2015 Jan 21, 9:12 2013 Jun 21, 10:43
What It All Means: All Your Communications are Belong to U.S. In sum, if you use encryption they’ll keep your data forever. If you use Tor, they’ll keep your data for at least five years. If an
American talks with someone outside the US, they’ll keep your data for five years. If you’re talking to your attorney, you don’t have any sense of privacy. And the NSA can hand over you
information to the FBI for evidence of any crime, not just terrorism. All without a warrant or even a specific FISA order.
Not sure if this is saying all Tor data is collected or saying if someone uses Tor then start collecting that someone’s communication.
technical legal tor nsa eff spying security privacy 2012 Sep 26, 2:43
Eric gets the most entertaining mail.
You have failed to comply with them after all the warning and instructions given to you, but since you are also among the terrorist we are facing in the country, I will personal
make sure that I wipe away the crime in the state and I promise you that you will definitely pay with your life because I am here to protect the interest of my people and not to put them in
shame, you suppose to support this government and not to spoil it.
humor spam scam email eric-law 2012 Jan 10, 2:33
Fascinating anecdotes on criminal investigations involving game consoles.
technical crime law video-game xbox 2010 Mar 1, 2:24There is an amazing amount of info around about the alleged assassination Mahmoud al-Mabhouh including this Dubai hotel survielance footage.
video crime security privacy wired cctv 2010 Jan 29, 10:52Another technology stolen but then remotely using the tech to get it back story.
iphone apple gps privacy crime 2009 Dec 8, 12:02"This illustration, from the September 10, 1910 New York Tribune, imagines the rooftop burglars of the future. 'BURGLARS LEARN TO HANDLE THE AEROPLANE WITH PRECISION AND SILENCE: Our artist takes a
look into the future and foresees the time when roofs must be secured as carefully as any other part of the home.'"
humor history burglar crime newspaper news 2009 Jun 1, 3:21"Marc Weber Tobias can pick, crack, or bump any lock. Now he wants to teach the world how to break into military facilities and corporate headquarters."
via:boingboing hack diy business politics security video lockpicking lock crime wired 2009 Apr 23, 4:46Some lovely data visualizations. Is their Crimespotting visualization supposed to look like the map interface from GTA3SA? "Since 2001, Stamen has developed a reputation for beautiful and
technologically sophisticated projects in a diverse range of commercial and cultural settings."
blog web art visualization information interactive interface portfolio mashup 2009 Jan 20, 11:40"But, when police searched his computer, they found Google searches from a couple days after the accident like, "auto parts, auto dealers out-of-state; auto glass, Las Vegas; auto glass reporting
requirements to law enforcement, auto theft," according to the prosecutor. The coup de grace? He searched for "hit-and-run," which he followed to a page about the hit-and-run he committed."
privacy google internet crime 2008 Sep 8, 10:26"This is what I call the "cup of tea" problem, after Douglas Adams: Newsreaders still feel it is worth a special and rather worrying mention if, for instance, a crime was planned by people 'over the
Internet.' They don't bother to mention when criminals use the telephone or the M4, or discuss their dastardly plans 'over a cup of tea,' though each of these was new and controversial in their day."
internet security humor douglas-adams via:sambrook