We use cookies and collect data to improve your experience and deliver personalized content. By clicking "Accept," you agree to our use of cookies and the processing of your data as described in our Privacy Policy.
Accept
1337Topics1337Topics1337Topics
  • News
  • Cybersecurity
    • Vulnerabilities
    • Malware analysis
    • Coding
    • Crypto topics
    • Tools and Practical Knowledge
    • Gadgets & Electronics
  • DIY Projects
  • A.I
Reading: Tracking the Trump Shooter’s Phone
Share
Notification Show More
Font ResizerAa
1337Topics1337Topics
Font ResizerAa
Search
  • News
  • Cybersecurity
    • Vulnerabilities
    • Malware analysis
    • Coding
    • Crypto topics
    • Tools and Practical Knowledge
    • Gadgets & Electronics
  • DIY Projects
  • A.I
Follow US
© 2024 1337topics. All Rights Reserved.
1337Topics > Blog > News > Tracking the Trump Shooter’s Phone
News

Tracking the Trump Shooter’s Phone

Kornak214
Last updated: August 19, 2024 1:07 am
Kornak214
Share
4 Min Read
Donald Trump gets covered by Secret Service.
LAPRESSE
SHARE

 

Contents
Mapping Crooks’s MovementsHow Was Crooks Tracked?Skepticism and Concerns
Thomas Matthew Crooks, the gunman who tried to assassinate Donald Trump.
NY Post

Researchers have meticulously mapped the movements of Thomas Matthew Crooks’s phone leading up to the day of the failed assassination attempt. However, the methods they used in this investigation raise some serious concerns about privacy and surveillance.

Mapping Crooks’s Movements

Using controversial methods, researchers have pieced together the alleged movements of Thomas Matthew Crooks. Their findings suggest that Crooks traveled twice to the city where the now-famous rally was to be held. He also allegedly visited a gun shop and even a building in Washington, D.C., which is notably close to an FBI office. While conspiracy theorists have jumped at the idea that he might have been visiting the FBI, this article will focus on the methods used to gather this data rather than speculate on such theories.

How Was Crooks Tracked?

Contrary to what some might think, there was nothing unique about Crooks’s phone—no special trackers were installed on it leading up to that fateful day. Moreover, the location data used to track him was not obtained by the FBI physically accessing his device. Instead, the information was derived from mobile ad data.

Mobile ad data typically comes from apps that collect your GPS coordinates and then sell them to third-party companies. These companies, in turn, build a web of your movements, primarily to serve you more relevant ads. However, this trade is highly opaque, with data often coming from seemingly innocent apps, like weather apps, which have been exposed in the past for collecting and selling location data.

This data then ends up in the hands of data brokers, who often have minimal online presence. From there, it is sold to various entities—some of which may have questionable intentions. The data is technically anonymized, linked only to an ad ID rather than personal identifiers like your name or phone number. But de-anonymizing these datasets is often surprisingly easy. With knowledge of just a few key locations, such as your home and workplace, it becomes possible to accurately guess the identity behind an ad ID.

This is precisely how researchers tracked Thomas Matthew Crooks. By identifying devices that regularly visited both his home and workplace, they could monitor where else those ad IDs appeared. The researchers behind this analysis are from the Oversight Project, a part of the conservative think tank The Heritage Foundation.

Skepticism and Concerns

There are reasons to be skeptical of this analysis. The researchers claim to have linked at least nine devices to these ad IDs, but it’s known that Crooks only had two phones. This discrepancy raises questions about the accuracy of the data. Additionally, the researchers have not disclosed where they obtained this data—whether it was purchased or provided by a whistleblower at one of these data brokers.

As always, thank you for reading, and stay informed.

TAGGED:AdsMobile phoneTrackingWarefar
Share This Article
Facebook Twitter Whatsapp Whatsapp Telegram Copy Link
Share
Previous Article DePIN: Decentralizing the Physical World
Next Article The SoCRadar Data Breach: A Closer Look at the July 2024 Incident
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

What Do You Consider the Most Challenging Cybersecurity Vulnerability to Mitigate?

  • Advanced Persistent Threats (APTs) 50%, 2 votes
    2 votes 50%
    2 votes - 50% of all votes
  • Phishing and Social Engineering 25%, 1 vote
    1 vote 25%
    1 vote - 25% of all votes
  • Ransomware 25%, 1 vote
    1 vote 25%
    1 vote - 25% of all votes
  • Insider Threats 0%, 0 votes
    0 votes
    0 votes - 0% of all votes
  • Supply Chain Attacks 0%, 0 votes
    0 votes
    0 votes - 0% of all votes
  • Zero-Day Exploits 0%, 0 votes
    0 votes
    0 votes - 0% of all votes
  • Cloud Security Misconfigurations 0%, 0 votes
    0 votes
    0 votes - 0% of all votes
Total Votes: 4
August 14, 2024 - September 30, 2024
Voting is closed

Thanks for your opinion !

Latest Articles

Why Pixhawk Stands Out: A Technical Comparison of Flight Controllers.
DIY Projects Gadgets & Electronics
How hackers are making millions selling video game cheats ?
Cybersecurity News
$16.5 Million Lottery Scam That Shook America’s Lotteries.
Cybersecurity
The Rise of Sentient AI: Are We Facing a New Reality?
A.I

Stay Connected

TwitterFollow
TelegramFollow
1337Topics1337Topics
Follow US
1337Topics © 2024 All Rights Reserved.
  • Terms & Conditions of use.
  • Privacy Policy
  • Disclamer
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account