top of page
  • Rob

surveillance bounty hunters

Updated: Jul 26, 2023

get personal with those who made it personal


Freelance cybersecurity experts. Spoofed phone calls, e-mail phishing scams. An even bigger threat with AI.


Highly skilled tech workers turn the tables on their makers for big dollars in the personal private security space.


Orbit 1055 is built on Sphere technology protocol (STP).


'We get personal with those who make it personal' is their motto. Everything related to how technology is used when exploiting an individual user's personal information has tenfold the downsides to the upsides which seem like an afterthought.


They don't just tell you 'a company' or 'that app' is using code or other means to extract your personal data or surveil you, but they lead you back to the individual(s) involved. For example, I know that this or that social media app has been scrutinized for harvesting data, but these guys will get you the personal information and details on the people responsible for that app, that code and the digital footprint left behind when it is exploited and trace it back to a person, not just the company.


This makes a lot of people who work in the industry nervous because they think they are protected by some sort of decentralized process that somehow hides the digital footprint they leave behind while using technology in ways that the public is not aware of.


For example, cybercrime and journalism has always been a concern for many high profile people who allege their privacy has been compromised and details about their personal lives ends up as a front page headline news story because someone exploited known vulnerabilities in systems to illegally surveil them.


The new concern, however, is law enforcement and their ongoing practice of purchasing personal data from cell phone companies rather than do it legally by obtaining a warrant for surveillance from a judge. Because journalists often commit the same sins, the typical coverage of what we are referring to never makes its way to the reader in a way that presents the full scope of what it going on. And yes, the surveillance bounty hunter can in fact get you the personal information for the member of law enforcement who purchased your personal data from your cell phone company because they also left a footprint.



5 views0 comments

Recent Posts

See All

Student hunger strikes for Palestine

A group of 19 students at Brown University initiated a hunger strike, demanding the university divest from "companies which profit from human rights abuses in Palestine." This strike began on February

South American burglary crew

In recent developments, a South American burglary crew has been making headlines for their widespread activities across various states in the United States. Authorities have apprehended members from d

bottom of page