{"id":3585,"date":"2025-06-08T13:59:55","date_gmt":"2025-06-08T13:59:55","guid":{"rendered":"https:\/\/kaizen-blog.org\/?p=3585"},"modified":"2025-06-08T14:01:23","modified_gmt":"2025-06-08T14:01:23","slug":"ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden","status":"publish","type":"post","link":"https:\/\/kaizen-blog.org\/en\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/","title":{"rendered":"A State in Your Pocket \u2013 How Smartphones Became the Achilles\u2019 Heel of Western Security"},"content":{"rendered":"<p>It starts with a crash. Not a loud, not a spectacular one \u2013 but a quiet, almost imperceptible glitch in a system that is no longer a technical toy, but a geopolitical echo chamber. When cybersecurity analysts at the firm iVerify began to register an unusual number of unexplained software crashes on smartphones belonging to Western government employees in late 2024, no one yet realized how deep the digital fracture actually ran. What looked like a technical error soon revealed itself as a highly sophisticated, zero-click-enabled espionage operation: an unknown group had infiltrated smartphones \u2013 without the targets ever having to click a thing. Affected were individuals in politics, tech, and media \u2013 and they all had one thing in common: they had previously been targeted by Chinese cyber operations.<\/p>\n\n\n\n<p>A pattern is emerging. Anyone who believes the main battleground of modern espionage lies in data centers or spy satellites is mistaken. The new front runs straight through our pockets \u2013 on devices that trade stocks, distribute power, steer elections, and model war scenarios. And all the while, they are linked to children's toys, outdated apps, and microphones no one is watching anymore. \"The world is in a mobile security crisis,\" says Rocky Cole, former NSA staffer, now COO at iVerify. And not just in the United States. Germany, too, has long known that this threat is not theoretical. In March 2024, a confidential conversation between German Air Force officers about arms deliveries to Ukraine was intercepted \u2013 via WebEx, of all things, recorded from Singapore. The recording ended up with the Russian propaganda network RT. The German government was humiliated, the security breach glaringly obvious. In a country that prides itself on exporting technology, it was military communication that ran through a commercial video tool \u2013 in the midst of a European war.<\/p>\n\n\n\n<p>China? Denies everything. The government in Beijing points to alleged U.S. double standards, speaks of \"despicable Western methods,\" and has Foreign Ministry spokesman Lin Jian claim that it is not China doing the spying \u2013 but the West, which lies, infiltrates, and recruits \"CIA-badged spies.\" And while these accusations trade places like Cold War echoes, a digital operation is unfolding quietly and deeply \u2013 powered by artificial intelligence, disinformation networks, and precisely aligned infrastructure.<\/p>\n\n\n\n<p>That Germany is part of this game becomes evident at the latest with the Pegasus affair. Even if no confirmed infection of high-level German politicians has been found, the Federal Criminal Police Office acquired the spyware in 2020 \u2013 albeit later under strict limitations. Human rights activists and journalists in Germany were verifiably among the global targets. The message is clear: espionage knows no borders \u2013 and no distinction between inside and out. Yet while state actors deploy increasingly precise tools, the security breaches are often opened by those meant to be protected. The White House recently had to confirm that someone impersonating Susie Wiles \u2013 Trump\u2019s chief of staff \u2013 had contacted governors, senators, and business leaders. The calls didn\u2019t come from her number. But most likely from someone with access to her contact list.<\/p>\n\n\n\n<p>In Germany, too, it wasn\u2019t just the external threat that proved dangerous \u2013 but the internal culture of complacency. The domestic intelligence service warned repeatedly about the use of Chinese IT components in sensitive infrastructure \u2013 and yet, Huawei routers and surveillance cameras could still be found in police departments, ministries, and even the Bundestag as recently as 2023. While the United States expelled Chinese firms from its networks, Germany was still debating \"proportionality.\"<\/p>\n\n\n\n<p>The danger already resides in the circuitry. The \u201cCyberbunker\u201d in Traben-Trarbach \u2013 a decommissioned NATO bunker turned into a base for botnets, darknet markets, and child pornography \u2013 showed how easily German infrastructure could become a global threat vector. Europol was stunned, the BKA dismayed. And yet, the lesson went largely unheeded: smart devices are still sold by the millions, with microphones, cameras, and chips that are rarely updated \u2013 but always listening.<\/p>\n\n\n\n<p>The U.S. government is trying to respond \u2013 with the \u201cCyber Trust Mark,\u201d a security label for connected devices that meet federal standards. But how long can a sticker offer protection when a networked Barbie doll contains a built-in microphone? \u201cThey\u2019re finding backdoors even in children\u2019s toys,\u201d warns Snehal Antani, former CTO of the Pentagon. What sounds na\u00efve is harsh reality. This is no longer about technology \u2013 it\u2019s about statecraft. When Pete Hegseth, Trump\u2019s secretary of defense, installed a private internet line bypassing Pentagon security \u2013 just to use Signal on his personal laptop \u2013 it revealed how far convenience has displaced caution. That his colleague Mike Waltz accidentally added the editor-in-chief of The Atlantic to a chat group discussing military planning only adds insult to injury.<\/p>\n\n\n\n<p>All of this shows: the biggest weakness in cybersecurity isn\u2019t the technology. It\u2019s the human being \u2013 and their desire to trade control for comfort. We must stop thinking of the smartphone as merely a tool. It has long since become a political actor. It decides who listens, who speaks \u2013 and who is silenced.<\/p>\n\n\n\n<p>And if we don\u2019t start taking this reality seriously, it won\u2019t be the next attack that surprises us \u2013 but the sheer simplicity with which it succeeded.<\/p>\n<div class=\"gsp_post_data\" \r\n\t            data-post_type=\"post\" \r\n\t            data-cat=\"dark-net,news,topstory\" \r\n\t            data-modified=\"120\"\r\n\t            data-created=\"1749391195\"\r\n\t            data-title=\"Ein Staat in der Hosentasche \u2013 Wie Smartphones zur Achillesferse westlicher Sicherheit wurden\" \r\n\t            data-home=\"https:\/\/kaizen-blog.org\/en\/\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Es beginnt mit einem Absturz. Kein lauter, kein spektakul\u00e4rer \u2013 sondern ein stiller, beinahe unscheinbarer Fehler in einem System, das l\u00e4ngst kein technisches Spielzeug mehr ist, sondern ein geopolitischer Resonanzk\u00f6rper. Als Cybersicherheits-Analysten der Firma iVerify Ende 2024 vermehrt unerkl\u00e4rliche Softwareabst\u00fcrze auf den Smartphones westlicher Regierungsmitarbeiter registrieren, ahnt noch niemand, wie tief der digitale Riss tats\u00e4chlich [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3586,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[23,5,7],"tags":[],"class_list":["post-3585","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dark-net","category-news","category-topstory"],"featured_image_src":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/06\/china-hackers.webp?fit=850%2C508&ssl=1","author_info":{"display_name":"Rainer Hofmann","author_link":"https:\/\/kaizen-blog.org\/en\/author\/admin\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ein Staat in der Hosentasche \u2013 Wie Smartphones zur Achillesferse westlicher Sicherheit wurden - The Kaizen Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kaizen-blog.org\/en\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ein Staat in der Hosentasche \u2013 Wie Smartphones zur Achillesferse westlicher Sicherheit wurden\" \/>\n<meta property=\"og:description\" content=\"Es beginnt mit einem Absturz. Kein lauter, kein spektakul\u00e4rer \u2013 sondern ein stiller, beinahe unscheinbarer Fehler in einem System, das l\u00e4ngst kein technisches Spielzeug mehr ist, sondern ein geopolitischer Resonanzk\u00f6rper. Als Cybersicherheits-Analysten der Firma iVerify Ende 2024 vermehrt unerkl\u00e4rliche Softwareabst\u00fcrze auf den Smartphones westlicher Regierungsmitarbeiter registrieren, ahnt noch niemand, wie tief der digitale Riss tats\u00e4chlich [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kaizen-blog.org\/en\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/\" \/>\n<meta property=\"og:site_name\" content=\"The Kaizen Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/rainer.hofmann.2025\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-08T13:59:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-08T14:01:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kaizen-blog.org\/wp-content\/uploads\/2025\/06\/china-hackers.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"508\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Rainer Hofmann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rainer Hofmann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\\\/\"},\"author\":{\"name\":\"Rainer Hofmann\",\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/#\\\/schema\\\/person\\\/7d3fc7346e2501a389ea3daa48b99ad0\"},\"headline\":\"Ein Staat in der Hosentasche \u2013 Wie Smartphones zur Achillesferse westlicher Sicherheit wurden\",\"datePublished\":\"2025-06-08T13:59:55+00:00\",\"dateModified\":\"2025-06-08T14:01:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\\\/\"},\"wordCount\":854,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/kaizen-blog.org\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/china-hackers.webp?fit=850%2C508&ssl=1\",\"articleSection\":[\"Dark Files\",\"NEWS\",\"Topstory\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/kaizen-blog.org\\\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\\\/\",\"url\":\"https:\\\/\\\/kaizen-blog.org\\\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\\\/\",\"name\":\"Ein Staat in der Hosentasche \u2013 Wie Smartphones zur Achillesferse westlicher Sicherheit wurden - The Kaizen Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/kaizen-blog.org\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/china-hackers.webp?fit=850%2C508&ssl=1\",\"datePublished\":\"2025-06-08T13:59:55+00:00\",\"dateModified\":\"2025-06-08T14:01:23+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/#\\\/schema\\\/person\\\/7d3fc7346e2501a389ea3daa48b99ad0\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kaizen-blog.org\\\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/kaizen-blog.org\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/china-hackers.webp?fit=850%2C508&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/kaizen-blog.org\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/china-hackers.webp?fit=850%2C508&ssl=1\",\"width\":850,\"height\":508},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/kaizen-blog.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ein Staat in der Hosentasche \u2013 Wie Smartphones zur Achillesferse westlicher Sicherheit wurden\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/#website\",\"url\":\"https:\\\/\\\/kaizen-blog.org\\\/\",\"name\":\"The Kaizen Blog\",\"description\":\"Investigativer Journalismus\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kaizen-blog.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/kaizen-blog.org\\\/#\\\/schema\\\/person\\\/7d3fc7346e2501a389ea3daa48b99ad0\",\"name\":\"Rainer Hofmann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"\\\/\\\/www.gravatar.com\\\/avatar\\\/21e5b26d4f12b21206d8094d7aea4ab6?s=96&#038;r=g&#038;d=initials\",\"url\":\"\\\/\\\/www.gravatar.com\\\/avatar\\\/21e5b26d4f12b21206d8094d7aea4ab6?s=96&#038;r=g&#038;d=initials\",\"contentUrl\":\"\\\/\\\/www.gravatar.com\\\/avatar\\\/21e5b26d4f12b21206d8094d7aea4ab6?s=96&#038;r=g&#038;d=initials\",\"caption\":\"Rainer Hofmann\"},\"sameAs\":[\"https:\\\/\\\/kaizen-blog.org\"],\"url\":\"https:\\\/\\\/kaizen-blog.org\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ein Staat in der Hosentasche \u2013 Wie Smartphones zur Achillesferse westlicher Sicherheit wurden - The Kaizen Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kaizen-blog.org\/en\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/","og_locale":"en_US","og_type":"article","og_title":"Ein Staat in der Hosentasche \u2013 Wie Smartphones zur Achillesferse westlicher Sicherheit wurden","og_description":"Es beginnt mit einem Absturz. Kein lauter, kein spektakul\u00e4rer \u2013 sondern ein stiller, beinahe unscheinbarer Fehler in einem System, das l\u00e4ngst kein technisches Spielzeug mehr ist, sondern ein geopolitischer Resonanzk\u00f6rper. Als Cybersicherheits-Analysten der Firma iVerify Ende 2024 vermehrt unerkl\u00e4rliche Softwareabst\u00fcrze auf den Smartphones westlicher Regierungsmitarbeiter registrieren, ahnt noch niemand, wie tief der digitale Riss tats\u00e4chlich [&hellip;]","og_url":"https:\/\/kaizen-blog.org\/en\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/","og_site_name":"The Kaizen Blog","article_publisher":"https:\/\/www.facebook.com\/rainer.hofmann.2025\/","article_published_time":"2025-06-08T13:59:55+00:00","article_modified_time":"2025-06-08T14:01:23+00:00","og_image":[{"width":850,"height":508,"url":"https:\/\/kaizen-blog.org\/wp-content\/uploads\/2025\/06\/china-hackers.webp","type":"image\/webp"}],"author":"Rainer Hofmann","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rainer Hofmann","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kaizen-blog.org\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/#article","isPartOf":{"@id":"https:\/\/kaizen-blog.org\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/"},"author":{"name":"Rainer Hofmann","@id":"https:\/\/kaizen-blog.org\/#\/schema\/person\/7d3fc7346e2501a389ea3daa48b99ad0"},"headline":"Ein Staat in der Hosentasche \u2013 Wie Smartphones zur Achillesferse westlicher Sicherheit wurden","datePublished":"2025-06-08T13:59:55+00:00","dateModified":"2025-06-08T14:01:23+00:00","mainEntityOfPage":{"@id":"https:\/\/kaizen-blog.org\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/"},"wordCount":854,"commentCount":0,"image":{"@id":"https:\/\/kaizen-blog.org\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/06\/china-hackers.webp?fit=850%2C508&ssl=1","articleSection":["Dark Files","NEWS","Topstory"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kaizen-blog.org\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kaizen-blog.org\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/","url":"https:\/\/kaizen-blog.org\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/","name":"Ein Staat in der Hosentasche \u2013 Wie Smartphones zur Achillesferse westlicher Sicherheit wurden - The Kaizen Blog","isPartOf":{"@id":"https:\/\/kaizen-blog.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kaizen-blog.org\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/#primaryimage"},"image":{"@id":"https:\/\/kaizen-blog.org\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/06\/china-hackers.webp?fit=850%2C508&ssl=1","datePublished":"2025-06-08T13:59:55+00:00","dateModified":"2025-06-08T14:01:23+00:00","author":{"@id":"https:\/\/kaizen-blog.org\/#\/schema\/person\/7d3fc7346e2501a389ea3daa48b99ad0"},"breadcrumb":{"@id":"https:\/\/kaizen-blog.org\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kaizen-blog.org\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kaizen-blog.org\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/#primaryimage","url":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/06\/china-hackers.webp?fit=850%2C508&ssl=1","contentUrl":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/06\/china-hackers.webp?fit=850%2C508&ssl=1","width":850,"height":508},{"@type":"BreadcrumbList","@id":"https:\/\/kaizen-blog.org\/ein-staat-in-der-hosentasche-wie-smartphones-zur-achillesferse-westlicher-sicherheit-wurden\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/kaizen-blog.org\/"},{"@type":"ListItem","position":2,"name":"Ein Staat in der Hosentasche \u2013 Wie Smartphones zur Achillesferse westlicher Sicherheit wurden"}]},{"@type":"WebSite","@id":"https:\/\/kaizen-blog.org\/#website","url":"https:\/\/kaizen-blog.org\/","name":"The Kaizen Blog","description":"Investigative Journalism","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kaizen-blog.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/kaizen-blog.org\/#\/schema\/person\/7d3fc7346e2501a389ea3daa48b99ad0","name":"Rainer Hofmann","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/\/www.gravatar.com\/avatar\/21e5b26d4f12b21206d8094d7aea4ab6?s=96&#038;r=g&#038;d=initials","url":"\/\/www.gravatar.com\/avatar\/21e5b26d4f12b21206d8094d7aea4ab6?s=96&#038;r=g&#038;d=initials","contentUrl":"\/\/www.gravatar.com\/avatar\/21e5b26d4f12b21206d8094d7aea4ab6?s=96&#038;r=g&#038;d=initials","caption":"Rainer Hofmann"},"sameAs":["https:\/\/kaizen-blog.org"],"url":"https:\/\/kaizen-blog.org\/en\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2025\/06\/china-hackers.webp?fit=850%2C508&ssl=1","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":31259,"url":"https:\/\/kaizen-blog.org\/en\/warten-auf-den-grossen-krieg-wie-al-qaida-vom-globalen-chaos-profitieren-will-und-wie-moskau-eigene-allianzen-im-schatten-knuepft\/","url_meta":{"origin":3585,"position":0},"title":"Waiting for the Great War - How Al Qaeda Intends to Profit from Global Chaos and How Moscow Is Forging Its Own Alliances in the Shadows","author":"Rainer Hofmann","date":"March 10, 2026","format":false,"excerpt":"Al-Qaida rechnet mit einem dritten Weltkrieg. Und die Organisation plant nicht, am Rand zu stehen. Ein im Januar 2026 ver\u00f6ffentlichtes Papier mit dem Titel \u201eDie Zukunft des Islam im Lichte der gegenw\u00e4rtigen globalen Umbr\u00fcche\u201c, verbreitet \u00fcber arabischsprachige Kan\u00e4le der Al-Qaida auf der Arabischen Halbinsel, beschreibt eine Welt auf dem Weg\u2026","rel":"","context":"In &quot;Kaizen Flashpoint&quot;","block_context":{"text":"Kaizen Flashpoint","link":"https:\/\/kaizen-blog.org\/en\/category\/madness\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/03\/putin-isis.webp?fit=640%2C327&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/03\/putin-isis.webp?fit=640%2C327&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/03\/putin-isis.webp?fit=640%2C327&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":34807,"url":"https:\/\/kaizen-blog.org\/en\/24-april-2026-kurznachrichten\/","url_meta":{"origin":3585,"position":1},"title":"April 24, 2026 \u2013 Short News","author":"TEAM KAIZEN BLOG","date":"April 24, 2026","format":false,"excerpt":"Papst Leo fordert Gespr\u00e4che statt Krieg \u2013 und verurteilt jede Hinrichtung! Papst Leo XIV sitzt im Flugzeug auf dem R\u00fcckweg aus Afrika und spricht Klartext, ohne laut zu werden. Er fordert die Vereinigten Staaten und Iran auf, wieder miteinander zu reden, nicht irgendwann, sondern jetzt. F\u00fcr ihn ist die entscheidende\u2026","rel":"","context":"In &quot;+++ Kaizen News Ticker +++&quot;","block_context":{"text":"+++ Kaizen News Ticker +++","link":"https:\/\/kaizen-blog.org\/en\/category\/ticker\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/kaizenlive-2026-04-24T005938.002.webp?fit=905%2C500&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/kaizenlive-2026-04-24T005938.002.webp?fit=905%2C500&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/kaizenlive-2026-04-24T005938.002.webp?fit=905%2C500&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/kaizenlive-2026-04-24T005938.002.webp?fit=905%2C500&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":33841,"url":"https:\/\/kaizen-blog.org\/en\/recherche-zeigt-der-krieg-den-man-nicht-sehen-soll-wie-das-pentagon-bestimmt-was-die-welt-sehen-darf\/","url_meta":{"origin":3585,"position":2},"title":"Investigation shows: The war you are not supposed to see - How the Pentagon determines what the world is allowed to see","author":"TEAM KAIZEN BLOG","date":"April 10, 2026","format":false,"excerpt":"W\u00e4hrend die USA und Israel seit dem 28. Februar Ziele im Iran angreifen, bleibt auff\u00e4llig wenig sichtbar. Keine klaren Bilder, keine belastbaren Einsch\u00e4tzungen zu Treffern, kaum nachvollziehbare Angaben zu Sch\u00e4den. Was wie milit\u00e4rische Geheimhaltung wirkt, geht weiter. Interne Vorgaben zeigen, dass das Pentagon nicht nur eigene Informationen zur\u00fcckh\u00e4lt, sondern gezielt\u2026","rel":"","context":"In &quot;Documentation&quot;","block_context":{"text":"Documentation","link":"https:\/\/kaizen-blog.org\/en\/category\/documentation\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/batch_kaizennewsday-2026-04-10T134356.070.webp?fit=905%2C500&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/batch_kaizennewsday-2026-04-10T134356.070.webp?fit=905%2C500&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/batch_kaizennewsday-2026-04-10T134356.070.webp?fit=905%2C500&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/batch_kaizennewsday-2026-04-10T134356.070.webp?fit=905%2C500&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":34799,"url":"https:\/\/kaizen-blog.org\/en\/recherchen-decken-auf-toeten-per-algorithmus-das-pentagon-baut-die-maschine-die-entscheidet-wer-stirbt\/","url_meta":{"origin":3585,"position":3},"title":"Investigations show: killing by algorithm - the Pentagon is building the machine that decides who dies","author":"TEAM KAIZEN BLOG","date":"April 23, 2026","format":false,"excerpt":"Im Haushaltsantrag \u00fcber 1,5 Billionen Dollar taucht ein Begriff auf, der harmlos klingt und doch nach Recherchen alles ver\u00e4ndert: Special Operations Autonomous Warfare Center. Ein Zentrum, das genau daf\u00fcr gebaut wird, was lange vorbereitet wurde. Daten sammeln, Ziele ausw\u00e4hlen, Angriffe ausl\u00f6sen. Der Ablauf steht, nur der Mensch steht noch dazwischen.\u2026","rel":"","context":"In &quot;Dark America&quot;","block_context":{"text":"Dark America","link":"https:\/\/kaizen-blog.org\/en\/category\/dark-america\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/batch_kaizennewsday-2026-04-23T182010.794.webp?fit=905%2C500&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/batch_kaizennewsday-2026-04-23T182010.794.webp?fit=905%2C500&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/batch_kaizennewsday-2026-04-23T182010.794.webp?fit=905%2C500&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/batch_kaizennewsday-2026-04-23T182010.794.webp?fit=905%2C500&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":31199,"url":"https:\/\/kaizen-blog.org\/en\/wieder-erwischt-fox-vertauscht-nicht-nur-bilder-fox-schuetzt-trump-selbst-bei-der-rueckkehr-gefallener-soldaten\/","url_meta":{"origin":3585,"position":4},"title":"Caught Again: Fox Doesn\u2019t Just Swap Images - Fox Shields Trump Even During the Return of Fallen Soldiers","author":"Rainer Hofmann","date":"March 9, 2026","format":false,"excerpt":"Fox & Friends Weekend ersetzte in seiner Sonntagsausgabe das Videomaterial von Donald Trumps Teilnahme an der gestrigen w\u00fcrdevollen \u00dcberf\u00fchrungszeremonie auf der Dover Air Force Base durch einen Clip vom 17. Dezember 2025. Gezeigt wurde also nicht das tats\u00e4chliche Material der aktuellen Zeremonie, bei der die sterblichen \u00dcberreste von sechs im\u2026","rel":"","context":"In &quot;Dark America&quot;","block_context":{"text":"Dark America","link":"https:\/\/kaizen-blog.org\/en\/category\/dark-america\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/03\/kaizennewsday-2026-03-09T164743.289.webp?fit=905%2C500&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/03\/kaizennewsday-2026-03-09T164743.289.webp?fit=905%2C500&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/03\/kaizennewsday-2026-03-09T164743.289.webp?fit=905%2C500&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/03\/kaizennewsday-2026-03-09T164743.289.webp?fit=905%2C500&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":34750,"url":"https:\/\/kaizen-blog.org\/en\/23-april-2026-kurznachrichten\/","url_meta":{"origin":3585,"position":5},"title":"April 23, 2026 \u2013 Short News","author":"TEAM KAIZEN BLOG","date":"April 23, 2026","format":false,"excerpt":"Staatsbesuch ohne Begegnung \u2013 warum Charles den Kontakt zu Epstein-Opfern vermeidet! Die Reise steht fest, der Ablauf ist geplant, die Termine sind gesetzt. Wenn Charles III. kommende Woche in die Vereinigten Staaten reist, wird er empfangen, sprechen, repr\u00e4sentieren. Was nicht stattfinden wird, ist ein Treffen mit den Opfern von Jeffrey\u2026","rel":"","context":"In &quot;+++ Kaizen News Ticker +++&quot;","block_context":{"text":"+++ Kaizen News Ticker +++","link":"https:\/\/kaizen-blog.org\/en\/category\/ticker\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/kaizenlive-2026-04-23T021253.486.webp?fit=905%2C500&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/kaizenlive-2026-04-23T021253.486.webp?fit=905%2C500&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/kaizenlive-2026-04-23T021253.486.webp?fit=905%2C500&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kaizen-blog.org\/wp-content\/uploads\/2026\/04\/kaizenlive-2026-04-23T021253.486.webp?fit=905%2C500&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/posts\/3585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/comments?post=3585"}],"version-history":[{"count":0,"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/posts\/3585\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/media\/3586"}],"wp:attachment":[{"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/media?parent=3585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/categories?post=3585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kaizen-blog.org\/en\/wp-json\/wp\/v2\/tags?post=3585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}