AI and Microdirectives

Imagine a future in which AIs automatically interpret—and enforce—laws. All day and every day, you constantly receive highly personalized instructions for how to comply with the law, sent directly by your government ...

Self-Driving Cars Are Surveillance Cameras on Wheels

Police are already using self-driving car footage as video evidence: While security cameras are commonplace in American cities, self-driving cars represent a new level of access for law enforcement ­ and a ...

Identifying the Idaho Killer

The New York Times has a long article on the investigative techniques used to identify the person who stabbed and killed four University of Idaho students. Pay attention to the techniques: The ...
Genesis Market Crackdown, Life360 App Misuse, Tesla Customer Privacy Concerns

Genesis Market Crackdown, Life360 App Misuse, Tesla Customer Privacy Concerns

Law enforcement agencies across 17 countries have cracked down on Genesis Market, one of the largest criminal marketplaces, resulting in the arrests of 120 people globally. Popular family safety app, Life360, has ...

Fines as a Security System

Tile has an interesting security solution to make its tracking tags harder to use for stalking: The Anti-Theft Mode feature will make the devices invisible to Scan and Secure, the company’s in-app ...
Dutch Cops Bust ‘Exclu’ Messaging Service, Arrest 42

Dutch Cops Bust ‘Exclu’ Messaging Service, Arrest 42

Police in the Netherlands broke open alleged drugs gangs by hacking an encrypted messenger service, Exclu. Lives were saved and alleged perps arrested ...
Security Boulevard

Bulk Surveillance of Money Transfers

Just another obscure warrantless surveillance program. US law enforcement can access details of money transfers without a warrant through an obscure surveillance program the Arizona attorney general’s office created in 2014. A ...

Identifying People Using Cell Phone Location Data

The two people who shut down four Washington power stations in December were arrested. This is the interesting part: Investigators identified Greenwood and Crahan almost immediately after the attacks took place by ...
Why Telegram Is Essential to Open Source Investigations

Why Telegram Is Essential to Open Source Investigations

Telegram has become an increasingly popular—and often essential—source of information that can be used for open-source investigations and uncover a variety of cyber and physical threats that organizations in the public and ...