🦄 Social Control, Tech

Target Supremacy: What You Should Know About the 2013 Security Breach

Since Target Corporation’s massive hack in 2013, some significant information has come to light, like the fact that Target was extracting extremely sensitive information from millions of its own customers before it was compromised. Additionally, Target has invested heavily in mass surveillance technologies and policing,…

🦄 Tech

Locating Missing Persons Using Open-Source Intelligence at DEFCON 27

Las Vegas, NV – At DEFCON 27 in Las Vegas, Unicorn Riot spoke with the organizers of an event where participants were asked to find information on real missing people in a competition called Open-Source Intelligence (OSINT) Missing Persons Capture The Flag (CTF).

Many people…

🦄 Tech

Hacking LIDAR: Changing What Autonomous Vehicles See

Las Vegas, NV – In the near future, automobile manufacturers are expected to begin rolling out autonomous driving vehicles that use Light Detection and Ranging (LIDAR) lasers to see objects, roads, and people.

These driver-less vehicles will soon be cruising down every major city street,…

🦄 Tech

FBI Considered Espionage Act Charges Against WikiLeaks Over Declassified Files

In late 2011 and early 2012, the FBI considered Espionage Act charges on an alleged “WikiLeaks breach” in which “classified information may have been downloaded” according to a newly released document under a Freedom of Information Act (FOIA) request. The FBI “discovered”  that this “may…