An analysis of WIRED this week found that ICE and CBP’s face recognition app Mobile Fortify, which is used to identify people across the United States, is never designed to verify who people are and is only approved for use by the Department of Homeland Security by relaxing some of the agency’s own privacy rules.
WIRED took a closer look highly militarized ICE and CBP units which uses extreme tactics normally seen only in active combat. Two agents involved in the shooting deaths of US citizens in Minneapolis were reportedly members of paramilitary units. And a new report from the Public Service Alliance this week found just that Data brokers can fuel violence against public servantswho face more threats but have few ways to protect their personal information under state privacy laws.
Meanwhile, at the Milano Cortina Olympic Games starting this week, The Italians and other spectators were on edge as an influx of security personnel—including ICE agents and members of the Qatari Security Forces—descended on the event.
And many more. Each week, we round up the security and privacy news we don’t quite understand. Click on the headlines to read the full stories. And stay safe out there.
AI is recognized as a super-powered tool for finding security flaws in code for hackers to exploit or for defenders to fix. So far, one thing has been confirmed: AI creates many of the hackable bugs themselves—including a particularly nasty one revealed this week in an AI-coded social network for AI agents known as Moltbook.
Researchers at security firm Wiz this week Revelation that they found a serious security flaw in Moltbook, a social network intended to be a Reddit-like platform for AI agents to interact with each other. The mishandling of a private key in the site’s JavaScript code exposed the email addresses of thousands of users with millions of API credentials, allowing anyone to access “which would allow the complete account impersonation of any user of the platform,” as Wiz wrote, along with access to private communications between AI agents.
That security flaw may come as little surprise since Moltbook is proudly “vibe-coded” by its founder, Matt Schlicht, who has DECLARED that he “didn’t write a single line of code” himself to create the site. “I had a vision for technical architecture, and AI made it a reality,” he wrote in X.
Although Moltbook has now fixed the site error discovered by Wiz, its critical vulnerability should serve as a warning about the security of AI-powered platforms. The problem is often not any security flaw inherent in companies’ AI implementation. Instead, these companies are more likely to let AI write their code—and many AI-generated bugs.
The FBI’s raid on Washington Post reporter Hannah Natanson’s home and search of her computers and phones amid its investigation into alleged leaks by a federal contractor provides important security lessons about how federal agents can access your devices. if you have biometrics enabled. It also revealed at least one safeguard that could keep them out of the devices: Apple Lockdown mode for iOS. The feature, designed at least in part to prevent the hacking of iPhones by governments that contract spyware companies like the NSO Group, also kept the FBI from Natanson’s phone, according to a court filing first reported by 404 Media. “Because the iPhone was in Lockdown mode, CART could not retrieve that device,” reads the filing, using an acronym for the FBI’s Computer Analysis Response Team. That protection probably resulted from the Lockdown mode security measure that prevents connection to peripherals—as well as forensic analysis devices such as Graykey or Cellebrite tools used for hacking phones—unless the phone is unlocked.
Elon Musk and Starlink’s role in the war in Ukraine in the past complexand has not always favored Ukraine in its defense against Russian aggression. But Starlink this week gave Ukraine a significant victory, preventing the Russian military from using Starlink, causing a loss of communication with most of its frontline forces. Russian military bloggers described the move as a serious problem for Russian troops, especially in its use of drones. The move reportedly came after Ukraine’s defense minister wrote to Starlink’s parent company, SpaceX, last month. Now it appears to have responded to that plea for help. “The enemy is not only a problem, the enemy is a disaster,” Serhiy Beskrestnov, one of the advisers to the defense minister, wrote on Facebook.
In a coordinated digital operation last year, the US Cyber Command used digital weapons to disrupt Iran’s air missile defense system during a US kinetic attack on Iran’s nuclear program. The disruption “helped prevent Iran from launching surface-to-air missiles at American warplanes,” according to The Record. US agents reportedly used intelligence from the National Security Agency to find an advantageous weakness in Iran’s military systems that allowed them to take out anti-missile defenses without having to directly attack and defeat Iran’s military digital defenses.
“The US Cyber Command is proud to support Operation Midnight Hammer and is fully equipped to carry out the orders of the commander-in-chief and the secretary of war at any time and in any place,” a command spokesman said in a statement to The Record.









