Three years ago, former President Trump tweeted this image along with a denial of the U.S.’ involvement with a launch accident involving Iran’s Safir SLV rocket. Now, this image has been officially declassified so why are Pentagon and intelligence officials so disturbed? Trump’s controversial handling of classified documents is nothing new. When his Mar-a-Lago home… Read More »
Hoarding Vulnerabilities Makes Me ‘WannaCry’
Hoarding is when an individual has difficulty parting with or discarding possessions regardless of their value. But most hoarders eventually have their day of reckoning when their world implodes and their behavior affects not just themselves, but family and friends. Hoarding security vulnerabilities has similar parallels but on a scale affecting potentially billions of innocent users. In a… Read More »
Apple’s iPhone Encryption Security Battle is Canary in IoT Coal Mine
Are we doomed to repeat the mistakes of the past? With a little luck, we are. I know that sounds rather pessimistic but in light of the current FBI and Apple battle over encryption security, we are standing at a familiar crossroads. Last time, the U.S. avoided widespread security failure was the ill-proposed Clipper Chip… Read More »
Law Enforcement Must “Immediately Destroy” Collateral Data Collected
Privacy advocates recently won a victory against the unrestricted use of “stingray” cell-site emulators. On November 9th, Illinois judge Iain D. Johnston ruled law enforcement agencies must take steps to minimize the impact on innocent bystanders caught up in the stingray surveillance dragnet and that law enforcement must “immediately destroy” collateral data collected. So how is… Read More »
Low-Cost Cell Phone Detector Interesting Side Effect
Low-Cost Cell Phone Detectors Have Interesting Side Effect: They Help Protect Your Privacy Monitoring a suspect’s phone calls is an essential part of many criminal investigations, but tapping a wireless or landline phone requires a court order. Now law enforcement agencies have another option for keeping tabs on wireless phones that may not necessitate going… Read More »
Global Governments Attempt to Peel The Onion Router
Tor has been embraced by lawful and unlawful users alike. It helps those who value their online privacy and dissidents who live in countries with oppressive governments, but it also provides ways for cyber criminals, terrorists and other bad guys to avoid identification. This has made breaking Tor’s anonymity a top priority for government agencies… Read More »