Hackers Using Fake Police Data Requests against Tech Companies

from Schneier on Security Brian Krebs has a detailed post about hackers using fake police data requests to trick companies into handing over data. Virtually all major technology companies serving large numbers of users online have departments that routinely review and process such requests, which are typically granted as long as the proper documents are provided and the request appears to come from an email address connected to an actual police department domain name. But in certain circumstances ­– such as a case involving imminent harm or death –­ an investigating authority may make what’s known as an Emergency Data […]

Continue reading

Government Surveillance By Data

from NYTs This is the ultimate example of what’s broken in digital life: The locations of people who used apps to pray and hang their shelves wound up in U.S. military databases. Vice’s Motherboard publication this week reported that data on people’s movements collected by seemingly innocuous apps passed through multiple hands before being bought by U.S. defense contractors and military agencies. It’s not clear what the military is doing with the information. This isn’t an isolated case of government authorities buying commercially available databases containing the movements of millions of people. U.S. law enforcement agencies and the Internal Revenue […]

Continue reading

New Report on Police Decryption Capabilities

from Schneier on Security There is a new report on police decryption capabilities: specifically, mobile device forensic tools (MDFTs). Short summary: it’s not just the FBI that can do it. This report documents the widespread adoption of MDFTs by law enforcement in the United States. Based on 110 public records requests to state and local law enforcement agencies across the country, our research documents more than 2,000 agencies that have purchased these tools, in all 50 states and the District of Columbia. We found that state and local law enforcement agencies have performed hundreds of thousands of cellphone extractions since […]

Continue reading