By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Online Tech Guru
  • News
  • PC/Windows
  • Mobile
  • Apps
  • Gadgets
  • More
    • Gaming
    • Accessories
    • Editor’s Choice
    • Press Release
Reading: Security News This Week: Jeffrey Epstein’s Yahoo Inbox Revealed
Best Deal
Font ResizerAa
Online Tech GuruOnline Tech Guru
  • News
  • Mobile
  • PC/Windows
  • Gaming
  • Apps
  • Gadgets
  • Accessories
Search
  • News
  • PC/Windows
  • Mobile
  • Apps
  • Gadgets
  • More
    • Gaming
    • Accessories
    • Editor’s Choice
    • Press Release

The Best Deals Today: AirPods Pro 3, The Hundred Line – Last Defense Academy, and More

News Room News Room 13 September 2025
FacebookLike
InstagramFollow
YoutubeSubscribe
TiktokFollow
  • Subscribe
  • Privacy Policy
  • Contact
  • Terms of Use
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Online Tech Guru > News > Security News This Week: Jeffrey Epstein’s Yahoo Inbox Revealed
News

Security News This Week: Jeffrey Epstein’s Yahoo Inbox Revealed

News Room
Last updated: 13 September 2025 17:18
By News Room 4 Min Read
Share
SHARE

Against the background of Trump officials weighing whether to release the sealed “Epstein files” and speculation over a potential pardon, the correspondence positions Maxwell not only as Epstein’s fixer but someone who has long worked to secure her standing with those in power.

In a newly unsealed warrant reviewed by Forbes, Immigration and Customs Enforcement was authorized to use a cell-site simulator—a controversial surveillance tool that tracks phones by mimicking real cell towers—in an effort to locate a Venezuelan national. Initial location data narrowed the man to a 30-block area, prompting ICE to request more precise tracking using the device. It’s unclear if he was ever caught.

The case highlights ICE’s reliance on surveillance tools long criticized by civil liberties groups for sweeping up swaths of data from bystanders alongside targets. In May, procurement records show ICE spent nearly $1 million on “cell site simulator vehicles,” building on a 2024 contract launched under the previous administration. ICE also reportedly maintains a $4.4 million deal with Harris Corporation, maker of the notorious “Stingray,” which has become an eponym for nearly all cell-site simulators used by law enforcement.

The devices work by tricking cell phones into believing they’re real cell towers, allowing police to identify a target device and track its movements far more precisely than the broad geolocation data available from phone companies. While a normal trace may only provide a rough radius or general direction, with a stingray—and a few attachments—police can shrink the search to a specific block, home, or apartment. The devices are controversial because in certain modes, they don’t just capture the target’s phone signal—they scoop up data from every device in range, sweeping up information about bystanders’ calls without their knowledge or consent.

A security advisory from the US Department of Transportation’s Federal Highway Administration said last month that highway infrastructure including chargers, traffic cameras, and roadside weather stations should be checked for hidden equipment. The report said, according to Reuters, that investigators have found “undocumented cellular radios” in some power inverters and battery management systems used for solar power in US highway equipment. The warning comes as the US government has increasingly sounded the alarm in recent years about the risk of backdoors in Chinese-made equipment that could undermine US infrastructure.

The US Treasury Department sanctioned almost 20 companies and individuals in Myanmar and Cambodia this week for their alleged roles in the multibillion-dollar global scam industry. The swindles target victims around the world with investment, romance, and other digital confidence scams using the forced labor of human trafficking victims. The US issued financial and diplomatic sanctions against nine entities in Myanmar’s Shwe Kokko city as well as 10 in Cambodia. In a release about the action, John K. Hurley, undersecretary of the treasury for terrorism and financial intelligence, said,“Southeast Asia’s cyber scam industry not only threatens the well-being and financial security of Americans, but also subjects thousands of people to modern slavery.”

Share This Article
Facebook Twitter Copy Link
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This week’s best deals include half off Paramount Plus, Legos, and more

News Room News Room 13 September 2025
FacebookLike
InstagramFollow
YoutubeSubscribe
TiktokFollow

Trending

Capcom Reveals 3 Resident Evil Games for Nintendo Switch 2 With February 2026 Release Date

Capcom made a surprise appearance during today’s September 2025 Nintendo Direct to announce that Resident…

13 September 2025

What Are Ebike ‘Classes’ and What Do They Mean?

Over the past few years, electric bikes have skyrocketed in popularity (conscious decision not to…

13 September 2025

Spotify Lossless is an inconvenient improvement

If you listen to music the way a lot of people do these days —…

13 September 2025
News

How a 2020 Rolex Collection Changed the Face of Watch Design

As the company that either invented or popularized the dive watch, the GMT watch, the first water-resistant watch, the first automatic watches, and much more besides, you could hardly downplay…

News Room 13 September 2025

Your may also like!

Gaming

‘Secretly Console First’ – Ripple Effect Talks Building Battlefield 6 and Lessons Learned from Battlefield 2042

News Room 13 September 2025
News

The Best Digital Notebooks and Smart Pens

News Room 13 September 2025
News

How Often Should You Replace Your Mattress and Bedding?

News Room 13 September 2025
Gaming

‘I Am THAT Confident’ — Randy Pitchford Says It’s Impossible for Borderlands 4 Players to Break the Game’s Servers This Weekend, Challenges Them to Try

News Room 13 September 2025

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site.

Read our privacy policy for more information.

Quick Links

  • Subscribe
  • Privacy Policy
  • Contact
  • Terms of Use
Advertise with us

Socials

Follow US
Welcome Back!

Sign in to your account

Lost your password?