mobiles

Foreign Spy Agencies Want Your Texts

Posted on

A new amendment has been introduced in parliament looking to allow for the easier sharing of communications data between Australia’s law enforcement and spy agencies and foreign governments. It comes in response to calls that spy agencies are being left behind without timely access to messaging apps with cloud servers in foreign jurisdictions. It would […]

mobiles

Mobile phone extraction

Posted on

In this piece we examine mobile phone extraction, relying on publicly available information and Privacy International’s experience from conducting mobile phone extraction using a Cellebrite UFED Touch 2. Mobile Phone Extraction technologies, known also as mobile forensics, entails the physical connection of the mobile device that is to be analysed and a device that extracts, […]

mobiles

5G risk assessment

Posted on

5G is on the way, but there’s no reason to start running around with your pants on your head just yet. While there will be a lot of hoopla about 5G in the CBD area of major cities there is a very large infrastructure network that will have to be put in place. Think at […]

anonymity

The Spycraft Revolution

Posted on

The world of espionage is facing tremendous technological, political, legal, social, and commercial changes. The biggest disruptive force is technological. Traditional spycraft has always relied on deception based on identity. Spotting, developing, recruiting, running, and servicing intelligence sources involves concealing what you are doing.  Not anymore. A cover identity that would have been almost bulletproof […]

mobiles

Check Your Android VPN

Posted on

Granting permissions to apps takes a certain level of trust—trust that an app is honest about the parts of your phone’s hardware and operating system it has access to, and what it does with the data therein. Trust is especially crucial with VPN apps, the point of which is to obfuscate your mobile internet activity from unwanted […]

mobiles

Phone Hacking Fears and Facts

Posted on

The lack of security built into phone networks leaves callers vulnerable to snooping, but the growth of encrypted communications will help protect privacy. Apple’s ongoing standoff with the government over passcode-protected iPhones is still raising unprecedented alarms over smartphone security and privacy.  The good news: Although the SS7 system will indeed work for spying on […]

mobiles

Clone A Phone

Posted on

It might surprise you, but there are plenty of ways to learn how to clone a phone without touching it. It doesn’t matter if you wish to clone an Android, Windows, or an iOS device – you can easily clone the target phone and obtain crucial information related to it. By exploiting some vulnerability on […]

mobiles

Using Android Without Google

Posted on

As soon as you start up a new Android phone, you get prompted to sign in with your Google account — but what if you don’t want to do that? Maybe you want to take advantage of Android but limit what Google knows about you, or maybe you just prefer the alternative apps; whatever the case, […]

mobiles

My phone is spying on me

Posted on

If your phone is turned on and has signal, it can be communicating — whether you’ve asked it to or not — with a wide variety of companies, many of which you won’t have any direct relationship with. And yes, this can happen even when you’re not using it. Your phone and other personal computing […]