
The ongoing tensions between the US government and Minnesota over immigration enforcement operations have escalated into legal battles, with federal agents conducting armed raids that some believe are meant to pressure the state into abandoning its sanctuary policies. This comes amid controversial incidents, including the fatal shooting of Alex Pretti by a federal immigration officer, followed by immediate smear campaigns from Trump administration officials.
Expanding Surveillance Technologies
Immigration and Customs Enforcement (ICE) has significantly expanded its technological arsenal, using Palantir’s AI system to process tip line information and deploying the controversial Mobile Fortify facial recognition app to scan countless individuals, including US citizens. Military experts have criticized ICE for masquerading as a military force while employing tactics that would be considered dangerously amateur in actual combat situations.
Human Trafficking and Scam Operations
WIRED published an extensive exposé on human trafficking operations in Laos, based on communications with a victim who leaked internal documents from a scam compound where he was being held captive. In related news, Chinese authorities have executed 11 members of the Ming crime family for running similar scam compounds in Myanmar, operations that reportedly generated $1.4 billion in illegal proceeds between 2015 and 2023.
AI and Cybersecurity Vulnerabilities
Deepfake technology continues to advance, with ‘nudify’ tools becoming increasingly accessible and sophisticated, posing significant risks for potential victims. Research also revealed that an AI stuffed animal toy from Bondu had exposed approximately 50,000 logs of children’s conversations due to inadequate security measures.
The viral AI assistant OpenClaw has raised serious security concerns as it requires access to users’ online accounts to function. Security researchers identified hundreds of instances where users had inadvertently exposed their systems to the web, highlighting how autonomous AI systems can create substantial security vulnerabilities.
Cryptocurrency and Cyberattacks
A cryptocurrency investigator traced $40 million in stolen funds to John Daghita, reportedly the son of the president of CMDSS, a contractor that holds seized crypto for the US Marshals Service. Meanwhile, Poland has attributed a series of cyberattacks on its energy grid to Russia’s Berserk Bear hacking group, potentially signaling a new phase where previously restrained state-sponsored hackers are becoming more aggressive in targeting critical infrastructure.
Jeffrey Epstein’s Alleged Connections
According to newly released DOJ documents, an informant told the FBI in 2017 that Jeffrey Epstein had a “personal hacker” from southern Italy who specialized in finding vulnerabilities in various operating systems and allegedly sold exploits to several countries and even to Hezbollah. The accuracy of these claims remains unverified.


GIPHY App Key not set. Please check settings