• The president’s decision to deploy the National Guard in Washington, D.C., is costing taxpayers $1.65 million daily, a total of more than $330 million since August, according to a report released Thursday by Senate Democrats on the Homeland Security Committee. The lawmakers said they investigated the matter “after the Department of Defense failed to respond to questions about the deployment.”

    Recap: Trump ordered Guard troops to Washington, D.C., seven months ago, citing false and exaggerated statistics about crime in the district, which was at a 30-year low

    The effort includes nearly 2,500 servicemembers from nine states and the District, and that deployment in Washington was recently extended through the end of 2026. Guard officials said they’re “focused on crime suppression in central D.C. but not in locations in Southeast D.C. such as Ward 8, which had the most incidences of violent crime in 2025 of any ward,” according to the report. When asked why they’re staying away, officials admitted the Guard is “a lousy tool for fixing gun crime.”

    The Guard is on track to spend more than $602 million per year to patrol what they characterize as “high trafficked” areas around the National Mall. 

    That’s more than the entire D.C. police force’s annual operating budget, which is estimated at $599 million in fiscal year 2026. “If those federal dollars were instead directed to local law enforcement, the District of Columbia would have additional resources to address crime and public safety more effectively, especially by focusing support on the neighborhoods experiencing the highest levels of violence,” they said in their report, reflecting the recommendations of researchers and policing experts

    Also: The White House cut $811 million in grants for community violence intervention and law enforcement last April. As Marc Novicoff the The Atlantic wrote in October, “The Trump administration says a primary goal of its National Guard deployments is to reduce crime. Taking that claim at face value—a dubious proposition—it is hard to think of a less efficient way of doing so than shifting funds away from violence prevention and local law enforcement and toward troops who stand in low-crime areas and don’t make arrests.”

    To date, Trump’s Guard deployment to D.C. has “resulted in no directly attributable impact on crime, risks diverting law enforcement resources away from cities, lacks clearly defined goals and metrics, and is contributing to rising concern that the Administration is militarizing U.S. cities for political purposes,” the lawmakers said in their report Thursday. That’s at least in part because “months into the mission, the National Guard cannot point to tangible crime reduction successes specifically tied to their efforts,” they said after visiting with military officials. 

    “The D.C. National Guard has clearer metrics on their beautification effort,” which includes painting 270 feet of fence and pruning 65 trees in the District. But the Department of Defense “has not done a comparative analysis to examine whether their beautification efforts could be achieved at a lower cost by other federal or local partners,” the report says. 

    The troops from nine states deployed to Washington were sent by their Republican governors. That includes Alabama, Florida, Georgia, Louisiana, Mississippi, South Carolina, South Dakota, West Virginia and Ohio. Just five of those states—Ohio, West Virginia, South Carolina, Mississippi, and Louisiana—have at least 64 cities with higher rates of violent crime than D.C., according to FBI data

    The Guard troops are using social-media surveillance software like the Maven Smart System (supported by Palantir) to help with force protection. Why this matters to lawmakers: “Maven was acquired and configured for Title 10 federal activities, including those under Northern Command. It was not contracted for use in Title 32 activities, such as those currently taking place in D.C.” 

    They’re also using Dataminr First Alert, Meltwater, and Cision. Those applications help “create daily updates for leadership describing public perception and narratives related to the mission,” even though they raise “potential privacy and civil liberties concerns which call for specialized First Amendment safeguards and training more traditionally undertaken by law enforcement officers,” according to the report, which you can read over in full (PDF) here

    Additional reading:Trump’s aggressive tactics force a reckoning between local leaders and Washington,” the Associated Press reported Friday.


    Welcome to this Friday edition of The D Brief, a newsletter focused on developments affecting the future of U.S. national security, brought to you by Ben Watson with Bradley Peniston. It’s more important than ever to stay informed, so we’d like to take a moment to thank you for reading. Share your tips and feedback here. And if you’re not already subscribed, you can do that here. On this day in 1862, the U.S. military notched its first victory of the Civil War when it captured Fort Henry, west of Nashville on the Kentucky-Tennessee border. 

    Around the Defense Department

    The Pentagon could further accelerate its technology purchasing if the services’ emerging-tech budget requests flowed through the office of the defense undersecretary for research, the Government Accountability Office said in a new report published Thursday. 

    The analysts urge lawmakers to transfer “budget certification authority” for the services’ research and engineering spending to the Office of the Under Secretary of Defense for Research and Engineering.

    Unsurprisingly, the proposal was not well received by the services, Defense One’s Patrick Tucker writes off the new report. “The Departments of the Army, Air Force, and Navy disagreed,” arguing that the change would lead to “delays, restricted autonomy, and increased workload,” the authors note. But the current setup limits the Pentagon tech chief’s ability to ensure that service purchases fit with broader plans for the joint force, which is a “key role” the office was intended to play. Continue reading, here

    Speaking of budgets, two conservative think tankers share their plans to help the White House spend $600 billion more on the military for a total of $1.5 trillion in 2027. Read that analysis published last month by Elaine McCusker and John Ferrari of the American Enterprise Institute, here.

    The Army has cleared three companies to bid on the service’s plan to outsource initial helicopter pilot training, despite some lawmakers’ reservations about the idea, Defense One’s Tom Novelly reports

    Bell, Lockheed Martin, and M1 Support Services have all publicly confirmed this week that they are moving to the third phase of the competition for Flight School Next: a contract to take over the Army’s Initial Entry Rotary Wing training program at Fort Rucker, Alabama. The three companies must submit a Commercial Solutions Proposal for their offering, according to a Dec. 9 call for solutions outlining the process. 

    Service officials and contractors believe the new model, which is intended to produce 800 to 1,500 Army aviators annually for 26 years, will lower costs by taking the aircraft, maintenance, and training out of the service’s hands. But Congress isn’t convinced. Read more, here

    The U.S. military’s largest shipbuilder, HII, reported increased production in 2025, but said submarine-building schedules could slip if the Navy doesn’t award new contracts by midyear, Defense One’s Lauren C. Williams reported Thursday. 

    The company has been negotiating with the Navy and General Dynamics Electric Boat on multiyear deals for 10 Virginia-class Block VI attack boats and for the next five Columbia-class submarines, but timing is uncertain, HII CEO Christopher Kastner said Thursday during the company’s earnings call. 

    In 2025, HII improved shipyard productivity by 14 percent. This year, it is aiming for a 15-percent increase, Kastner said. It also hopes to hire even more workers than the 6,600 it brought on last year. Kastner’s comments come as U.S. shipbuilding demands—and budgets—rise with existing and new programs and the Trump administration pressures builders to move quickly. More, here

    Additional reading: 

    Etc.

    Amid the backdrop of a rising Chinese military, U.S. drone makers Red Cat, Anduril, and Shield AI are hawking their gear to Asian buyers at the Singapore Airshow this week, Reuters reported on location. But they’re definitely not alone. 

    “Neros, which has a U.S. Marine Corps contract for its small Archer quadcopter attack drone, aims to establish factories in South Korea, the Philippines, Singapore and Japan to build stockpiles of expendable, explosive-laden drones that could help overwhelm Chinese forces in the event of a Taiwan Strait conflict,” a company official told the wire service on the trade show floor in Singapore. 

    Additional reading: 

    And lastly this week, we have a particularly odd report from France, where a hospital was recently evacuated after a man sought treatment for … well, uhm … maybe we should just let British newspaper The Standard pick up the story from here. 

    Hint: It involves an artillery shell from the first World War. 

    Be safe out there, folks. Have a great weekend, and we’ll see you again on Monday!

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that’s operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, and deliver malware via routers and edge devices. Its primary targets seem to

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Flickr says a third-party email vendor flaw may have exposed user names, emails, IP data, and activity logs,…

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • This week in cybersecurity from the editors at Cybercrime Magazine

    Sausalito, Calif. – Feb. 6, 2026

    Listen to the podcast

    On Jun. 25, 2012, 31-year-old Higinio O. Ochoa, III of Dallas, Texas, the self-proclaimed associate of computer hacker groups known as “Anonymous” and “CabinCr3w” pleaded guilty, admitted that in Feb. 2012, he hacked into computers belonging to the Texas Department of Public Safety; Alabama Department of Public Safety, Houston County, Alabama; and the West Virginia Chiefs of Police Association.

    Ochoa further admitted that he unlawfully downloaded personal and confidential information, deleted data, engaged in website defacement, made stolen information available to others, and boasted about his criminal activities online. He was sentenced to 27 months in federal prison, followed by three years of supervised release.

    Now, Ochoa (aka w0rmer), 45, refers to himself as a “former hacktivist turned seasoned cybersecurity professional” and his resume includes 20 years of experience as an ethical hacker, Linux administrator, programmer, penetration tester, and speaker.

    Ochoa is a member of the white-hat hacker group Sakura Samurai. He recently came on the Cybercrime Magazine Podcast to discuss his journey, including the transition from being a high-profile target of the FBI to a cybersecurity professional, the culture of hacktivism, and more.

    Listen to the Podcast Episode



    Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

    • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
    • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
    • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
    • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
    • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
    • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
    • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
    • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
    • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

    Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.

    The post Higinio Ochoa, Hacktivist Turned White Hat, On The Cybercrime Magazine Podcast appeared first on Cybercrime Magazine.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove those that no longer receive security updates from original equipment manufacturers (OEMs) over the next 12 to 18 months. The agency said the move is to drive down technical debt and minimize

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A worrying shift in the tactics of “Transparent Tribe,” a notorious threat group also known as APT36. Historically focused on Indian government, defense, and educational sectors, the group has now expanded its scope to target India’s growing startup ecosystem. This new campaign uses sophisticated lures themed around real startup founders to infect victims with the […]

    The post Transparent Tribe Hacker Group Targets India’s Startup Ecosystem in Cyber Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Bitdefender Labs reveals that 17% of OpenClaw AI skills analyzed in February 2026 are malicious. With over 160,000…

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A surprising link between legitimate IT software and major cybercriminal operations. While investigating attacks by the “WantToCry” ransomware gang, analysts noticed that the attackers were using virtual machines (VMs) with identical, computer names (hostnames) like WIN-J9D866ESIJ2 and WIN-LIVFRVQFMKO. These names were not random. They were automatically generated by ISPsystem, a completely legitimate company that makes software for managing web […]

    The post Bulletproof Hosting Providers Exploit Legitimate ISPs to Power Cybercrime Servers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year, according to new findings from Palo Alto Networks Unit 42. In addition, the hacking crew has been observed conducting active reconnaissance against government infrastructure associated with 155

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Anthropic has released Claude Opus 4.6, marking a significant leap in the defensive application of artificial intelligence. Released yesterday, the model has already identified and validated over 500 high-severity “zero-day” vulnerabilities in open-source software. This development signals a major shift in cybersecurity, moving beyond traditional brute-force testing to intelligent, reason-based analysis that mimics human security […]

    The post Claude Opus 4.6 Launches Enhanced Security Capabilities to Validate 500+ Critical Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶