Items Tagged with "Law Enforcement"


03b2ceb73723f8b53cd533e4fba898ee

FBI on Bitcoin: Cybercrime, Opportunity and Digital Choice

May 11, 2012 Added by:Pierluigi Paganini

The real danger of digital money, above the vulnerabilities in its processes, is the inability of governments to exert control over finances, which could lead to a distortion of the main mechanisms of economic control and taxation, bringing total chaos to the market...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

IC3 Releases 2011 Internet Crime Report

May 11, 2012

“Internet crime is a growing problem that affects computer users around the world and causes significant financial losses. The IC3 is an efficient mechanism for the public to report suspicious e-mail activity, fraudulent websites, and Internet crimes..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Drones, Secret Surveillance, and Classifying the Wizard of Oz

May 10, 2012 Added by:Electronic Frontier Foundation

The FAA finally released the names of the government agencies which applied for and received authorization to fly drones in the US. Unfortunately, the list did not include what drones were authorized, what they were being used for, or what information they were collecting...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The FBI, Content Monitoring, Backdoors and Going Dark

May 09, 2012 Added by:Pierluigi Paganini

The FBI is working to obtain a backdoor for major social networks like Facebook and also for some of the most used communications platforms such as Skype and Instant Messaging for government surveillance, and is collaborating with companies like Microsoft, Google and Yahoo...

Comments  (4)

7ddc1f3000a13e4dfec28074e9e7b658

DOJ: Any Protection is too Much for Cell Phone Tracking

May 08, 2012 Added by:Electronic Frontier Foundation

For years, we've been arguing that cell phone location data should only be accessible to law enforcement with a search warrant. After all, as web enabled smart phones become more prevalent, this location data reveals an incredibly revealing portrait of your every move...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Continues Crusade Against Botnet Masters

May 04, 2012 Added by:Headlines

"Google began alerting the registrants of more than three dozen Gmail accounts that were the subject of Microsoft’s subpoenas... The email addresses were already named in Microsoft’s initial complaint posted at zeuslegalnotice.com, which listed nicknames and other information..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

FBI Overreaches with May First - Riseup Server Seizure

May 02, 2012 Added by:Electronic Frontier Foundation

Most troubling is the collateral damage. The search warrant authorized seizure of emails, communications, and files on the server, and records of IP addresses connected to the server. And the server was used by a wide range of people who had nothing to do with the bomb threats...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Domains Selling Stolen Credit Card Numbers Seized

April 30, 2012 Added by:Headlines

“By seizing the websites the criminal underground uses to blatantly sell stolen personal information, Operation Wreaking hAVoC shows that we are committed to protecting individuals online and preventing criminals from using the Internet to line their pockets..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Online Narcotics Marketplace Utilized TOR

April 23, 2012 Added by:Headlines

“The drug trafficking organization... was distributing dangerous and addictive drugs to every corner of the world, and trying to hide their activities through the use of advanced anonymizing on-line technology...”

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Warrantless Cell Phone Tracking, Drones, and FBI Surveillance

April 19, 2012 Added by:Electronic Frontier Foundation

Documents prove warrantless cell phone tracking “has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

CISPA Legislation FAQs: The Disturbing Dangers

April 18, 2012 Added by:Electronic Frontier Foundation

EFF—along with a host of other civil liberties groups—are protesting the dangerous new cybersecurity bill known as CISPA that will be voted on in the House on April 23. Here is everything you need to know about the bill and why we are protesting...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

TeaMp0isoN Claims U.K. Anti-Terrorism Hotline Hack

April 12, 2012 Added by:Headlines

"We did it with ease. Their security is bizarre, it's as if they have no security whatsoever. The security they lack, it's incredible. They use an old phone system. It's pretty much the art of phreaking," a TeaMp0isoN member called 'Detonate' said in an interview...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

European Union Set to Establish Cybercrime Center

April 11, 2012 Added by:Headlines

The European center will warn of major cybercrime threats and weaknesses in online defenses. It will identify organized cyber-criminal networks and will provide operational support in concrete investigations and provide forensic assistance...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Court to Rehear Electronic Device Border Search Case

April 05, 2012 Added by:Electronic Frontier Foundation

When it comes to the government's ability to search your electronic devices, we've always maintained that the border is not an "anything goes" zone. Recently, the Ninth Circuit Court of Appeals agreed to rehear a case that gave the government carte blanche...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Criminals Top Secret Service Most Wanted List

April 02, 2012 Added by:Headlines

The majority of fugitives on the Secret Service's top ten most wanted list can be described as "cyber criminals". While the objectives remain the same, the ubiquity of the digital systems that pervade every aspect of our culture presents a new set of challenges for law enforcement...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Authorities Apprehend the Hacktivist Known as th3j35t3r

March 31, 2012 Added by:Infosec Island Admin

In a shocking turn of events, the hacktivist known as th3j35t3r has been identified as Robert "Lance" Miller from Pittsboro, North Carolina. Mr Miller is now in police custody after the multi-agency operation took place in the early hours of the morning on April 1st, 2012...

Comments  (8)

Page « < 1 - 2 - 3 - 4 - 5 > »