{"id":21259,"date":"2025-08-24T20:29:12","date_gmt":"2025-08-24T20:29:12","guid":{"rendered":"https:\/\/thisbiginfluence.com\/?p=21259"},"modified":"2025-08-24T20:29:12","modified_gmt":"2025-08-24T20:29:12","slug":"us-government-seeks-medical-records-of-trans-youth","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=21259","title":{"rendered":"US Government Seeks Medical Records of Trans Youth"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"paywall\">\u201cI\u2019m wanting over my shoulder driving residence,\u201d a health care provider whose hospital was focused by a subpoena informed the Publish.<\/p>\n<p class=\"paywall\">Homeland Safety secretary Kristi Noem has briefly moved into safe army housing after the situation of her Washington, DC, condo was uncovered on-line, triggering what DHS referred to as \u201cvicious doxxing\u201d and a wave of demise threats, the <a data-offer-url=\"https:\/\/nypost.com\/2025\/08\/15\/us-news\/noem-temporarily-relocated-to-military-housing-after-vicious-doxxing-and-death-threats\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/nypost.com\/2025\/08\/15\/us-news\/noem-temporarily-relocated-to-military-housing-after-vicious-doxxing-and-death-threats\/&quot;}\" href=\"https:\/\/nypost.com\/2025\/08\/15\/us-news\/noem-temporarily-relocated-to-military-housing-after-vicious-doxxing-and-death-threats\/\" rel=\"nofollow noopener\" target=\"_blank\">New York Post reports<\/a>. A DHS official stated the relocation was vital for security, although Noem continues to pay hire on her Navy Yard residence.<\/p>\n<p class=\"paywall\">The transfer comes as Noem has pointed to what she describes as a pointy rise in violence in opposition to ICE brokers, citing what it claims to be a virtually 1,000 % uptick in assaults\u2014figures ICE has not absolutely defined and that <a data-offer-url=\"https:\/\/www.washingtonpost.com\/opinions\/2025\/06\/19\/brad-lander-ice-assault-masking\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.washingtonpost.com\/opinions\/2025\/06\/19\/brad-lander-ice-assault-masking\/&quot;}\" href=\"https:\/\/www.washingtonpost.com\/opinions\/2025\/06\/19\/brad-lander-ice-assault-masking\/\" rel=\"nofollow noopener\" target=\"_blank\">The Washington Post<\/a> has questioned for missing specificity. Whereas DHS has not publicly detailed the sources of the alleged threats in opposition to her, Noem has framed them as a part of a broader local weather of hostility towards immigration enforcement.<\/p>\n<p class=\"paywall\">North Korea has reportedly infiltrated the worldwide IT job market by posing as distant staff at Fortune 500 firms, <a href=\"https:\/\/www.axios.com\/2025\/08\/19\/north-korea-it-worker-fraud-fortune-500\">Axios reports<\/a>. The operation\u2014backed by teams like Jasper Sleet and Moonstone Sleet\u2014makes use of stolen identities and AI-assisted functions to bypass hiring methods and conceal the employees\u2019 true origins.<\/p>\n<p class=\"paywall\">The scheme funnels salaries again to Pyongyang and raises severe cybersecurity issues, from mental property theft to the danger of extortion if the employees are uncovered. The Justice Division has introduced costs in opposition to a number of people tied to the plot, whereas the FBI has carried out raids on \u201claptop computer farms\u201d supporting it, <a data-offer-url=\"https:\/\/abcnews.go.com\/US\/justice-department-charges-4-north-koreans-posing-workers\/story?id=123344658\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/abcnews.go.com\/US\/justice-department-charges-4-north-koreans-posing-workers\/story?id=123344658&quot;}\" href=\"https:\/\/abcnews.go.com\/US\/justice-department-charges-4-north-koreans-posing-workers\/story?id=123344658\" rel=\"nofollow noopener\" target=\"_blank\">ABC News reports<\/a>. The <a data-offer-url=\"https:\/\/timesofindia.indiatimes.com\/technology\/tech-news\/microsoft-suspends-3000-outlook-and-hotmail-accounts-with\/articleshow\/122282172.cms\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/timesofindia.indiatimes.com\/technology\/tech-news\/microsoft-suspends-3000-outlook-and-hotmail-accounts-with\/articleshow\/122282172.cms&quot;}\" href=\"https:\/\/timesofindia.indiatimes.com\/technology\/tech-news\/microsoft-suspends-3000-outlook-and-hotmail-accounts-with\/articleshow\/122282172.cms\" rel=\"nofollow noopener\" target=\"_blank\">Times of India<\/a>, in the meantime, reported in June that Microsoft had suspended roughly 3,000 Outlook and Hotmail accounts allegedly linked to the scheme.<\/p>\n<p class=\"paywall\">Earlier this month, <a href=\"https:\/\/wired.com\/story\/leaked-data-reveals-the-workaday-lives-of-north-korean-it-scammers\/\">WIRED reported<\/a> on a associated trove of leaked paperwork obtained by cybersecurity researcher SttyK and introduced on the Black Hat safety convention. The cache offers a uncommon look inside these North Korean IT employee operations, detailing their meticulous job monitoring, inner quotas, and even glimpses of each day life below shut regime surveillance.<\/p>\n<p class=\"paywall\">Texas Tech College has signed a analysis settlement with the FBI targeted on defending key companies in opposition to cyberattacks and different disruptions, the <a data-offer-url=\"https:\/\/www.mrt.com\/news\/education\/article\/texas-tech-fbi-partnership-20823053.php\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.mrt.com\/news\/education\/article\/texas-tech-fbi-partnership-20823053.php&quot;}\" href=\"https:\/\/www.mrt.com\/news\/education\/article\/texas-tech-fbi-partnership-20823053.php\" rel=\"nofollow noopener\" target=\"_blank\">Midland Reporter-Telegram reports<\/a>. The partnership will reportedly grant the bureau entry to Tech\u2019s Essential Infrastructure Safety Institute, which research vulnerabilities within the energy grid, water methods, communications networks, and army amenities.<\/p>\n<p class=\"paywall\">Angelo State College can even contribute entry to its cybersecurity applications and Regional Safety Operations Middle, the place college students practice whereas monitoring real-world networks <a data-offer-url=\"https:\/\/sanangelolive.com\/news\/education\/2025-08-19\/angelo-state-texas-tech-partner-fbi-advance-us-national-security\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/sanangelolive.com\/news\/education\/2025-08-19\/angelo-state-texas-tech-partner-fbi-advance-us-national-security&quot;}\" href=\"https:\/\/sanangelolive.com\/news\/education\/2025-08-19\/angelo-state-texas-tech-partner-fbi-advance-us-national-security\" rel=\"nofollow noopener\" target=\"_blank\">in West Texas<\/a>. College leaders and FBI officers stated the deal is supposed to show tutorial analysis into sensible instruments and develop the pipeline of graduates ready for protection and cybersecurity roles.<\/p>\n<p class=\"paywall\">The push to develop analysis partnerships, nevertheless, contrasts with reporting in <a data-offer-url=\"https:\/\/www.nytimes.com\/2025\/08\/21\/us\/politics\/fbi-agent-recruitment-requirements-trump.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nytimes.com\/2025\/08\/21\/us\/politics\/fbi-agent-recruitment-requirements-trump.html&quot;}\" href=\"https:\/\/www.nytimes.com\/2025\/08\/21\/us\/politics\/fbi-agent-recruitment-requirements-trump.html\" rel=\"nofollow noopener\" target=\"_blank\">The New York Times<\/a> this week that the FBI could also be shifting away from its conventional position as an intelligence company, with plans to decrease recruiting requirements and focus extra on avenue crime. Critics say that shift dangers leaving the bureau with much less capability for advanced, technical circumstances, even because it seeks exterior experience by agreements just like the one with Texas Tech.<\/p>\n<p class=\"paywall\">Google has pushed an pressing safety replace for its Chrome browser, urging customers worldwide\u2014estimated within the billions\u2014to put in the patch instantly, <a data-offer-url=\"https:\/\/www.thesun.ie\/tech\/15715404\/google-chrome-update-browser-cyber-crime\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.thesun.ie\/tech\/15715404\/google-chrome-update-browser-cyber-crime\/&quot;}\" href=\"https:\/\/www.thesun.ie\/tech\/15715404\/google-chrome-update-browser-cyber-crime\/\" rel=\"nofollow noopener\" target=\"_blank\">The Sun reports<\/a>. The replace addresses a number of vulnerabilities, together with the excessive\u2011severity CVE\u20112025\u20118901 in Chrome\u2019s ANGLE graphics engine, which might permit attackers to hijack gadgets merely by luring customers to a malicious webpage.<\/p>\n<p class=\"paywall\">Though there\u2019s no proof of any actual\u2011world exploitation but, Google emphasizes that the danger stays till the replace is put in and the browser is restarted. The fixes are rolling out throughout all main platforms\u2014Home windows, macOS, Linux, Android, and iOS\u2014and Google advises customers to use them promptly to remain protected.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/us-government-seeks-medical-records-of-trans-youth\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cI\u2019m wanting over my shoulder driving residence,\u201d a health care provider whose hospital was focused by a subpoena informed the Publish. Homeland Safety secretary Kristi Noem has briefly moved into safe army housing after the situation of her Washington, DC, condo was uncovered on-line, triggering what DHS referred to as \u201cvicious doxxing\u201d and a wave [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":21261,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[991,480,1686,1358,341,282],"class_list":["post-21259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-government","tag-medical","tag-records","tag-seeks","tag-trans","tag-youth"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/21259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21259"}],"version-history":[{"count":1,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/21259\/revisions"}],"predecessor-version":[{"id":21260,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/21259\/revisions\/21260"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/21261"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=21259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=21259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}