A public school district is under scrutiny for a "fundamental misunderstanding" of students' constitutional rights by overly restricting what they can do with technology and the Internet, according to the Electronic Frontier Foundation and the American Civil Liberties Union.
A years-long "game" of stealing and trading nude photos from suspects' cell phones has come to an end for several California Highway Patrol (CHP) officers, who have been accused of misconduct.
Several options may be available to law enforcement officials concerned that recent actions by companies to protect and encrypt data on smartphones and other mobile devices could impact their investigations, according to a recent Congressional Research Service brief.
The Chilean government has blocked some 18,000 public transportation cards after detecting that transit users fraudulently added money to the cards with an Android-based application.
The Justice Department said it will review whether a Drug Enforcement Administration agent went too far when he used photographs and other personal information taken from a woman's cell phone to set up a fake Facebook account as part of an investigation.
Sen. Al Franken (D-Minn.), who has championed legislation to ban mobile apps that enable one person to spy on or stalk another, is urging the Justice Department to step up its efforts against such technology.
The State Department is trying to satisfy demands for instantaneous mobile communications in every setting and provide more access to classified and sensitive networks at its facilities – priorities that can be at odds and impossible to do all the time, said a high-ranking departmental official.
Police use of a device that lets officers zero in on the location of cellphones – and thereby persons of interest or suspects – is being kept under wraps by the FBI, according to a document released last month through a Freedom of Information Act request.
FBI Director James Comey has criticized Apple and Google for saying they would not give law enforcement officials access to their customers' smartphones even if they wanted to because those devices will be encrypted.
The National Institute of Standards and Technology issued the second draft of a "building block" document federal agencies or enterprises could use to secure mobile devices that connect to the organization's network. The guide is customizable, as it takes a layered approach to security, and also practical and repeatable because it offers standards-based solutions using commercially available technology.