Secure Comms: Cracking the Encrypted Messages of Balkan Crime Gangs

Secure Comms: Cracking the Encrypted Messages of Balkan Crime Gangs

Law enforcement authorities in the United States and Europe, however, say it was created with the sole purpose of facilitating drug trafficking and had become the messaging app of choice for transnational crime organisations.

Thousands of US police officers and public servants have reportedly used Clearview's controversial facial recognition tech without approval

Thousands of US police officers and public servants have reportedly used Clearview's controversial facial recognition tech without approval

Over 7,000 police officers and public servants in the US have been using or testing Clearview AI's facial recognition software without authorization from their departments, according to a report from BuzzFeed News.

EU police spy on 70,000 encrypted phones

EU police spy on 70,000 encrypted phones

Police agencies were able to monitor the encrypted communications of about 70,000 people in a second major hack by European law enforcement in the last year.Sky ECC has rejected the claim its app has been unlocked by European agencies and said it was cloned devices running a fake application that were hacked.

Virginia lawmakers unanimously approve bill that bans facial recognition technology

Virginia lawmakers unanimously approve bill that bans facial recognition technology

Under the bill, any law enforcement agency using facial recognition technology must stop, and they can only get approval to use it if they seek special permission from the legislature beginning July 1.Democratic Delegate Lashrecse Aird was one of the bill's lead sponsors.

Ex-policeman says Synesis did help to identify Belarus protesters

Ex-policeman says Synesis did help to identify Belarus protesters

The Synesis-made Kipod software was used by law enforcement agencies to identify participants of peaceful protests in Belarusian cities, according to a former employee with the Organized Crime and Corruption Task Force (GUBOPIK) Stanislau Lupanosau .

EFF Joins Effort to Restrict Automated License Plate Readers in California

EFF Joins Effort to Restrict Automated License Plate Readers in California

One year ago, the California State Auditor released a damning report on the use of automated license plate readers (ALPRs) by local law enforcement agencies that confirmed concerns EFF has raised for years.

The new Policing Bill fails to provide sufficient safeguards around extraction of victims' data.

The new Policing Bill fails to provide sufficient safeguards around extraction of victims' data.

Our main concerns regarding Chapter 3 of the PCSC Bill: Continued reliance on "consent" of victims and witnesses to hand over their devices Section 36 of the Bill provides that an authorised person, such as a police officer, can extract data from an electronic device if the user of a device has:.

Police Surveillance Can't Be Reformed. It Must Be Abolished

Police Surveillance Can't Be Reformed. It Must Be Abolished

The CCOPS scheme aligns in this way with other policing reforms, like community “advisory” boards and “community policing” that police use to work with people and organizations who they know will compromise in their favor.

Home-security cameras have become a fruitful resource for law enforcement - and a fatal risk

Home-security cameras have become a fruitful resource for law enforcement - and a fatal risk

Police forces across the U.S. made more than 20,000 requests last year for footage captured by Ring's "video doorbells" and other home-security cameras, underscoring how the rapid growth of inexpensive home surveillance technologyhas given American law enforcement an unprecedented ability to monitor neighborhood life.

Private dollars are seeding surveillance tech across the US

Private dollars are seeding surveillance tech across the US

Companies including Axon – which makes tasers, cameras and drones, and Verizon – which provides video surveillance technologies and 5G connectivity services – they’re in the Chula Vista Police Foundation’s Captain’s Circle of sponsors.

Tools of digital surveillance and repression

Tools of digital surveillance and repression

Justice For Myanmar has obtained Ministry of Home Affairs budget files from 2018-21 and Ministry of Transport and Communications budget files from 2019-21, which include budgeted items for the Myanmar Police Force, Bureau of Special of Investigation under the Ministry of Home Affairs and Department of IT and Cyber Security under the Ministry of Transport and Communications.

Facebook's plan to encrypt messages will makes it easier to share child abuse images, say MPs

Facebook's plan to encrypt messages will makes it easier to share child abuse images, say MPs

Facebook has been branded 'hopelessly naive' over plans to encrypt its messaging apps, as MPs warned the move will make it 'even easier' for paedophiles to share child abuse images.

The I have Nothing To Hide Argument Is Flawed

The I have Nothing To Hide Argument Is Flawed

Likewise, just because there are people who are hiding destructive things that the people in charge should ultimately know about doesn’t suddenly mean they should allow the police to check EVERYONE.

Hacked messages can be used as evidence in court

Hacked messages can be used as evidence in court

EncroChat’s instant messaging service was used by criminals around the world before it was hacked by French police.In a victory for prosecutors in their fight against organised crime the Court of Appeal ruled that communications obtained by French police by hacking into mobile phones were lawfully obtained.

Police used geofence warrant to make Google to identify George Floyd protestors

Police used geofence warrant to make Google to identify George Floyd protestors

We’re only aware of the search warrant because an individual who had their information given to the police by Google, Said Abdullahi, received an email from Google letting him know that the information had been handed over.In this particular reverse location search warrant, Google handed over information on hundreds of individuals.

Police in Minneapolis reportedly used a geofence warrant at Floyd protest last year

Police in Minneapolis reportedly used a geofence warrant at Floyd protest last year

Police in Minneapolis got a search warrant that ordered Google to provide account data on people who were near a protest that turned violent two days after the killing of George Floyd last year, TechCrunch reported.

UK Police Chief falsely claims that end to end encrypted messaging “puts lives at risk”

UK Police Chief falsely claims that end to end encrypted messaging “puts lives at risk”

In fact, a police chief went so far as to say that offering end to end encryption would “’unequivocally put lives at risk.” The words were uttered by Detective Chief Superintendent Kevin Southworth – who head’s the country’s online anti-terrorism efforts.

Every move you make - An eye-opening look at law-enforcement surveillance

Every move you make - An eye-opening look at law-enforcement surveillance

JON FASMAN’S new book, “We See It All”, is a brisk and informative overview of one of the more pressing issues in criminal justice: the rise of surveillance technology.

Government defeated over child spy law

Government defeated over child spy law

Peers have forced through an amendment to the spycops bill to curtail the use of child spies by the police and security services.

'Child spies' bill could face Lords defeat as Tory peers rebel

'Child spies' bill could face Lords defeat as Tory peers rebel

Tory peers, bishops and crossbenchers could inflict defeat on the government after an outcry over new guidance which allows state agencies to use children as undercover spies as part of the government’s covert intelligence bill.

Police scrambling to recover more than 150,000 records wiped from UK database

Police scrambling to recover more than 150,000 records wiped from UK database

The policing minister, Kit Malthouse, said Home Office and law enforcement officials were working at pace to recover the data.“While the loss relates to individuals who were arrested and then released with no further action, I have asked officials and the police to confirm their initial assessment that there is no threat to public safety,” he said.

Facial recognition use surges after Capitol riot

Facial recognition use surges after Capitol riot

With many of the participants posting footage of the riot to social media, officials nationwide are relying on software like Clearview AI — which matches photos of unidentified people with publicly posted images — including in jurisdictions that have enacted recent reforms about police use of the technology.

Not going dark: personal data from the Internet of Things ushers in a golden age for law enforcement

Not going dark: personal data from the Internet of Things ushers in a golden age for law enforcement

A report from the Brennan Center for Justice provides a good summary of how the authorities are accessing that data in order to help them with their work: The proliferation of connected devices provides expansive opportunities for the government to assemble detailed portraits of people’s lives.

The Capitol Attack Doesn’t Justify Expanding Surveillance

The Capitol Attack Doesn’t Justify Expanding Surveillance

Right now, a growing chorus is demanding we use facial recognition, cellphone tower data, and every manner of invasive surveillance to punish the mob.Rather than responding to these attacks with a new mandate for expanded policing powers, we need to expand our civilian oversight.

Use of Clearview AI facial recognition tech spiked as law enforcement seeks to identify Capitol mob

Use of Clearview AI facial recognition tech spiked as law enforcement seeks to identify Capitol mob

Clearview AI’s CEO says that use of his company’s facial recognition technology among law enforcement spiked 26 percent the day after a mob of pro-Trump rioters attacked the US Capitol.Some 2,400 law enforcement agencies across the US use Clearview’s software, according to the company.

Police Robots Are Not a Selfie Opportunity, They’re a Privacy Disaster Waiting to Happen

Police Robots Are Not a Selfie Opportunity, They’re a Privacy Disaster Waiting to Happen

Instead, a robot snitch that looks like a rolling trash can is programmed to decide whether a person looks suspicious—and then call the human police on them.This begs the question: Who gets reprimanded if a robot improperly harrasses an innocent person, or calls the police on them?

Man sues police after incorrect facial recognition match leads to wrongful arrest

Man sues police after incorrect facial recognition match leads to wrongful arrest

Nijeer Parks is suing the police after he was arrested and jailed in 2019 for ten days based on an incorrect facial recognition match.

In 2020, COVID-19 derailed the privacy debate in the U.S.

In 2020, COVID-19 derailed the privacy debate in the U.S.

Nine months into the crisis, Schwartz said, the "worst ideas" being deployed internationally have yet to take hold in the U.S. But that doesn't mean COVID-19 hasn't created a slew of smaller, but still insidious privacy setbacks for Americans who, in recent years, have become increasingly wary of all the intrusive ways that governments and private companies use their personal data.

T-Mobile rounds out this awful year with another data breach, affecting hundreds of thousands of subscribers

T-Mobile rounds out this awful year with another data breach, affecting hundreds of thousands of subscribers

T-Mobile has confirmed to Android Police it has shut down a data breach operation that may have harvested a small group of customers' phone numbers, number of lines per account, and call diagnostic metrics.

She didn't know her kidnapper. But he was using Google Maps — and that cracked the case.

She didn't know her kidnapper. But he was using Google Maps — and that cracked the case.

Over the next few days, Google representatives helped Draeger update his warrant to allow the company to search beyond the airport, where hundreds of devices had been using the app at the time of the attack, and look for devices used in additional scenes linked to the crime, including the abduction point and a bar in Chicago where M.D.’s credit card was used the following night.