article thumbnail

Apple Guidance on Intimate Partner Surveillance

Adam Shostack

They’re unreasonable because ever year in the United States, 1,000 to 1,600 women die at the hands of their male partners, and some fraction of those are enabled by technology-aided surveillance. The National Institute of Justice Journal’s issue on Intimate Partner Homicide is mainly disturbing and also fascinating.

article thumbnail

Threat Model Thursday: Technology Consumers

Adam Shostack

There’s an interesting paper, ‘It depends on your threat model’: the anticipatory dimensions of resistance to data-driven surveillance. The author critiques ‘anticipatory data practices’, a collection of techniques that include my own work, as presented to civil society activists.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy Device Designed to Defend Against Illegal Wireless Tracking

SecureWorld News

BVS has been at the forefront of the wireless security industry for 50 years, designing, building, and shipping thousands of innovative security products. The company's latest product, BlueSleuth-Lite, is a game-changer in the world of personal security and privacy.

Wireless 103
article thumbnail

If I Go to a Protest, What Kinds of Personal Information Might Police Collect About Me? (important guest post)

Architect Security

And when thousands of protesters are out on the street, the opportunity is ripe for law enforcement to not only surveil the scene but to collect personal information that it can then hold on to for a long time. So your experience will depend on where you are.

article thumbnail

Automotive Privacy

Adam Shostack

[Update: clarified a sentence about whose privacy is touched, and where.]. I had missed the story “ Big Brother on wheels: Why your car company may know more about you than your spouse.

article thumbnail

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The Last Watchdog

In one case, ExtraHop tracked a made-in-China surveillance cam sending UDP traffic logs , every 30 minutes, to a known malicious IP address with ties to China. It appears the cam in question was unwittingly set up by an employee for personal security reasons.