Raleigh cops are investigating crime by getting Google to reveal the identity...
Public records requests have revealed that on at least four occasions, the Raleigh-Durham police obtained warrants forcing Google to reveal the identities of every mobile user within acres of a crime...
View ArticleCops routinely unlock phones with corpses' fingers
Since 2016, when an FBI agent first used a dead suspect's finger to unlock his phone, police forces across the USA have made a routine practice of unlocking phones using suspects and victims' dead...
View ArticleThe secret, unaccountable location-tracking tool favored by dirty cops has...
Securus is the widely abused location-tracking tool that exploits a loophole in privacy law to allow police to extract realtime and historical cellphone location data without a warrant or any...
View ArticleEvidence of NSO Group surveillance products found in 45 countries, including...
Researchers from the University of Toronto's outstanding Citizen Lab (previously) have published their latest research on the notorious and prolific Israeli cyber-arms-dealer The NSO Group...
View ArticleState surveillance company leaked its own data, its customers' data, and its...
Wolf Intelligence is a German state surveillanceware company founded by Manish Kumar, selling tools that independent researchers described as "very shitty and it's just copy paste from open source...
View ArticleItalian prosecutors have given up on catching the person who hacked and...
Hacking Team (previously) was an Italian company that developed cyberweapons that it sold to oppressive government around the world, to be used against their own citizens to monitor and suppress...
View ArticleEl Chapo went down because his sysadmin sold him out
Here's something to remember come the next Sysadmin Appreciation Day: Mexican drug lord El Chapo was only caught because his systems administrator flipped and started working for the feds, backdooring...
View ArticleTeen Vogue counsels taping over your webcam to resist FBI (and other)...
As EFF's Eva Galperin notes, Nicole Kobie's story about resisting surveillance by taping over your webcam "proves that once more, the best and most straightforward tech reporting is being done by Teen...
View ArticleUndercover who targeted Citizen Lab over Israeli cyber-arms dealer is an...
Last week, Citizen Lab and the AP published a blockbuster story revealing that Citizen Lab had been targeted by undercover operatives who pumped Lab employees for information on the group's work...
View ArticleMajor vulnerability in 5G means that anyone with $500 worth of gear can spy...
Stingrays (AKA IMSI catchers) are a widespread class of surveillance devices that target cellular phones by impersonating cellular towers to them (they're also called "cell-site simulators"). IMSI...
View ArticleToronto cops can frequently get your public transit history without a warrant
Metrolinx, the provincial agency that supplies the Presto cards used to pay for public transit rides in Toronto, has continued to hand over riders' travel history to Toronto-area cops without asking...
View ArticleEx-NSA whistleblower says she and other US ex-spooks targeted Americans on...
Lori Stroud is an ex-NSA spy who also contracted with the NSA through Booz Allen, who says that after she left the NSA, she was recruited to work on Project Raven, a secret, offensive surveillance and...
View ArticleThis is bad: the UAE's favorite sleazeball cybermercenaries have applied for...
Remember Darkmatter, the UAE-based cybermercenaries who worked with the beltway bandit firm Cyberpoint to recruit ex-NSA spies to infiltrate and expose dissidents, journalists, even children who...
View ArticleA finance industry group is pushing an intentionally broken cryptography...
ETS was originally called "Enterprise TLS," implying that it was an "enterprise-grade" version of TLS, the system used to secure internet sessions (if you visit a URL that starts with "https://", it's...
View ArticleBowing to public pressure, Coinbase announces it will "transition out" the...
The cryptocurrency service Coinbase recently acquired Neutrino, a forensics startup founded by cybermercenaries who were left unemployed by the collapse of the company Hacking Team, following a dump...
View ArticleZuckerberg announces a comprehensive plan for a new, privacy-focused...
Mark Zuckerberg's 3,000 word blog post about his plan to create a parallel set of Facebook services that contain long-overdue privacy protections has plenty to please both the regulators who are...
View ArticleLawyer involved in suits against Israel's most notorious cyber-arms dealer...
NSO Group is a notorious Israeli cyber-arms dealer whose long trail of sleaze has been thoroughly documented by the University of Toronto's Citizen Lab (which may or may not be related to an attempt...
View ArticleEuropean telcos want the right to perform "deep packet inspection" on our data
[Austria's Epicentre Works is an incredibly effective European digital rights group, most famous for getting the EU's Data Retention Directive struck down; now, they're raising the alarm about a move...
View ArticleDiscovering whether your Iphone has been hacked is nearly impossible thanks...
This week, we learned that the notorious Israeli cyber-arms-dealer NSO Group had figured out how hijack your Iphone or Android phone by placing a simple Whatsapp call, an attack that would work even...
View ArticleHow can spies from democracies compete with spies from autocracies?
Economist international editor Edward Lucas devotes 4,000+ words in the new issue of Foreign Policy to the changing landscape of state espionage in the 21st century; it's not particularly...
View ArticleGermany demands an end to working cryptography
Germany's Interior Minister Horst Seehofer — a hardliner who has called for cameras at every "hot spot" in Germany — has announced that he will seek a ban on working cryptography in Germany; he will...
View ArticleCEO of London's Serpentine Gallery resigns after Guardian report
[Addendum 2/20/2020: Following a legal complaint, the Guardian removed its article of 14 June 2019 and apologised to Mrs Peel. We are happy to clarify that Yana Peel is not, and was not, personally...
View Article"Massive scale" intrusion into mobile carriers' networks exposed customers'...
The security firm Cybereason says that it has identified a likely state-sponsored attack on ten global mobile phone networks that they have attributed to "the Chinese-affiliated threat actor APT10,"...
View ArticleChinese authorities are secretly installing their anti-Uyghur surveillance...
Back in 2017, Chinese authorities in Xinjiang began stopping members of the Uyghur ethnic minority and forcing them to install spyware on their phones: it marked an intensification of the country's...
View ArticleUK ISP Association, spies, censorship organsation jointly condemn Mozilla for...
ISPs in the UK are required to censor a wide swathe of content: what began as a strictly limited, opt-in ban on depictions of the sexual abuse of children has been steadily expanded to a mandatory ban...
View ArticleEFF publishes an indispensable, plain-language guide to "cell-site...
In 2012, the Wall Street Journal first reported on a mysterious cellphone surveillance tool being used by law-enforcement; years later, we learned that the origin of this report was an obsessive...
View ArticleYou have the right to remain encrypted
"You have the right to remain silent." We've heard the Miranda warning countless times on TV, but what good is the right to remain silent if our own cellphones testify against us? Imagine every...
View ArticleAfter suing NSO Group for hacking Whatsapp, Facebook kicks NSO employees off...
This week, Facebook filed suit against the NSO Group, a cyber-arms dealer that supplies some of the world's most oppressive regimes with spying tools used to attack dissidents, journalists, human...
View ArticleNSO Group employees kicked off Facebook for spying for brutal dictators are...
The NSO Group (previously) is an Israeli spyware company that sells tools to autocratic states that are used to spy on democratic opposition movements, journalists, and so on (the company's tools were...
View ArticleSchneier: "It's really too late to secure 5G networks"
Bruce Schneier's Foreign Policy essay in 5G security argues that we're unduly focused on the possibility of Chinese manufacturers inserting backdoors or killswitches in 5G equipment, and not focused...
View Article
More Pages to Explore .....