25,000 Americans apply for just 1,000 jobs at new federal Tech Force



Hot on the heels of the U.S. government's announcement of the Tech Force combing for 1,000 new recruits, 25 times that number of Americans have sent in their resumes to the cross-agency technology team.

The Tech Force, announced mid-month, urged the country's best and brightest to head to its website to apply for short-term federal employment. Over the ensuing week, that number has risen to at least 25,000, according to Scott Kupor, the director of the U.S. Office of Personnel Management.

'Tech Force will tackle the most complex and large-scale civic and defense challenges of our era.'

With a two-year government contract worth as much as $200,000, recruits will be part of an "elite group" of tech specialists hired to "accelerate artificial intelligence (AI) implementation" and solve critical tech challenges.

The unprecedented new group will primarily recruit those early in their careers, the Tech Force website explained, who specialize in engineering, AI, cybersecurity, data analytics, or project management in tech. Those brought on board can expect to implement AI programs and applications, modernize data, and provide digital service delivery at federal agencies.

"Backed by the White House, Tech Force will tackle the most complex and large-scale civic and defense challenges of our era," the outfit promised. "From administering critical financial infrastructure at the Treasury Department to advancing cutting-edge programs at the Department of Defense, and everything in between."

RELATED: BEWARE: With these new web browsers, everything on your computer can be stolen with one click

— (@)

Hires can look forward to working with agency leadership and "leading technology companies" to train and engage with senior management from partnered companies. The government openly states that once Tech Forcers are finished with their training program, they will seek employment at the partnering private-sector companies in order to demonstrate "the value of combining civil service with technical expertise."

Along with the competitive high salaries, the government program says it provides benefits like health insurance, retirement plans, and "performance-based awards."

The duties and scope of the Tech Force varied to a great degree, with the official website providing a lengthy list of federal agencies that participants can expect to be placed within. These included the Departments of War, Treasury, State, Labor, Commerce, Energy, Health and Human Services, Interior, Housing & Urban Development, Transportation, Homeland Security, and Veterans Affairs.

Other agencies like the Small Business Administration, IRS, and Office of Personnel Management were also noted.

RELATED: NO HANDS: New Japanese firm trains robots without human input

Photo by Wang Gang/VCG via Getty Images

Readers on X had mixed reactions to open recruitment, with several hoping the program would only be open to Americans and others sarcastically saying that it probably should not be filled "with Indians."

The application form goes through the USA Jobs website.

The official account for the Young Republicans of Texas said the program could be an effective way to prove that there are "plenty of qualified Americans" in the tech field.

At the same time, others worried about a dystopian future that could arise from combining advanced technology and the Treasury Department.

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!

Convicted hacker twins who landed jobs as federal contractors nabbed for allegedly deleting government databases



Muneeb and Sohaib Akhter, a pair of convicted hackers based in Alexandria, Virginia, were arrested on Wednesday over an alleged conspiracy to destroy government databases and other crimes.

After doing prison time for wire fraud and conspiring to hack into the U.S. State Department, the Akhter twins, one of whom previously served as a cybersecurity contractor with the State Department, managed to secure jobs as federal contractors — working as engineers for Opexus.

'Their actions jeopardized the security of government systems.'

Opexus, a company that handles sensitive data for most federal agencies and has received over $50 million in contracts from various agencies over the past decade, determined earlier this year that it had been compromised in February by two employees.

A Bloomberg investigation revealed in May that after one of the agencies with which Opexus was working, the Federal Deposit Insurance Corporation, flagged the twins as possible threats on account of their criminal records, the duo were fired on Feb. 18.

The company later discovered that while being fired and immediately afterward, the twins allegedly accessed sensitive documents and compromised or scrubbed dozens of databases, including those containing data from the General Services Administration and the Internal Revenue Service.

The FBI, FDIC Office of Inspector General, Department of Homeland Security Office of Inspector General, and Homeland Security Investigations investigated the case.

The brothers were indicted on Nov. 13 for allegedly working to harm Opexus and its U.S. government clients "by accessing computers without authorization, issuing commands to prevent others from modifying the databases before deletion, deleting databases, stealing information, and destroying evidence of their unlawful activities," the DOJ said in a release.

RELATED: Could hackers target your car's tires?

Muneeb Akhter. Photo by Evelyn Hockstein/Washington Post via Getty Images

According to the indictment, Muneeb Akhter allegedly deleted approximately 96 databases storing U.S. government information — including databases containing records and documents related to Freedom of Information Act matters as well as sensitive federal investigative files.

Muneeb Akhter is also accused of asking an artificial intelligence tool how they could cover their tracks after deleting a DHS database.

After he got fired from Opexus, Muneeb Akhter allegedly obtained data from the U.S. Equal Employment Opportunity Commission and is accused further of stealing copies of IRS information including federal tax information and other identifying information for at least 450 individuals.

Opexus did not respond to a request for comment from Blaze News.

"These defendants abused their positions as federal contractors to attack government databases and steal sensitive government information," said Matthew Galeotti, acting assistant attorney general at the Department of Justice's Criminal Division, in a statement. "Their actions jeopardized the security of government systems and disrupted agencies’ ability to serve the American people."

Muneeb Akhter has been charged with conspiracy to commit computer fraud and to destroy records, two counts of computer fraud, theft of federal records, and two counts of aggravated identity theft. His twin, Sohaib Akhter, was charged with conspiracy to commit computer fraud and to destroy records and computer fraud.

While Sohaib Akhter faces a maximum penalty of six years in prison, Muneeb Akhter faces a mandatory minimum penalty of two years of prison time for each aggravated identity theft count and a maximum penalty of 45 years for the other charges.

The duo pleaded guilty in 2015 to a different set of crimes.

Muneeb Akhter hacked into the website of a cosmetics company and stole thousands of customers' credit card and personal information. He and his brother used the stolen data to pay for flights, hotel stays, various goods, and attendance at professional conferences. Muneeb Akhter proceeded to hand off the stolen data to a "dark net" operator who cut him in on the profits from the sales.

The other brother, meanwhile, used his contract position at the State Department in 2015 to steal personally identifiable data belonging to various people including co-workers and a federal law enforcement agent who was investigating him.

According to the Justice Department, Sohaib Akhter later hatched a scheme to ensure perpetual access to various State Department systems and, with the help of his twin, attempted to install an electronic collection device inside a State Department office, which would have enabled the hackers to remotely steal federal data.

Years earlier, Muneeb Akhter hacked into a Maryland-based private data aggregation company that he was performing contract work for, giving his brother access to a database of federal contract information to give their technology company an upper hand when bidding for contracts and clients.

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!

It's not just you. X and vast tracts of the internet are down.



Large sections of the internet stopped working on Tuesday morning. Among the sites affected by the latest in a weeks-long series of outages were Amazon Web Services, X, League of Legends, the betting site bet365, Spotify, ChatGPT, and — ironically — the website that monitors online outages, Downdetector.

The problem appears to be the result of issues at Cloudflare, a San Francisco-headquartered tech company that effectively serves as a backbone to a myriad of sites, providing content delivery network and wide area network services, domain registration, and cybersecurity.

'We saw a spike in unusual traffic.'

At the time of writing, the Cloudflare system status page indicated that the company was working toward restoring global network services, having hours earlier acknowledged "experiencing an internal service degradation" that could leave some services "intermittently impacted."

The latest outages come just days after Cloudflare admitted an "issue which potentially impacts multiple customers" — an issue that was supposedly "resolved."

A spokesperson for Cloudflare said in a statement obtained by the Guardian, "We saw a spike in unusual traffic to one of Cloudflare’s services beginning at 11:20am [London time]. That caused some traffic passing through Cloudflare’s network to experience errors. While most traffic for most services continued to flow as normal, there were elevated errors across multiple Cloudflare services."

"We do not yet know the cause of the spike in unusual traffic," continued the spokesperson. "We are all hands on deck to make sure all traffic is served without errors. After that, we will turn our attention to investigating the cause of the unusual spike in traffic."

The company's engineers were reportedly scheduled to conduct some maintenance work on data centers in Atlanta, Los Angeles, Tahiti, and Santiago, Chile. It's unclear whether their efforts had anything to do with the technical issues.

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!

'Unprecedented': AI company documents startling discovery after thwarting 'sophisticated' cyberattack



In the middle of September, AI company and Claude developer Anthropic discovered "suspicious activity" while monitoring real-world cyberattacks that used artificial intelligence agents. Upon further investigation, however, the company came to realize that this activity was in fact a "highly sophisticated espionage campaign" and a watershed moment in cybersecurity.

AI agents weren't just providing advice to the hackers, as expected.

'The key was role-play: The human operators claimed that they were employees of legitimate cybersecurity firms.'

Anthropic's Thursday report said the AI agents were executing the cyberattacks themselves, adding that it believed that this is the "first documented case of a large-scale cyberattack executed without substantial human intervention."

RELATED: Coca-Cola doubles down on AI ads, still won't say 'Christmas'

Photo by Samuel Boivin/NurPhoto via Getty Images

The company's investigation showed that the hackers, whom the report "assess[ed] with high confidence" to be a "Chinese-sponsored group" manipulated the AI agent Claude Code to run the cyberattack.

The innovation was, of course, not simply using AI to assist in the cyberattack; the hackers directed the AI agent to run the attack with minimal human input.

The human operator tasked instances of Claude Code to operate in groups as autonomous penetration testing orchestrators and agents, with the threat actor able to leverage AI to execute 80-90% of tactical operations independently at physically impossible request rates.

In other words, the AI agent was doing the work of a full team of competent cyberattackers, but in a fraction of the time.

While this is potentially a groundbreaking moment in cybersecurity, the AI agents were not 100% autonomous. They reportedly required human verification and struggled with hallucinations such as providing publicly available information. "This AI hallucination in offensive security contexts presented challenges for the actor's operational effectiveness, requiring careful validation of all claimed results," the analysis explained.

Anthropic reported that the attack targeted roughly 30 institutions around the world but did not succeed in every case.

The targets included technology companies, financial institutions, chemical manufacturing companies, and government agencies.

Interestingly, Anthropic said the attackers were able to trick Claude through sustained "social engineering" during the initial stages of the attack: "The key was role-play: The human operators claimed that they were employees of legitimate cybersecurity firms and convinced Claude that it was being used in defensive cybersecurity testing."

The report also responded to a question that is likely on many people's minds upon learning about this development: If these AI agents are capable of executing these malicious attacks on behalf of bad actors, why do tech companies continue to develop them?

In its response, Anthropic asserted that while the AI agents are capable of major, increasingly autonomous attacks, they are also our best line of defense against said attacks.

Could hackers target your car's tires?



Hackers have found another way into your car's computer system: where the rubber meets the road.

Thanks to the TREAD Act, every new car since 2008 comes with a tire pressure monitoring system. It's what turns on that annoying low-pressure light we're all familiar with. By monitoring the the air pressure of each tire and alerting the driver when the pressure falls below a certain threshold, you car's TPMS makes you safer. It also makes you a bigger target for hackers.

TPMS hackers could gain access to other systems within the vehicle, such as the engine or brakes, leading to complete control of the vehicle.

The problem is that TPMS uses unencrypted radio frequencies for the communication between the tire and the receiver. Hackers can "spoof" these signals, allowing them to send false data to the vehicle’s computer, such as indicating that the tire pressure is higher or lower than it actually is.

Takeover

Big deal. You can hack my car and turn on my little pressure light? Annoying, sure. I didn’t think I cared until I learned that your TPMS radio frequency receiver is hooked directly into the car's ECU — the computer that controls everything from fuel injection to exhaust, fuel mix, electricity, engine stats, timing, electric car driveability, and more

What's more, this RF receiver is usually the same receiver that talks to your remote key fob to open the doors and disarm your security system.

RELATED: Could a hacker blow up your EV remotely?

Bloomberg/Getty Images

Compromised safety

So what exactly could a hacker do via your TPMS? More than you might expect.

TPMS hacking can:

  • Compromise the safety of the vehicle by causing incorrect tire pressure readings, which can lead to accidents or tire blowouts.
  • Capture data about the vehicle, such as its location and driving habits.
  • Gain access to other systems within the vehicle, such as the engine or brakes, leading to complete control of the vehicle.

Gauging the risk

So what can you do to keep hackers out? You should be as cautious of your car’s security as you are of public Wi-Fi and keep your vehicle's software up to date. Additionally, be wary of any attempts to physically tamper with your TPMS sensors.

And it can't hurt to have your own dial or digital pressure gauge. If that tire pressure light kicks on and your tires seem fine, check the pressure against the number inside the driver's door. If it it's fine, it could be a sign that your TPMS has been compromised.

Someone hacking into your car this way is unlikely, but if it does happen, it could be a disaster. As vehicles become more connected and rely more on electronic systems, this and other cybersecurity issues are something to keep an eye on.

China Escalates Cyberattacks That Are Increasingly Hard To Detect

The Trump administration must take decisive action to hold the Chinese government and its affiliated hackers accountable for their cyber activities.

Secret Service Foils Foreign-Linked Plot To Disable NYC Cellular Network Amid UN General Assembly

The Secret Service on Tuesday dismantled an illicit network of electronic devices in the New York tristate area that could have been used to shut down cell networks as world leaders gather in Manhattan for the U.N. General Assembly.

The post Secret Service Foils Foreign-Linked Plot To Disable NYC Cellular Network Amid UN General Assembly appeared first on .

Israeli government official arrested in child sex-crime sting, flees to Israel



An Israeli government official was arrested during a child sex-crime joint sting operation in Nevada earlier this month, racking up a felony charge of "luring a child with computer for sex act," according to a Las Vegas Metropolitan Police Department press release.

Tom Artiom Alexandrovich, 38, was named as one of the eight arrested during a Nevada Internet Crimes Against Children Unit joint operation with the FBI's Child Exploitation Task Force earlier this month.

Alexandrovich was reportedly released from custody on $10,000 bail after an initial court appearance and then returned to Israel.

Those arrested reportedly believed that they were meeting underage children whom they had met online for sex acts, but they were apprehended by law enforcement in part of the two-week sting operation.

RELATED: Epstein-funded MIT lab hosted panel that discussed 'child-size sex robots'

Photo by ABIR SULTAN/POOL/AFP via Getty Images

According to an alleged screenshot of a since-deleted LinkedIn profile, Alexandrovich is the executive director of the Israel Cyber Directorate, a government agency that operates under Prime Minister Benjamin Netanyahu's office. Another screenshot also placed him in Nevada during early August, talking about the Black Hat conference and cybersecurity:

Two things you can’t escape at Black Hat 2025: the relentless buzz of generative [artificial intelligence] and the sound of Hebrew … in every corridor. ... The key takeaway? The future of cybersecurity is being written in code, and it seems a significant part of it is being authored in #TelAviv and powered by LLMs. An exciting time to be in the field!

Black Hat 2025 was a cybersecurity conference scheduled for August 2-7 at Mandalay Bay Convention Center in Las Vegas, Nevada.

The Jewish Chronicle reported that a "Tom Alexandrovich" is due in court in Clark County, Nevada, on August 27 in connection with an alleged offense on August 6, a date that coincides both with the Black Hat Convention and with the Nevada police sting operation. Alexandrovich was reportedly released from custody on $10,000 bail after an initial court appearance and then returned to Israel.

According to an article published Wednesday by Ynet, an Israel-based outlet, the Israeli prime minister’s office initially issued a statement denying that the official was even arrested. “A state employee who traveled to the U.S. for professional matters was questioned by American authorities during his stay,” the initial statement read. “The employee, who does not hold a diplomatic visa, was not arrested and returned to Israel as scheduled.”

In a Saturday report, Ynet said that the Cyber Directorate claimed its earlier statement "was accurate based on the information provided to us" when presented with evidence of the arrest. The office denied that it had any involvement with posting Alexandrovich's bail, though it is unclear who posted it. Alexandrovich is reportedly on leave "by mutual decision."

The Las Vegas Metropolitan Police Department did not respond to Blaze News' request for comment on the circumstances of Alexandrovich's arrest.

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!

The real spyware threat could be in your pocket



U.S. intelligence agencies are on high alert after CNN reported that Iran is actively preparing cyberattacks aimed at critical government and military infrastructure. But the real threat may already be inside the wire — not from foreign hackers at a keyboard, but from mobile phones unknowingly or deliberately carried into the nation’s most sensitive facilities.

The devices we carry every day are now among our greatest national security vulnerabilities.

In 2025, secrets aren’t stolen with a crowbar. They’re stolen with an app.

Despite years of post-9/11 investments in hardened infrastructure, the federal government has been remiss in investing in a sensor network to keep pace with the risks of wireless technology now embedded in daily life.

When the first iPhone was introduced in 2007, it ushered in a new era of hyper-connected mobility. Since then, innovation has continued to explode, bringing countless benefits but also exposing serious vulnerabilities.

Our most secure government facilities are wide open to wireless threats.

Today, up to 90% of secure government facilities rely on little more than the honor system and self-reporting to keep unauthorized wireless devices — mobile phones, smartwatches, rogue transmitters — out of sensitive compartmented information facilities, special access program facilities, and other high-security zones. In an era of Pegasus spyware and remote malware, this should be viewed as a national security malpractice.

Portable security risks

The modern smartphone is a traitor’s dream — portable, powerful, and everywhere. It records audio and video, it transmits data instantaneously via Wi-Fi, Bluetooth, and cellular networks, and it connects to everything — from commercial clouds to encrypted chat apps. And yet these devices are routinely brought into facilities housing classified intelligence data, most often undetected and without consequence.

Take the case of Asif W. Rahman, a former CIA analyst who held a top-secret security clearance and was recently sentenced to three years in federal prison for photographing classified information and transmitting it to unauthorized recipients, who then posted the material to social media. Snapping and sharing photos of classified government documents using a smartphone is stunningly simple, with no high-tech espionage or daring break-ins required.

Every week offers new examples like this. People inside the Department of Defense and State Department have been caught photographing screens, copying documents, and walking classified data right out the door. These are crimes of opportunity, enabled by lax enforcement and outdated security measures.

If a wireless intrusion detection system were in place, the device would have triggered an alert and stopped these breaches before they became major national security failures.

Exploiting our weaknesses

Now, with Iran probing for cyber vulnerabilities, the risk of insiders being exploited or coerced into facilitating digital breaches through personal devices has never been higher. And it can happen without a trace if the right wireless defenses aren’t in place.

In 2023, the secretary of defense issued a memo directing all Defense Department offices to install wireless intrusion detection systems to monitor unauthorized devices. The technology works. It detects any device that emits a wireless signal — such as phones, smartwatches, or even printers with Wi-Fi — inside a restricted area. Yet the directive remains largely unfunded and unenforced.

RELATED: After the bombs, Iran sharpens its digital daggers

Gwengoat via iStock/Getty Images

Near-peer adversaries, terrorist groups, and criminal syndicates are exploiting wireless threats to their advantage. They don’t need sophisticated tradecraft and specialized technologies. They simply need to compromise and leverage someone with access and a phone. And with thousands of secure facilities across the country, that opportunity presents itself every day.

In light of the latest intelligence warnings, we need to fund wireless intrusion detection across all SCIFs and SAPFs and educate agency leaders on the vulnerabilities posed by modern smartphones.

We need to hold bad actors accountable — not retroactively or as part of a congressional committee hearing, but by making sure they never have the opportunity to compromise the integrity of national security in the first place.

Protecting digital secrets

The U.S. government has spent billions building concrete walls, locking doors, and implementing network-specific defenses to protect its secrets. But in 2025, secrets aren’t stolen with a crowbar; they’re stolen with an app.

Until we treat the wireless threat with the same seriousness, those secrets will remain just one text message or compromised phone away from unauthorized disclosure of highly classified information.

You can’t protect your most sensitive state secrets if you are blind to the threat. Without action, these vulnerabilities will only grow more dangerous — and more missions and lives may be put at risk.

Editor’s note: This article was originally published by RealClearDefense and made available via RealClearWire.

After the bombs, Iran sharpens its digital daggers



The footage was unmistakable: plumes of smoke rising over Iran’s nuclear sites, a fiery punctuation mark on years of brinkmanship and intelligence coups. With one sweeping air campaign, the United States delivered a message: The Islamic Republic won’t cross the nuclear threshold.

But anyone assuming the threat has been neutralized is mistaken. Iran’s nuclear humiliation may hasten a shift already under way — from building bombs to waging war through digital disruption.

Cyber warfare offers something the mullahs crave: the ability to humiliate, disrupt, and retaliate without risking direct military confrontation.

Even as diplomats celebrate a ceasefire, cybersecurity experts remain on alert. In 2025, a regime doesn’t need enriched uranium to paralyze an enemy. It needs a cadre of skilled hackers, access to stolen exploits, and no scruples about targeting civilian infrastructure.

Iran’s cyber playbook didn’t appear overnight. In 2012, the Shamoon virus devastated Saudi Aramco’s systems, wiping tens of thousands of computers. Since then, Tehran has steadily advanced its cyber operations.

Today, Iran commands a capable and motivated digital force. With its nuclear facilities in ruins, the regime has every reason to flex other muscles. Cyber warfare offers something the mullahs crave: the ability to humiliate, disrupt, and retaliate without risking direct military confrontation.

They’re not the first to embrace this model.

Russia, long dominant in the cyber realm, has hammered Ukraine with digital attacks targeting power grids, satellites, and financial systems. Criminal groups like Conti and Black Basta operate under Moscow’s protection, extorting ransoms and leaking stolen data to sow chaos.

This blending of espionage, sabotage, and state-backed crime has become a blueprint for autocracies under pressure. Iran, hemmed in by sanctions and unrest, doesn’t need to invent the model. It just needs to adopt it.

Most Americans still think of cyberwar as an abstract threat — something IT departments handle behind the scenes. That complacency works to our enemies’ advantage.

Take zero-day vulnerabilities: flaws in software even the developers don’t yet know exist. They’re sold on dark markets for eye-watering sums and let hostile actors bypass traditional defenses undetected.

Then there’s Chaos RAT, a remote access trojan capable of burrowing into a network and sitting dormant for months. Once triggered, it can steal sensitive data, erase backups, or crash entire systems on command.

Iran possesses both the motive and the skill to deploy these weapons — and the timing couldn’t be better for the regime. With its nuclear program crippled, it needs a new front to demonstrate relevance.

RELATED: Google confirms Iranian hacking group targeted Trump, Harris presidential campaigns

daoleduc via iStock/Getty Images

China’s cyber militias show what’s possible. Groups like APT Silver Fox specialize in patient infiltration, building access over years. Iran lacks Beijing’s global reach, but the methods are accessible. Tehran’s hackers borrow code from Russia, shop the same black markets, and lease infrastructure from the same digital underworld.

The global cyber arena now functions like a black-market bazaar: fluid alliances, shared tradecraft, and few rules. Almost everything’s for sale.

So while headlines tout the ceasefire between Israel and Iran, they miss the next act. No truce binds a nation’s hackers. Cyber operations offer deniability by design. When a hospital network locks up or a power grid fails, Tehran’s response will be predictable: denial, distraction, and a smirk about the West’s poor “cyber hygiene.”

Expect Iran to probe how far it can push in cyberspace without drawing more missiles in return. And unless the West prepares accordingly, those probes may succeed.

America still leads the world in conventional firepower. But cyber defense remains its soft underbelly. Agencies like the Cybersecurity and Infrastructure Security Agency have made strides, but critical infrastructure — power plants, water systems, hospitals — still run on aging software and patchwork security.

Iran doesn’t need to destroy a city to spread fear. A flip of a switch in a power station or the theft of sensitive government files can inflict lasting damage — and create leverage.

This imbalance between battlefield dominance and digital vulnerability demands urgent correction.

Cybersecurity must move from an IT line item to a strategic national priority. That means building AI-driven detection systems, developing real deterrence for cyberattacks, and forging public-private partnerships to defend vital infrastructure.

Iran’s nuclear setback matters. But no bomb erases a hacker’s know-how. No missile strike disables an ideology that thrives on asymmetrical warfare.

The coming months will test whether the West has learned anything. Tehran’s leaders need to prove they still have teeth. While their nuclear ambitions smolder, their cyber arsenal remains sharp — and likely emboldened.

The next war may not begin with jets roaring over deserts. It may start silently in the fluorescent-lit halls of a data center, where intruders already hide behind blinking servers, waiting.

In that theater, the rules are different — and the consequences no less severe.