Welcome! What is up with the Popularity of these Geofence Warrants -- Lazy Investigators!plus more on Tech Talk with Craig Peterson on WGAN
Craig Peterson - America's Leading Technology News Commentator
Release Date: 09/11/2020
Craig Peterson - America's Leading Technology News Commentator
In this eye-opening podcast episode, we dive into the world of online safety and debunk the top myths that surround it. Join us as we separate fact from fiction and provide practical tips to enhance digital security. Key Points Discussed: The Role of Antivirus Software: Separating Fact from Fiction Discover why antivirus software isn't always necessary, as we delve into the capabilities of Windows Defender and its ability to provide adequate protection. Moving Beyond Caution: Preventing Hacking and Breaches Understand why being cautious alone isn't enough to prevent hacking and learn...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Are you tired of browsing through endless options for anti-virus software? We've got you covered! In this episode, we're diving into the world of PC protection and revealing our top recommendations to keep your system safe from malware and viruses. Our first choice, and top pick, is Windows Defender. Not only does it offer exceptional protection against threats, but it comes at an unbeatable price—free! Enable it effortlessly and enjoy the peace of mind you get from knowing your system is safeguarded. Plus, lifetime updates and support are included at no additional cost. It's a win-win! If...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Are you aware of the invisible threat of social engineering that can compromise your personal and professional security? Cybercriminals are using cunning manipulations to exploit human vulnerabilities and gain access to sensitive information. But don't worry; there are practical ways to protect yourself from these attacks. We have published a must-read article that provides invaluable insights and guidance on how to avoid social engineering attacks. From phishing scams to physical impersonation, the article delves into the inner workings of these attacks and offers concrete strategies to...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Do you ever feel like someone is watching you as you browse the internet? With so much personal data at stake, it's no wonder that online privacy has become a hot-button issue. Luckily, there's a new player in town: privacy-focused search engines. These search engines are prioritizing user privacy and security by shaking up the online landscape. No longer will your personal information be sold to the highest bidder or your browsing history used against you. With privacy-focused search engines, you can rest easy knowing that your online activities are shielded from prying eyes. But how do they...
info_outlineCraig Peterson - America's Leading Technology News Commentator
In this episode, we will discuss zero-day vulnerabilities and how they can affect everyone. A zero-day vulnerability is an exploit that has been discovered but not yet fixed by a software vendor. It's essentially a security hole in software that hasn't been patched yet. These vulnerabilities can range from minor to critical, depending on how long the vendor can patch them. These are so dangerous because hackers can take advantage of them before they're patched. They can use these vulnerabilities to infect your computer with malware or ransomware, steal your data, or even take control of your...
info_outlineCraig Peterson - America's Leading Technology News Commentator
In today's fast-paced, technology-driven world, it is crucial for computer users to stay informed about the latest updates and security measures for their systems. For Windows users, automatic updates are a common method of ensuring their devices remain up-to-date and protected against various threats. While these updates are essential for maintaining a secure and smoothly operating system, they can also introduce unexpected problems, such as data loss, system instability, and other unwelcome changes. This podcast aims to shed light on the hidden dangers of automatic Windows updates and...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Which patches are critical? When do they really need to be applied? That’s where our new PatchAware™ features come in. We’re monitoring the thousands of patches that are issued every week, and will tell you which patches are the most critical to install right now. This week’s tip, 9 years after it was discovered, is the “Heartbleed” bug. It is still one of the most significant threats to online security. It gives the bad guys access to sensitive information from affected systems. This article highlights the importance of upgrading software and keeping it up-to-date with...
info_outlineCraig Peterson - America's Leading Technology News Commentator
First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses, phone numbers, email addresses, and even passwords. Cybercriminals are constantly searching for vulnerabilities in systems where this information is stored, and unfortunately, they often find them. However, there are steps we can take to protect ourselves. One tool that can help is called "haveibeenpwned." It's a website where you can check if your email address has been compromised in any data breaches. If it has been compromised,...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Welcome to this week's episode of The AI Revolution! In this episode, join us as we explore the world of Artificial Intelligence and its potential to revolutionize business and life. We'll discuss how to use AI for free, what it can do well, and when and where you should never use it. We'll also talk about how to generate emails, blog posts, and content for Facebook, Twitter, LinkedIn, Instagram, and YouTube live! Tune in now to learn more about how AI is transforming the world. Discover the Secrets of Internet Anonymity and Protect Your Privacy The best way to protect yourself from...
info_outlineCraig Peterson - America's Leading Technology News Commentator
Cyber security is no longer an option for small business owners – it's a necessity. Cyber threats are rising, and small businesses must stay ahead of the curve to protect their data and networks from malicious actors. This show will uncover the most dangerous cyber threats to small businesses and what steps you can take to stay secure. Ransomware Attacks Ransomware attacks are one of the most dangerous cyber threats to small businesses. Ransomware is malicious software (malware) that's typically delivered via malicious links or email attachments. Once installed on a network, the...
info_outlineWelcome!
Craig discusses geofence warrants and why they are so popular with law enforcement investigators. Has the court seen enough? Listen in to find out.
For more tech tips, news, and updates visit - CraigPeterson.com
---
Read More:
iOS 13.7 launched today with a new system for battling the pandemic
Hackers are exploiting a critical flaw affecting >350,000 WordPress sites
The accidental notary: Apple approves notorious malware to run on Macs
Most IoT Hardware Dangerously Easy to Crack
55% of Cybersquatted Domains are Malicious or Potentially Fraudulent
Feds Can’t Ask Google for Every Phone in a 100-meter Radius, Court Says
The Hidden Cost of Losing Security Talent
---
Automated Machine-Generated Transcript:
Craig Peterson: [00:00:00] Welcome back everybody. The fed had been out there using stingrays and other devices to watch where you're at. We're going to talk about that right now, and a new core ruling against the feds for some of the stuff they've been doing to spy.
We're not just talking about spying on the bad guys. This isn't a FISA court thing. This is in fact, the feds taking the lazy way out. So think about you. If you were a police officer trying to investigate a crime, what's the easiest way for you to figure out who was in the area when a bank was robbed?
Okay. I'm going to give you one second. What's the easiest way. it turns out that apparently the easiest way is to just send a letter to Google asking them for information about every phone within a 100-meter radius of where a suspected crime occurred.
Now, isn't that an interesting thing, right? Isn't that an interesting way to do it?
You might say, I've got an iPhone I don't have Google. So they're not going to be able to give that information to the fed. Do you have any Google apps on your phone that might be keeping track of your location? Things like, oh, I don't know. Google maps for instance.
That could be a bit of a problem because federal courts in the Chicago area have now rejected government warrant applications three times. The government has applied for a warrant to force Google to produce a list of smartphones that were near a couple of places where the feds thought that crimes might have occurred, during the specified 45-minute intervals.
Now, this recent ruling was handed down just last week and was recently made public and ARS Technica is talking about this. Now the numbers are frankly, striking here because these decisions really haven't significant impact. Google has reported. The growth in the law enforcement use of what are being called geo-fence searches.
Are you familiar with geofencing? On your Android or your iPhone you can say, Hey, I'm on my to-do list here. I got a pickup toilet paper when I get near the grocery store because we all know there's no toilet paper in grocery stores. So when you drive by the grocery store, you can have a little, geofence set up on your phone that says, Hey, remember you got to get toilet paper. Then you can run to the grocery store, pick up your toilet paper, and be on your way.
Geo-fencing when we're talking about these types of searches means a little bit different, but almost the same. That is Google gets or Apple gets a demand from the police, a warrant, that says, tell me about every phone that was within again, a hundred meters, 300 feet of this business of this area during this 45 minute period.
Now, what we're seeing here is a 1500% increase in these types of warrants between 2017 and 2018. And then it jumped up again. Another 600%. percentages don't mean much unless you have the raw numbers. Let me give you the raw numbers. Google says that they received 180 geofence search requests a week.
During 2019, that kinda adds up. At least I think it adds up. So let me see 180 a week. And let's just say there are 52 weeks in a year. Oh my gosh. That's almost 10,000 of these warrants that Google has to respond to every day. And if we say 180 a week and we divided by, Oh, I don't know. let's say the police work seven days a week.
That means 25 warrants per day, almost 26 warrants per day. So that's a couple of full-time people just to respond to these. Of course, it also has to go over to the legal side and everything else. It gets to be a real problem. Google is a very popular target for these warns because almost everyone uses Google products in one way or another.
Think of our cars, how many of our cars have Android in them? How many of them are using Google maps? How many of our cars have GPS on them? All of that is being tracked by Google. Yes, indeed. Android controls a majority of the smartphone market right now. As I mentioned earlier, even those of us who have I-phones might be using Gmail or Google maps.
So this is going to be an ongoing problem. I think it needs to be solved at a bit of a higher level than just district courts in various States out there. now for years, the. Police have gone after the cell phone companies to ask where a phone was that the whole idea of a tower location. What will happen is, am I trying to triangulate you more frequently? However, all of the phone companies will have is just data that you were connected to this cell tower, which means you, it was probably the closest cell tower to you because that's the idea, right? You'll hop between the South towers, depending on which one is the strongest. This is a kind of a Dragnet approach. Something I do not approve of and many courts don't approve of just because it makes it easier for the police doesn't mean it's constitutional. In one case last year, Google was required to hand over information on almost 1500 users to federal investigators, working on a Wisconsin arson case.
We've also seen. Cases where a guy was running his bicycle back and forth on this back street. Not like he was right in front of one house, but he got nailed because he was on that street at the wrong time. Although ultimately they figured out he had nothing to do with the crime, so they just turned his life upside down.
So we'll see what happens. This Chicago case apparently is being, appealed, and if the appeal goes through, it could place new limits on these broad government data requests, which I think is ultimately a pretty good deal. By the way, what were they investigating? it turns out they're investigating a case where there were stolen pharmaceuticals, apparently sold on the black market and investigators believe that the bad guys stole the pharmaceuticals from this drug store or a clinic, and then traveled to another one to ship them to customers like a FedEx or ups stores. So to help them investigate, the suspect, the investigators asked Google for data about every smartphone that was near either this drug store or the medical clinic or FedEx or ups during a particular 45-minute window, one window, the first location, two windows on different days of the second. So the application was rejected. It was said to be too broad. The government narrowed its request too much narrower areas right around the buildings, but the courts rejected them all.
The court said none of them complied with the Fourth Amendment's requirement that warrant particularly described the persons or things to be seized. Interesting. Very interesting. I know. What do you think about this? these all persons warrants are generally considered to be unconstitutional that's part of the reason we have the fourth amendment because the King was issuing these very vague big in the general warrant, the gave his military officers, governors and others, the ability to just go in and harass anybody they basically wanted to. So I tend to agree with the courts on this one. Sometimes, I disagree sometimes I agree, but then, in order to really justify this kind of a geo-fence search the government, according to this judge needs to show that everyone in the geofenced areas likely to be involved in the crime.
So how does this work when we're talking about these domestic terrorists that are burning down, buildings, cars dragging people from cars, beating them. Are we going to see these types of cases, as well as the geofence? Ultimately we will see. But again, it's another reason.
Not only do the bad guys have apps that are attracting you. And I talk about those a lot, but the good guys are too. And. They might just upturn your life for what turns out to be not particularly good reason and something that's probably against the fourth amendment.
Alright. When we come back, we're going to talk about a business problem right now, and that has to do with it. Security person, now there's a huge shortage, but what's the cost. When you lose the security person, you're listening to Craig Peterson, WGAN.
Stick around. Cause we'll be right back.
---
More stories and tech updates at:
Don't miss an episode from Craig. Subscribe and give us a rating:
Follow me on Twitter for the latest in tech at:
For questions, call or text:
855-385-5553