ago

In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Economic pressures and high inflation are increasing property-related crime, exposing operational sites to theft and requiring proactive security measures to protect assets and revenue.
fromSecuritymagazine
3 months ago

Take a Look Inside: Managing and Mitigating Insider Risk

All individuals with access to or knowledge of an organization's computers, networks, facilities, information, or personnel are potential insider threats, including vendors and contractors. The ability to intentionally use or accidentally misuse any of this information can breach confidentiality, reveal trade secrets, cause a data security incident, or harm an organization's personnel, ultimately impacting its reputation and ability to do business.
Information security
#cybercrime
#cybersecurity
fromThe Hacker News
6 months ago
Artificial intelligence

OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups

OpenAI identified and banned accounts used by threat actors for developing malware and social media manipulation.
fromemptywheel
7 months ago
Digital life

Whiskey Pete's Dirty Desktop - emptywheel

Pete Hegseth's operational security is critically weak, posing risks to sensitive information.
Cryptocurrency
fromBitcoin Magazine
7 months ago

9 Of The Best Bitcoin Consultants To Improve Your Knowledge, Enhance Your OPSEC And Secure Your Bitcoin

Bitcoin requires individuals to take full responsibility for asset protection, emphasizing the need for operational security and adept guidance.
US politics
fromFuturism
7 months ago

The Head of the Pentagon Has Been Using His Personal Phone for Sports Betting and Sharing Military Secrets

Defense Secretary Pete Hegseth's use of a personal phone for classified communications has raised major national security concerns.
[ Load more ]