British universities paid security firm to ‘spy’ on pro-Palestine students

Twelve British universities paid a private firm run by former military intelligence officials to “spy” on student protesters and academics, including those who have expressed solidarity with Palestine, it can be revealed.

A joint investigation by Al Jazeera English and Liberty Investigates has uncovered evidence that Horus Security Consultancy Limited trawled through student social media feeds and conducted secret counter-terror threat assessments on behalf of some of Britain’s most elite institutions.

Horus, which describes itself as a “leading intelligence” firm, has been paid at least 440,000 pounds ($594,000) by universities since 2022.

Among those monitored were a Palestinian academic invited to give a guest lecture at Manchester Metropolitan University and a pro-Gaza PhD student at the London School of Economics, according to internal documents.

In October 2024, the University of Bristol provided the firm with a list of student protest groups it wished to receive alerts about, an internal university email suggests. It included pro-Palestinian and animal rights activists.

In total, 12 universities paid the firm to monitor campus protest activity. Others include the University of Oxford, Imperial College London, University College London (UCL), King’s College London (KCL), the University of Sheffield, the University of Leicester, the University of Nottingham and Cardiff Metropolitan University.

There is no suggestion that this activity is illegal.

These findings have come to light after Al Jazeera English and Liberty Investigates submitted freedom of information (FOI) requests to more than 150 universities.

All the institutions named in this article were approached for comment by Al Jazeera and Liberty Investigates.

The University of Oxford, UCL, KCL, the University of Leicester and the University of Nottingham did not respond to requests for comment.

Keep reading

Islamized Dearborn Man Hit With Federal Charges After Feds Uncover 35,000 Child Abuse Files


Federal prosecutors in Detroit have charged a 26-year-old Dearborn man after an FBI investigation linked him to tens of thousands of files believed to be connected to the online sexual exploitation of children.

Authorities unsealed a federal complaint and arrest warrant for Audy Mugally Al-Saidi, who faces allegations of receipt, distribution, and possession of child pornography.

Investigators said Al-Saidi was associated with approximately 35,002 potentially downloadable files identified as being of investigative interest.

The case is part of an investigation conducted by the FBI’s Innocent Images National Initiative, a program within the agency’s Violent Crimes Against Children Unit that focuses on crimes involving the online exploitation of minors.

According to court records, the investigation began in February 2026.

On Feb. 18, 2026, an FBI agent used an undercover computer to access a BitTorrent peer-to-peer file-sharing network.

These systems allow users to exchange files directly, often without identifying information visible to others on the network.

While monitoring activity on the platform, the agent identified a device tied to an IP address that contained approximately 35,002 potentially downloadable files.

Keep reading

Rep. Lauren Boebert Demands Answers for ‘Deeply Troubling Abuse of Power’ by NSA Analysts

Rep. Lauren Boebert (R-CO) on Monday wrote to National Security Agency (NSA) Director Joshua Rudd about multiple instances of “deeply troubling abuses of power” by NSA analysts who have misused Section 702 of FISA to search private communications, including a person met through a dating service and a potential tenant.

“I write to demand answers about a deeply troubling abuse of power by a National Security Agency analyst who exploited one of our nation’s most sensitive surveillance authorities to spy on Americans met through an online dating service,” Boebert wrote to the NSA.

She recounted an incident that was disclosed by the Privacy and Civil Liberties Oversight (PCOAB)’s September 2023 report that “represents exactly the kind of government overreach that erodes the trust of the American people in their intelligence community.”

“As a Member of Congress who takes both national security and the constitutional rights of every American seriously, I find it unacceptable that nearly three years after this abuse was disclosed, the public has received no accounting of what consequences, if any, were imposed on the individuals responsible,” she added.

Keep reading

US & EU Negotiate Biometric Data-Sharing Deal

Washington wants to run European fingerprints through American databases, and the EU is considering it. The Department of Homeland Security and the European Union are in formal negotiations over an arrangement that would give DHS direct query access to biometric records held by EU member states, a level of access that Brussels has never granted to a non-EU country for border security purposes.

The deal sits inside DHS’s Enhanced Border Security Partnership program, which effectively tells Visa Waiver Program countries to open their biometric databases or risk losing visa-free travel privileges. Washington has set a December 31, 2026, deadline for EBSP agreements to be operational. After that, DHS reviews each country’s compliance. Countries that fail to meet expectations risk suspension from the VWP, which would reimpose visa requirements on their citizens.

When DHS encounters a traveler, asylum seeker, visa applicant, or anyone flagged during immigration processing, it would query a participating country’s database using that person’s biometrics.

A match returns fingerprints and related identity data to DHS.

Keep reading

Americans Traveling to Hong Kong Will Now Face ARREST for Refusing to Hand Over Phones, Laptops, and Passwords

The era of privacy is officially over in the “New Hong Kong,” and if you’re an American traveling abroad, you are now a target for the Communist-controlled regime.

According to a recent warning issued by the U.S. Consulate, Americans entering or even transiting through Hong Kong could now face criminal charges simply for refusing to unlock their phones or provide passwords to authorities.

Under newly updated enforcement rules tied to Hong Kong’s sweeping National Security Law, police now have the authority to demand access to personal electronic devices, including phones and laptops, on the spot.

And here’s the catch:

This applies to everyone, residents, tourists, business travelers, and even passengers just passing through the airport.

The U.S. Consulate General in Hong Kong and Macao issued the following alert:

On March 23, 2026, the Hong Kong government changed the implementing rules relating to the National Security Law. It is now a criminal offense to refuse to give the Hong Kong police the passwords or decryption assistance to access all personal electronic devices including cellphones and laptops. This legal change applies to everyone, including U.S. citizens, in Hong Kong, arriving or just transiting Hong Kong International Airport. In addition, the Hong Kong government also has more authority to take and keep any personal devices, as evidence, that they claim are linked to national security offenses.

Keep reading

Maine Lobsterman Asks the Supreme Court To Strike Down a Rule Allowing the Government To Track His Boat 24/7

In March 2022, a rule was finalized requiring all federally permitted lobster vessels in 10 East Coast states to install GPS tracking. Now one lobsterman is asking the Supreme Court to overturn the regulation.

Last week, Frank Thompson, a fifth-generation Maine lobsterman, filed a petition to the Supreme Court challenging a rule set by the Atlantic States Marine Fisheries Commission (ASMFC). This rule required lobstermen to install a GPS device on their boats, which tracks and sends locations on a minute-by-minute basis to government agencies—even when the boat is being used recreationally. The systems—which are Bluetooth compatible and can collect audio—also record and update the boat’s location every six hours when it is docked or moored. Failing to comply with the rule could lead to fines, forfeiture of fishing licenses, jail time, and even a federal moratorium on lobstering in noncompliant states.

The rule was pitched as a way to save lobstermen time. Rather than using written logs, the GPS device would automatically track their day. It was also proposed to better track and reduce the environmental impact of the industry. However, these fishermen are already ecologically conscious because their livelihood depends on it. The industry has received praise from the state’s fishing commissioner for being a “model of conservation.”

Whatever the motivation, fishermen say the rule violates their constitutional rights. In 2024, Thompson challenged the regulation in federal court, arguing that it violated his Fourth Amendment right to protection against unreasonable search and seizure. Both the district court and appeals court sided with the government, saying that since lobstering was considered a “closely regulated” industry, it did not enjoy the same constitutional protections from warrantless searches that less-regulated businesses enjoy.

But “digital surveillance without a warrant is unconstitutional—regardless of industry,” says the Pacific Legal Foundation (PLF), a public-interest law firm that is representing Thompson. “The government cannot exclude licensed professions from the Fourth Amendment’s protections and compel lobstermen to submit to government trespass and around-the-clock” federal surveillance.

Keep reading

Massachusetts Agrees to Delete Data From App It ‘Secretly Installed’ During Pandemic

Massachusetts officials have agreed to delete data from a contact tracing application that people said was installed on their phones without their permission during the COVID-19 pandemic.

Under a settlement agreement approved by a federal judge on March 31, the Massachusetts Department of Public Health “shall (a) destroy any Primary Data in the Department’s possession, custody, and control, which the Department, exercising all due diligence, has located and … that was made available to the Department from the COVID Exposure Notification Setting on Android Devices; and (b) certify in writing to Class Counsel that such data has been destroyed and will not be provided to any third party.”

The state’s health commissioner also promised not to have data collecting applications installed on people’s phones without their permission for five years.

The settlement came in a case brought by plaintiffs who said the app in question, known as MassNotify v.3 or Exposure Notification Settings Feature-MA, was “secretly installed” on their phones without their permission.

American Institute of Economic Research senior fellow Robert Wright, who lives in Massachusetts, said the app was downloaded onto his Android phone around July 1, 2021, without his knowledge. Johnny Kula, a New Hampshire resident who travels to Massachusetts on a daily basis for work, also said he discovered the app on his phone around the same time, and that it was back on the phone later in 2021 after he uninstalled it.

The plaintiffs’ claims echoed reviews from app store users complaining they had not downloaded the app, but it appeared on their phones. The app, which allowed people to say they had tested positive for COVID-19, and alerted others who had recently been close in location to those people, was downloaded more than one million times, according to court filings. Similar applications were developed by at least 24 other states.

Keep reading

FBI Issues Public Alert on Americans Using Foreign Apps

The FBI identified data security risks from foreign-developed mobile apps used in the United States, the agency warned in a March 31 public service announcement.

“As of early 2026, many of the most downloaded and top-grossing apps in the United States are developed and maintained by foreign companies, particularly those based in China,” the FBI said, without naming any apps.

“The apps that maintain digital infrastructure in China are subject to China’s extensive national security laws, enabling the Chinese government to potentially access mobile app users’ data.”

In the Google Play store, the most popular apps include short-form video platform TikTok, video editor CapCut, artificial intelligence video generator PixVerse, and communication app Telegram X. China-based ByteDance maintains ownership of TikTok and CapCut. PixVerse is owned by a Singaporean company, and the developer of Telegram X is based in the United Arab Emirates.

On Apple’s App Store, the top free apps include CapCut, TikTok, and Chinese shopping apps Temu and Shein.

In its alert, the FBI warned users to be aware of the types of data the foreign apps request access to when they are downloaded.

Keep reading

Trump signs order directing creation of a national voter list, a move already facing lawsuit threats

President Donald Trump on Tuesday signed an executive order to create a nationwide list of verified eligible voters and to restrict mail-in voting, a move that swiftly drew legal threats from state Democratic officials ahead of this year’s midterm elections.

The order, which voting law experts say violates the Constitution by attempting to seize states’ power to run elections, is the latest in a torrent of efforts from Trump to interfere with the way Americans vote based on his false allegations of fraud. The president has repeatedly lied about the outcome of the 2020 presidential campaign and the integrity of state-run elections, asserting again Tuesday that he won “three times” and citing accusations of voter fraud that numerous audits, investigations and courts have debunked.

The order signed Tuesday calls on the Department of Homeland Security, working in conjunction with the Social Security Administration, to make the list of eligible voters in each state. It also seeks to bar the U.S. Postal Service from sending absentee ballots to those not on each state’s approved list.

Trump is also calling for ballots to have secure envelopes with unique barcodes for tracking, according to the executive order, which was first reported by the Daily Caller. Federal funding could be withheld from states and localities that don’t comply.

Keep reading

White House App Found Tracking Users’ Exact Location Every 4.5 Minutes via Third-Party Server

The Trump administration’s newly launched White House App is under scrutiny after a software developer claimed to have found embedded code that tracks users’ precise GPS coordinates every 4.5 minutes and automatically syncs them to a third-party server. The claim, posted on 28 March 2026 by the X account @Thereallo1026, has drawn nearly 260,000 views and prompted questions about data collection practices in government-operated applications.

The post included what appeared to be decompiled source code from the app, revealing what the user described as OneSignal’s ‘full GPS pipeline compiled in.’ According to the post, the code showed the app ‘polling your location every 4.5 minutes, syncing your exact coordinates to a third-party server.’ The White House has not publicly responded to the specific technical claims.

What the Code Allegedly Shows

OneSignal is a widely used push notification platform that, according to its own documentation, updates a user’s GPS coordinates ‘approximately every 5 minutes (based on permission and system rules)’ when location sharing is enabled within a mobile app. The platform is designed to allow developers to segment and target users based on their physical location for messaging campaigns.

The decompiled code shared by @Thereallo1026 references Android location permission strings, background location access, and a foreground update time set to 270,000 milliseconds — the equivalent of 4.5 minutes — alongside a background update time of 600,000 milliseconds, or 10 minutes. If accurate, these constants suggest the app is configured to collect and transmit precise location data at regular intervals, even while running in the background.

Keep reading