I recently penned a blog about the Stingray tracker, a device that intercepts communications from cell phones by simulating a cell tower. Basically, it is an eavesdropping-type of application and used by security agencies (so far).
Now, I hear about another eavesdropping activity. This time is wasn’t for national security but for consumer marketing and data mining.
Here is the story: J... » read more