Researchers were able to use beer rating app Untappd to track the location history of military and CIA personnel.
Examples of users that can be tracked this way include a U.S. drone pilot, along with a list of both domestic and overseas military bases he has visited, a naval officer, who checked in at the beach next to Guantanamo’s bay detention center as well as several times at the Pentagon, and a senior intelligence officer with over seven thousand check-ins, domestic and abroad. Senior officials at the U.S. Department of Defense and the U.S. Air Force are included as well.
Not even the CIA is safe against the data industrial complex.
William H. Webster, a former director of both the FBI and CIA, foiled a phone scammer who threatened him and his wife.
Over a number of weeks, Thomas, calling himself David Morgan, made a series of calls to the Websters, and they soon turned threatening: he described their house, and he said that if they didn’t hand over $6,000, he’d shoot them in the head or burn their house down, boasting that the FBI and CIA would never find him.
Can you imagine the look on that guy’s face when he learned who he threatened?
The CIA’s years-old Cherry Blossom surveillance hacks target lots of WiFi routers, but not Apple’s AirPort Basestations.
Apple may have patched most of the security flaws that Wikileaks revealed the CIA is exploiting, but not all of them. Apple has been scrambling trying to learn more about the remaining exploits and it looks like the help it needs is coming directly from Wikileaks. The organization said it plans to share everything it knows about the hacks with Apple, and it’s going to do the same for other tech companies the CIA targeted, too.
According to the Wikileaks Vault 7 information dump, the CIA has been hard at work developing hacks to get into the data on our iPhones. Most of the exploits listed in the report, however, are already patched and Apple is working on taking care of the remaining few.
Now that we’re thinking about privacy and the security of our computers and mobile devices again, we’re worried about encrypting email. Jeff Butts is here to set your mind at ease that email encryption is alive and well, and surprisingly easy to do on the Mac.
Bob LeVitus joins Bryan and Jeff to talk about his new book, Working Smarter for Mac Users. They talk about why Bob wrote it and the things Bryan learned from editing it. They also talk about the CIA iPhone hacks leaked to Wikileaks and the home automation hub they wish they could buy.