• Home
  • About
  • Contact
  • Advertising
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Education
  • Advertising
Latest
  • 20 May 2022 | Telecoms, Bribes and South Korea’s President: Part 2
  • 19 May 2022 | How STC Evolved from Reporting Assurance to Finance Assurance
  • 18 May 2022 | Cities of Gold or the Final Meltdown? Nobody Can Predict the Future of Bitcoin
  • 17 May 2022 | Zimbabwean Government Keeps Crushing Mobile Money
  • 16 May 2022 | Why Massive Political Bias in Email Spam Algorithms Is Problematic for Free Speech More Generally
  • 13 May 2022 | Telecoms, Bribes and South Korea’s President
  • 12 May 2022 | EU Flirts with Ending Net Neutrality to Squeeze Money for European Telcos from US Big Tech
  • 11 May 2022 | New Callback Scam Is Based on Misleading Voicemails
  • 10 May 2022 | US Says No Need for Telcos to Pay $3.3mn Illegal Robocall Penalty If They Cannot Afford It
  • 9 May 2022 | Nigeria Issues RFQ for National Phone Tracking System to ‘Fight Cybercrime and Insecurity’
> Privacy & Intellectual Property

Nigeria Issues RFQ for National Phone Tracking System to ‘Fight Cybercrime and Insecurity’

By Eric Priezkalns 9 May 2022 Privacy & Intellectual Property

The national regulator will be able to monitor and block any device with an IMEI.


Concerns Raised about Evidence Gathered by Police Infiltration of Encrypted Crime Networks

By Eric Priezkalns 6 May 2022 Privacy & Intellectual Property

High-profile prosecutions in the Balkans may be at risk because evidence obtained from the Sky ECC app may be inadmissible.


Philippines President Rejects SIM Card Registration Law on Privacy Grounds

By Eric Priezkalns 22 Apr 2022 Privacy & Intellectual Property

President Rodrigo Duterte blocked a law supposed to reduce SIM swap fraud because it might also have infringed constitutional rights.


Tinder Dating App Used to Work around Russian Internet Censorship

By Eric Priezkalns 6 Apr 2022 Privacy & Intellectual Property

A Slovakian marketing agency is persuading Tinder users to tell the truth about war in Ukraine alongside messages of love to Russians.


The Hacker Who Stole a Telco’s Most Valuable Personal Data Without Using a Computer

By Eric Priezkalns 18 Mar 2022 Privacy & Intellectual Property

A 1980’s phreaker said she stole the phone numbers of LA celebrities by checking unlocked cabinets in the office of Pacific Bell.


NSO Group Sues Newspaper Over Claims Its Phone Spyware Was Abused by Israeli Police

By Eric Priezkalns 10 Mar 2022 Privacy & Intellectual Property

The notorious spyware firm disputes one technical detail in articles written by Tomer Gannon based on whistleblower testimony.


Indian Activist Challenges Police Use of Facial Recognition

By Eric Priezkalns 14 Feb 2022 Privacy & Intellectual Property

The police in Hyderabad want to connect 440,000 CCTV cameras to their facial recognition system.


Second Israeli Spyware Business Exploited iPhone Zero-Click Vulnerabilities

By Eric Priezkalns 9 Feb 2022 Privacy & Intellectual Property

QuaDream independently developed methods to install spyware using the same FORCEDENTRY vulnerability as NSO Group.


The FBI Purchased Pegasus Phone Spyware

By Eric Priezkalns 3 Feb 2022 Privacy & Intellectual Property

After two years of evaluation, the US Federal Bureau of Investigation decided against using the notorious Israeli-developed spyware shortly before the Biden administration blacklisted its makers.


Newspaper Says Israeli Police Used Pegasus for Warrantless Spying on Phones

By Eric Priezkalns 25 Jan 2022 Privacy & Intellectual Property

Court orders to permit surveillance were reportedly only requested if incriminating evidence had already been found using Pegasus.


1 2 3 … 31 »

Top Stories on Commsrisk

Telecoms, Bribes and South Korea’s President: Part 2


How STC Evolved from Reporting Assurance to Finance Assurance


Cities of Gold or the Final Meltdown? Nobody Can Predict the Future of Bitcoin


Zimbabwean Government Keeps Crushing Mobile Money



Why Massive Political Bias in Email Spam Algorithms Is Problematic for Free Speech More Generally


Telecoms, Bribes and South Korea’s President


EU Flirts with Ending Net Neutrality to Squeeze Money for European Telcos from US Big Tech


New Callback Scam Is Based on Misleading Voicemails



RAG RAFMCS Survey Results

Watch Eric Priezkalns give his summary of the largest ever survey of revenue assurance, fraud management and cybersecurity (RAFMCS) pros working for communications providers worldwide.

 

Recent Comments

  • Eric Priezkalns Eric Priezkalns 11 May 2022
    New Callback Scam Is Based on Misleading Voicemails
    These are great insights and great questions. I don't know the answers, partly because I suspect legislators and regulators increasingly want to create some structural ambiguity about when it is...
  • GCara GCara 11 May 2022
    New Callback Scam Is Based on Misleading Voicemails
    I'm with a major US carrier and I have received a few of these voicemails. What I like about my carrier is that it sends me a SMS with the transcript of the voicemail message. This eliminates all the...

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ►2022 (100)
    • ►May (15)
    • ►April (21)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2021 (262)
    • ►December (23)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (22)
    • ►July (22)
    • ►June (23)
    • ►May (21)
    • ►April (22)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Leading Contributors
  • Joseph Nderitu
    Joseph Nderitu
  • Michael Lazarou
    Michael Lazarou
  • Rob Chapman
    Rob Chapman
  • Marianne Curphey
    Marianne Curphey
  • David Morrow
    David Morrow
Recent Posts
  • Telecoms, Bribes and South Korea’s President: Part 2
  • How STC Evolved from Reporting Assurance to Finance Assurance
  • Cities of Gold or the Final Meltdown? Nobody Can Predict the Future of Bitcoin
  • Zimbabwean Government Keeps Crushing Mobile Money
  • Why Massive Political Bias in Email Spam Algorithms Is Problematic for Free Speech More Generally
  • Telecoms, Bribes and South Korea’s President
  • EU Flirts with Ending Net Neutrality to Squeeze Money for European Telcos from US Big Tech
  • New Callback Scam Is Based on Misleading Voicemails
  • US Says No Need for Telcos to Pay $3.3mn Illegal Robocall Penalty If They Cannot Afford It
  • Nigeria Issues RFQ for National Phone Tracking System to ‘Fight Cybercrime and Insecurity’
  • Concerns Raised about Evidence Gathered by Police Infiltration of Encrypted Crime Networks
  • Does Uganda Intend to Replace Its $20mn National RA System with GVG?
  • Home
  • About
  • Contact
  • Advertising

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT