Video

Play Video

Podcast

LISTEN ON

Facebook
Twitter
LinkedIn
Email
Skype
WhatsApp
Telegram

Episode 49

Stalkerware is a term now in use officially recognized as a thing. Scary but there are tricks and thing i discuss in the cast that others don’t talk about.

Dealing With Stalkers Stalkerware And Location Tracking Avoidance

Every day Big Tech and Mass Media make it hard to find out what is going on with the internet. The suppression of information is a danger to all of us.  Social media attempts to shape news and information by over-amplification of disinformation. This podcast hope to give information and provide insights from 
 
 

Join our community!!
Subscribe to the Insecurity Brief podcast now on every platform we can find

Follow me on Twitter

@trip_elix

 

 

Hi, we’re Red Pocket Mobile

Get the same great wireless coverage you’re used to – for a lot less.

https://www.redpocket.com/?rfsn=6236351.bbd511

Vehicle Sightings Reports and License Plate Recognition

Easily access the travel history and last known locations of road-bound vehicles in the United States, when available, with direct access via TLOxp®. What’s more, you can plot multiple sightings for the same vehicle on a single user-friendly map — an innovative way to draw meaningful insights with far less effort. Be sure to add this breakthrough search to your list of investigative tools.

https://www.tlo.com/vehicle-sightings

What is stalkerware?

Stalkerware refers to tools – software programs, apps and devices – that enable someone to secretly spy on another person’s private life via their mobile device. The abuser can remotely monitor the whole device including web searches, geolocation, text messages, photos, voice calls and much more. Such programs are easy to buy and install. They run hidden in the background, without the affected person knowing or giving their consent. Regardless of stalkerware’s availability, the abuser is accountable for using it as a tool and hence for committing this crime.

Resources

Clinic to End Tech Abuse


This page provides a collection of materials, tools, and resources that we have created to help IPV survivors, support workers, and technologists discover and address tech-related risks.

https://www.ceta.tech.cornell.edu/resources

Search

Trip's Books

Subscribe to

The Insecurity Brief
RadioPublic Podcasts
Pocket Casts Podcasts
Breaker Podcasts
Soundcloud Podcasts
IHeart Podcasts
Rss Feed
Subscribe via Email

About The Host

Trip Elix

Trip Elix is an author, podcaster and video personality Over the last 30 years, he has worked as a security analyst and privately as a consultant, investigator, forensic technician, and skip tracer. He is the author of books and gives talks on security and privacy.

You May Also Like

Copy & Paste Exploit
How To Tell If Your Device Has A Virus
Chinese Propaganda Targets Redefining Democracy Uses Bots To Spread Message