Tatianna Harris
April 23, 2026

This Week in Leaks: April 23, 2026

TWIL: From government memos to game footage and corporate emails—these insider leaks shaped recent headlines.

Internal documents, surveillance tools, game footage, and product details surfaced this week. Here are this week's stories:

  • ICE surveillance glasses program document leaked
    April 20, 2026
    An internal ICE document involving information on implementing the use of facial recognition glasses was leaked to a journalist.
  • Meta internal tracking of employee activity leaked
    April 21, 2026
    Details from an internal corporate tool and employee discussions were shared externally, revealing internal monitoring practices.
  • Ubisoft's Assassins Creed Black Flag remake footage leaks early
    April 21, 2026
    Pre-release gameplay footage was captured and distributed online before the official planned launch.
  • JetBlue CEO internal message made public
    April 20, 2026
    Executive messaging and other internal communication, communications, from CEO Joanna Geraghty, were leaked squashing speculation of airline bankruptcy.

  • European semiconductor giant plans layoffs according to leaked documents
    April 21, 2026
    According to a leaked all-hands presentation, upcoming restructuring and reduction initiatives were outlined for ASML.

  • iPhone 18 Pro colors leaked ahead of launch
    April 20, 2026
    Supply chain and design information were distributed, revealing details about Apple's upcoming iPhone lineup.

  • Supreme Court case memos leaked
    April 18, 2026
    Leaked memos form SCOTUS internal deliberations were disclosed to the public.

Why it matters...

From surveillance program documents to game builds and executive emails, they’re all part of the normal flow of information inside organizations. And all became public knowledge due to insiders leaking.

Continue sharing what needs to move business forward—without losing control of it. EchoMark’s individualized invisible watermarking protects information at the source and persists across leak paths. If your information leaks, trace it back to the insider responsible.