❌

Normal view

The Constitutionality of Geofence Warrants

27 January 2026 at 13:01

The US Supreme Court is considering the constitutionality of geofence warrants.

The case centers on the trial of Okello Chatrie, a Virginia man who pleaded guilty to a 2019 robbery outside of Richmond and was sentenced to almost 12 years in prison for stealing $195,000 at gunpoint.

Police probing the crime found security camera footage showing a man on a cell phone near the credit union that was robbed and asked Google to produce anonymized location data near the robbery site so they could determine who committed the crime. They did so, providing police with subscriber data for three people, one of whom was Chatrie. Police then searched Chatrie’s home and allegedly surfaced a gun, almost $100,000 in cash and incriminating notes.

Chatrie’s appeal challenges the constitutionality of geofence warrants, arguing that they violate individuals’ Fourth Amendment rights protecting against unreasonable searches.

A Cyberattack Was Part of the US Assault on Venezuela

6 January 2026 at 17:08

We don’t have many details:

President Donald Trump suggested Saturday that the U.S. used cyberattacks or other technical capabilities to cut power off in Caracas during strikes on the Venezuelan capital that led to the capture of Venezuelan President NicolΓ‘s Maduro.

If true, it would mark one of the most public uses of U.S. cyber power against another nation in recent memory. These operations are typically highly classified, and the U.S. is considered one of the most advanced nations in cyberspace operations globally.

β€˜Mortified’ OBR chair hopes inquiry into budget leak will report next week

Reuters news agency says it obtained document after visiting URL it predicted file would be uploaded to

The chair of the Office for Budget Responsibility has said he felt mortified by the early release of its budget forecasts as the watchdog launched a rapid inquiry into how it had β€œinadvertently made it possible” to see the documents.

Richard Hughes said he had written to the chancellor, Rachel Reeves, and the chair of the Treasury select committee, Meg Hillier, to apologise.

Continue reading...

Β© Photograph: Kirsty O’Connor/Treasury

Β© Photograph: Kirsty O’Connor/Treasury

Β© Photograph: Kirsty O’Connor/Treasury

Starmer to unveil digital ID cards in plan set to ignite civil liberties row

β€˜Brit card’ already facing opposition from privacy campaigners as government looks for ways to tackle illegal immigration

All working adults will need digital ID cards under plans to be announced by Keir Starmer, in a move that will spark a battle with civil liberties campaigners.

The prime minister will set out the measures on Friday at a conference on how progressive politicians can tackle the problems facing the UK, including addressing voter concerns around immigration.

Continue reading...

Β© Photograph: Alberto Pezzali/AP

Β© Photograph: Alberto Pezzali/AP

Β© Photograph: Alberto Pezzali/AP

UK β€˜woefully’ unprepared for Chinese and Russian undersea cable sabotage, says report

CSRI finds China and Russia may be coordinating β€˜grey zone’ tactics against vulnerable western infrastructure

China and Russia are stepping up sabotage operations targeting undersea cables and the UK is unprepared to meet the mounting threat, according to new analysis.

A report by the China Strategic Risks Institute (CSRI) analysed 12 incidents in which national authorities had investigated alleged undersea cable sabotage between January 2021 and April 2025. Of the 10 cases in which a suspect vessel was identified, eight were directly linked to China or Russia through flag-state registration or company ownership.

Continue reading...

Β© Photograph: John Leicester/AP

Β© Photograph: John Leicester/AP

Β© Photograph: John Leicester/AP

Podcast: Passwords: You Are the Weakest Link

Why are companies still recommending an 8-character password minimum?Β  Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment.Β Multiple service providers recommend […]

The post Podcast: Passwords: You Are the Weakest Link appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

Webcast: Passwords: You Are the Weakest Link

Why are companies still recommending an 8-character password minimum?Β  Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment.Β Multiple service providers recommend […]

The post Webcast: Passwords: You Are the Weakest Link appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

Passwords: Our First Line of Defense

By: BHIS
3 December 2019 at 18:36

Darin Roberts // β€œWhy do you recommend a 15-character password policy when (name your favorite policy here) recommends only 8-character minimum passwords?” I have had this question posed to me […]

The post Passwords: Our First Line of Defense appeared first on Black Hills Information Security, Inc..

Webcast: Implementing Sysmon and Applocker

By: BHIS
30 August 2019 at 18:43

Click on the timecodes to jump to that part of the video (on YouTube) Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_ImplementingSysmonAppLocker.pdf 5:03 Introduction, problem statement, and executive problem […]

The post Webcast: Implementing Sysmon and Applocker appeared first on Black Hills Information Security, Inc..

WEBCAST: Blue Team-Apalooza

By: BHIS
15 November 2018 at 17:57

Kent Ickler & Jordan Drysdale // Preface We had a sysadmin and security professional β€œAA” meeting on November 8, 2018. We met and discussed things that seem to be painfully […]

The post WEBCAST: Blue Team-Apalooza appeared first on Black Hills Information Security, Inc..

Finding: Weak Password Policy

David Fletcher// The weak password policy finding is typically an indicator of one of two conditions during a test: A password could be easily guessed using standard authentication mechanisms. A […]

The post Finding: Weak Password Policy appeared first on Black Hills Information Security, Inc..

How To Fix a Missing Referrer-Policy on a Website

Kent Ickler // Referrer-Policy, What-What? Referrer-PolicyΒ is a security header that can (and should) be included on communication from your website’s server to a client. The Referrer-Policy tells the web browser […]

The post How To Fix a Missing Referrer-Policy on a Website appeared first on Black Hills Information Security, Inc..

❌