University Tracks Students' Movements Using WiFi, But Says It's OK Because It's Not Tracking Students
One of the many revelations from the Snowden files was that Canada's spy agency has been tracking people as they connect to WiFi in different public locations. And if Canada is doing it, you can be pretty sure the NSA and GCHQ are doing the same, since neither is known for being backward in using whatever means it can to snoop on huge numbers of people. Of course, you'd expect spy agencies to be up to these kinds of tricks, and you might also be unsurprised to learn that shops are also tracking you using your WiFi connection.
The DEA -- along with several other law enforcement agencies -- has shown, over the years, that civil asset forfeiture is the tail wagging the dog. It may have been put in place to separate criminals from their cash, but is now used mainly to pad agency budgets and increase discretionary spending.
This attitude is summed up by the former DEA supervisor quoted in Brad Heath's (USA Today) investigation into the agency's forfeiture activities.
After receiving a deluge of obscene voicemails and text messages, House Minority Leader Nancy Pelosi informed her fellow Democrats on Saturday of "an electronic Watergate break-in" and warned them not to allow family members to answer their phones or read incoming texts.
University researchers have developed a new method to help forensic investigators extract data information from memory.
The tool, dubbed Retroscope, recovered data from up to the previous 11 screens displayed from up to 15 apps, with an average of five screens pulled from each.
Living in the Age of Information that we live in today brings great convenience and benefit along with great risks. On the one hand, humanity has access to basically the entirety of information and knowledge known in existence at the mere few clicks of a button; but on the other hand, this great power in the hands of a nefarious few can cause great destruction and misery if taken too far. In this article, I'll guide you through the possible steps to secure your private information online.