Advanced Search
Content Type: Long Read
In the UK, successive government ministers and members of parliament have made emotive proclamations about the malaise of "public sector fraud".
This year, former Work and Pensions Secretary Therese Coffey said that the welfare system "is not a cash machine for callous criminals and it’s vital that the government ensures money is well spent...[and] fraud is an ever-present threat."
In 2013, the UK's minister for the disabled made numerous claims that there were "vast numbers of bogus disabled […
Content Type: Long Read
The pressing need to fix our cybersecurity (mis)understandings
Despite all the efforts made so far by different, cybersecurity remains a disputed concept. Some states are still approving cybersecurity laws as an excuse to increase their surveillance powers. Despite cybersecurity and cybercrime being different concepts, the confusion between them and the broad application of criminal statutes is still leading to the criminalise legitimate behaviour.
All of this represents a sizable challenge…
Content Type: Long Read
In this piece we examine mobile phone extraction, relying on publicly available information and Privacy International’s experience from conducting mobile phone extraction using a Cellebrite UFED Touch 2. We welcome input from experts in the field. This is a rapidly developing area. Just as new security features are announced for phones, so too new methods to extract data are found.
[All references can be found in the pdf version below.]
General explanation of mobile phone…