crime - Dave's Blog

Search

randomdross: UA string with a shortlink to moar UA string

2015 Jan 21, 9:12
David Ross @randomdross :
UA string with a shortlink to moar UA string
PermalinkComments

In Depth Review: New NSA Documents Expose How Americans Can Be Spied on Without A Warrant

2013 Jun 21, 10:43

What It All Means: All Your Communications are Belong to U.S. In sum, if you use encryption they’ll keep your data forever. If you use Tor, they’ll keep your data for at least five years. If an American talks with someone outside the US, they’ll keep your data for five years. If you’re talking to your attorney, you don’t have any sense of privacy. And the NSA can hand over you information to the FBI for evidence of any crime, not just terrorism. All without a warrant or even a specific FISA order.

Not sure if this is saying all Tor data is collected or saying if someone uses Tor then start collecting that someone’s communication.

PermalinkCommentstechnical legal tor nsa eff spying security privacy

Attention:!!!, Behold, you are reading a letter from your President Barack Obama.

2012 Sep 26, 2:43

Eric gets the most entertaining mail.

You have failed to comply with them after all the warning and instructions given to you, but since you are also among the terrorist we are facing in the country, I will personal make sure that I wipe away the crime in the state and I promise you that you will definitely pay with your life because I am here to protect the interest of my people and not to put them in shame, you suppose to support this government and not to spoil it.

PermalinkCommentshumor spam scam email eric-law

CSI: Xbox - how cops perform Xbox Live stakeouts and console searches

2012 Jan 10, 2:33

Fascinating anecdotes on criminal investigations involving game consoles.

PermalinkCommentstechnical crime law video-game xbox

Alleged Assassins Caught on Dubai Surveillance Tape | Threat Level | Wired.com

2010 Mar 1, 2:24There is an amazing amount of info around about the alleged assassination Mahmoud al-Mabhouh including this Dubai hotel survielance footage.PermalinkCommentsvideo crime security privacy wired cctv

How to catch an iPhone thief: Busting an iPhone thief

2010 Jan 29, 10:52Another technology stolen but then remotely using the tech to get it back story.PermalinkCommentsiphone apple gps privacy crime

Paleo-Future - Paleo-Future Blog - Burglars of the Future (1910)

2009 Dec 8, 12:02"This illustration, from the September 10, 1910 New York Tribune, imagines the rooftop burglars of the future. 'BURGLARS LEARN TO HANDLE THE AEROPLANE WITH PRECISION AND SILENCE: Our artist takes a look into the future and foresees the time when roofs must be secured as carefully as any other part of the home.'"PermalinkCommentshumor history burglar crime newspaper news

The Ultimate Lock Picker Hacks Pentagon, Beats Corporate Security for Fun and Profit

2009 Jun 1, 3:21"Marc Weber Tobias can pick, crack, or bump any lock. Now he wants to teach the world how to break into military facilities and corporate headquarters."PermalinkCommentsvia:boingboing hack diy business politics security video lockpicking lock crime wired

stamen design | big ideas worth pursuing

2009 Apr 23, 4:46Some lovely data visualizations. Is their Crimespotting visualization supposed to look like the map interface from GTA3SA? "Since 2001, Stamen has developed a reputation for beautiful and technologically sophisticated projects in a diverse range of commercial and cultural settings."PermalinkCommentsblog web art visualization information interactive interface portfolio mashup

Google: If You Commit a Felony, Don't Google It or You'll Go to Jail

2009 Jan 20, 11:40"But, when police searched his computer, they found Google searches from a couple days after the accident like, "auto parts, auto dealers out-of-state; auto glass, Las Vegas; auto glass reporting requirements to law enforcement, auto theft," according to the prosecutor. The coup de grace? He searched for "hit-and-run," which he followed to a page about the hit-and-run he committed."PermalinkCommentsprivacy google internet crime

Epeus' epigone: Fear of the new - the Internet, Tea, and MapReduce

2008 Sep 8, 10:26"This is what I call the "cup of tea" problem, after Douglas Adams: Newsreaders still feel it is worth a special and rather worrying mention if, for instance, a crime was planned by people 'over the Internet.' They don't bother to mention when criminals use the telephone or the M4, or discuss their dastardly plans 'over a cup of tea,' though each of these was new and controversial in their day."PermalinkCommentsinternet security humor douglas-adams via:sambrook
Older Entries Creative Commons License Some rights reserved.