Illinois Judge Says Law Enforcement Must Destroy Data. Privacy advocates recently won a victory against the unrestricted use of “stingray” cell-site emulators. On November 9th, Illinois judge Iain D. Johnston…
Cellular phones pose a security threat to every industry needing trade secrets, authorized-only areas and vulnerable infrastructure. The nuclear power sector is especially susceptible. Forget terrorists and international spying. Personal devices…
There has been a lot of buzz in the media about drivers texting or using social media apps behind the wheel, but the problem doesn’t stop when they get to…
The manhunt surrounding escaped New York prisoners David Sweat and Richard Matt may be over, but questions surrounding how they coordinated their escape still remain. According to other inmates at…
Cell phone detectors generally fall into two categories based on the method they use to locate the devices so there is no clear winner when you pit the two against…
Monitoring a suspect’s phone calls is an essential part of many criminal investigations, but tapping a wireless or landline phone requires a court order. Now law enforcement agencies have another…
Cell phones are a modern marvel, but they can also be a tremendous problem for any organization trying to enforce security or safeguard confidential information. The effects of contraband cell…
Some cell phone detectors use radio wave transmissions to locate contraband devices. They have a very long range, but if a phone isn’t actively transmitting the detector won’t pick…
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc dictum aliquet justo sit amet consectetur. In tempor lobortis ante vitae ornare. Praesent feugiat magna at tempor consequat. Aenean in iaculis libero, aliquam imperdiet mi.