Cops hack into foreign computers to find cyber criminals As crime continues to proliferate on the so-called dark web, law enforcement agencies are sometimes having to work outside of their jurisdiction. When a suspected criminal acts on the dark web, authorities are unlikely to know where in the world he or she is physically located….
Category: Cyber-Crime
Crusader Corner: ISIS Publishes Kill List with Names and Addresses of Minnesota Cops
Just like Great Britian, This is the end-result of a Govt. that pacifies and emboldens Terrorist. With this kind of policy, Nobody is safe anymore. Take Responsibility for you and your family’s safety NOW. -SF “Islamic State hackers post ‘kill list’ of Minnesota cops,” by Kellan Howell, The Washington Times, March 15, 2016: A group…
In the FBI’s Crypto War, Apps May Be The Next Target
IF THERE’S ANYTHING the world has learned from the standoff over the encrypted iPhone of San Bernardino killer Syed Rizwan Farook, it’s that the FBI doesn’t take no for an answer. And now it’s becoming clear that the government’s determination to access encrypted data doesn’t end with a single iPhone, or with Apple, or even…
“Predictive Policing”: The Cyber Version of “Stop and Frisk”
Thanks America! How China’s Newest Software Could Track, Predict, and Crush Dissent Armed with data from spying on its citizens, Beijing could turn ‘predictive policing’ into an AI tool of repression. What if the Communist Party could have predicted Tiananmen Square? The Chinese government is deploying a new tool to keep the population from uprising. Beijing is building…
Fingerprint Spoofing: Yeah there’s An App for That
So That Thumbprint Thing on Your Phone Is Useless Now Researchers found a cheap, easy way to copy your fingerprints a few months after millions of Americans had theirs stolen by hackers. Last year, when the Office of Personnel Management notified 22 million people that their personal information was compromised in a massive data breach, one…
Inside “Eligible Receiver”
The NSA’s disturbingly successful hack of the American military Excerpted from Dark Territory: The Secret History of Cyber War by Fred Kaplan. Out now from Simon & Schuster. On Wednesday, March 9, Kaplan will discuss his book in New York; for more information and to RSVP, visit the New America website. On June 9,…
Going Inside the Ukrainian Power Grid Hack
IT WAS 3:30 p.m. last December 23, and residents of the Ivano-Frankivsk region of Western Ukraine were preparing to end their workday and head home through the cold winter streets. Inside the Prykarpattyaoblenergo control center, which distributes power to the region’s residents, operators too were nearing the end of their shift. But just as one…
Technology Update: Feds Don’t Need Apple to Get Into Your iPhone
IT’S A SHOWDOWN that has the country mesmerized. In court battles brewing across the nation, the FBI is trying to force Apple to help it extract data from iPhones seized in more than a dozen cases. The government is so intent on forcing Apple’s hand that in each case the Justice Department has invoked the…
Reversing the Cyber-Crime Paradigm: The “Cyber-Robin Hood”
ID THIEF HACKS INTO FAMILY’S NETFLIX, AT&T ACCOUNTS TO PAY OFF THEIR BILLS STOLEN CREDENTIALS; USER ACCOUNTS COMPROMISED An Orange County, Fla. family says a hacker breached their phone and Netflix accounts to pay off the family’s bills. The Hennigs discovered the sorta well-meaning hack when AT&T alerted Kathy Hennig that she owed $1,300 because…
Crime Awareness: IRS Scammers
“This is the IRS. Call us back immediately to avoid an arrest warrant being issued.” Last week, one of our officers responded to a fraud complaint involving an unknown con artist who scammed a victim out of $15,000. It all began with a simple voicemail message, “This is the IRS. Call us back immediately to…
