{"id":35723,"date":"2024-09-26T19:37:53","date_gmt":"2024-09-26T18:37:53","guid":{"rendered":"https:\/\/zlcopenhagen.com\/is-your-apple-phone-a-ticking-time-bomb\/"},"modified":"2026-03-10T11:50:05","modified_gmt":"2026-03-10T10:50:05","slug":"is-your-apple-phone-a-ticking-time-bomb","status":"publish","type":"post","link":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/","title":{"rendered":"IS CHATGPT SAFE? AI SURVEILLANCE AND THE PENTAGON DEAL"},"content":{"rendered":"<p>[spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2>CAN CIVILIAN TECHNOLOGY BECOME A WEAPON?<\/h2>\n<p>The pager attack in Lebanon raised disturbing questions about modern technology. Devices designed for communication were reportedly turned into weapons, showing how vulnerable civilian technology can become in geopolitical conflicts.<\/p>\n<p>The incident highlights a broader concern: global supply chains. Smartphones, computers and surveillance systems are built from components produced across many countries. When technology travels through complex networks, the risk of manipulation or hidden vulnerabilities increases.<\/p>\n<h2>GLOBAL SUPPLY CHAINS AND DIGITAL TRUST<\/h2>\n<p>Reports have also shown how governments use advanced surveillance tools. For example, intelligence cooperation between Denmark and the United States revealed that digital infrastructure can be used for large-scale monitoring of foreign leaders and citizens.<\/p>\n<p>Events like the Lebanon attack illustrate a wider shift in how technology is perceived. Devices that once symbolized connection and progress now raise questions about security, control and trust in the global digital ecosystem.<\/p>\n<p>[\/spb_text_block] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2>THE PAGER ATTACK THAT SHOCKED LEBANON<\/h2>\n<p>In recent months explosions linked to communication devices such as pagers and walkie-talkies struck multiple locations in Lebanon. Thousands were injured and dozens were killed, including civilians. The operation was reportedly aimed at Hezbollah networks, but the scale of the damage quickly triggered accusations of terrorism and violations of international law.<\/p>\n<h2>GLOBAL REACTION AND ACCUSATIONS<\/h2>\n<p>Former CIA director <a href=\"https:\/\/www.jpost.com\/breaking-news\/article-821315\" target=\"_blank\" rel=\"noopener\"><strong>Leon Panetta<\/strong><\/a> described the attack as an act of terrorism, highlighting the civilian casualties. At the same time, countries such as <a href=\"https:\/\/www.nna-leb.gov.lb\/en\/international\/723031\/russia-china-condemn-israeli-terror-attacks-in-urg\" target=\"_blank\" rel=\"noopener\"><strong>Russia<\/strong><\/a> and <a href=\"https:\/\/www.nna-leb.gov.lb\/en\/international\/723916\/china-slams-indiscriminate-attacks-on-lebanese-civ\" target=\"_blank\" rel=\"noopener\"><strong>China<\/strong><\/a> condemned the operation at the UN Security Council, arguing that it violated international law.<\/p>\n<h2>SUPPLY CHAINS, TECHNOLOGY AND GLOBAL TRUST<\/h2>\n<p>The incident also exposed vulnerabilities in global technology supply chains. Reports suggested that companies in Hungary and Taiwan were involved in producing the devices used in the attack. This has raised wider concerns about how civilian technology can be manipulated within complex international production networks.<\/p>\n<p>As trust in Western technology becomes more contested, some countries in the Middle East and Asia are increasingly looking toward Chinese manufacturers for alternatives, reflecting a broader shift in the geopolitical technology landscape.<\/p>\n<p>[\/spb_text_block] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2>CHINA AND THE SHIFT IN GLOBAL TECHNOLOGY POWER<\/h2>\n<p>Over the past decades, China has become the largest trading partner for many countries and a central hub in global manufacturing. Today, it produces a large share of the world\u2019s electronics, including smartphones, computers and communication equipment.<\/p>\n<p>This growing influence means that global technology supply chains increasingly depend on Chinese manufacturing. As geopolitical tensions rise, debates about trust, security and technological independence have intensified across many regions.<\/p>\n<h2>WEAPONIZED TECHNOLOGY AND SUPPLY CHAINS<\/h2>\n<p>Reports about explosive communication devices used in Lebanon highlighted how civilian technology can be manipulated within complex supply chains. Investigations linked companies in Hungary and Taiwan to the production of the devices, illustrating how global manufacturing networks can obscure the origin of sensitive technologies.<\/p>\n<h2>SURVEILLANCE, CYBER POWER AND GLOBAL COMPETITION<\/h2>\n<p>The debate about technology security is not limited to one country. Revelations by whistleblower <strong>Edward Snowden<\/strong> showed that the U.S. <strong>NSA<\/strong> conducted extensive surveillance operations worldwide, including monitoring allies and infiltrating technology companies.<\/p>\n<p>These disclosures reinforced a broader global debate: modern technology is not only a tool for communication and trade, but also a strategic instrument in geopolitical competition.<\/p>\n<p>[\/spb_text_block] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h3>THE EVOLUTION OF GLOBAL TRADE NETWORKS AND TECHNOLOGY POWER<\/h3>\n<p data-start=\"701\" data-end=\"1011\">The three maps above illustrate how global trade networks have evolved over the past decades. In 1960, the United States and Western Europe dominated international commerce. By 1990, globalisation had expanded trade connections across multiple regions, although Western economies still played a central role.<\/p>\n<p data-start=\"1018\" data-end=\"1371\">By 2020, the structure of global trade had changed dramatically. China emerged as the largest trading partner for many countries, reflecting its rise as the world\u2019s manufacturing hub and a key driver of global supply chains. These shifts are closely tied to broader geopolitical competition over technology, production capacity and strategic industries.<\/p>\n<p>[\/spb_text_block] [spb_blank_spacer height=&#8221;30px&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_image image=&#8221;35729&#8243; image_size=&#8221;full&#8221; frame=&#8221;borderframe&#8221; caption=&#8221;Global trade network in 1960 showing how the United States and Western Europe dominated international commerce before the rise of China as the world\u2019s largest manufacturing power.&#8221; caption_pos=&#8221;below&#8221; remove_rounded=&#8221;yes&#8221; fullwidth=&#8221;no&#8221; overflow_mode=&#8221;none&#8221; link_target=&#8221;_self&#8221; lightbox=&#8221;no&#8221; intro_animation=&#8221;none&#8221; animation_delay=&#8221;200&#8243; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;][\/spb_image] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<p>In 1960, global trade networks were dominated by the United States and Western Europe. Industrial production, technological innovation and financial institutions in these regions shaped much of the global economy. Many countries depended on Western markets as their primary trading partners, reflecting the geopolitical balance of power during the Cold War.<\/p>\n<p>[\/spb_text_block] [spb_blank_spacer height=&#8221;30px&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_image image=&#8221;35733&#8243; image_size=&#8221;full&#8221; frame=&#8221;borderframe&#8221; caption=&#8221;Global trade network in 1990 showing how the United States remained a central hub of international commerce while Europe and emerging economies expanded their economic connections.&#8221; caption_pos=&#8221;below&#8221; remove_rounded=&#8221;yes&#8221; fullwidth=&#8221;no&#8221; overflow_mode=&#8221;none&#8221; link_target=&#8221;_self&#8221; lightbox=&#8221;no&#8221; intro_animation=&#8221;none&#8221; animation_delay=&#8221;200&#8243; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;][\/spb_image] [spb_blank_spacer height=&#8221;30px&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<p>By 1990, globalisation had expanded international trade networks significantly. The United States remained a major economic hub, but Europe, Japan and emerging economies were becoming increasingly connected through international production and trade.<\/p>\n<p>These expanding networks laid the foundation for the highly interconnected global supply chains that define the modern technology economy.<\/p>\n<p>[\/spb_text_block] [spb_image image=&#8221;35737&#8243; image_size=&#8221;full&#8221; frame=&#8221;borderframe&#8221; caption=&#8221;Global trade network in 2020 showing China as the central hub of international commerce and the largest trading partner for many countries.&#8221; caption_pos=&#8221;below&#8221; remove_rounded=&#8221;yes&#8221; fullwidth=&#8221;no&#8221; overflow_mode=&#8221;none&#8221; link_target=&#8221;_self&#8221; lightbox=&#8221;no&#8221; intro_animation=&#8221;none&#8221; animation_delay=&#8221;200&#8243; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;][\/spb_image] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<p>By 2020, global trade networks had shifted dramatically. China emerged as the largest trading partner for many countries, reflecting its role as the world\u2019s primary manufacturing hub and a key supplier of electronics, telecommunications equipment and digital infrastructure.<\/p>\n<p>These developments have major geopolitical implications. As technology production becomes concentrated in specific regions, control over supply chains increasingly influences global power dynamics, economic security and technological independence.<\/p>\n<h3>CONCLUSION: TECHNOLOGY, GEOPOLITICS AND DIGITAL POWER<\/h3>\n<p>The intersection between technology, geopolitics and global supply chains is becoming increasingly complex. Devices that once symbolized connectivity and innovation are now also viewed through the lens of security, surveillance and strategic competition.<\/p>\n<p>From cyber operations and spyware to global manufacturing networks, modern technology has become deeply embedded in international power structures. As governments and societies rely more on digital infrastructure, questions about trust, control and technological sovereignty are likely to remain central to global political debates in the years ahead.<\/p>\n<p>[\/spb_text_block] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2>GLOBAL SURVEILLANCE AND CYBER POWER<\/h2>\n<p>Modern geopolitical conflicts increasingly involve digital surveillance and cyber operations. Investigations have revealed that spyware developed by companies such as <strong>NSO Group<\/strong> has been used to monitor journalists, political opponents and activists across multiple countries. These tools demonstrate how smartphones and communication platforms have become targets in modern intelligence operations.<\/p>\n<h2>TECHNOLOGY AS A GEOPOLITICAL WEAPON<\/h2>\n<p>At the same time, competition between major powers is intensifying around global technology supply chains. Governments increasingly view control over semiconductors, telecommunications infrastructure and digital platforms as a strategic advantage.<\/p>\n<p>Cyber operations such as the <strong>Stuxnet<\/strong> attack on Iranian nuclear facilities and revelations about intercepted networking equipment have reinforced concerns that civilian technologies can be modified or exploited for intelligence purposes.<\/p>\n<h2>TECHNOLOGY, TRUST AND GLOBAL POLITICS<\/h2>\n<p>These developments have created a growing debate about technological sovereignty. Countries are now reconsidering where their digital infrastructure and communication equipment originate, as trust in global technology supply chains becomes a central issue in international politics.<\/p>\n<h2>GLOBAL SPYWARE AND DIGITAL SURVEILLANCE<\/h2>\n<p>[\/spb_text_block] [spb_image image=&#8221;35741&#8243; image_size=&#8221;full&#8221; frame=&#8221;noframe&#8221; caption=&#8221;Infographic illustrating the global reach of Pegasus spyware developed by Israel\u2019s NSO Group and its use in surveillance operations across multiple countries.&#8221; caption_pos=&#8221;below&#8221; remove_rounded=&#8221;yes&#8221; fullwidth=&#8221;no&#8221; overflow_mode=&#8221;none&#8221; link_target=&#8221;_self&#8221; lightbox=&#8221;no&#8221; intro_animation=&#8221;none&#8221; animation_delay=&#8221;200&#8243; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;][\/spb_image] [spb_blank_spacer height=&#8221;30px&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_video link=&#8221;https:\/\/www.youtube.com\/watch?v=CGnVF55Eu0o&amp;t=946s&#8221; remove_related=&#8221;yes&#8221; autoplay=&#8221;no&#8221; full_width=&#8221;no&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_blank_spacer height=&#8221;30px&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2>BIG TECH, AI AND THE RISE OF TECHNOFEUDALISM<\/h2>\n<p>Debates about surveillance technology and artificial intelligence are also linked to the growing power of large technology corporations.<\/p>\n<p>Economist and former Greek finance minister Yanis Varoufakis has described this development as \u201ctechnofeudalism\u201d, a system where digital platforms, algorithms and cloud infrastructure allow a small group of technology companies to exercise unprecedented economic and political influence.<\/p>\n<p>[\/spb_text_block] [spb_raw_html width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]JTNDZGl2JTIwc3R5bGUlM0QlMjJwb3NpdGlvbiUzQXJlbGF0aXZlJTNCcGFkZGluZy1ib3R0b20lM0E1Ni4yNSUyNSUzQmhlaWdodCUzQTAlM0JvdmVyZmxvdyUzQWhpZGRlbiUzQm1heC13aWR0aCUzQTEwMCUyNSUzQiUyMiUzRSUwQSUyMCUyMCUzQ2lmcmFtZSUyMHNyYyUzRCUyMmh0dHBzJTNBJTJGJTJGd3d3LnlvdXR1YmUuY29tJTJGZW1iZWQlMkY3aVJjM1prSHpSVSUyMiUwQSUyMCUyMHRpdGxlJTNEJTIyWW91JTIwRG9uJUUyJTgwJTk5dCUyME93biUyMFlvdXIlMjBOYXJyYXRpdmUlMjBBbnltb3JlJTIwJUUyJTgwJTk0JTIwTmFvbWklMjBLbGVpbiUyMGFuZCUyMFlhbmlzJTIwVmFyb3VmYWtpcyUyMiUwQSUyMCUyMHN0eWxlJTNEJTIycG9zaXRpb24lM0FhYnNvbHV0ZSUzQnRvcCUzQTAlM0JsZWZ0JTNBMCUzQndpZHRoJTNBMTAwJTI1JTNCaGVpZ2h0JTNBMTAwJTI1JTNCYm9yZGVyJTNBMCUzQiUyMiUwQSUyMCUyMGFsbG93JTNEJTIyYWNjZWxlcm9tZXRlciUzQiUyMGF1dG9wbGF5JTNCJTIwY2xpcGJvYXJkLXdyaXRlJTNCJTIwZW5jcnlwdGVkLW1lZGlhJTNCJTIwZ3lyb3Njb3BlJTNCJTIwcGljdHVyZS1pbi1waWN0dXJlJTNCJTIwd2ViLXNoYXJlJTIyJTBBJTIwJTIwYWxsb3dmdWxsc2NyZWVuJTNFJTBBJTIwJTIwJTNDJTJGaWZyYW1lJTNFJTBBJTNDJTJGZGl2JTNF[\/spb_raw_html] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<p><strong>DiEM25 debate (2026):<\/strong> Naomi Klein and Yanis Varoufakis discuss AI, deepfakes, digital identity and the political power of big tech platforms.<\/p>\n<p>[\/spb_text_block] [spb_blank_spacer height=&#8221;30px&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_raw_html width=&#8221;1\/2&#8243; el_position=&#8221;first&#8221;]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[\/spb_raw_html] [spb_raw_html width=&#8221;1\/2&#8243; el_position=&#8221;last&#8221;]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[\/spb_raw_html] [spb_blank_spacer height=&#8221;30px&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2>SOCIAL MEDIA, DATA AND GEOPOLITICAL POWER<\/h2>\n<p>Social media platforms have increasingly become part of geopolitical debates about data and influence. Governments in Europe and the United States have raised concerns about how platforms such as TikTok collect data and shape information flows.<\/p>\n<p>Critics argue that large technology platforms \u2014 whether American or Chinese \u2014 increasingly function as strategic infrastructures that influence political narratives, public opinion and global data ecosystems.<\/p>\n<h2>THE PETRODOLLAR SYSTEM AND GLOBAL POWER<\/h2>\n<p>[\/spb_text_block] [spb_blank_spacer height=&#8221;30px&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_raw_html width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]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[\/spb_raw_html] [spb_blank_spacer height=&#8221;30px&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<p><strong>Petrodollar geopolitics:<\/strong> This analysis explores how energy markets, the U.S. dollar and Middle East conflicts can influence global power structures and the international financial system.<\/p>\n<p>[\/spb_text_block] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2>KEY FIGURES, ORGANIZATIONS AND COMPANIES (2024\u20132026)<\/h2>\n<p>The events and technological debates described in this article involve a range of political leaders, intelligence agencies, technology companies and international actors connected to surveillance, global trade and geopolitical conflicts.<\/p>\n<h3>Key Individuals<\/h3>\n<ul>\n<li><strong>Hassan Nasrallah<\/strong> \u2013 Leader of Hezbollah<\/li>\n<li><strong>Leon Panetta<\/strong> \u2013 Former CIA Director<\/li>\n<li><strong>Edward Snowden<\/strong> \u2013 Whistleblower who revealed global NSA surveillance programs<\/li>\n<li><strong>Angela Merkel<\/strong> \u2013 Former German Chancellor<\/li>\n<li><strong>Viktor Orb\u00e1n<\/strong> \u2013 Prime Minister of Hungary<\/li>\n<li><strong>Antony Blinken<\/strong> \u2013 United States Secretary of State<\/li>\n<\/ul>\n<h3>Organizations and Intelligence Agencies<\/h3>\n<ul>\n<li><strong>Hezbollah<\/strong><\/li>\n<li><strong>CIA<\/strong> (Central Intelligence Agency)<\/li>\n<li><strong>NSA<\/strong> (National Security Agency)<\/li>\n<li><strong>UN Security Council<\/strong><\/li>\n<li><strong>NSO Group<\/strong><\/li>\n<li><strong>Quadream<\/strong><\/li>\n<li><strong>BAC Consulting<\/strong><\/li>\n<li><strong>Gold Apollo<\/strong><\/li>\n<\/ul>\n<h3>Technology Companies<\/h3>\n<ul>\n<li><strong>Huawei<\/strong><\/li>\n<li><strong>Xiaomi<\/strong><\/li>\n<li><strong>Lenovo<\/strong><\/li>\n<li><strong>Samsung<\/strong><\/li>\n<li><strong>Apple<\/strong><\/li>\n<li><strong>Cisco<\/strong><\/li>\n<\/ul>\n<p>[\/spb_text_block]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] CAN CIVILIAN TECHNOLOGY BECOME A WEAPON? The pager attack in Lebanon raised disturbing questions about modern technology. Devices designed for communication were reportedly turned into weapons, showing how vulnerable civilian technology can become in geopolitical conflicts. The incident highlights a broader concern: global supply [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":60196,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1642,1357,1649],"tags":[],"class_list":["post-35723","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-geopolitics-es","category-noticias-independientes","category-production-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Is ChatGPT Safe? AI, Surveillance Technology and the Pentagon Controversy<\/title>\n<meta name=\"description\" content=\"Is AI becoming part of modern warfare? From the OpenAI\u2013Pentagon deal to global surveillance technology, this article explores how AI, smartphones and digital supply chains may shape future conflicts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ZLCOPENHAGEN: Danish-Punjabi Ethical Menswear\" \/>\n<meta property=\"og:description\" content=\"ZLCOPENHAGEN merges Danish minimalism with Punjabi pride. Ethical menswear with muscle, message, and meaning. Designed with zidd.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/\" \/>\n<meta property=\"og:site_name\" content=\"zlcopenhagen.com\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-26T18:37:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-10T10:50:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zlcopenhagen.com\/wp-content\/uploads\/2024\/09\/ai-surveillance-smartphone-security-risk.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1792\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ZLC Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"ZLC Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutos\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Is ChatGPT Safe? AI, Surveillance Technology and the Pentagon Controversy","description":"Is AI becoming part of modern warfare? From the OpenAI\u2013Pentagon deal to global surveillance technology, this article explores how AI, smartphones and digital supply chains may shape future conflicts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/","og_locale":"es_ES","og_type":"article","og_title":"ZLCOPENHAGEN: Danish-Punjabi Ethical Menswear","og_description":"ZLCOPENHAGEN merges Danish minimalism with Punjabi pride. Ethical menswear with muscle, message, and meaning. Designed with zidd.","og_url":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/","og_site_name":"zlcopenhagen.com","article_published_time":"2024-09-26T18:37:53+00:00","article_modified_time":"2026-03-10T10:50:05+00:00","og_image":[{"width":1792,"height":1024,"url":"https:\/\/zlcopenhagen.com\/wp-content\/uploads\/2024\/09\/ai-surveillance-smartphone-security-risk.webp","type":"image\/webp"}],"author":"ZLC Team","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"ZLC Team","Tiempo de lectura":"8 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/#article","isPartOf":{"@id":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/"},"author":{"name":"ZLC Team","@id":"https:\/\/zlcopenhagen.com\/#\/schema\/person\/c7ce5649957ac4c1258910e89f0f5fb3"},"headline":"IS CHATGPT SAFE? AI SURVEILLANCE AND THE PENTAGON DEAL","datePublished":"2024-09-26T18:37:53+00:00","dateModified":"2026-03-10T10:50:05+00:00","mainEntityOfPage":{"@id":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/"},"wordCount":2842,"publisher":{"@id":"https:\/\/zlcopenhagen.com\/#organization"},"image":{"@id":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/#primaryimage"},"thumbnailUrl":"https:\/\/zlcopenhagen.com\/wp-content\/uploads\/2024\/09\/ai-surveillance-smartphone-security-risk.webp","articleSection":["Geopolitics","NOTICIAS INDEPENDIENTES","Production"],"inLanguage":"es","copyrightYear":"2024","copyrightHolder":{"@id":"https:\/\/zlcopenhagen.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/","url":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/","name":"Is ChatGPT Safe? AI, Surveillance Technology and the Pentagon Controversy","isPartOf":{"@id":"https:\/\/zlcopenhagen.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/#primaryimage"},"image":{"@id":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/#primaryimage"},"thumbnailUrl":"https:\/\/zlcopenhagen.com\/wp-content\/uploads\/2024\/09\/ai-surveillance-smartphone-security-risk.webp","datePublished":"2024-09-26T18:37:53+00:00","dateModified":"2026-03-10T10:50:05+00:00","description":"Is AI becoming part of modern warfare? From the OpenAI\u2013Pentagon deal to global surveillance technology, this article explores how AI, smartphones and digital supply chains may shape future conflicts.","breadcrumb":{"@id":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/#primaryimage","url":"https:\/\/zlcopenhagen.com\/wp-content\/uploads\/2024\/09\/ai-surveillance-smartphone-security-risk.webp","contentUrl":"https:\/\/zlcopenhagen.com\/wp-content\/uploads\/2024\/09\/ai-surveillance-smartphone-security-risk.webp","width":1792,"height":1024,"caption":"Illustration showing how modern smartphones and connected devices can become targets in geopolitical cyber and surveillance conflicts."},{"@type":"BreadcrumbList","@id":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/zlcopenhagen.com\/es\/"},{"@type":"ListItem","position":2,"name":"IS CHATGPT SAFE? AI SURVEILLANCE AND THE PENTAGON DEAL"}]},{"@type":"WebSite","@id":"https:\/\/zlcopenhagen.com\/#website","url":"https:\/\/zlcopenhagen.com\/","name":"zlcopenhagen.com","description":"","publisher":{"@id":"https:\/\/zlcopenhagen.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zlcopenhagen.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":["Organization","Place"],"@id":"https:\/\/zlcopenhagen.com\/#organization","name":"ZLCOPENHAGEN","alternateName":"ZLCOPENHAGEN","url":"https:\/\/zlcopenhagen.com\/","logo":{"@id":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/#local-main-organization-logo"},"image":{"@id":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/#local-main-organization-logo"},"sameAs":["https:\/\/www.youtube.com\/channel\/UCy7JINwB6DMr2fA9yHpDQJg"],"telephone":[],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"09:00","closes":"17:00"}]},{"@type":"Person","@id":"https:\/\/zlcopenhagen.com\/#\/schema\/person\/c7ce5649957ac4c1258910e89f0f5fb3","name":"ZLC Team","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/bb92a8e9bdde1cf2114b74dce44557ee57d3909986eab1422fc34e9cce350044?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bb92a8e9bdde1cf2114b74dce44557ee57d3909986eab1422fc34e9cce350044?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bb92a8e9bdde1cf2114b74dce44557ee57d3909986eab1422fc34e9cce350044?s=96&d=mm&r=g","caption":"ZLC Team"}},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/zlcopenhagen.com\/es\/is-your-apple-phone-a-ticking-time-bomb\/#local-main-organization-logo","url":"https:\/\/zlcopenhagen.com\/wp-content\/uploads\/2016\/05\/blog-logo.jpg","contentUrl":"https:\/\/zlcopenhagen.com\/wp-content\/uploads\/2016\/05\/blog-logo.jpg","width":68,"height":68,"caption":"ZLCOPENHAGEN"}]}},"_links":{"self":[{"href":"https:\/\/zlcopenhagen.com\/es\/wp-json\/wp\/v2\/posts\/35723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zlcopenhagen.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zlcopenhagen.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zlcopenhagen.com\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zlcopenhagen.com\/es\/wp-json\/wp\/v2\/comments?post=35723"}],"version-history":[{"count":18,"href":"https:\/\/zlcopenhagen.com\/es\/wp-json\/wp\/v2\/posts\/35723\/revisions"}],"predecessor-version":[{"id":60237,"href":"https:\/\/zlcopenhagen.com\/es\/wp-json\/wp\/v2\/posts\/35723\/revisions\/60237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zlcopenhagen.com\/es\/wp-json\/wp\/v2\/media\/60196"}],"wp:attachment":[{"href":"https:\/\/zlcopenhagen.com\/es\/wp-json\/wp\/v2\/media?parent=35723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zlcopenhagen.com\/es\/wp-json\/wp\/v2\/categories?post=35723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zlcopenhagen.com\/es\/wp-json\/wp\/v2\/tags?post=35723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}