<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>agency &#8211; EFR Technology Group</title>
	<atom:link href="https://www.efrtechgroup.com/category/agency/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.efrtechgroup.com</link>
	<description>We maintain technology so you don't have to!</description>
	<lastBuildDate>Mon, 17 Aug 2020 16:55:31 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.efrtechgroup.com/wp-content/uploads/2019/02/cropped-EFRTG-color-2-32x32.jpg</url>
	<title>agency &#8211; EFR Technology Group</title>
	<link>https://www.efrtechgroup.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Secret Service bought location data pulled from common apps</title>
		<link>https://www.efrtechgroup.com/tech/secret-service-bought-location-data-pulled-from-common-apps/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Mon, 17 Aug 2020 16:55:31 +0000</pubDate>
				<category><![CDATA[agency]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[babel street]]></category>
		<category><![CDATA[cell phone]]></category>
		<category><![CDATA[contract]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[federal]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[locate x]]></category>
		<category><![CDATA[location data]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ron wyden]]></category>
		<category><![CDATA[secret service]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[us]]></category>
		<category><![CDATA[warrantless]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/secret-service-bought-location-data-pulled-from-common-apps/</guid>

					<description><![CDATA[[ad_1] With Locate X, an agency like the Secret Service could, for instance, create a geo-fence around a crime scene. It could then identify mobile devices that were in that area prior to the crime and see where those devices traveled before or after the incident. Police took that approach following a burglary in 2019, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>With Locate X, an agency like the Secret Service could, for instance, create a geo-fence around a crime scene. It could then identify mobile devices that were in that area prior to the crime and see where those devices traveled before or after the incident. Police took that approach following a burglary in 2019, and they ended up <a href="https://www.engadget.com/2020-03-08-google-location-data-embroils-innocent-cyclist.html">investigating an innocent cyclist</a> based on his <a href="https://www.engadget.com/2016-02-12-runkeeper-asics.html">RunKeeper</a> data. </p>
<p>In March, <em>Protocol</em> reported that <a href="https://www.protocol.com/government-buying-location-data" target="_blank" rel="noopener noreferrer">US Customs and Border Protection purchased Locate X</a>, and a former Babel Street employee told <em>Protocol</em> that the Secret Service and US Immigration and Customs Enforcement (ICE) were using the location-tracking tech. But <em>Motherboard</em> has the first confirmation that the Secret Service did in fact purchase Locate X. </p>
<p>This isn’t a new issue. Federal agents have reportedly been buying commercially-available cell phone location data <a href="https://www.engadget.com/2020-02-07-federal-agencies-buy-location-data-track-immigrants.html">to track immigrants</a> for years. A recent <a href="https://www.engadget.com/mobilewalla-data-broker-demographics-protests-214841548.html">report on Black Lives Matter protestors</a> released by Mobilewalla shows just how much info private companies can glean from smartphone apps.</p>
<p>It’s unclear how federal agencies get away with obtaining this info without a warrant. In 2018, the US Supreme Court ruled that law enforcement need a <a href="https://www.engadget.com/2018-06-22-supreme-court-ruling-requires-search-warrant-for-phone-location.html">warrant to perform cell phone tower searches</a>. But why bother when you have app data?</p>
<p>Senator Ron Wyden is reportedly planning legislation to block law enforcement from purchasing products like Locate X.</p>
<p>“It is clear that multiple federal agencies have turned to purchasing Americans’ data to buy their way around Americans’ Fourth Amendment Rights. I’m drafting legislation to close this loophole, and ensure the Fourth Amendment isn’t for sale,” Wyden said in a statement provided to <em>Motherboard</em>.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/secret-service-bought-location-data-locate-x-165531624.html">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Government hackers reportedly broke into Russian search company Yandex</title>
		<link>https://www.efrtechgroup.com/tech/government-hackers-reportedly-broke-into-russian-search-company-yandex/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Fri, 28 Jun 2019 14:27:00 +0000</pubDate>
				<category><![CDATA[agency]]></category>
		<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[five eyes]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[reign]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[spy]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[tomorrow]]></category>
		<category><![CDATA[user accounts]]></category>
		<category><![CDATA[western intelligence]]></category>
		<category><![CDATA[yandex]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/government-hackers-reportedly-broke-into-russian-search-company-yandex/</guid>

					<description><![CDATA[[ad_1] In the fall of 2018, the hackers deployed a type of malware called Reign, which is linked to &#8220;Five Eyes,&#8221; an intelligence-sharing alliance comprised of the US, Britain, Australia, New Zealand and Canada. It&#8217;s unclear which of those countries might be behind the breach, though. A Yandex spokesperson told Reuters that the hack was [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>In the fall of 2018, the hackers deployed a type of malware called Reign, which is linked to <a href="https://www.engadget.com/2018/09/03/five-eyes-countries-anti-encryption-policy/">&#8220;Five Eyes,&#8221;</a> an intelligence-sharing alliance comprised of the US, Britain, Australia, New Zealand and Canada. It&#8217;s unclear which of those countries might be behind the breach, though. A Yandex spokesperson told <em>Reuters</em> that the hack was detected early and that no user data was compromised, but <em>Reuters</em>&#8216; sources claim the hackers had access to Yandex&#8217;s research and development unit for at least several weeks.</p>
<p>As <em>Reuters</em>&#8216; notes, Western cyberattacks against Russia are rarely acknowledged, but earlier this month we learned that the <a href="https://www.engadget.com/2019/06/15/us-offensive-malware-in-russia-power-grid/">US planted malware</a> in Russia&#8217;s power grid. Last spring, a few months before the alleged Yandex hack, the US elevated its cyber warfare division and <a href="https://www.engadget.com/2018/05/05/us-elevates-role-of-cyber-command/">vowed to take a more aggressive approach</a> to online threats. Even the private company Jigsaw, an Alphabet subsidiary, experimented with <a href="https://www.engadget.com/2019/06/12/jigsaw-hired-russian-troll-disinformation-research/">hiring a Russian troll</a> just to see if it could. In those cases, some feared the US might <a href="https://www.engadget.com/2019/06/16/eu-accuses-russia-of-election-interference-campaign/">provoke more digital aggression from Russia</a>. This Yandex breach could add to those fears.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/06/28/western-intelligence-hackers-russia-yandex/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
