US border forces seize Americans’ phone data and store it for 15 years

American border authorities access travelers’ phones without the need of a warrant, giving free reign of extracting all personal information and storing them for years. source: https://www.engadget.com/us-border-forces-traveler-data-15-years-085106938.html archived source: https://wellthissucks.xyz/2022/09/16/us-border-forces-seize-americans-phone-data-and-store-it-for-15-years-archived-source/

US border forces seize Americans’ phone data and store it for 15 years – archived source

US border forces are seizing Americans’ phone data and storing it for 15 years Border officials can copy information from travelers’ phones without a warrant. M. Moon @mariella_moon – September 16, 2022 4:51 AM If a traveler’s phone, tablet or computer ever gets searched at an airport, American border authorities could add data from their […]

Amazon ring used by police

The police force in Los Angeles, USA uses data gathered by Amazon Ring surveillance devices to persecute persons of interest. Another example of a government misusing a product which was not intended for their purposes. source: https://www.eff.org/deeplinks/2021/02/lapd-requested-ring-footage-black-lives-matter-protests archived source: https://wellthissucks.xyz/2021/02/16/amazon-ring-used-by-police-archived-source/

Amazon ring used by police – archived source

LAPD Requested Ring Footage of Black Lives Matter Protests BY MATTHEW GUARIGLIA AND DAVE MAASS – FEBRUARY 16, 2021 Along with other civil liberties organizations and activists, EFF has long warned that Amazon Ring and other networked home surveillance devices could be used to monitor political activity and protests. Now we have documented proof that our fears were […]

Apple gave the FBI access to the iCloud account of a protester

Apple cooperated with the FBI to give access to a protester’s data stored in Apple’s iCloud. Though it is normal for a cooperation like Apple to comply with official search warrants this example shows how deeply personal access can be gained into a person’s private life as any data stored in one of the big […]

Apple gave the FBI access to the iCloud account of a protester – archived source

Apple gave the FBI access to the iCloud account of a protester accused of setting police cars on fire Aaron Holmes – Sep 16, 2020, 5:52 PM Apple granted the FBI access to the iCloud account of a protester accused of setting police cars on fire in Seattle this summer, according to court documents. Once it […]

Backdoor in Juniper network devices – archived source

Secret Code Found in Juniper’s Firewalls Shows Risk of Government Backdoors Suspicious code found in Juniper’s firewall software underscores why governments shouldn’t be allowed to install their own backdoors in software. ENCRYPTION BACKDOORS HAVE been a hot topic in the last few years—and the controversial issue got even hotter after the terrorist attacks in Paris and […]

Backdoor in Juniper network devices

Multiple backdoors were discovered within the OS used on Juniper network devices which allows an attacker to monitor and alter all network traffic. The backdoor is believed to come from a big nation funded operation and mainly not only shows the obvious malicious infiltration of global network infrastructure but also the danger in the nature […]

NSA infiltrated HDD firmware

Security researchers found out that over years the NSA manipulated the firmware of HDDs which allowed to compromise systems all over the world in a way which is almost impossible to detect by any operating system. This shows the effort the agency puts into spying on foreign countries, corporations and end users. source: https://www.theregister.com/2015/02/17/kaspersky_labs_equation_group/ archived […]

NSA infiltrated HDD firmware – archived source

Your hard drives were riddled with NSA spyware for years Darren Pauli – Tue 17 Feb 2015 // 01:57 UTC The US National Security Agency (NSA) infected hard disk firmware with spyware in a campaign valued as highly as Stuxnet that dates back at least 14 years and possibly up to two decades – all according to an analysis by Kaspersky […]

Next Page »