<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>secret service &#8211; EFR Technology Group</title>
	<atom:link href="https://www.efrtechgroup.com/category/secret-service/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.efrtechgroup.com</link>
	<description>We maintain technology so you don't have to!</description>
	<lastBuildDate>Mon, 17 Aug 2020 16:55:31 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.efrtechgroup.com/wp-content/uploads/2019/02/cropped-EFRTG-color-2-32x32.jpg</url>
	<title>secret service &#8211; EFR Technology Group</title>
	<link>https://www.efrtechgroup.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Secret Service bought location data pulled from common apps</title>
		<link>https://www.efrtechgroup.com/tech/secret-service-bought-location-data-pulled-from-common-apps/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Mon, 17 Aug 2020 16:55:31 +0000</pubDate>
				<category><![CDATA[agency]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[babel street]]></category>
		<category><![CDATA[cell phone]]></category>
		<category><![CDATA[contract]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[federal]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<category><![CDATA[locate x]]></category>
		<category><![CDATA[location data]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[ron wyden]]></category>
		<category><![CDATA[secret service]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[us]]></category>
		<category><![CDATA[warrantless]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/secret-service-bought-location-data-pulled-from-common-apps/</guid>

					<description><![CDATA[[ad_1] With Locate X, an agency like the Secret Service could, for instance, create a geo-fence around a crime scene. It could then identify mobile devices that were in that area prior to the crime and see where those devices traveled before or after the incident. Police took that approach following a burglary in 2019, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>With Locate X, an agency like the Secret Service could, for instance, create a geo-fence around a crime scene. It could then identify mobile devices that were in that area prior to the crime and see where those devices traveled before or after the incident. Police took that approach following a burglary in 2019, and they ended up <a href="https://www.engadget.com/2020-03-08-google-location-data-embroils-innocent-cyclist.html">investigating an innocent cyclist</a> based on his <a href="https://www.engadget.com/2016-02-12-runkeeper-asics.html">RunKeeper</a> data. </p>
<p>In March, <em>Protocol</em> reported that <a href="https://www.protocol.com/government-buying-location-data" target="_blank" rel="noopener noreferrer">US Customs and Border Protection purchased Locate X</a>, and a former Babel Street employee told <em>Protocol</em> that the Secret Service and US Immigration and Customs Enforcement (ICE) were using the location-tracking tech. But <em>Motherboard</em> has the first confirmation that the Secret Service did in fact purchase Locate X. </p>
<p>This isn’t a new issue. Federal agents have reportedly been buying commercially-available cell phone location data <a href="https://www.engadget.com/2020-02-07-federal-agencies-buy-location-data-track-immigrants.html">to track immigrants</a> for years. A recent <a href="https://www.engadget.com/mobilewalla-data-broker-demographics-protests-214841548.html">report on Black Lives Matter protestors</a> released by Mobilewalla shows just how much info private companies can glean from smartphone apps.</p>
<p>It’s unclear how federal agencies get away with obtaining this info without a warrant. In 2018, the US Supreme Court ruled that law enforcement need a <a href="https://www.engadget.com/2018-06-22-supreme-court-ruling-requires-search-warrant-for-phone-location.html">warrant to perform cell phone tower searches</a>. But why bother when you have app data?</p>
<p>Senator Ron Wyden is reportedly planning legislation to block law enforcement from purchasing products like Locate X.</p>
<p>“It is clear that multiple federal agencies have turned to purchasing Americans’ data to buy their way around Americans’ Fourth Amendment Rights. I’m drafting legislation to close this loophole, and ensure the Fourth Amendment isn’t for sale,” Wyden said in a statement provided to <em>Motherboard</em>.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/secret-service-bought-location-data-locate-x-165531624.html">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alleged Twitter hacker was previously caught stealing a fortune in Bitcoin</title>
		<link>https://www.efrtechgroup.com/tech/alleged-twitter-hacker-was-previously-caught-stealing-a-fortune-in-bitcoin/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Mon, 03 Aug 2020 14:02:34 +0000</pubDate>
				<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[graham ivan clark]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[secret service]]></category>
		<category><![CDATA[stole]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Twitter]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/alleged-twitter-hacker-was-previously-caught-stealing-a-fortune-in-bitcoin/</guid>

					<description><![CDATA[[ad_1] In April, the Secret Service seized 100 Bitcoins from Clark, NYT reports. Weeks later, Bennett received a letter explaining that the Secret Service had recovered 100 of his Bitcoins. The letter cited the same code assigned to the coins seized from Clark. A Secret Service agent told Bennett that the person with the stolen [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>In April, the Secret Service seized 100 Bitcoins from Clark, <em>NYT </em>reports. Weeks later, Bennett received a letter explaining that the Secret Service had recovered 100 of his Bitcoins. The letter cited the same code assigned to the coins seized from Clark. A Secret Service agent told Bennett that the person with the stolen Bitcoins was not arrested because he was a minor.</p>
<p>According to the <em>NYT</em>, less than two weeks after the Secret Service seized the 100 Bitcoins from Clark, he began working on <a href="https://www.engadget.com/twitter-bitcoin-scam-hack-013715592.html">the Twitter heist</a>.</p>
<p>It appears Clark got his start as a cybercriminal by duping fellow Minecraft players into buying names or digital capes that he never provided. His interests then expanded to Fortnite, cryptocurrency and online hacker forums. By the time Clark was arrested for last month’s Twitter hack, he was living in his own Tampa apartment, complete with an expensive gaming setup. Neighbors said he drove a white BMW 3 Series, and he appeared on Instagram with items like designer sneakers and a gem-encrusted Rolodex.</p>
<p>The full profile by the <em>New York Times</em> can be <a href="https://www.nytimes.com/2020/08/02/technology/florida-teenager-twitter-hack.html" target="_blank" rel="noopener noreferrer">found here</a>.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/twitter-hacker-graham-clark-stolen-bitcoin-140234512.html">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
