CyberSecurity Knuggets
Mar 22, 2026
Subject: Best infosec-related long reads for the week of 3/14/26
Dear Reader,
Happy Saturday morning! Metacurity is pleased to bring you this week’s selection of outstanding long-form infosec content we couldn’t fit into our daily news digest. We invite you to share your thoughts and your favorite reads by emailing info@metacurity.com. For full access to our archives and exclusive content, consider upgrading your subscription.
This week’s highlights include:
-
Inside Industrialized Scam Compounds in Cambodia
Bloomberg Businessweek’s investigation reveals how trafficked workers in Cambodia operate global fraud schemes, impersonating police with realistic mock setups including fake police stations and detention cells. Victims are coerced through highly staged videos, and workers endure prison-like conditions. Many are deceived by job ads, held captive, and forced into scams targeting international victims.
-
SCION: Switzerland’s Secure Alternative to BGP
Switzerland’s SCION network architecture offers a cutting-edge upgrade to the aging, vulnerable BGP system by enabling multi-path routing, isolation domains, and cryptographic path validation. This approach drastically improves security and resilience against hijacking and failures, allowing senders and receivers control over packet routing. Yet, entrenched global infrastructure presents adoption challenges.
-
Flock Safety Surveillance: Local Resistance in Wisconsin
Following public outcry about transparency and civil rights, the city of Verona, Wisconsin ended its contract with Flock Safety’s AI-powered license plate reader network. However, cameras remain active in the broader region, sparking grassroots campaigns like DeFlock Dane County to map surveillance points and advocate for greater oversight, consent, and limits on expansive police surveillance networks.
-
Legal Challenges of Commercial Spyware in U.S. Law Enforcement
Stanford J.S.D. candidate Yotam Berger examines how powerful spyware tools like Pegasus, with zero-click infection abilities and total device control, raise unresolved Fourth Amendment and statutory questions. Existing laws such as the Electronic Communications Privacy Act (ECPA) and Rule 41 are ill-equipped to address the continuous, invasive nature of these technologies, requiring nuanced legal frameworks for the different spyware capabilities.
-
Russia’s Sovereign Internet Backfiring
Russia’s efforts to build an internally controlled “sovereign internet” with widespread deep packet inspection and throttling are disrupting domestic communications, damaging connectivity, and isolating the country from global networks. This impacts not only civilians but also military coordination, despite governmental attempts to suppress VPN usages and bypass tools. The approach faces criticism internally, including from Kremlin allies.
Thank you for your continued readership and support. If you find value in our reports, please consider upgrading your subscription.
Warm regards,
Cynthia B Brumfield
Metacurity
info@metacurity.com
Stay Well!
