There is a darker side to cybersecurity that’s regularly overlooked.

Simply as you have a whole market of people working to keep systems and networks safe from hazards, industrial foes are working to exploit them. We’re not talking about red-teamers, who work to ethically hack companies from within. We’re describing exploit markets that offer information of security vulnerabilities and the business spyware business that use those exploits to help governments and hackers spy on their targets.

These for-profit security companies flew under the radar for years, however have only recently got prestige. But now, they’re getting unwanted attention from U.S. legislators.

In this week’s Decrypted, we look at the innovations cops use versus the general public.


Secrecy over demonstration surveillance prompts require openness Recently we took a look at how the Justice Department approved the Drug Enforcement Administration brand-new powers to discreetly spy on protesters. That leaves a big question: What kind of surveillance do federal agencies have, and what takes place to people’s data once it is gathered?

While some surveillance is visible– from overhead drones and police helicopters overhead– others are stressed that police are utilizing less than obvious technologies, like facial recognition and access to phone records, CNBC reports. Lots of authorities departments around the U.S. also utilize “stingray” devices that spoof cell towers to trick cellular phone into turning over their call, message and area information.

Article curated by RJ Shara from Source. RJ Shara is a Bay Area Radio Host (Radio Jockey) who talks about the startup ecosystem – entrepreneurs, investments, policies and more on her show The Silicon Dreams. The show streams on Radio Zindagi 1170AM on Mondays from 3.30 PM to 4 PM.