Cell Phone Location Tracking Laws By State | American Civil Liberties Union Location records can reveal an enormous of information about a person, especially with the proliferation of smartphones that constantly track our whereabouts. Because privacy laws haven’t kept up with advances in technology, police have long claimed the authority to access this information from cell phone companies without warrants.
Looks to be a bit better than LastPass and you can store the encrypted database on your PC or the cloud…
LogMeOnce Password Management Suite Premium Review & Rating Despite the “Premium” in its name, the excellent LogMeOnce Password Management Suite Premium is totally free, and it offers a ton of features not usually found in free password managers.
Chaffetz seeks to criminalize warrantless data collection Legislation being introduced on Monday would make it illegal for agencies to use fake cell towers that vacuum up cell phone data over a wide area without a warrant.House Oversight Committee Chairman Rep. Jason Chaffetz, R-Utah, is introducing the Cell-Site Simulator Act. Under draft text of the bill provided to the Washington Examiner, collecting metadata with a device known as a stingray would require a warrant. Violations would be punishable by a fine and up to 10 years in prison. The bill would exempt emergencies that include an immediate danger of death, national security or that fall under the Foreign Intelligence Surveillance Act.Lawmakers have tossed around ideas for such a law, but Monday’s proposal is the first one filed. It follows an admission last week from Internal Revenue Service Commissioner John Koskinen that his agency uses cell-site simulators, which harvest telephone data by mimicking cell phone towers in some investigations.
Kaspersky announces death of CoinVault, Bitcryptor ransomware, releases all keys Over 14,000 keys used to unlock files encrypted by CoinVault and Bitcryptor have been released, signaling the death of the ransomware variants.
Build Your Own DIY Home Security System with Text Messaging Building your own DIY security system is a great way to learn more about technology, especially if you use a microcontroller like Arduino. And you don’t have to be a tech whiz to get one set up quickly. With a few parts (or just some free software), you can create a security system that will…
I2P Anonymous Network Anonymous peer-to-peer distributed communication layer built with open source tools and designed to run any traditional Internet service such as email, IRC or web hosting.