/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Andrew Couts

@couts
54 posts
2026-03-04
NEW: Researchers at Google and @iverify.bsky.social discovered a set of iPhone-hacking techniques that has the characteristics of hacking tools made for the US gov't.  Apple patched the 23 vulnerabilities in its latest version of iOS. @agreenberg.bsky.social reports: www.wired.com/story/coruna...
2026-03-04 View on X
Wired

Google details Coruna, an exploit kit used to hijack iPhones via malicious websites; iVerify suggests it may have been originally built for the US government

A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more.

2026-02-12
NEW: Border Patrol intelligence is getting access to Clearview AI, according to CBP procurement records reviewed by @wired.com. @dell.bsky.social w/ the scoop: www.wired.com/story/cbp-si...
2026-02-12 View on X
Wired

The US CBP signs a one-year Clearview AI deal to use facial recognition on 60B+ public images for “tactical targeting” and “strategic counter-network analysis”

US Border Patrol intelligence units will gain access to a face recognition tool built on billions of images scraped from the internet.

2026-01-29
NEW: The firm behind the Mobile Fortify app, which ICE and CBP use for running facial recognition scans on the public, was revealed today to be NEC, according to DHS docs reviewed by @wired.com.  NEC makes its of face rec platform called Reveal. @regret.bsky.social & @dell.bsky.social with the scoop:
2026-01-29 View on X
Wired

The US DHS confirms NEC is the vendor that sold Mobile Fortify, a facial recognition app used by federal immigration agents to identify people, to CBP and ICE

Immigration agents have used Mobile Fortify to scan the faces of countless people in the US—including many citizens.

2026-01-28
NEW: The firm behind the Mobile Fortify app, which ICE and CBP use for running facial recognition scans on the public, was revealed today to be NEC, according to DHS docs reviewed by @wired.com.  NEC makes its of face rec platform called Reveal. @regret.bsky.social & @dell.bsky.social with the scoop:
2026-01-28 View on X
Wired

DHS reveals that NEC is the vendor that sold Mobile Fortify, a facial recognition app used by federal immigration agents to identify people in the field, to CBP

Immigration agents have used Mobile Fortify to scan the faces of countless people in the US—including many citizens.

2026-01-27
Leaks from the man we then knew only as “Red Bull”—scam scripts and, crucially, videos showing 3 months of internal WhatsApp chats—exposed the scam operation in unprecedented detail. @agreenberg.bsky.social, @lhn.bsky.social, & @mattburgess1.bsky.social w/ the scoop: www.wired.com/story/the-re...
2026-01-27 View on X
Wired

Documents: a whistleblower details the Boshang scam compound in Laos that defrauded victims of ~$2.2M over 11 weeks and utilized a system of worker debt bondage

A whistleblower trapped inside a “pig butchering” scam compound gave WIRED a vast trove of its internal materials …

NEW: Early last summer, @agreenberg.bsky.social texted me something truly outlandish: A man actively being held captive in a scam compound in Laos had reached out to him.  He wanted to blow the whistle while risking his life and trying to escape—and he had receipts.  This is that story:
2026-01-27 View on X
Wired

Documents: a whistleblower details the Boshang scam compound in Laos that defrauded victims of ~$2.2M over 11 weeks and utilized a system of worker debt bondage

A whistleblower trapped inside a “pig butchering” scam compound gave WIRED a vast trove of its internal materials …

2026-01-16
NEW: 17 different models of Bluetooth headphones and speakers can be hijacked to play audio, eavesdrop thru mics, and in some cases even track your location—unless you install a patch, which many people don't. @agreenberg.bsky.social & @lhn.bsky.social w/ the scoop: www.wired.com/story/google...
2026-01-16 View on X
Wired

Researchers detail WhisperPair, vulnerabilities in Google's Fast Pair protocol affecting 17 audio device models from 10 brands; Google rolled out updates

2026-01-15
NEW: 17 different models of Bluetooth headphones and speakers can be hijacked to play audio, eavesdrop thru mics, and in some cases even track your location—unless you install a patch, which many people don't. @agreenberg.bsky.social & @lhn.bsky.social w/ the scoop: www.wired.com/story/google...
2026-01-15 View on X
Wired

Researchers detail WhisperPair, vulnerabilities in Google's Fast Pair protocol affecting 17 audio device models from 10 brands; Google rolled out updates

Flaws in how 17 models of headphones and speakers use Google's one-tap Fast Pair Bluetooth protocol have left devices open to eavesdroppers and stalkers.

2025-11-18
NEW: Your phone number was probably exposed because of this WhatsApp flaw. @agreenberg.bsky.social reports: www.wired.com/story/a-simp...
2025-11-18 View on X
Wired

Researchers demonstrated a major WhatsApp flaw that exposed 3.5B users' phone numbers, with 57% also showing a profile photo; Meta fixed the enumeration problem

By plugging tens of billions of phone numbers into WhatsApp's contact discovery tool, researchers found “the most extensive exposure …

2025-10-30
NEW: Peter Williams, who ran zero-day vendor Trenchant, pleaded guilty to two counts of stealing trade secrets.  Prosecutors say he sold the stolen software to an unnamed Russian broker.  He faces up to 108 months in prison. @kimzetter.bsky.social reports for @wired.com www.wired.com/story/peter-...
2025-10-30 View on X
CyberScoop

A former L3Harris executive pleads guilty in a US district court to selling eight zero-day exploits to a Russian broker in exchange for millions of dollars

* “at least eight sensitive and protected cyber-exploit components” illegally sold to “a Russian cyber-tools broker” (for ~$1.3m).  Obviously at a huge discount, bc super illegal  ...

2025-10-27
NEW: @wired.com recently tested a card shuffler that could be hacked to see every card in a deck.  Today, an unsealed DOJ indictment against 31 people—including NBA people & mobsters—claims they used the shufflers in a $7M betting scam. @agreenberg.bsky.social reports: www.wired.com/story/how-ha...
2025-10-27 View on X
Bloomberg

The US DOJ's rigged-poker-game indictment involved hacking DeckMate, a casino-standard, suitcase-sized, $10K+ card shuffling machine, to reveal players' hands

The rigged-poker-game indictment unveiled on Thursday reads like a Hollywood heist film, featuring NBA stars and famous Mafia crime families.

2025-10-20
NEW: @katie-drummond.bsky.social spoke with @zohrankmamdani.bsky.social about internet fame, technocracy, and... Linkin Park? www.wired.com/story/the-bi...
2025-10-20 View on X
Wired

Q&A with NYC mayoral front-runner Zohran Mamdani on social media, tech leaders, Trump, fame, Apple's and Google's “wrong decision” to remove ICEBlock, and more

Mere months ago, New York's mayoral front-runner was polling right next to “Someone Else.”

2025-10-16
NEW: People with facial differences are being shut out of essential services due to the proliferation of face recognition tech—and at best forced to experience further rejection due to technological failures. @mattburgess1.bsky.social reports: www.wired.com/story/when-f...
2025-10-16 View on X
Wired

How facial recognition software rejects people with facial differences, who number an estimated 100M+ worldwide, blocking them from accessing essential services

An estimated 100 million people live with facial differences.  As face recognition tech becomes widespread … Bluesky: @brbarrett , @lhn , @mattburgess1 , and @couts . Forums: r/tec...

2025-10-14
The study captured an estimated 15% of all geostationary satellites, which raised the prospect that as much as 85% of the world's satellite communications remain insecure—subject to surveillance by anyone with $800 in equipment www.wired.com/story/satell...
2025-10-14 View on X
Wired

Researchers used $800 of off-the-shelf hardware to collect data sent by satellites unencrypted, like T-Mobile users' calls and texts and some US military comms

With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users' calls …

2025-10-11
NEW: Apple is offering up to $2 million for exploits that can be used to infect iPhones with spyware, and bonuses for exploits used to bypass Lockdown Mode that bring total possible awards for a bug bounty to $5 million. @lhn.bsky.social reports: www.wired.com/story/apple-...
2025-10-11 View on X
Wired

Apple announces a “major evolution” of the Apple Security Bounty program, doubling its top award to $2M for exploit chains that could be abused for spyware

$2M Top Payout Usman Qureshi / iPhone in Canada : Apple Doubles Security Bounty Rewards to $2 Million Bill Toulas / BleepingComputer : Apple now offers $2 million for zero-click RC...

2025-10-10
NEW: Apple is offering up to $2 million for exploits that can be used to infect iPhones with spyware, and bonuses for exploits used to bypass Lockdown Mode that bring total possible awards for a bug bounty to $5 million. @lhn.bsky.social reports: www.wired.com/story/apple-...
2025-10-10 View on X
Wired

Apple announces a “major evolution” of the Apple Security Bounty program, doubling its top award to $2M for exploit chains that could be abused for spyware

With the mercenary spyware industry booming, Apple VP Ivan Krstić tells WIRED that the company is also offering bonuses …

2025-10-06
NEW: ICE is planning to hire a team of nearly 30 people to surveil social media 24/7, build dossiers on people, and flag them for arrest and deportation. @dell.bsky.social has the scoop: www.wired.com/story/ice-so...
2025-10-06 View on X
Wired

US federal contracting records show that US ICE is planning to hire nearly 30 private analysts to monitor social media content for enforcement operation leads

Documents show that ICE plans to hire dozens of contractors to scan X, Facebook, TikTok, and other platforms to target people for deportation.

2025-09-11
NEW: A report published by the @atlanticcouncil.bsky.social finds that US investors are increasingly funding companies that make commercial spyware, a technology linked to human rights abuses in countries around the world. @vaspanagiotopoulos.com reports for @wired.com www.wired.com/story/us-spy...
2025-09-11 View on X
Wired

Atlantic Council: the number of US-based investors in spyware companies nearly tripled in 2024 to 31, compared to just 11 in 2023, topping Israel's 26 investors

A new report warns that the number of US investors in powerful commercial spyware rose sharply in 2024 and names new countries linked to the dangerous technology.

2025-09-10
NEW: A leak of more than 100,000 documents shows how a Chinese firm, Geedge Networks, is exporting mass censorship technology similar to the Great Firewall to countries outside of China. @zeyiyang.bsky.social reports www.wired.com/story/geedge...
2025-09-10 View on X
Wired

Leaked docs: Chinese network-monitoring provider Geedge Networks has sold Great Firewall-style censorship systems to at least four countries, including Pakistan

Zeyi Yang / Wired :

2025-09-09
NEW: A leak of more than 100,000 documents shows how a Chinese firm, Geedge Networks, is exporting mass censorship technology similar to the Great Firewall to countries outside of China. @zeyiyang.bsky.social reports www.wired.com/story/geedge...
2025-09-09 View on X
Reuters

Amnesty: Pakistan is spying on millions via phone tapping and a Chinese-built internet firewall, in one of the broadest surveillance programs outside China

Pakistan is spying on millions of its citizens using a phone-tapping system and a Chinese-built internet firewall that censors social media …