• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - national security
Tag:

national security

Business

NASA steps into mystery of missing scientists as pressure builds for answers

by Chief Editor April 21, 2026
written by Chief Editor

The recent string of disappearances and deaths among top-tier nuclear and space scientists isn’t just a series of tragic coincidences—it’s a flashing red light for global security. When the people holding the keys to the next generation of energy and interstellar travel start vanishing, we aren’t just looking at criminal cases; we’re looking at the frontline of a new, invisible war over intellectual capital.

For decades, the “Cold War” was about missiles and borders. Today, the battlefield has shifted. It’s now about who possesses the specific, nuanced knowledge required to master nuclear fusion, quantum propulsion, and the mysteries of Unidentified Anomalous Phenomena (UAPs). As we move forward, the risks facing high-value scientists will only intensify.

The New Cold War for Intellectual Capital

We are entering an era of “Aggressive Talent Acquisition.” In the past, espionage involved stealing blueprints or hacking servers. While that still happens, the most efficient way to leapfrog a rival nation’s technology is to acquire the mind that created it.

The trend is shifting toward the targeting of “Linchpin Scientists”—individuals whose specific expertise is so rare that their loss or defection could set a national program back by a decade. Whether through coercion, bribery, or more sinister means, the pursuit of these individuals is becoming a primary objective for adversarial intelligence agencies.

Did you grasp? The concept of “Brain Drain” usually refers to scientists moving for better pay. However, intelligence communities now track “Forced Migration,” where experts are pressured to relocate to adversarial nations under threat or promise of unprecedented resources.

The Privatization of State Secrets

One of the most significant trends we’re seeing is the migration of cutting-edge research from government agencies like NASA to private corporations. Companies like SpaceX and Blue Origin are now handling tasks that were once the exclusive domain of the state.

The Security Gap in Private Research

While government facilities have rigorous security protocols and FBI oversight, private firms often operate with more flexibility, which can lead to vulnerabilities. The “corporate campus” environment is far easier to infiltrate than a fortified military base.

As more nuclear and space research moves into the private sector, People can expect a rise in corporate espionage. The line between a “business competitor” and a “foreign agent” is blurring, making scientists in the private sector prime targets for those seeking to bypass government firewalls.

AI and the Precision Targeting of Experts

The days of casting a wide net are over. Artificial Intelligence is now being used to map the “knowledge graph” of an entire industry. By analyzing published papers, patent filings, and conference attendance, AI can identify exactly which scientist holds the missing piece of a technological puzzle.

This allows for “Precision Targeting.” An adversary no longer needs to kidnap a whole team; they only need the one person who understands the specific thermal dynamics of a new reactor or the propulsion physics of a UAP-style craft. This algorithmic approach to espionage makes the “disappearance” of a single, seemingly obscure researcher a strategic victory.

Pro Tip for Researchers: In an age of AI-driven targeting, “digital hygiene” is a security requirement. Limiting the granularity of personal information on professional networks can reduce the footprint available to those mapping intellectual assets.

The UAP Paradox: Secrecy vs. Disclosure

The intersection of space science and UAPs adds a layer of volatility. For years, the government maintained a policy of strict denial. Now, with increased congressional pressure and public hearings, the veil is lifting. However, this transition period is the most dangerous time for those “in the know.”

Mysterious Cases of Dead and Missing NASA Scientists Unveils Chilling Pattern

When secrets move from “deep black” programs to the verge of public disclosure, the incentive to silence witnesses or experts peaks. We are likely to see a trend of “strategic leaks” countered by “strategic silences,” where individuals who possess proof of non-human intelligence or breakthrough physics find themselves in the crosshairs of those who believe such knowledge should remain classified for “national stability.”

For more on how government transparency is evolving, check out our analysis on the evolution of government secrecy.

Future Protection Frameworks for High-Value Assets

To counter these threats, we expect a shift in how the U.S. Protects its scientific community. We will likely see the implementation of “Intellectual Asset Protection Programs” that mirror the security provided to high-ranking diplomats.

View this post on Instagram about Unidentified Anomalous Phenomena, Unidentified
From Instagram — related to Unidentified Anomalous Phenomena, Unidentified
  • Continuous Monitoring: Real-time security audits for scientists working on “Tier 1” technologies.
  • Redundant Knowledge Systems: Moving away from “single-point-of-failure” expertise by ensuring critical knowledge is distributed across multiple teams.
  • Enhanced Vetting: More rigorous background checks for private contractors handling state-level secrets.

Frequently Asked Questions

Are these disappearances linked to foreign espionage?
While not officially confirmed in every case, the pattern of targeting experts in nuclear and space research strongly suggests a motive of intellectual theft or strategic sabotage.

Why is the FBI involved in scientific deaths?
When a scientist’s work impacts national security, their death or disappearance is treated as a potential intelligence breach rather than a simple local crime.

What is the connection to UAPs?
Some of the affected scientists were reportedly involved in studying Unidentified Anomalous Phenomena, which often involves classified propulsion and materials science that adversarial nations are eager to acquire.

Is the private sector safer than government labs?
Not necessarily. While they have less bureaucracy, private firms often lack the comprehensive counter-intelligence infrastructure that agencies like the Department of Energy provide.

What do you think is happening?

Is this a coordinated effort to stifle scientific breakthrough, or a series of isolated incidents? We want to hear your theories.

Join the conversation in the comments below or subscribe to our National Security newsletter for weekly deep dives.

April 21, 2026 0 comments
0 FacebookTwitterPinterestEmail
World

Estonian journalists went on China ‘propaganda’ visit | News

by Chief Editor April 18, 2026
written by Chief Editor

The Evolution of Curated Influence: Understanding Modern Propaganda

Modern influence operations have shifted from blunt messaging to sophisticated, curated experiences. As highlighted in the recent ISS (Kapo) annual report, there is a growing trend of using “curated and polished” visits to reshape perceptions of foreign powers, specifically regarding China’s activities in Estonia.

View this post on Instagram about Influence, China
From Instagram — related to Influence, China

These initiatives often masquerade as cultural cooperation or professional development, targeting specific cohorts of society to create a favorable narrative from the inside out.

Did you know? The ISS report indicates that Chinese intelligence services attempt to lure influential individuals by inviting them to China and the surrounding region to build strategic links.

Strategic Targeting of Media and PR Figures

A key trend in these influence activities is the targeting of “media figures” and public relations professionals. Rather than focusing solely on high-ranking politicians, these operations engage those who control the narrative.

Strategic Targeting of Media and PR Figures
Influence Estonia Askur Alas

A recent example involved a trip organized by a foreign relations firm in Jiangsu province. Attendees included journalist Askur Alas from Harju Elu, Galina Streltsova from MK Estonia, and Oliver Lomp and Siim Nikopensius, owners of the creative agency Sweep.

By engaging journalists and PR specialists, these programs aim to secure organic, positive coverage that feels authentic to the local audience, rather than appearing as state-sponsored advertising.

Expanding the Toolkit: From LinkedIn to Local Government

The methods used to establish these connections are becoming increasingly diversified. Influence activities are no longer limited to official diplomatic channels; they now leverage digital platforms and local partnerships.

  • Professional Networking: LinkedIn is actively used as a method of contact to identify and recruit influential individuals.
  • Local Integration: Cultural outreach is often funneled through embassies and organized in collaboration with local governments.
  • Financial Incentives: The ISS notes that local media and PR firms are sometimes paid to broker these critical links between foreign interests and domestic elites.

The Focus: Science, Tech, and Security

Influence operations are not random; they are strategically aligned with sectors of high importance. The current focus heavily emphasizes science, technology, and security.

China's Journalists Ordered To Take Marxism Classes | China Uncensored

By building bridges in these technical fields, foreign actors can gain access to expertise, foster dependencies, and influence the policy landscape under the guise of academic or technical cooperation.

Pro Tip: When evaluating professional invitations for international visits, verify the funding source and the organizing entity’s ties to foreign government agencies to distinguish between genuine cooperation and curated influence.

Deflecting Global Narratives

The ultimate goal of these “curated experiences” is often narrative management. By providing a polished version of reality, these trips attempt to deflect attention from systemic issues that generate negative press.

Deflecting Global Narratives
Influence China Estonia

According to the ISS, these efforts are designed to mask concerns regarding:

  • Human rights abuses.
  • Unfair economic practices.
  • Growing support for Russia in the war against Ukraine.

By creating a positive personal connection with visitors, the organizers hope to neutralize criticism and create a buffer of sympathetic voices within the host country.

Frequently Asked Questions

Who organized the recent Estonian media visit to China?
The visit was organized at the invitation of a foreign relations firm located in Jiangsu province.

Which Estonian media figures were involved?
The trip included Askur Alas (Harju Elu), Galina Streltsova (MK Estonia), and Oliver Lomp and Siim Nikopensius (Sweep agency).

What is the primary goal of these curated visits?
The goal is to expand influence activities and deflect attention from human rights abuses, unfair economic practices, and geopolitical alignments, such as support for Russia in the war against Ukraine.

How are these individuals contacted?
Common methods include embassy outreach, collaborations with local governments, and the use of professional networking sites like LinkedIn.

What are your thoughts on the intersection of professional networking and foreign influence? Should journalists be more transparent about the funding of their international trips? Let us know in the comments below or subscribe to our newsletter for more deep dives into media integrity.

April 18, 2026 0 comments
0 FacebookTwitterPinterestEmail
News

Judge says White House ballroom construction can’t begin above ground

by Rachel Morgan News Editor April 17, 2026
written by Rachel Morgan News Editor

A federal judge has maintained a block on the above-ground construction of a proposed $400 million White House ballroom, according to a decision issued Thursday. Even as the ruling halts the main structure, it allows work to continue on below-ground facilities, including a bunker and other national security installations.

Judicial Restrictions and National Security

U.S. District Judge Richard Leon issued the ruling after an appeals court requested clarification on a previous decision. The dispute centers on a 90,000-square-foot ballroom planned for the site where the White House East Wing was demolished.

Government lawyers argued that the entire project is essential for protecting against threats such as biohazards, ballistic missiles, and drones. However, Judge Leon stated that while he recognizes safety implications, national security does not provide a “blank check” for activity he deemed otherwise unlawful.

Did You Grasp? The proposed ballroom is designed to accommodate 999 people and is being built on the site of the now-demolished East Wing.

Executive Response and Legal Conflict

President Donald Trump reacted strongly to the ruling on social media, labeling Judge Leon a “Trump Hating” judge. He claimed the decision undermines national security and delays a project he described as a “Great Gift to America.”

View this post on Instagram about Judge, Leon
From Instagram — related to Judge, Leon

The administration has already filed a notice indicating it will seek a review of this latest decision from the U.S. Court of Appeals for the District of Columbia Circuit. Judge Leon has stayed the decision for one week, providing the administration time to potentially seek a review from the Supreme Court.

Expert Insight: This case highlights a significant tension between executive claims of national security and judicial oversight of federal land. By bifurcating the project into above-ground and below-ground work, the court is attempting to balance the immediate safety needs of the presidency with the legal requirements of congressional approval and historic preservation.

Project Background and Funding

The National Trust for Historic Preservation, led by CEO Carol Quillen, filed the lawsuit in December to challenge the ballroom project. The group expressed satisfaction with the court’s decision to block the above-ground work.

Funding for the project is split: President Trump stated the ballroom is funded via private donations, while public funds are being used for the security upgrades and bunker construction. Despite the legal battle, the 12-member National Capital Planning Commission gave the ballroom final approval on April 2.

Potential Next Steps

The legal battle may move toward the Supreme Court if the administration pursues that avenue during the current stay. The U.S. Court of Appeals for the District of Columbia Circuit could potentially review and alter Judge Leon’s restrictions.

Potential Next Steps
Judge Leon White House

The project’s progress remains dependent on whether the administration can secure the congressional approval that Judge Leon previously indicated was necessary for above-ground work to proceed.

Frequently Asked Questions

What specific parts of the construction are currently blocked?

Judge Richard Leon has blocked all above-ground construction of the ballroom, except for work required to secure or cover the project. Below-ground work on bunkers, medical facilities, and military installations remains permitted.

How is the $400 million project being funded?

The ballroom construction is reportedly funded by private donations, while the bunker and other security enhancements are paid for with public money.

Why did the National Trust for Historic Preservation sue?

The group filed the lawsuit in December to challenge the construction project, which involved the demolition of the White House East Wing.

Do you believe national security concerns should outweigh historic preservation rules when modifying federal landmarks?

Judge says White House ballroom construction can continue | FOX 5 DC

April 17, 2026 0 comments
0 FacebookTwitterPinterestEmail
News

Ex-MI5 employee sectioned over leak of state secrets to foreign power

by Rachel Morgan News Editor April 15, 2026
written by Rachel Morgan News Editor

A former MI5 employee has been sectioned after being accused of repeatedly leaking sensitive information to a foreign power.

Former MI5 Contractor Detained Under Mental Health Act

Juan Joseph, 43, a former government IT contractor, was found not guilty by reason of insanity following a week-long trial at the Old Bailey in March. He had emailed a foreign state and travelled to an embassy overseas in an attempt to pursue a complaint against MI5.

Former MI5 Contractor Detained Under Mental Health Act
Joseph Juan Juan Joseph

On Wednesday, at a hearing at the Old Bailey, Joseph was detained indefinitely under sections 37 and 41 of the Mental Health Act. Mr. Justice Hilliard stated, “I accept that Mr Joseph would not have done what he did if he had not been mentally ill.” Yet, the judge also expressed concern that if Joseph’s mental health deteriorates, there is a “very obvious risk that similar conduct could be repeated” with “very serious” consequences for national security.

Did You Know? Juan Joseph held the highest level of security clearance – “Developed Vetting” – during his 11 years at MI5, granting him access to highly classified information.

Joseph was diagnosed with paranoid schizophrenia and, according to the court, did not understand that his actions were wrong. Four psychiatrists agreed that a restricted hospital order was appropriate. Prosecuting, Ms. Jocelyn Ledward KC, noted a “high risk” of similar actions if Joseph’s mental health were to decline again.

The court heard Joseph’s 11-year career at MI5 included roles as a systems engineer, security IT management engineer, and senior support engineer. His contract was terminated in October 2020 after he was admitted to St Thomas’ Hospital in London due to “mental fragility,” “extreme anxiety,” and “paranoia.” He discharged himself before a full assessment could be completed.

FBI Arrests Ex-Army Employee Over Alleged Leak to Journalist

Following the termination of his contract, Joseph made a series of complaints against MI5, including claims of racist treatment and “highly disturbing” allegations of rape, child abuse, and torture. He also claimed a swastika had been placed in his office and that he had been injected with an unknown substance at MI5 headquarters. The trial was held largely behind closed doors to protect national security.

Expert Insight: The indefinite detention under sections 37 and 41 of the Mental Health Act reflects the seriousness with which the court views the potential risk posed by Joseph’s actions, even while acknowledging the role of his mental illness. The Section 41 restriction, requiring Ministry of Justice approval for release and allowing for immediate recall, underscores the priority given to safeguarding national security.

Joseph travelled to Riga, Latvia, in December 2024, attempting to arrange a meeting at a foreign embassy. He was arrested at Gatwick Airport upon his return, and again at an Ibis Hotel on January 30, 2025, where a lock knife was found in his possession. He maintained he was an “armed MI5 officer” and possessed a forged identification card.

The prosecution revealed Joseph had been arrested in early 2022 on similar charges, but no further action was taken at that time. He was subsequently admitted to a hospital for a mental health assessment, but was discharged when deemed not “sufficiently unwell” to remain hospitalized.

Frequently Asked Questions

What charges was Juan Joseph facing?

Joseph denied four charges under the Official Secrets and National Security Acts and having an article with a blade or point, but was found not guilty by reason of insanity.

Where will Juan Joseph be held?

Joseph will remain at Broadmoor Hospital indefinitely.

What was the judge’s assessment of Joseph’s mental state?

Mr. Justice Hilliard accepted that Joseph’s actions were a result of his mental illness, specifically paranoid schizophrenia, and that he did not have a “guilty mind” or understand that his actions were wrong.

Given the complexities of this case, and the intersection of mental health and national security, what safeguards are necessary to balance individual rights with the protection of sensitive information?

April 15, 2026 0 comments
0 FacebookTwitterPinterestEmail
News

MI5 contractor who gave intelligence to foreign power ‘was insane’

by Rachel Morgan News Editor March 20, 2026
written by Rachel Morgan News Editor

A former MI5 IT contractor has been found “not guilty by reason of insanity” by an Vintage Bailey jury after disclosing intelligence information to a “foreign power.” The case, which involved classified evidence presented in closed sessions, highlights the complex intersection of national security and mental health.

Details of the Case

Juan Joseph, 43, worked for the Security Service – commonly known as MI5 – from 2009 until 2020, holding positions including systems engineer and security IT management engineer. He possessed the highest level of security clearance, “Developed Vetting,” granting him access to “information of the highest classification.”

Did You Know? Juan Joseph’s contract with MI5 was terminated after he was taken to St Thomas’ Hospital in London in October 2020 due to the development of schizophrenia with paranoid delusions.

The court heard that Joseph began experiencing mental health issues in 2020. Following the termination of his contract, he repeatedly raised unfounded grievances against MI5, including claims of racism, rape, child abuse and torture. In August 2024, he attempted to bring a private prosecution against the agency for an alleged assault.

The disclosures of intelligence began after Joseph’s attempt at a judicial review was rejected. He then emailed an address associated with the foreign state. In December 2024, he traveled to Riga, Latvia, via Air Baltic, where he emailed the foreign embassy and requested a meeting. Further communication occurred in January 2025.

Upon his arrest on January 30, 2025, at a hotel in Sutton, police found a folding lock knife in his possession. Joseph claimed he was authorized to carry it due to his “ongoing role as an MI5 officer” and presented a fake ID card identifying him as a “STRAP officer.”

Expert Insight: This case underscores the significant challenges intelligence agencies face in balancing security protocols with the well-being of personnel, particularly when dealing with individuals holding highly sensitive information and experiencing mental health crises.

The Verdict and Aftermath

The prosecution and defense did not dispute the evidence of the intelligence disclosures or Joseph’s diagnosis of schizophrenia. Three psychiatrists testified to his mental state, and Mr. Justice Hilliard explained to the jury that the psychiatrists agreed Joseph “did not think that he was doing anything wrong,” believing he was “justified in what he was doing.” After less than two and a half hours of deliberation, the jury found Joseph not guilty by reason of insanity on all five charges, including two under the Official Secrets Act and two under the National Security Act.

Joseph will continue to receive mental health treatment at Broadmoor Hospital. A further court date is scheduled for April 15.

Frequently Asked Questions

What information was disclosed to the foreign power?

The name of the country and the specific information disclosed have been kept secret from the press and public to avoid damaging national security. The jury heard this evidence in closed sessions and were instructed not to discuss it with anyone.

What was Juan Joseph’s role at MI5?

Juan Joseph worked as an IT contractor for MI5 from 2009 to 2020, holding positions as systems engineer, security IT management engineer, and senior support engineer. He had the highest level of security clearance, allowing him access to highly classified information.

What will happen to Juan Joseph now?

Juan Joseph will continue to receive mental health treatment at Broadmoor Hospital. His case will be reviewed in court again on April 15.

Given the sensitive nature of this case and the ongoing need to protect national security, how might intelligence agencies adapt their vetting and support processes for personnel in the future?

March 20, 2026 0 comments
0 FacebookTwitterPinterestEmail
Business

Anduril to acquire space surveillance firm ExoAnalytic eyeing more Golden Dome capabilities

by Chief Editor March 11, 2026
written by Chief Editor

Anduril’s Acquisition of ExoAnalytic: A New Era in Space-Based Defense

Anduril Industries’ definitive agreement to acquire ExoAnalytic Solutions marks a significant escalation in the race to dominate space-based defense capabilities. The move positions Anduril to play a key role in President Trump’s ambitious Golden Dome project, a proposed space shield designed to intercept ballistic, cruise, and hypersonic missiles.

Golden Dome and the Reindustrialization of Defense

The Golden Dome initiative is driving a surge in activity among defense technology firms, all vying for contracts to contribute to this next-generation defense system. Anduril, having already secured smaller contracts for space-based interceptors, is strategically bolstering its position through the ExoAnalytic acquisition. This reflects a broader trend of military reindustrialization, with a renewed focus on domestic defense capabilities.

ExoAnalytic’s Unique Capabilities: A Global Telescope Network

ExoAnalytic brings to the table a powerful asset: a global network of over 400 telescopes. This network provides persistent, high-fidelity awareness of deep space, enabling comprehensive tracking of thousands of objects in orbit. The company’s expertise extends beyond simply tracking. they likewise excel in modeling and simulation for classified national security space programs, and provide crucial software for missile warning and defense.

Synergies and Integration: Autonomy Meets Space Awareness

The acquisition isn’t just about adding telescopes. It’s about integrating ExoAnalytic’s sensor network and data analytics with Anduril’s core strengths in autonomy and command and control. Anduril’s senior vice president of engineering, Gokul Subramanian, emphasized that the deal will “supercharge” the company’s ambitions in space sensing, tracking, battle management, and fire control. This integration promises a more seamless and effective defense system.

The Growing Importance of Space Domain Awareness

Modern threats are increasingly space-based. Missiles can be launched from anywhere in the world, traveling at high speeds and potentially evading traditional detection methods. Space Domain Awareness (SDA) – knowing what’s happening in orbit – is therefore critical. ExoAnalytic’s capabilities in SDA are a key driver behind Anduril’s acquisition, allowing for better tracking of satellite maneuvers, detection of anomalies, and monitoring of space debris.

Did you know? ExoAnalytic’s telescope network famously revealed details of a Chinese satellite operation in 2021, demonstrating its ability to independently verify space activities.

Impact on Anduril: Expanding the Space Division

This acquisition represents Anduril’s first within its space business unit and its 11th overall. It will more than double the size of Anduril’s space division, adding ExoAnalytic’s 130 employees to the existing team of 120. The combined entity will operate under Anduril’s space and engineering division, rather than as a separate subsidiary.

Future Trends: The Commercialization of Space Defense

Anduril’s acquisition of ExoAnalytic exemplifies a growing trend: the increasing commercialization of space defense. Traditionally, space-based defense relied heavily on government-operated systems. However, companies like Anduril and ExoAnalytic are demonstrating the potential of commercial innovation to deliver cutting-edge capabilities. This trend is likely to accelerate as the demand for SDA and missile defense technologies grows.

Pro Tip: Preserve an eye on companies specializing in data analytics, artificial intelligence, and autonomous systems – these are the technologies that will be crucial for future space defense innovations.

FAQ

What is the Golden Dome project? It’s a proposed space-based missile defense system championed by President Trump, aiming to protect the U.S. From ballistic, cruise, and hypersonic missile threats.

What does ExoAnalytic do? ExoAnalytic operates a global network of telescopes used to track satellites, space debris, and provide data for space domain awareness and missile defense.

Why did Anduril acquire ExoAnalytic? To strengthen its capabilities in space-based defense, particularly in space domain awareness, and to position itself for contracts related to the Golden Dome project.

What is Space Domain Awareness (SDA)? SDA is the ability to understand and monitor activities in space, including tracking satellites, debris, and potential threats.

Do you want to learn more about the latest developments in space technology and defense? Subscribe to our newsletter for exclusive insights and updates.

March 11, 2026 0 comments
0 FacebookTwitterPinterestEmail
Health

Video appears to show U.S. cruise missile striking Iranian school compound

by Chief Editor March 9, 2026
written by Chief Editor

U.S. Missile Strike Near Iranian School: A Shifting Narrative

A newly released video appears to reveal a U.S. Tomahawk cruise missile striking a compound adjacent to a girls’ school in Minab, Iran, on February 28, 2026. The incident, which Iranian state media reports resulted in the deaths of between 165 and 180 people, many of them students, has sparked a dispute over responsibility. While President Trump initially blamed Iran, mounting evidence suggests U.S. Involvement.

Contradicting Claims and Emerging Evidence

The seven-second video, posted by Iranian state news agency Mehr News, depicts a missile impacting a building within a walled compound. Experts, including Jeffrey Lewis of Middlebury College, believe the munition is consistent with a U.S.-made Tomahawk cruise missile – a weapon not known to be in Iran’s arsenal. This directly contradicts President Trump’s assertion that Iran was responsible, citing their “inaccuracy” with munitions.

Satellite imagery analysis, first reported by NPR and further investigated by CBC News, reveals the strike hit multiple buildings, including a health clinic, in what appears to be a precision attack. The compound previously functioned as an Islamic Revolutionary Guard Corps (IRGC) naval base, though the school was operating adjacent to it.

From Naval Base to School: A Complex History

The site’s history is complex. Satellite imagery shows the school was separated from the compound by a wall between 2013, and 2016. The airstrip was removed in 2024, and the land was being developed into a housing complex. The clinic, opened in 2025, was reportedly inaugurated by IRGC chief Hossein Salami, who was later killed in an Israeli strike. This suggests continued ties between the site and the IRGC even after the school’s establishment.

The Question of Targeting and Potential Errors

Experts suggest the bombing may have been the result of targeted, deliberate action, but also raise the possibility of faulty intelligence. The precision of the strike, hitting multiple buildings within the complex, points to careful planning. However, the presence of a school so close to a former military facility raises questions about the accuracy of targeting data.

Geolocating the Strike and Authenticating the Video

The location of the video was verified by NPR, confirming details matched known information about the compound. The video was also geolocated by Bellingcat. Both organizations noted the video’s authenticity, distinguishing it from AI-generated content often seen during the conflict, which typically lacks specific location details or contains physical inaccuracies.

U.S. Response and Ongoing Investigation

The Pentagon has not yet commented on the video. Defense Secretary Pete Hegseth stated the U.S. Is investigating but maintained that “the only side that targets civilians is Iran.” Gen. Dan Caine, Chairman of the Joint Chiefs of Staff, confirmed the use of Tomahawk missiles by the U.S. Navy in the region around the time of the strike.

The Future of Precision Strikes and Civilian Casualties

This incident highlights the increasing complexity of modern warfare and the potential for civilian casualties, even in precision strikes. The use of advanced weaponry like Tomahawk missiles doesn’t guarantee the avoidance of collateral damage, particularly in areas with dual-use facilities.

The Rise of Dual-Use Facility Targeting

The Minab school bombing exemplifies a growing trend: the targeting of dual-use facilities – locations that serve both military and civilian purposes. This raises significant ethical and legal questions, as it increases the risk of harming non-combatants. Future conflicts are likely to witness more instances of this type of targeting, necessitating stricter rules of engagement and more robust intelligence gathering.

The Role of Satellite Imagery and Open-Source Intelligence

The rapid dissemination of satellite imagery and video footage, coupled with the work of open-source intelligence groups like Bellingcat, is changing the landscape of conflict reporting. This allows for independent verification of events and challenges official narratives. Expect to see increased reliance on these sources in future investigations of military incidents.

AI and the Future of Target Verification

While AI-generated videos pose a challenge to verifying information, AI can also play a role in improving target verification. Machine learning algorithms can analyze satellite imagery and other data sources to identify potential civilian infrastructure near military targets, helping to minimize the risk of collateral damage.

FAQ

Q: What is a Tomahawk missile?
A: A Tomahawk is a long-range, all-weather, cruise missile manufactured by the United States. We see known for its precision-guided capabilities.

Q: Was the school intentionally targeted?
A: The evidence suggests the strike was targeted at the adjacent former IRGC naval base, but the proximity of the school raises questions about the accuracy of the intelligence used.

Q: What is the U.S. Government’s response?
A: The U.S. Government is investigating the incident, but maintains that Iran is responsible for targeting civilians.

Q: What is a dual-use facility?
A: A dual-use facility is a location that serves both military and civilian purposes, increasing the risk of civilian casualties during military operations.

Did you understand? The IRGC naval base in Minab appeared to be a relatively minor facility, with limited activity in recent years according to historical satellite imagery.

Pro Tip: Always cross-reference information from multiple sources, especially during times of conflict, to acquire a comprehensive understanding of events.

This is a developing story. Stay informed and continue to follow updates as they grow available.

What are your thoughts on this incident? Share your perspective in the comments below.

March 9, 2026 0 comments
0 FacebookTwitterPinterestEmail
News

Los Angeles, Bay Area voters will decide whether to hike already high sales taxes | Dan Walters | Dan-walters

by Rachel Morgan News Editor March 4, 2026
written by Rachel Morgan News Editor

California voters face a busy election year, with decisions looming on a new governor, state legislators, and a series of ballot measures. Simultaneously, local officials in Los Angeles County and the San Francisco Bay Area are seeking voter approval for increased sales tax rates, already among the highest in the nation.

Tax Increases on the Ballot

Los Angeles County officials are asking voters in the June primary to add a half percentage point to sales tax rates, which already exceed 10% in many cities. This increase is intended to offset a projected $2.4 billion reduction in federal healthcare funding over the next three years, according to Los Angeles County Supervisor Holly Mitchell.

In the Bay Area, voters in four counties will consider a half percentage point increase in November, while San Francisco voters will be asked to approve a full percentage point increase. These proposed taxes aim to address operating deficits within the Bay Area Rapid Transit (BART) system and local bus and trolley services.

Did You Know? California consumers spend approximately one trillion dollars annually on taxable goods.

Erosion of Tax Limitations

These proposed tax hikes continue a trend of circumventing a state law that limits local add-on taxes to 2 percentage points above the statewide rate of 7.25%. Local officials routinely seek waivers from the Legislature to exceed this cap, and those waivers are typically granted.

Currently, California’s average sales tax rate, including local overrides, is 8.99%, making it the seventh highest in the country. Some cities in Los Angeles County already have rates as high as 11.25%.

Controversy and Concerns

The proposed tax increases are not without opposition. The California Contract Cities Association, representing 73 cities in Los Angeles County, has voiced concerns that a county-wide half percentage point increase could hinder cities’ ability to pursue their own tax measures. According to the association’s executive officer, Marcel Rodarte, cities have expressed that the county tax increase “makes it more difficult for cities” to raise their own rates.

Expert Insight: The repeated reliance on tax increases to address ongoing operational costs, particularly for transit systems, suggests a deeper issue of financial sustainability and a potential failure to adapt to changing circumstances.

The Bay Area transit tax measure likewise reignites debate over the financial practices of BART and other transit systems, with critics questioning whether they are adequately adjusting to decreased ridership following the COVID-19 pandemic.

Governor Gavin Newsom and the Legislature have provided the Bay Area transit systems with a $590 million loan, contingent upon voter approval of the tax increase, which is estimated to generate $980 million annually.

Some critics, like Bay Area News Group columnist Daniel Borenstein, suggest transit officials are using scare tactics by warning of service cuts if the tax measure fails, particularly given BART’s current low ridership levels despite maintaining a high level of service.

Frequently Asked Questions

What is being asked of voters in Los Angeles County?

Voters in Los Angeles County will decide in the June primary election whether to add a half percentage point to the sales tax rate to offset reductions in federal healthcare spending.

What is the current average sales tax rate in California?

The average sales tax rate in California is 8.99%, according to the Tax Foundation.

What is the state’s role in local tax increases?

Local officials routinely question the Legislature to grant waivers to exceed a state law limiting local add-on taxes, and these waivers are typically approved.

As California voters consider these significant tax proposals, the outcomes could reshape the financial landscape of the state’s largest urban centers and influence the future of public services.

March 4, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Long before TikTok, the clock Was ticking on standards for foreign-owned apps

by Chief Editor January 21, 2026
written by Chief Editor

Our Digital House: Why the U.S. Needs Rules for Foreign-Owned Apps

Remember being told, “My house, my rules”? That simple childhood phrase is becoming a critical mantra for U.S. policymakers grappling with the growing influence of foreign-owned applications and software. As more of our lives move online, the question of who controls our data – and how it’s used – is no longer a theoretical concern, but a pressing national security and privacy issue.

The TikTok Effect and Beyond

The recent scrutiny of TikTok, owned by Chinese company ByteDance, has brought this issue to the forefront. Concerns about data access by the Chinese government, algorithmic manipulation, and potential censorship have fueled calls for restrictions or even a ban. But TikTok is just the most visible example. Apps like Temu, Shein, and even lesser-known software from countries with adversarial relationships to the U.S. present similar risks. A Council on Foreign Relations report highlights the broad range of potential vulnerabilities.

The core problem? The U.S. currently lacks a comprehensive framework for governing these foreign-owned digital entities. We operate on a patchwork of regulations, leaving significant gaps in oversight. This isn’t just about national security; it’s about protecting consumer privacy and ensuring a level playing field for American businesses.

Data Ownership: The First Line of Defense

At the heart of the issue is data ownership. Where is your data stored? Who has access to it? Can it be transferred to foreign governments? Currently, these questions are often buried in lengthy, complex user agreements that few people read. A recent Pew Research Center study found that only 9% of Americans say they always read a privacy policy before agreeing to the terms of service.

The solution isn’t necessarily to ban all foreign apps. It’s to establish clear, enforceable standards. These standards should include:

  • Data Localization: Requiring data to be stored within the U.S. or in countries with strong data protection laws.
  • Transparency: Mandating clear and concise disclosures about data ownership, usage, and transfer policies.
  • Algorithmic Accountability: Establishing mechanisms to audit algorithms for bias, manipulation, and potential harm.
  • Independent Audits: Requiring regular security audits by independent third parties.
  • Right to Opt-Out: Giving users meaningful control over their data and the ability to easily opt-out of data collection.

The AI Factor: A New Layer of Complexity

The rise of artificial intelligence adds another layer of complexity. Foreign-owned apps are increasingly using user data to train AI models. This raises concerns about intellectual property theft, the development of AI technologies that could be used against U.S. interests, and the potential for biased or discriminatory algorithms. Consider the implications if an AI model trained on American user data is then used to develop surveillance technologies or influence public opinion.

Pro Tip: Review the privacy settings on your most frequently used apps. While it won’t solve the systemic problem, it can give you some control over your personal data.

Looking Ahead: Potential Future Trends

Several trends are likely to shape the future of this debate:

  • Increased Government Regulation: Expect to see more legislative action at both the federal and state levels. The RESTRICT Act is a prime example of ongoing efforts.
  • Focus on Critical Infrastructure: Apps that control critical infrastructure, such as energy grids or financial systems, will likely face the strictest scrutiny.
  • International Cooperation: The U.S. will need to work with allies to develop a coordinated approach to regulating foreign-owned apps.
  • Rise of Data Sovereignty: More countries will likely adopt data sovereignty laws, requiring data to be stored and processed within their borders.
  • Decentralized Technologies: The growth of decentralized technologies, such as blockchain, could offer alternative models for data ownership and control.

FAQ: Foreign Apps and Your Data

  • Q: What is the biggest risk posed by foreign-owned apps?
    A: The primary risk is the potential for data access by foreign governments, which could be used for espionage, surveillance, or manipulation.
  • Q: Can the U.S. government ban apps?
    A: Yes, but bans are often legally challenged. Establishing clear regulatory standards is a more sustainable approach.
  • Q: What can I do to protect my data?
    A: Review privacy settings, use strong passwords, and be mindful of the information you share online.
  • Q: Is this just about China?
    A: No. While China is a major focus, the risks extend to apps from any country with potentially adversarial interests.

Did you know? The U.S. Committee on Foreign Investment in the United States (CFIUS) reviews transactions that could result in foreign control of U.S. businesses, but its authority over data security is limited.

The “Our house, our rules” principle isn’t about isolationism. It’s about establishing a fair and secure digital environment that protects American interests and values. It’s time for the U.S. to move beyond reactive measures and develop a proactive, comprehensive policy for governing foreign-owned apps before the next digital threat emerges.

What are your thoughts? Share your concerns and ideas in the comments below. Explore our other articles on cybersecurity and data privacy to learn more. Subscribe to our newsletter for the latest updates.

January 21, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Aflac: 22.6M impacted in cybersecurity breach | Local News

by Chief Editor December 21, 2025
written by Chief Editor

Aflac Breach: A Harbinger of Rising Healthcare Data Attacks?

The recent Aflac data breach, impacting approximately 22.65 million individuals, isn’t an isolated incident. It’s a stark reminder of the escalating threat landscape facing the healthcare and insurance industries. While Aflac acted swiftly to contain the breach and offer protective services, the event underscores a worrying trend: healthcare data is increasingly valuable – and therefore, increasingly targeted – by cybercriminals.

The Growing Value of Protected Health Information (PHI)

Why is healthcare data so attractive to hackers? Unlike credit card numbers, which can be quickly cancelled, PHI – including Social Security numbers, medical claims, and diagnoses – is incredibly persistent. It can be used for years to commit identity theft, insurance fraud, and even blackmail. According to the HIPAA Journal, healthcare data breaches exposed over 70 million records in 2023 alone, a significant increase from previous years. The average cost of a healthcare data breach in 2023 was a staggering $10.93 million, according to IBM’s Cost of a Data Breach Report 2023.

This isn’t just about financial gain. Nation-state actors are also increasingly interested in healthcare data, potentially for espionage or to disrupt critical infrastructure. The COVID-19 pandemic saw a surge in attacks targeting healthcare organizations, as hackers sought to exploit vulnerabilities and steal research data.

Beyond Ransomware: The Evolving Tactics of Attackers

While ransomware remains a dominant threat, attackers are diversifying their tactics. The Aflac breach, while details are still emerging, highlights the risk of data exfiltration – the theft of sensitive information – even without a full system lockdown. We’re seeing a rise in:

  • Supply Chain Attacks: Targeting third-party vendors who have access to healthcare data.
  • Business Email Compromise (BEC): Hackers impersonating executives to trick employees into transferring funds or revealing sensitive information.
  • Insider Threats: Malicious or negligent employees who compromise data security.
  • AI-Powered Attacks: The use of artificial intelligence to automate phishing campaigns and identify vulnerabilities.

Pro Tip: Regularly train employees on cybersecurity best practices, including phishing awareness and password security. Implement multi-factor authentication (MFA) wherever possible.

The Role of Supplemental Insurance in Data Security

Aflac’s response – offering credit monitoring and identity theft protection through CyEx Medical Shield – is a positive step. However, the incident raises questions about the security practices of supplemental insurance providers. These companies often handle a wealth of personal information, making them attractive targets.

The industry needs to move beyond simply reacting to breaches and proactively invest in robust cybersecurity measures. This includes:

  • Data Encryption: Protecting data both in transit and at rest.
  • Regular Security Audits: Identifying and addressing vulnerabilities.
  • Incident Response Planning: Having a clear plan in place to respond to and contain breaches.
  • Zero Trust Architecture: Assuming that no user or device is trustworthy and verifying access requests.

Future Trends: What to Expect

The future of healthcare data security will likely be shaped by several key trends:

  • Increased Regulation: Expect stricter regulations and enforcement related to data privacy and security.
  • AI-Driven Security Solutions: The use of AI to detect and respond to threats in real-time.
  • Blockchain Technology: Exploring the use of blockchain to secure and share healthcare data.
  • Cyber Insurance: Increased demand for cyber insurance to mitigate the financial impact of breaches.
  • Focus on Data Minimization: Collecting and storing only the data that is absolutely necessary.

Did you know? The Health Insurance Portability and Accountability Act (HIPAA) requires healthcare organizations to protect the privacy and security of patient information, but compliance doesn’t guarantee immunity from attacks.

FAQ

Q: What should I do if I was affected by the Aflac breach?
A: Enroll in the free credit monitoring and identity theft protection services offered by Aflac. Monitor your credit reports and bank accounts for any suspicious activity.

Q: Is my health information safe with insurance companies?
A: Insurance companies are required to protect your health information, but no system is completely secure. Be vigilant about protecting your personal information.

Q: What is multi-factor authentication (MFA)?
A: MFA adds an extra layer of security by requiring you to provide two or more forms of identification to access an account.

Q: How can I protect myself from phishing scams?
A: Be wary of unsolicited emails or text messages asking for personal information. Verify the sender’s identity before clicking on any links or attachments.

Want to learn more about protecting your data? Explore our comprehensive guide to data security. Share your thoughts on this article and the growing threat of healthcare data breaches in the comments below!

December 21, 2025 0 comments
0 FacebookTwitterPinterestEmail
Newer Posts
Older Posts

Recent Posts

  • Parents Face Charges After 13-Year-Old Kills Woman With Statue

    April 22, 2026
  • Santa Šillere: Jauns skaņdarbs un ceļojums uz Vāciju

    April 22, 2026
  • Parents Face Prosecution After Son’s Dropped Figurine Kills Woman in Italy

    April 22, 2026
  • London getting more flights amid service cuts at other airports

    April 22, 2026
  • ‘We’re really worried’: 4 grey whales found dead off B.C. coast in 10 days

    April 22, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World