intelligence agencies, political science, international relations, security services

The Dunhuang Culture ζ•¦η…Œζ–‡εŒ– Database
digitalorientalist.comΒ·22h
πŸ“œText Collation
Holding AI dupes accountable
gavialib.comΒ·18h
🏴󠁧󠁒󠁳󠁣󠁴󠁿Scottish Computing
Criminal Management Division Quarterly Goals
medium.comΒ·1d
πŸ“ΌCassette Hacking
Homeland Security reassigns β€˜hundreds’ of CISA cyber staffers to support Trump’s deportation crackdown
techcrunch.comΒ·19h
πŸ›‘Cybersecurity
Reading the ENISA Threat Landscape 2025 report
securityaffairs.comΒ·5d
🎯Threat Hunting
Strategic Communication under Threat: Learning Information Trade-offs in Pursuit-Evasion Games
arxiv.orgΒ·1d
πŸ”²Cellular Automata
Technological Approach to Mind Everywhere: A Grounded Framework (pdf, 2022)
frontiersin.orgΒ·2dΒ·
Discuss: Hacker News
πŸ”²Cellular Automata
North Korea displays new long-range missile at military parade celebrating Kim Jong Un’s leadership
the-independent.comΒ·11h
πŸ”¬Floppy imaging
California State University Long Beach student, 22, is found dead and now his roommate is charged with murder
the-independent.comΒ·8h
🚨Incident Response
What happens to college towns after peak 18-year-old?
theargumentmag.comΒ·9hΒ·
Discuss: Hacker News
πŸ“°RSS Archaeology
Inside the Chinese AI threat to security
politico.comΒ·3dΒ·
Discuss: Hacker News
πŸ‡¨πŸ‡³Chinese Computing
INFER : Learning Implicit Neural Frequency Response Fields for Confined Car Cabin
arxiv.orgΒ·1d
πŸ‘‚Psychoacoustic Coding
Paper2Agent: Research Papers as Interactive AI Agents
huggingface.coΒ·19hΒ·
Discuss: Hacker News
πŸ€–AI Curation
The A.I. Prompt That Could End the World
nytimes.comΒ·1dΒ·
Discuss: Hacker News
⚑Proof Automation
Chinese Gov't Fronts Trick the West to Obtain Cyber Tech
darkreading.comΒ·4d
πŸ•³οΈInformation Leakage
Fear and vigilance rise as attacks on houses of worship intensify across the world
the-independent.comΒ·21h
πŸ›‘Cybersecurity
Three UK universities make top 10 in prestigious world rankings
the-independent.comΒ·2d
🏴󠁧󠁒󠁳󠁣󠁴󠁿Scottish Computing
ResAD: Normalized Residual Trajectory Modeling for End-to-End Autonomous Driving
arxiv.orgΒ·1d
πŸŒ€Riemannian Computing
Commission to probe reports that OrbΓ‘n’s spies targeted EU officials in Brussels
politico.euΒ·2d
πŸ”ŽOSINT Techniques