The Network: How a Secretive Phone Company Helped the Crime World Go Dark

The Network: How a Secretive Phone Company Helped the Crime World Go Dark

Motherboard spoke to over half a dozen sources around Phantom, including family members of Ramos, distributors who sold Phantom phones in multiple countries on his behalf, and people with knowledge of the company's operations.

Alphabet CEO: Plan to target EU commissioner was not “sanctioned” by me

Alphabet CEO: Plan to target EU commissioner was not “sanctioned” by me

In a virtual meeting on Thursday, Sundar Pichai told Mr. Breton, the internal market commissioner, that Google was a very large company and that the document “was never shown to me.” He added that he had not “sanctioned” the plan, according to two people familiar with the conversation.

Thailand orders ISPs to block Telegram amid ongoing protests

Thailand orders ISPs to block Telegram amid ongoing protests

The government of Thailand has ordered Thai internet service providers (ISPs) to block the Telegram encrypted messaging service.According to this leaked document that is marked “Top Secret”, the Thai government has ordered all internet providers to block the @telegram messaging app.

Auckland University's 'bizarre' files on students' social media posts

Auckland University's 'bizarre' files on students' social media posts

A University of Auckland statement sent to Craccum said: "We know that students communicate about and respond to issues via social media and looking at what is being posted is one of the ways that the university listens to the student voice and gets a sense of the student sentiment in real time.

MEGA Provided Suspended Account Files to FBI in Child Porn Case

MEGA Provided Suspended Account Files to FBI in Child Porn Case

Popular file sharing service MEGA recently shared the content of a user's suspended account after the FBI provided the service with a list of potential passwords in a child abuse case, according to court records.

Court seeks IP address from Twitter for account allegedly linked to Seth Rich conspiracy

Court seeks IP address from Twitter for account allegedly linked to Seth Rich conspiracy

U.S. Magistrate Judge Donna Ryu of Oakland, CA has issued a subpoena to Twitter asking the social media platform to provide the IP address and account registration information used to create and operate the Twitter account that has been established as the first link to an allegedly forged FBI document which some say is the root of the conspiracy surrounding the death of Seth Rich – a Democratic National Congress staffer who died in 2016.

Secret Service Bought Phone Location Data from Apps, Contract Confirms

Secret Service Bought Phone Location Data from Apps, Contract Confirms

The sale highlights the issue of law enforcement agencies buying information, and in particular location data, that they would ordinarily need a warrant or court order to obtain.Other documents obtained as part of the same FOIA request detail the Secret Service's purchase of Babel Street's open source intelligence product.

States probe Apple for potential consumer protection violation

States probe Apple for potential consumer protection violation

Texas is among a group of states whose attorneys general are probing Apple over potential violations of a consumer protection law, according to a document obtained by the Tech Transparency Project through an open records request and shared with CNBC.

Homeland Security fears widespread mask-wearing will break facial recognition software

Homeland Security fears widespread mask-wearing will break facial recognition software

Under the heading "Violent Adversaries Likely to Use Protective Masks to Evade Face Recognition Systems," the agency's bulletin warns that "violent extremists and other criminals who have historically maintained an interest in avoiding face recognition are likely to opportunistically seize upon public safety measures recommending the wearing of face masks to hinder the effectiveness of face recognition systems in public spaces by security partners.".

Customs to Expand License Plate Reading Program Nationwide

Customs to Expand License Plate Reading Program Nationwide

Those databases contain information collected by “private businesses (e.g., parking garages), local governments (e.g., toll booth cameras), law enforcement agencies, and financial institutions via their contracted repossession companies,” the PIA states.“The LPR commercial aggregator services store, index, and sell access to the images, along with the time and location of the collection.

Documentos vazados mostram que Abin pediu ao Serpro dados e fotos de todas as CNHs do país

Documentos vazados mostram que Abin pediu ao Serpro dados e fotos de todas as CNHs do país

Os documentos, datados entre os últimos meses e entregues ao Intercept por uma fonte anônima, detalham as informações requisitadas pela agência de espionagem: nome, filiação, CPF, endereço, telefones, foto, dados dos veículos (inclusive com nomes de proprietários anteriores, situação e procedência) de cada cidadão habilitado a dirigir.

When Your Office Scanner Is Framed for Phishing

When Your Office Scanner Is Framed for Phishing

The phishing campaign attempts to leverage the 'scan to email' functionality of modern office document-handling equipment as the bait text to lure users into opening an attachment which contains a credential-harvesting phishing page.

Ministers plan to give more UK public bodies power to access phone data

Ministers plan to give more UK public bodies power to access phone data

Five additional public bodies are to be allowed to obtain communications data under the Investigatory Powers Act – frequently dubbed the snooper’s charter – as they are “increasingly unable to rely on local police forces to investigate crimes on their behalf”, according to documents published by the government.

Vatican joins IBM, Microsoft to call for facial recognition regulation

Vatican joins IBM, Microsoft to call for facial recognition regulation

“New forms of regulation must be encouraged to promote transparency and compliance with ethical principles, especially for advanced technologies that have a higher risk of impacting human rights, such as facial recognition,” the document said.

I Asked Reddit’s “r/privacy” What Tools They Use to Protect Themselves— Here’s What They Said.

I Asked Reddit’s “r/privacy” What Tools They Use to Protect Themselves— Here’s What They Said.

Reddit User, rabicanwoosley suggests uMatrix, described as: “Point & click to forbid/allow any class of requests made by your browser.Do we really need 500 lists going over the same ground again and again ?And beyond some basics, much of your security and privacy is more dependent on your behavior, and that of your friends and family, than on tools.

Europe can win global battle for industrial data, says EU industry chief

Europe can win global battle for industrial data, says EU industry chief

Vast troves of data from how fast we drive our cars to how much time a robot needs to churn out products will open a new front in the battle for digital dominance, said Thierry Breton, the European Commissioner in charge of the bloc’s single market.

How Big Companies Spy on Your Emails

How Big Companies Spy on Your Emails

Motherboard has also obtained documentation that provides more specifics about how two other popular apps—Cleanfox and Slice—sell products based on users' emails to corporate clients.

Exclusive: Europe wants single data market to break U.S. tech giants' dominance

Exclusive: Europe wants single data market to break U.S. tech giants' dominance

The proposal, which includes reining in big online platforms and could still be tweaked ahead of their presentation on Feb. 19, underlines the EU’s determination to break U.S. tech giants’ stranglehold on vast troves of data and better compete with Chinese rivals.

Technical analysis of client identification mechanisms

Technical analysis of client identification mechanisms

The other versioning scheme, Last-Modified, suffers from the same issue: servers can store at least 32 bits of data within a well-formed date string, which will then be echoed back by the client through a request header known as If-Modified-Since.

The California DMV Is Making $50M a Year Selling Drivers’ Personal Information

The California DMV Is Making $50M a Year Selling Drivers’ Personal Information

The California Department of Motor Vehicles is generating revenue of $50,000,000 a year through selling drivers’ personal information, according to a DMV document obtained by Motherboard.Lawmakers introduced the Driver's Privacy Protection Act (DPPA) in 1994 after a private investigator hired by a stalker obtained the address of actress Rebecca Schaeffer from the DMV.

How cash is becoming a thing of the past | DW Documentary (Banking documentary)

How cash is becoming a thing of the past | DW Documentary (Banking documentary)

And digital payment companies like Paypal or Visa simply want to profit from money transactions and collect as much financial data about consumers as they can.But as our financial behavior becomes more and more transparent, states are also using payment data to find out more about us.

Sidewalk Labs document reveals company’s early vision for data collection, tax powers, criminal justice

Sidewalk Labs document reveals company’s early vision for data collection, tax powers, criminal justice

Fred Lum. A confidential Sidewalk Labs document from 2016 lays out the founding vision of the Google-affiliated development company, which included having the power to levy its own property taxes, track and predict people’s movements and control some public services.

Beyond Aadhaar: India wants to create a giant centralized facial recognition database

Beyond Aadhaar: India wants to create a giant centralized facial recognition database

As that indicates, the idea is that any kind of image – whether a photograph, a drawing, or a CCTV feed capture – can be run against the database to search for matches.

GitHub - heiseonline/embetty: 🐙 Embetty displays remote content like tweets or YouTube videos without compromising your privacy.

GitHub - heiseonline/embetty: 🐙 Embetty displays remote content like tweets or YouTube videos without compromising your privacy.

Embetty displays remote content like tweets or videos without compromising your privacy.yarn add @heise/embetty.: $ git clone $ cd embetty $ yarn $ yarn build Supported embed types.The Embetty server component does not proxy video data .

TSA Testing Face Recognition at Security Entrances, Opening Door to Massive Expansion of the Technology

TSA Testing Face Recognition at Security Entrances, Opening Door to Massive Expansion of the Technology

If widely deployed, the TSA's program would (as we said of the CBP program) socialize people to accept face recognition and normalize the technology, inevitably be subject to mission creep, and expose people to the judgments of unreliable and biased algorithms.

Netflix’s new documentary “The Not So Surprising Hack”

Netflix’s new documentary “The Not So Surprising Hack”

Earlier this month, Facebook got fined with 5 billion dollars.“The Great Hack” unfolds the true story of the data and privacy scandal in a narrative that is thrilling, but foremost frightening.Will they actually listen when, as mentioned in the documentary, data has surpassed oil in value?

Everything you wanted to know about media metadata, but were afraid to ask

Everything you wanted to know about media metadata, but were afraid to ask

You can explode a flattened PDF into individual images of the pages using PDF Redact Tools, then feed the pages into Tesseract to create a text document that can be worked on with any language processing tool.

Just Opening A Document in LibreOffice Can Hack Your Computer (Unpatched)

Just Opening A Document in LibreOffice Can Hack Your Computer (Unpatched)

CVE-2019-9849 : This vulnerability, which you can fix by installing the latest available update, could allow the inclusion of remote arbitrary content within a document even when 'stealth mode' is enabled.

Police facial recognition could target 'literally anybody', senior MP says

Police facial recognition could target 'literally anybody', senior MP says

According to internal documents uncovered by Sky News, South Wales Police - the force leading the Home Office-backed trial of the controversial technology - places "persons where intelligence is required" on its watchlists, alongside wanted suspects and missing people.

Google executive refuses to commit to independent audit during Senate hearing

Google executive refuses to commit to independent audit during Senate hearing

Karan Bhatia , Google vice president of global government affairs and public policy, demurred when pressed by senators to undergo an independent audit of the company’s content management practices, as both Facebook and Twitter have done, saying his company is in a “very different situation.”.