InfoSec News 19DEC2025

General

Normally, a U.S.-based remote worker’s computer would send keystroke data within tens of milliseconds. This suspicious individual’s keyboard lag was “more than 110 milliseconds,”
Last week we were alerted to suspicious activity in one of our online IT code libraries....While principally used for code storage and development, unfortunately there were also historical data files in this code library containing personal information about some members of our community.
Our current investigations indicate the accessed data includes:
- personal information of around 10,000 current staff and affiliates, that were employed or affiliated as at 4 September 2018
- personal information of around 12,500 former staff and affiliates, that were employed or affiliated as at 4 September 2018
- a series of historical data sets predominantly from 2010-2019 containing personal information of around 5000 alumni and students, as well as six supporters.
Prosecutors say the suspect, born in 2003, was already known to them after having been convicted of similar crimes earlier this year.

Getting Techy

Geo-Politics

Privacy

  • [US] The Pennsylvania Supreme Court has decided that police don't need a warrant to obtain Google Search data.
In its opinion, the court said that internet users making searches have no reasonable right to privacy because “it is common knowledge that websites, internet-based applications, and internet service providers collect, and then sell, user data.”
  • [US] Customs and Border Patrol want to expand their drone programme - not just small "vertical-takeoff and -landing drones small enough to be carried and launched by individual teams", but also expanding their purchasing of Predator (MQ9) drones. "MQ-9 can reportedly remain aloft for more than 27 hours at altitudes approaching 50,000 feet, surveying vast areas with multi-sensor payloads."
drone and counter-drone technology and “mitigation measures” that can be used not only for federally secured special events, such as the 2026 FIFA World Cup
Flight logs and public records show that the agency has repeatedly deployed uncrewed aircraft in support of other federal missions, including aerial monitoring during protests and assistance with interior immigration enforcement. That overlap has intensified concerns that tools developed for border control can migrate quickly into domestic policing.
  • [US] Immigrations and Customs Enforcement (ICE) is looking to beef up its internal logging and insider-threat detection. On the surface, this sounds good, however concerns have been raised about internal dissent, and considerations of 'loyalty'.
The expansion of internal monitoring comes as the Trump administration has framed dissent inside federal agencies as a threat, moving to aggressively identify and remove career officials viewed as ideologically misaligned with the administration, particularly in national security and law enforcement roles.
Since returning to office, the Trump White House has portrayed internal dissent in explicitly loyalty-based terms—as opposed to misconduct, malfeasance, or efforts to deliberately undermine the government—framing political disagreement with the president’s goals as grounds for firing.
Several watchdog groups have warned that expanded monitoring systems, when paired with weakened oversight, can blur the line between cybersecurity and retaliation. Tools built to detect breaches or misuse, they say, can just as easily be repurposed to track internal critics, especially when privacy safeguards and independent review are thin.

AI

Subscribe to Deuxieme RE Banque News

Sign up now to get access to the library of members-only issues.
Jamie Larson
Subscribe