Spies, Hackers, Social Media, AI, Oh My!
By CW3 Jason Coombs
Article published on: March 1st 2026, in the March 2026 Edition of Strength in Knowledge:
The Warrant Officer Journal
Read Time: < 10 mins
Photo: DVIDS 2018. FORT GEORGE G. MEADE, Md. – “Conquer the Flag” and “Howdy Neighbor
IOT” (Internet of Things) capture the flag were two village events attendees could participate in at the third annual AvengerCon, a hacker-style training event, at the McGill Training Center on November 27.
Near-peer and state-sponsored adversaries are using social media, cyber operations, and traditional HUMINT
tradecraft to target operations, Soldiers, and their families. Commanders must ensure their personnel
understand that online behavior, OPSEC, and cybersecurity are not just personal matters, but battlefield
vulnerabilities that can directly affect mission success.
The Battlefield Has Moved to Your Pocket
Today’s Army is operating more and more within the “gray zone” or below the threshold of war, where the
operational lines can be blurry. Our adversaries do not always play by the same rules where there are Title
10 and Title 50 authorities. Our adversaries do not have to breach a wall, hack a classified system, or
undertake extensive measures to recruit an insider threat. All they have to do is go online and appeal to
one of Maslow’s hierarchy of needs on LinkedIn, Instagram, Reddit, Discord, or any other social media
platform to make a connection (Ceder, 2025; Lowe, 2025; Yoshida, 2025b). A quick look inside any Soldier’s
pocket reveals a smartphone that is now part of the operational environment. Every social media profile is a
targeting package, and every friend is a line of operation (LOO), i.e., a target deck (Obis, 2025; Lt Col
Lisenbee, 2024).
This threat is not theoretical. Senior Intelligence officials and leaders, the Government Accountability
Office (GAO), and other Western intelligence services have all issued clear warnings that nation-state
adversarial intelligence services like Russia and the People’s Republic of China (PRC) are exploiting online
platforms to assess, develop, and recruit Defense personnel to collect information on their behalf. These
recruitments have occurred through elaborate ruses that include, but are not limited to, job offers, pay for
seemingly meaningless tasks (e.g., write a white paper on your experiences in your unit), and sexual
provocations (LTG Hale, 2025; GAO, 2025; D’Agati, 2019). The danger is not just what Soldiers post or how
they portray themselves online, but how adversaries combine small pieces of seemingly harmless information
into targetable intelligence.
If Commanders and Soldiers do not understand this threat in simple, practical terms, then the annual training
requirements and Army policies will fail. Personnel must realize and understand that poor online practices
can enable compromise across the human and technical domains, putting operations and even families at risk.
Adversaries Weaponizing Social Media
With advancements in technology and the rise of social media applications, our adversaries and their foreign
intelligence services (FIS) have adapted their offensive posture faster than the Department of War (DoW)
can. Focusing on the path of least resistance, adversaries seek to develop an insider threat by exploiting
human behavior. They are using social media and professional networking platforms like LinkedIn, Reddit, and
Discord to collect resumes, unit affiliations, career and permanent change of station (PCS) timelines, and
social networks to develop their targeting package (Ceder, 2025; Edwards, 2026; Lt Col Lisenbee, 2024; Lowe,
2025).
An Infantryman who has learned the most recent tactics and used new technology, the logistics Private who is
doing all the ordering and processing of new gear and equipment, or the admin who knows the ins and outs of
the personnel in the unit – they all have information valuable to our adversaries. An important note that is
not emphasized enough: Soldiers are not being targeted because they did something wrong; they are being
targeted because they have value.
How Surfing Social Media Morphs Into Espionage
Espionage cases no longer require secret meetings or specialized tradecraft; they can simply start with a
message request. Recent news reporting highlights the threat and tactics of the People’s Republic of China
(PRC) on LinkedIn, where it poses as recruiters and consultants to identify and develop targets of interest
(Edwards, 2026; Hui, 2026; Lt Col Lisenbee, 2024; Lowe, 2025). In November 2025, the Army’s senior
Intelligence Officer and former G-2, LTG Hale, issued a message to the force warning of threats facing Army
personnel and their families, and of ongoing operations, and urging everyone to stay alert and aware. Hale
pointed to seemingly harmless approaches, such as job offers or small payments to write papers about
Soldiers’ unit experiences, command climate, or how new technologies apply to current operations (LTG Hale,
2025; Lowe, 2025). These requests can then escalate to offers of money for unclassified Army publications or
regulations, followed by sensitive but unclassified material, and ultimately - the coup de grâce -
classified information. Once communication begins and any material is shared, it becomes a slippery slope;
the hook is set (D’Agati, 2019; Polymeropoulos, 2026).
Foreign intelligence services understand human motivation. To highlight this, adversaries often use a matrix
similar to the classic MICE framework that focuses on: money, ideology, compromise, and ego. Soldiers facing
financial strains, work or career frustrations, loneliness, or a strong desire for recognition are
especially vulnerable under MICE. Many of these feelings can be found and developed from an individual’s
online presence or profile, and are easily exploited. A simple picture of a pretty girl can capture a lonely
Soldier’s attention, or an offer of money for writing a simple paper about their weekly activities in
exchange for money and accolades, allows an adversary to exploit these factors without the target ever
realizing that they are being manipulated or doing something wrong (D’Agati, 2019; Polymeropoulos, 2026).
Several recent cases have demonstrated that these tactics are true, effective, and consistent. In a recent
case, a U.S. Navy petty officer was approached through a social media chat group focused on stock trading.
What began as a casual conversation turned into requests for sensitive military data, which he eventually
provided in exchange for money (Yoshida M., 2025b). Another Sailor passed dozens of technical manuals to PRC
intelligence officers after being recruited online, receiving relatively small payments that nonetheless
resulted in a 16-year prison sentence (Fuentes, 2026). These two cases, among many, highlight a hard truth:
adversaries only need opportunity, access, and patience.
The Setup – Fusing Social Media with Cyber Operations
Espionage today is not exclusively about getting someone to talk or pass documents; it is also about
compromising devices. As a follow-up to online targeting, adversaries are using social media to deliver
malware or spyware, and with current advancements, it can be delivered without user interaction. Zero-click
cyber exploitation is increasingly common, exploiting device vulnerabilities that allow compromise without
the user clicking a link (Sharma, 2026; Sharma, 2026). Some of the more advanced tools, like NSO Group’s
Pegasus Project, used against government and military officials, dignitaries, and journalists, can collect
nearly everything from their mobile devices (International, 2021). Less advanced spyware, such as “Hermit,”
which targets both iOS- and Android-based devices, allows attackers to collect messages, contacts, photos,
and geolocation data (Townsend, 2022; Underhill, 2025). Malware and spyware are often delivered through
social engineering via links. A common method is through job-advertisement links or posing as a female
friend who sends their target a link to their OnlyFans page for free content, which is actually a redirect
to download spyware. With advancements in technology, cyber actors are embedding malicious code into
messages and documents that execute automatically, using Artificial Intelligence (AI) to bypass basic
security protocols (Sharma, 2026; Pearl, 2026).
The Army does a good job of emphasizing the importance of OPSEC but misses the mark on basic device security
measures (AR 530-1, 2014; Flores-Wilkin, 2024; SM Guide, 2026; Flores-Wilkin, 2023). One could say that
device security is covered in Cyber-Security training, but beyond not clicking on links from people you do
not trust, what else is there? One of the easiest phone security measures is powering down your phone each
night to thwart mobile threats. Most malware/spyware exploits do not persist through a device’s power cycle
(Whitney, 2025). Another threat mitigation is not scanning public QR codes, turning off location services,
and asking, "Why does your calculator need access to your contact list?" Check your applications and turn
off unnecessary access to your phone’s secrets. The big takeaway for a Soldier is simple: you do not have to
be reckless or crazy online to be compromised; you just have to be predictable or lazy.
Why OPSEC Matters – Loose Lips Sink Ships
Army Regulation (AR 530-1) defines Operational Security as the identification and protection of critical
information from adversaries. That definition has not changed. What has changed is where that information
resides. Seemingly harmless posts on social media – pictures of you on the compound in the warzone,
complaints about the unit (morale), or even family updates can be pieced together like a puzzle that reveals
a picture – unit readiness, timelines, vulnerabilities (Flores-Wilkin, 2024; Thorne, 2025; Yoshida M. ,
2025). The Army’s Social Media guidance warns Soldiers and families to assume adversaries are reading every
post and painting the picture of access (AR 530-1, 2014; SM Guide, 2026).
The Army has programs in place and publishes articles of awareness, but are they read? Are they posted in
locations where the new Infantryman arriving at his unit overseas can access them? This is definitely an
area where we can improve. Most DoW components failed to provide proper OPSEC and CI training, often
glossing over it, and many personnel were never trained on mobile device security (GAO, 2025; Flores-Wilkin,
2023). This is not a policy failure alone; it is a correctable leadership challenge.
Why Check-the-Box Training Is Not Enough
Counterintelligence Threat Awareness and Reporting (TARP) is required annual training (AR 381-12, 2025) and
while necessary, it does not change anyone’s behavior. Unlike most Army online training, which usually
consists of a kindergarten-style video, TARP is often delivered through in-person instruction. Soldiers
often understand the rules in theory but underestimate, in reality, how aggressively they are being targeted
(Lt Col Lisenbee, 2024; LTG Hale, 2025). If Soldiers believe that espionage can only happen to someone else
or that spyware only affects careless users, they will continue to overshare, accept unknown contacts, click
links from unknown senders, and continue poor security practices.
The Commander’s Role – Making it Real
Command emphasis matters. Soldiers take cues from what leaders reinforce consistently, not just once a year.
Commanders reinforce what is important. Therefore, Commanders must ensure Soldiers understand three simple
truths (Flores-Wilkin, 2023):
- Every Soldier is a potential target, regardless of rank or MOS.
- Social media is an intelligence collection platform, not just entertainment.
- Small mistakes can have strategic consequences.
Hands-on leadership involvement includes attending training to understand the threat truly. Training should
include real-world examples, personal examples when applicable, and current training, tactics, and
procedures (TTPs) used by our adversaries, to have more impact than reading a slide of warnings. When
leaders can acknowledge their own vulnerabilities and mistakes, it reinforces that these are shared
responsibilities, not a disciplinary trap or a simple yearly requirement.
OPSEC and Digital Discipline Is Combat Readiness
Our adversaries are patient, professional, and persistent. They are not waiting for the next conflict to
begin shaping the battlefield; they are doing it now, one friend request at a time (Lt Col Lisenbee, 2024).
Ensuring Soldiers and their families understand the online threat environment is not about restricting
freedom or discouraging technology use. It is about recognizing that OPSEC and digital discipline are now
part of combat readiness (Flores-Wilkin, 2024). Similar to how we train Soldiers to secure weapons and
sensitive equipment, we must train them to secure their personal information, online behavior, and devices.
The cost of complacency is no longer theoretical. It is measured in compromised operations, lives lost,
endangered families, and ruined careers. Attention and focus from Commanders today can prevent tomorrow’s
clickbait headlines.
References
Army Social Media Guide. (2026). Army social media guide. U.S. Army. https://www.army.mil/socialmedia/
Ceder, R. (2025, October 16). Soldiers are being contacted by adversaries on LinkedIn, Reddit, the Army
says. Defense News.
https://www.defensenews.com/news/your-army/2025/10/16/soldiers-being-contacted-by-adversaries-on-linkedin-reddit-army-says/
D’Agati, D. (2019, August 2). Want to fight insider threats? Just look for the MICE. ClearanceJobs.
https://news.clearancejobs.com/2019/08/02/want-to-fight-insider-threats-just-look-for-the-mice/
Edwards, C. (2026, January 20). Britain approves ‘mega’ Chinese embassy in London despite national
security fears. CNN.
https://www.cnn.com/2026/01/20/uk/uk-china-mega-embassy-royal-mint-court-intl
Fuentes, G. (2026, January 13). Sailor to serve 16-year prison sentence for selling secrets to China.
USNI News.
https://news.usni.org/2026/01/13/sailor-to-serve-16-year-prison-sentence-for-selling-secrets-to-china
Government Accountability Office. (2025). Information environment: DOD needs to address security risks of
publicly accessible information (GAO-26-107492). https://www.gao.gov/assets/gao-26-107492.pdf
Headquarters, Department of the Army. (2014). Operations security (AR 530-1). U.S. Army. Headquarters,
Department of the Army. (2025). Counterintelligence awareness and reporting (AR 381-12). U.S. Army.
Hale, A. (2025, November 24). Message to the force: Protecting the force against foreign intelligence
threats. U.S. Army.
https://api.army.mil/e2/c/downloads/2025/11/24/10456559/message-to-the-force-protecting-the-force-against-foreign-intel-threats.pdf
Hui, S. (2026, January 20). UK approves a ‘mega’ Chinese embassy in London despite criticism of security
risks. ABC News.
https://abcnews.go.com/International/wireStory/uk-approves-mega-chinese-embassy-london-despite-criticism-129374853
Lisenbee, C. (2024). Covert connections: The LinkedIn recruitment ruse targeting defense insiders.
Journal of Indo-Pacific Affairs.
https://www.airuniversity.af.edu/JIPA/Display/Article/3768503/covert-connections-the-linkedin-recruitment-ruse-targeting-defense-insiders/
Lowe, A. (2025). Army’s top spy warns of growing threat. U.S. Army.
https://www.army.mil/article/289201/armys_top_spy_warns_of_growing_threat
Obis, A. (2025, November). DoD failing to address growing security threats posed by publicly available
data. Federal News Network.
https://federalnewsnetwork.com/defense-news/2025/11/dod-failing-to-address-growing-security-threats-posed-by-publicly-available-data
Pearl, M. (2026). Did you get an Instagram password reset email recently? Gizmodo.
https://gizmodo.com/did-you-get-an-instagram-password-reset-email-recently-this-might-be-the-very-unpleasant-reason-2000708667
Polymeropoulos, M. (2026). The art of agent-running. Engelsberg Ideas.
https://engelsbergideas.com/notebook/the-art-of-agent-running/
Project Pegasus. (2021, July). Massive data leak reveals Israeli NSO Group’s spyware used to target
activists, journalists, and political leaders globally. Amnesty International.
https://www.amnesty.org/en/latest/press-release/2021/07/the-pegasus-project/
Sharma, R. (2026). Radware uncovers ZombieAgent, a zero-click AI vulnerability in OpenAI agents. The Fast
Mode.
https://www.thefastmode.com/technology-solutions/46638-radware-uncovers-zombieagent-a-zero-click-ai-vulnerability-in-openai-agents
Thorne, A. (2025). Learning to take OPSEC seriously protects everyone. U.S. Army.
https://www.army.mil/article/285690/learning_to_take_opsec_seriously_protects_everyone
Townsend, C. (2022). Google warns of ‘Hermit spyware’ infecting Android and iOS devices. Mashable.
https://mashable.com/article/google-warns-spyware-android-ios
Underhill, K. (2025). Android zero-click flaw lets hackers take over devices. eSecurity Planet.
https://www.esecurityplanet.com/threats/android-zero-click-flaw-lets-hackers-take-over-devices/
Whitney, L. (2025). Why you should power off your phone at least once a week, according to the NSA.
ZDNET.
https://www.zdnet.com/article/why-you-should-power-off-your-phone-at-least-once-a-week-according-to-the-nsa/
Yoshida, M. (2025a). OPSEC awareness month: Avoid oversharing on social media, practice OPSEC. U.S. Army.
https://www.army.mil/article/285316/opsec_awareness_month_avoid_oversharing_on_social_media_practice_opsec
Yoshida, M. (2025b). AT awareness month: Online targeting, do not take the bait. U.S. Army.
https://www.army.mil/article/287786/at_awareness_month_online_targeting_dont_take_the_bait
Author
CW3 Jason Coombs is a Counterintelligence and TARP/OPSEC professional. CW3 Kristen
Tritz, CW3 Michael Gabel, and CW3 Timothy Hornback peer-reviewed this article before submission.