Faith-Based Daily Awareness Post 10 March 2026

Faith-Based Security Headlines

These updates are shared to help raise the situational awareness of Faith-Based organizations to best defend against and mitigate the impacts from all-hazards threats including physical security, cybersecurity, and natural disasters.

 

Iran may be activating sleeper cells in the United States, officials warn

 

According to a report from ABC News, U.S. intelligence agencies recently intercepted encrypted communications believed to have originated from Iran that may serve as an “operational trigger” for sleeper cells or covert operatives outside the country. The transmission, detected through signals intelligence, appeared to be broadcast across multiple countries and was encoded with the appropriate encryption key, suggesting it could be intended to deliver instructions to clandestine operatives without using traditional internet or cellular networks. The alert, circulated to law enforcement agencies, followed the recent death of Iran’s Supreme Leader and the ongoing conflict involving Iran, Israel, and the United States. Authorities emphasized that the message’s exact content is unknown and that no specific attack or target has been identified, but agencies were advised to increase monitoring of suspicious radio-frequency activity and maintain heightened situational awareness while the intelligence is further analyzed.

 

Analyst Comments: This report should be viewed as an early intelligence indicator rather than confirmation of imminent activity. Governments routinely share alerts like this with law enforcement when ambiguous signals intelligence is detected, particularly during periods of geopolitical tension. While the concept of “sleeper cells” carries significant attention, officials have not identified any specific plot, location, or operational timeline. In practice, such alerts primarily serve to increase awareness and encourage vigilance among security and law enforcement partners while analysts work to determine whether the communication represents a real operational directive, routine signaling, or unrelated encrypted traffic. Events like this are best understood as high-impact but low-probability scenarios worth monitoring given the potential consequences, but not necessarily indicative that attacks are imminent.

 

Public Service Announcement: Criminals Use Stolen Personal Information to Target Victims Through Government Impersonation Schemes

 

The FBI’s Internet Crime Complaint Center (IC3) issued a Public Service Announcement warning about an emerging phishing scheme in which criminals impersonate city and county planning or zoning officials to fraudulently collect payments for permit-related fees. In these scams, threat actors identify potential victims by leveraging publicly available planning and zoning permit information and then send convincing emails referencing legitimate details such as property addresses, permit numbers, and the names of real government officials. The emails are appropriately formatted with attached invoices that appear legitimate, instructing recipients to pay fees through wire transfers, peer-to-peer payment platforms, or cryptocurrency. The messages typically create urgency by warning that failure to pay could delay the permitting process and often discourage victims from verifying the request by directing them to communicate only through email, rather than contacting the local government office directly. The FBI advises individuals and businesses to carefully verify email addresses, confirm payment requests directly with official government contacts, and report suspected incidents to IC3. 

 

Analyst Comments: This advisory highlights a growing trend in cyber-enabled fraud where threat actors exploit publicly accessible government data to craft highly targeted phishing campaigns. By referencing legitimate permit applications and real officials, the scammers increase the perceived legitimacy of the request and reduce the likelihood that victims will question the communication. Organizations involved in construction, real estate development, permitting, or municipal planning processes may be particularly vulnerable because such transactions often involve legitimate fees and tight timelines, making urgent payment requests appear routine. More broadly, this activity reflects the continued evolution of business email compromise–style tactics into niche sectors where publicly available records can be used for reconnaissance. For organizations and individuals interacting with local government processes, verifying payment instructions through trusted channels such as official websites or known phone numbers remains a critical control to prevent financial loss.

More Security-Focused Content

The FB-ISAO’s sponsor Gate 15 publishes a daily newsletter called the SUN. Curated from their open source intelligence collection process, the SUN informs leaders and analysts with the critical news of the day and provides a holistic look at the current global, all-hazards threat environment. Ahead of the daily news cycle, the SUN allows current situational awareness into the topics that will impact your organization.