Cookies make web browsing convenient by saving our user names and passwords as well as other unique identifiers about us from one web session to the next. Cookies are also a treat for marketers as they uniquely identify visitors and when combined with web traffic logs, provide advertisers your focused browsing habits and specific buying… Read More »
Law Enforcement Must “Immediately Destroy” Collateral Data Collected
Privacy advocates recently won a victory against the unrestricted use of “stingray” cell-site emulators. On November 9th, Illinois judge Iain D. Johnston ruled law enforcement agencies must take steps to minimize the impact on innocent bystanders caught up in the stingray surveillance dragnet and that law enforcement must “immediately destroy” collateral data collected. So how is… Read More »
Why Are So Many Prison Calls Being Recorded and Stored?
On November 11th an anonymous hacker leaked records of more than 70 million calls stolen from Securus Technologies. Securus provides phone service to land line phones in jails and prisons across the country, covering 1.2 million inmates. The Intercept examined 37 gigabytes of leaked data and found it consisted of databases that included the prisoners’… Read More »
Low-Cost Cell Phone Detector Interesting Side Effect
Low-Cost Cell Phone Detectors Have Interesting Side Effect: They Help Protect Your Privacy Monitoring a suspect’s phone calls is an essential part of many criminal investigations, but tapping a wireless or landline phone requires a court order. Now law enforcement agencies have another option for keeping tabs on wireless phones that may not necessitate going… Read More »
Is Drone Skyjacking The New Hijacking?
Right now most civilian drones are owned by hobbyists for recreational use, but many companies are exploring commercial uses. Drones have already been used for shooting nature documentaries and commercials, aerial surveys on remote properties, checking on crops for farmers and even delivering pizza. They have the potential to revolutionize many aspects of our daily… Read More »
Global Governments Attempt to Peel The Onion Router
Tor has been embraced by lawful and unlawful users alike. It helps those who value their online privacy and dissidents who live in countries with oppressive governments, but it also provides ways for cyber criminals, terrorists and other bad guys to avoid identification. This has made breaking Tor’s anonymity a top priority for government agencies… Read More »
Why Healthcare Hacking Has Become Big Business
As banks and large retailers have taken steps to harden their networks, hackers have turned their attention to healthcare providers. Just recently, Premera announced a breach that took place last year may have exposed the personal and financial data of approximately 11 million customers. Last month, the nation’s second largest health insurance company reported the information… Read More »