Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Google records device locations
- This topic has 1 reply, 1 voice, and was last updated 1 year, 3 months ago by .
-
Topic
-
Google saves the location data from your mobile devices. Data from 2018 from a nine-hour window of time from an approximate total of 1500 phones was recovered recently by “Federal investigators” in attempt to solve somewhat old, unsolved arson cases.
“The two warrants Forbes obtained together covered about nine hours’ worth of activity within 29,400 square meters—an area a smidge larger than an average Milwaukee city block. ”
I personally find it shocking that this was possible.
You must be logged in to reply to this topic.