Technology
The US will relax pollution-limiting rules for vehicle emissions
President Biden’s administration plans to pull back on strict new Environmental Protection Agency (EPA) rules that would have forced US automakers to turn EVs into their main business by 2032. That’s according to The New York Times, which wrote yesterday that industry players had moved the administration to give them more time to bring down EV costs, and for a nationwide charging infrastructure to be more fully built out.
The Times writes that labor leaders pressured Biden to give them more time to extend union membership to those working in new US EV plants. As the article notes, labor union support is crucial as Biden faces re-election where he’s straddling a dire climate situation and attacks from candidate and former President Donald Trump.
The original EPA requirements called for electric vehicles to make up 67 percent of new light-duty vehicle sales and 46 percent of new medium-duty sales by 2032 — a huge spike from the 7.6 percent the Times notes from last year. Sales of EVs have slowed, putting the goal further out of reach for a variety of reasons, not least of which is that the auto industry has insisted on big electric trucks and SUVs that the supply chain isn’t prepared to affordably accommodate.
Technology
Your phone is now a crime scene in your pocket
NEWYou can now listen to Fox News articles!
Take a second and look at your phone. It knows where you slept last night. Who you texted. What you searched. Where you drove.
For investigators, that information can turn into evidence fast. In fact, a major new survey found smartphones now show up in almost every criminal investigation.
In other words, your phone can become the primary crime scene. And that should get your attention.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Detectives say smartphones act as “a crime scene in your pocket,” storing messages, GPS history and payment records. (Anna Barclay/Getty Images)
Why smartphones have become the center of crime investigations
Your phone is always with you. It logs:
- Text messages and chats
- Photos and videos
- GPS location history
- App activity
- Call logs
- Payment records
According to the 2026 Industry Trends Report from Cellebrite, a digital forensics company that provides tools to law enforcement and investigators, smartphones are now the most cited source of digital evidence in criminal cases at 97%. The report shows that mobile data can reveal where a person has been, who they communicate with and patterns of daily life.
For that reason, many in law enforcement now describe the smartphone as “a crime scene in your pocket” to illustrate how deeply these devices factor into investigations. That phrase may sound dramatic. It is not. It reflects how investigations now unfold in the U.S. and around the world. In many criminal cases, phone data regularly helps:
- Reconstruct timelines using cell site and GPS data
- Place suspects near crime scenes
- Confirm or contradict alibis
- Recover deleted messages
- Track digital payments
Police agencies have testified in court that smartphone extractions help establish sequences of events faster than traditional methods. Modern policing no longer relies only on fingerprints and surveillance footage. It often begins with digital footprints.
Real cases where phone data made the difference
This is happening in courtrooms right now. Case in point, in the prosecutions tied to the Gilgo Beach serial killings in New York, investigators leaned heavily on burner phone data, cell site records and digital communications to link the suspect to victims. Mobile records helped narrow movements, connect devices and support key search warrants.
In the ongoing University of Idaho murder case, prosecutors have relied on smartphone location data, digital mapping history and phone activity logs to build a timeline. Location records helped place the suspect’s phone near the crime scene during critical time windows.
Fraud investigations across the U.S. tell a similar story. In large-scale romance scams and crypto investment schemes, law enforcement now uses smartphone chat logs, transaction screenshots and crypto wallet trails to follow the money. Cryptocurrency evidence appears in a growing share of cases as online scams surge.
The pattern is clear. Phone data can protect the innocent by confirming where someone was. It can also reveal intent through messages, searches and digital payments.
Here is what matters most for everyday Americans. Even if you are not committing a crime, your phone creates a detailed and often lasting record of your life. And in today’s justice system, that record carries real weight.
BRYAN KOHBERGER’S PHONE RECORDS REVEAL PANICKED SEARCHES AFTER POLICE UNCOVERED KEY DETAIL
Bryan Kohberger appears at the Ada County Courthouse in Boise, Idaho, on July 23, 2025, for sentencing in the University of Idaho murders case, where prosecutors relied heavily on cellphone location data and digital evidence. (Kyle Green-Pool/Getty Images)
The rise of crypto and AI in criminal cases
The report revealed another important trend. Cryptocurrency is now the fastest-growing source of evidence. Investigators cited crypto data in 22% of cases, largely due to the explosion of online scams and fraud. If you have followed ransomware attacks or crypto investment scams, this makes sense. Payments leave blockchain trails. Law enforcement increasingly follows the money.
Meanwhile, 65% of detectives believe AI tools can speed up investigations. A typical case can require up to 35 hours of digital review. About 60% of that time goes to sorting and evaluating data. That creates pressure. And pressure can lead to mistakes.
Experts warn that generative AI can deliver convincing but inaccurate results if no one double-checks them.
The hidden bottlenecks behind digital evidence
The report also highlights challenges investigators face behind the scenes. More than half of devices arrive locked. Many investigators report difficulty accessing iOS and Android phones due to constant software updates and encryption. Most teams still review evidence manually. Only a small share of users use advanced analytical tools to connect data across devices and cases. On top of that, agency leaders say training gaps and rising data volume are slowing investigations and stretching resources. As digital evidence grows, so do the pressure points inside the system.
What this means for you
Here is the part most people miss. Even if you never plan to break the law, your phone can:
- Place you at a location
- Show who you were with
- Reveal what you searched
- Expose private conversations
- Document your purchases
Sometimes that helps you. It can prove an alibi. It can clear your name. Other times, it raises serious privacy questions. Who has access to your data? How long is it stored? How securely is it handled?
In most criminal investigations, law enforcement must obtain a warrant or other court-approved legal process to access the contents of your phone. But the sheer volume of data these devices hold has exploded. And that changes the stakes.
Smartphone data and the growing privacy debate
We live in an era where digital evidence is the backbone of modern justice. That helps solve crimes. It protects victims. It speeds up investigations. But it also means the device in your pocket contains a map of your life.
As smartphone digital evidence becomes central to 97% of cases, we need to ask hard questions about privacy, oversight and AI accuracy. Because once data exists, it can be used.
5 SIMPLE TECH TIPS TO IMPROVE DIGITAL PRIVACY
Smartphones now appear in 97% of criminal investigations, with law enforcement relying on mobile data to reconstruct timelines and track suspects. (Boris Roessler/picture alliance via Getty Images)
Tech tips: Protect your digital footprint
You cannot eliminate your digital trail. But you can reduce unnecessary exposure.
1) Review location settings
Turn off constant location access for apps that do not need it. On iPhone and Android, set most apps to “While Using” instead of “Always.”
2) Use encrypted messaging
Apps like Signal and WhatsApp use end-to-end encryption, which means messages are scrambled so only you and the recipient can read them. Apple’s iMessage also uses end-to-end encryption for conversations between Apple devices. Strong encryption protects your messages from hackers and data breaches. It is also why law enforcement often cannot read message content without access to the physical device. Keep in mind that encryption protects message content, not everything around it. Metadata such as who you contacted and when may still exist.
3) Lock down cloud backups
Check whether your messages and photos back up to the cloud. Cloud data can become part of investigations.
4) Enable strong authentication
Use a long passcode, not a simple four-digit PIN. Turn on biometric security and two-factor authentication (2FA).
5) Think before you search
Search history, voice assistant queries and in-app messages often live longer than you expect.
6) Keep your phone updated
Security updates patch vulnerabilities that criminals exploit. They also protect your data from being stolen in breaches.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
Your phone is no longer just a communication tool. It is a timeline, a diary and a witness. For law enforcement, that is powerful. For you, it is a reminder that convenience comes with consequences. The next time you tap “Allow” on a permissions request, remember this. You are not just installing an app. You are adding another entry to your digital twin.
If your phone tells the story of your life, who should control that story when it matters most? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
New York sues Valve, alleging its loot boxes are ‘quintessential gambling’
New York Attorney General Letitia James is suing Valve for “illegally promoting gambling” through the loot box systems it has built for video games like Counter-Strike 2, Team Fortress 2, and Dota 2, according to a press release. The attorney general seeks to “permanently stop Valve from promoting gambling features in its games, disgorge all ill-gotten gains, and pay fines for violating New York’s laws.”
“This loot box model that Valve has developed — charging an individual for a chance to win something of value based on luck alone — is quintessential gambling, prohibited under New York’s Constitution and Penal Law,” the lawsuit says. Valve has made “tens of millions of dollars” selling loot box keys to “thousands” of New York residents and has “made millions of dollars more in commissions from New Yorkers who sold virtual items obtained from loot boxes.” The company’s loot boxes are also “particularly pernicious” because they’re popular with children and adolescents, according to the complaint.
Users can purchase keys to open loot boxes in some Valve games and receive randomly-selected virtual items as rewards. If they want, users can then sell those rewards on the Steam Community Market and on third-party marketplaces; the rarer items can be worth “thousands of dollars,” the lawsuit says. These systems, however, require that users pay Valve $2.49 plus tax to open the loot boxes, and users often get items that are “worth less than what the user spent on the key”. The lawsuit also notes that Valve’s experience for opening a loot box in Counter-Strike 2 resembles that of a slot machine.
Valve didn’t immediately reply to a request for comment.
Technology
Think your New Year’s privacy reset worked? Think again
NEWYou can now listen to Fox News articles!
At the start of the year, you did everything right. You searched your name, opted out of several data broker sites and deleted listings that exposed your address, phone number and relatives.
At first, it felt like a clean slate. However, here’s the uncomfortable truth: your data rarely stays gone. In many cases, February is when it quietly returns.
Privacy does not work as a one-time cleanup. Instead, it requires ongoing maintenance, because data brokers design their systems to outlast your best intentions.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE
Cybersecurity advocates urge continuous monitoring to prevent data brokers from recreating deleted profiles. (Smith Collection/Gado/Getty Images)
How data brokers re-list your information (even after you delete it)
Most people assume that once they remove their profile from a data broker site, it’s gone for good.
That’s not how the system works. Data brokers don’t “store” your information the way a normal website does. They rebuild it constantly using automated data feeds from:
- Credit headers
- Property and mortgage records
- Utility registrations
- Loyalty programs
- App tracking efforts
- Court filings and public databases
- Online purchases and subscriptions
Every few weeks, their systems can re-ingest new records and match them to your identity. That means:
- Your old address gets replaced with your new one
- Your new phone number appears
- Your relatives are updated
- Your age, job history and household data refresh
- Your digital footprint grows more detailed over time
Even if you removed your profile in January, the next data refresh can quietly re-create it in February under a slightly different variation of your name. This is why people often say: “I removed my data… and then found it again a month later.” It wasn’t a mistake. It’s how the business model works.
Why January cleanups still leave you exposed
Manual opt-outs feel empowering at first. However, they rarely last. The real issue is scale: hundreds of data brokers collect, trade and republish personal information, and many share data with one another. As a result, removing your profile from one site does not stop the spread. Instead:
- Another broker re-adds you using a new source
- A third site scrapes the refreshed profile
- A fourth copies the updated record
- The cycle starts again
You’re not fighting one website. You’re fighting a self-healing network of databases that rebuild your profile every few weeks. That’s why January cleanups don’t protect you throughout the year. Scammers know this. They don’t just scrape old databases; they wait for newly refreshed lists that contain your:
- Current phone number
- Correct address
- Relatives
- Likely income range
- Age and life stage
By February and March, those lists are already circulating again.
10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE
Experts warn January privacy cleanups may not last as data broker databases refresh in February. (Jason Alden/Bloomberg via Getty Images)
What scammers get when your profile is rebuilt
When your data comes back, it doesn’t just sit on a website. It becomes fuel for:
That’s why scams feel personal now. Criminals often have access to:
- Your current address
- Names of relatives
- Your age
- Your likely income range
Rather than guessing, scammers search your profile and build their pitch around real details. That precision is what makes today’s fraud attempts so convincing.
What ‘ongoing removal’ actually protects against
This is where most people misunderstand privacy tools. The real threat isn’t the old profile you deleted. It’s the next version that gets created.
Ongoing removal means:
- Your data is constantly scanned across broker networks
- New profiles are detected as soon as they appear
- Fresh listings are removed automatically
- Re-created records don’t get time to circulate.
Instead of playing whack-a-mole once a year, you block the rebuild cycle itself. This is the only way to stay ahead of systems designed to outlast you.
SPYWARE CAN HIJACK YOUR PHONE IN SECONDS
Ongoing data removal services aim to stop personal profiles from reappearing across broker networks. (Elisa Schu/picture alliance via Getty Images)
How to stop data brokers from rebuilding your profile
If you truly want to stay off data broker sites, you need a system that:
- Scans for new profiles
- Removes them as they appear
- Keeps doing it every month.
That’s what a data removal service was built for. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy.
These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.
By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
Why this matters more in February than January
In January, people clean up their digital footprint. By contrast, February is when many data brokers refresh their databases and scammers begin working from newly updated lists. Instead of sending alerts, brokers quietly republish your details.
You receive no warning when your profile reappears, and no notification when someone resells your information. As a result, most people only realize what happened after a scam email hits their inbox or a suspicious call lights up their phone.
For that reason, February becomes the moment of confusion. That is when readers often say, “I thought I already handled this.”
Kurt’s key takeaways
At the start of the year, you did what most people avoid. You searched your name, opted out of broker sites and took control of your information. However, privacy does not work like a one-time spring cleaning. Instead, it works more like lawn care. The moment you stop maintaining it, the growth returns. Data brokers constantly refresh and rebuild profiles. They pull from public records, commercial feeds and shared databases. As a result, when your profile reappears, scammers do not treat it like old data. They treat it like fresh intelligence. That is exactly why February matters. While January feels proactive, February is when many databases quietly update and republish information. So if you want lasting control, you need consistent monitoring and ongoing removal, not a single annual cleanup. The real objective is not simply deleting an old profile. Rather, it is stopping the next version from spreading in the first place. Ultimately, privacy is not about what you remove. It is about what never comes back.
Have you ever removed your personal information from a data broker site, only to find it listed again weeks later? Let us know your thoughts by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
-
World11 hours agoExclusive: DeepSeek withholds latest AI model from US chipmakers including Nvidia, sources say
-
Massachusetts19 hours agoMother and daughter injured in Taunton house explosion
-
Montana6 days ago2026 MHSA Montana Wrestling State Championship Brackets And Results – FloWrestling
-
Oklahoma1 week agoWildfires rage in Oklahoma as thousands urged to evacuate a small city
-
Louisiana3 days agoWildfire near Gum Swamp Road in Livingston Parish now under control; more than 200 acres burned
-
Technology5 days agoYouTube TV billing scam emails are hitting inboxes
-
Culture1 week agoTest Your Knowledge of the Authors and Events That Helped Shape the United States
-
Technology5 days agoStellantis is in a crisis of its own making