Cell phone searches are a common law enforcement tool, but up until now, the public has largely been in the dark regarding how much sensitive information the government can get with this invasive surveillance technique.
Tag Archives: Mobile security
Source: Jessica Weiss, IJNet
In September 2011, two Mexican bloggers who reported frequently on local crime, including drug trafficking and related gang activity, were tortured and hanged on a pedestrian bridge in Nuevo Laredo, a town near the U.S. border.
This month’s Social Media Watch looks at the privacy concerns around Facebook’s Graph Search, an open letter to Skype detailing concerns about its practices, several noteworthy legislative privacy stories and several other policy, security and privacy stories from the social media community.
Source: The Next Web
On Wednesday, security professional Gaurang Pandya outlined how Nokia is hijacking Internet browsing traffic on some of its phones.
Seth Hardy was interviewed in a piece about the use of smartphones in cybercrime.
Pakistan’s government will continue its suspension of cell phone services in several parts of the country Saturday morning after it restores services Friday midnight, the interior minister said.
Adi Pito and his friend Avi Genasia were checking out the damage from the first – and so far only – fatal rocket attack of the past week when there was a deep rumble on the horizon.
Source: Mehtab Haider, The News
All emails, telephone calls and other communications with the rest of the world will begin to be monitored within 90 days at a cost of million of dollars, according to a deadline given by the government to operators including PTCL.Source: Mehtab Haider, The News
Verizon iPhone owners have 30 days to opt-out of sharing location, search data and more with advertisers
Source: Matthew Panzarino
If you’re the brand new owner of a Verizon iPhone, you’ve got 30 days to opt-out of sharing information including anonymized location data as well as demographics like age, gender, sports teams, dining habits and more.
Source: Aman Sharma, Economic Times
The government is gearing up to arm cyber sleuths with forensic tools to catch up with criminals who outsmart investigators by using secure mobile phones or password-protected computers.