An analysis by WIRED revealed that the face recognition app used by ICE and CBP, called Mobile Fortify, was not actually designed for verifying identities. Instead, it was authorized for use by relaxing certain privacy regulations within the Department of Homeland Security. This week, WIRED also scrutinized the militarized units within ICE and CBP, highlighting the extreme tactics they employ, which are usually reserved for combat situations. Two agents involved in shooting incidents in Minneapolis reportedly belong to these units. Additionally, a new report has pointed out that data brokers are increasingly endangering public servants who face rising threats without adequate safeguards for their personal information.
As the Milano Cortina Olympic Games kick off, many Italians, along with other attendees, are anxious about the arrival of heightened security measures, including the presence of ICE agents and Qatari security personnel.
In more technology-related security news, researchers at Wiz uncovered a critical vulnerability in Moltbook, an AI-coded social network aimed at AI agents. This flaw exposed the personal data, including email addresses and API keys, of thousands of users, allowing unauthorized access and account impersonation. The site’s founder, Matt Schlicht, boasted that he did not write any of the code himself, relying entirely on AI for development, which might explain the significant security issues.
In a separate incident, an FBI investigation into Washington Post reporter Hannah Natanson highlighted the effectiveness of Apple’s Lockdown mode. This security feature successfully prevented the FBI from accessing Natanson’s phone during a raid, demonstrating a practical safeguard against unauthorized device access.
Elon Musk’s Starlink played a pivotal role in Ukraine’s ongoing conflict by disabling Russian troops’ satellite internet access, leading to significant communication outages for the Russian military. This action responded directly to a request for assistance from Ukraine’s defense minister, underlining Musk’s evolving involvement in wartime technology dynamics.
Additionally, a coordinated cyber operation by US Cyber Command aimed to disrupt Iran’s missile defense systems during a kinetic military strike last year, enhancing operational safety for US forces and revealing the increasing intersection of digital warfare and traditional military strategies.