• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Article 4: Motorola, Known For Cellphones, is Fast Becoming a Major Player in Government Surveillance

October 3, 2019 by Imran Jordan Kharabsheh Leave a Comment

Now having invested over $1.7 billion dollars in acquisitions since 2017, tech giant Motorola Solutions has acquired a large chunk of the surveillance market, who the primary buyer is the government, under a single roof. Among the technologies they have acquired and been developing include police body cameras, smart train cameras that can identify faces and distinguish suspicious behavior, and smart camera networks that can track car movements by their license plates. What many civil liberties groups find frightful about this information is that Motorola may be selling most of their developed and acquired surveillance technology as a single product or as packages, arguing that your privacy is safer when “information about you is scattered among agencies and entities”. I looked personally to see if Motorola Solutions had issued a response or a statement regarding their recent acquisitions of surveillance tech companies, however I could not seem to find anything regarding the matter.

Source: https://yro.slashdot.org/story/19/10/02/2134249/motorola-known-for-cellphones-is-fast-becoming-a-major-player-in-government-surveillance

Filed Under: Week 04: Network Mapping and Vulnerability Scanning Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in