Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Cybercrime

UK – Secure sanitisation and disposal of storage media

How to ensure data cannot be recovered from electronic storage media. In this guidance

  1. What is electronic storage media?
  2. What is sanitisation?
  3. Before you sanitise
  4. Preparing ESM for re-use
  5. Disposing of ESM

This guidance is for organisations who need to ensure that data held on electronic storage media can’t be read by unauthorised parties after it has left organisational control. It will help organisations to protect data from being read by standard users with access to commercially available data-recovery tools, or by using forensic services. This is based on the protections proportionate for OFFICIAL data, as described in the Government Security Classifications Policy’s threat model.

Cybersecurity Experts Warn of DeepSeek Vulnerabilities as Governments Ban App

Gizmodo: “A cybersecurity company is warning businesses and organizations not to use a popular app from the generative AI company DeepSeek, saying that the program contains a number of security vulnerabilities that could compromise users’ data. The DeepSeek app, which shocked the stock market when it moved to the top of the Apple App Store… Continue Reading

Elon Musk’s AI Fueled War on Human Agency

The New Yorker [unpaywalled]: “…To run his agency [DOGE], Musk brought on a group of tech-company managers and inexperienced twentysomethings whose credentials included internships at SpaceX. We watched as this crew began interrogating federal employees about their jobs, interfering with the system that controls payments at the Treasury Department, and trawling government budgets while Musk… Continue Reading

Musk associates access confidential info about X’s competitors via CFPB takeover

Musk Watch and Bloomberg – “Just nine days before his DOGE team visited CFPB, Musk’s X — the former Twitter — announced that it had struck a deal with Visa to process peer-to-peer payments. Musk has publicly mused about expanding into payment-services since he first took control of X in 2022. Entering that business could… Continue Reading

NSA can track powered-down phones: how to actually protect your privacy

BoingBoing – Ellsworth Toohey: “Yesterday I wrote about Privacy Guide’s mobile phone privacy and security guide for protesters. Today, Randy Zar, CEO of Faraday pouch manufacturer SLNT wrote: “Just want to let you know your cell phone is tracking you regardless if you have it in airplane mode or not.  It even ping’s when it’s… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, February 8, 2025

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, February 8, 2025 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on… Continue Reading

Project 2025 Executive Action Tracker

“The Center for Progressive Reform and Governing for Impact are monitoring the Trump administration’s implementation of Project 2025, tracking the authoritarian blueprint’s executive action proposals across 20 federal agencies. The Heritage Foundation’s Project 2025 is the conservative movement’s blueprint for weakening our government and building an authoritarian presidency. To monitor the Trump administration’s regulatory and… Continue Reading

DOGE Emails Went Out to Federal Judges by Mistake

As if we have not been in a lessons not learned class since noon on January 20, 2025 today Newsweek reported: “One of the people who received an email from allies of Elon Musk was a federal judge overseeing a lawsuit aimed at blocking these messages. “I, like probably every other judge in the country,… Continue Reading

Time to Delete? The Most Invasive Apps List Includes Some of Your Favorites

PC Mag: “The apps on your phone know way too much about you. I’ll tell you which apps collect the most data and offer suggestions for locking down your private information. Everyone wants your data. And why not? There’s a lot of money in selling or sharing the information apps collect about you. App companies… Continue Reading

Pete Recommends – Weekly highlights on cyber security issues, February 1, 2025

Via LLRX – Pete Recommends – Weekly highlights on cyber security issues, February 1, 2025 – Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the… Continue Reading

Using Tails When Your World Doesn’t Feel Safe Anymore

Privacy Guides: “There is a growing number of people who no longer feel safe in their own home or country. Whatever the reason, many people might not feel safe to browse certain topics online. With all the information getting collected for each internet search, it is difficult to access sometime vital information without leaving a… Continue Reading