Posts by Unique Wire

Cell Phone Data: The Blame Game

Today, about everyone has a cell phone always on them. While everyone can agree that cell phones are very useful to have, not many realize the ways in which their cell phone can help them protect their freedom. Let’s look at a case involving a minor car accident where cell phone and cell tower data came into play. 

Read More

Cell Phone Data: Knowledge Is Power

Cell phones have become increasingly ingrained in everyone’s day-to-day life. Unfortunately, with technology advancing at such a rapid pace, it is making it increasingly difficult for those in the criminal justice field to stay on top of technological advancements while staying focused on the pursuit of justice. While cell phones contain a great amount of data, they also contain fundamentally different data that can change the outcome of a court case.  

Read More

Hacker Framing: Welcome to the Neighborhood

Hacking is a topic that nearly everyone is aware of, but few truly grasp the risks and dangers associated with it. In fact, by 2023, there are expected to be over three times more networked devices on Earth than there are humans who populate it; meaning there is three times the number of devices whose data needs protecting. Unfortunately, the more devices one has, the more opportunities criminals have to steal your information. Let’s look at a hypothetical hacking case, where John Doe’s neighbor turned out to be a neighbor from hell. 

Read More

Hacking: Behind the Scenes, Behind the Act

Hacking, or hacker framing, is when a hacker gains unauthorized access to your devices with plans to facilitate criminal activity. In some cases, hackers go as far as planting incriminating evidence on the victim’s device, like a cell phone or laptop, to be used against them later in court. In fact, 1 out of every 36 cell phones had “high-risk” apps on their phones making them more susceptible to being hacked. With technology advancing at a rapid rate, it can be difficult for the average person to stay vigilant against criminals and their convincing dupes. When it comes to hacking, it is always better to be safe than sorry. 

Read More

Cell Phone Trafficking: Oh Tech You Didn't

Cell phone trafficking has caused a considerable amount of harm to consumers and the wireless industry. Wireless carriers are being forced to raise the prices of their cell phones in order to offset the losses incurred from criminals trafficking cell phones. In turn, legitimate customers are turning to the black market because they cannot afford to pay for the phone through a reliable source. Hackers have made this crime possible to commit and have undoubtedly aided in the proliferation of this crime. Let us look at a theoretical case involving two technology companies and the jailbreaking of phones. 

Read More

Trafficking of Cell Phones: The More You Know

Every day, more and more people are finding the conveniences of having advanced technology at their fingertips wherever they go and are embracing them. Unfortunately, while technological advances do make day-to-day life easier, it also increases the susceptibility to being a victim of crime. Cell phone trafficking is where criminals unlock or jailbreak phones in order to sell them at a higher value on the streets or the black market. Many consumers do not realize the dangers that come with purchasing an unlocked or jailbroken phone, and one day it may cost them more than they bargained for. 

Read More

Ransomware: The Dupe That Succeeded

The number of ransomware attacks on businesses and organizations is increasing exponentially, but cyber security education unfortunately is not. And it is because of this lack of cyber security education that many businesses and organizations fall victim to these kinds of cyber-attacks. In fact, according to PurpleSec, 36% of ransomware deployments were due to a lack of security training, with 61% of reported attacks in 2019 being on educational organizations. Let’s look at a theoretical case of ransomware on an adjunct professor at a local university. 

Read More