Connect with us

Technology

Genealogy boom exposes personal data scammers can exploit

Published

on

Genealogy boom exposes personal data scammers can exploit

NEWYou can now listen to Fox News articles!

Millions of Americans are digging into their roots. Genealogy has quietly become one of the fastest-growing hobbies in North America, with the industry now valued at more than $5 billion. From DNA kits to digital family tree builders, people are discovering relatives, tracing migration stories and reconnecting with their past.

There is something deeply meaningful about learning where you come from. However, there is another side to this trend that many people never consider.

The same information that helps you find your great-grandparents can also help scammers find you. Once personal details appear online, they rarely stay in one place. And that can create unexpected security risks.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

DNA KITS MAY SHARE PERSONAL DATA AFTER DEATH
 

A woman looks at the contents of a 23andMe DNA testing kit in Oakland, California, on June 8, 2018. Millions of Americans using family tree platforms may be unknowingly sharing sensitive details like maiden names and birthplaces online. (Cayce Clifford/Bloomberg via Getty Images)

What family tree sites encourage you to upload

Genealogy platforms feel harmless. In fact, they are designed to feel warm, nostalgic and personal.

To build a detailed family tree, users often upload information such as:

  • Full legal names, including maiden names
  • Birth dates
  • Places of birth
  • Marriage records
  • Address history
  • Names of children, siblings and relatives
  • Old family photos
  • Obituaries and memorial information

Each detail may seem harmless on its own. But together, they create something extremely valuable: a fully mapped identity profile. Not just of you, but of your entire family network. And that kind of information is exactly what scammers look for.

Once information is uploaded, it rarely stays private

Many genealogy platforms allow public trees by default. Even when accounts are private, information can still spread in several ways.

Advertisement

For example, data can appear through:

  • Shared family trees
  • Public obituaries
  • Search features
  • Data scraping tools
  • Third-party integrations

Over time, this information becomes searchable. It may be indexed by search engines. Bots can scrape it. Data brokers can absorb it into their databases. Once that happens, your family details no longer live only on a genealogy website. They can appear on people search websites, background check platforms and marketing databases. And you may never know it happened.

The 23andMe wake-up call

The recent bankruptcy of the DNA testing company 23andMe served as a reminder for millions of users. When companies change ownership or shut down, your data does not simply disappear. Genetic data raises serious privacy concerns on its own.

However, the broader genealogy ecosystem carries a similar risk. When you upload deeply personal, multi-generational information, you lose control over how long it is stored, who can access it and where it may end up in the future. Even if you trust a company today, you cannot control what happens tomorrow.

23ANDME PROBE LAUNCHED TO PREVENT CUSTOMER DNA DATA FROM BEING SOLD TO CHINA OR OTHER BAD ACTORS
 

A woman collects a DNA sample in Oakland, California, on June 8, 2018. Personal data uploaded to genealogy sites can spread across data broker networks, making it difficult to control where information appears. (Cayce Clifford/Bloomberg via Getty Images)

Advertisement

Why scammers love family tree data

Cybercriminals no longer focus only on credit card numbers. Instead, they want context. They want personal details that help them impersonate you or bypass security checks. Family tree websites provide exactly that. Here are three ways criminals can exploit genealogy data.

1) Answering security questions

Many financial institutions still rely on knowledge-based authentication questions, such as:

Unfortunately, those answers often appear directly in public family trees. With enough background information, scammers may bypass account protections without ever knowing your password. 

2) Crafting believable impersonation scams

Now imagine receiving a message like this: “Hi, Aunt Linda, it’s Jake. I’m stuck overseas and need help.”

If a scammer already knows:

Advertisement
  • Your relatives’ names
  • Who is related to whom
  • Where family members live

They can create highly believable emergency scams. These are no longer random “grandparent scams.” They are customized attacks, and genealogy data makes that customization easy.

3) Targeting entire families

When one person’s information becomes exposed, it rarely stops there. A scammer can quickly map your entire family network. They may identify:

  • Adult children
  • Elderly parents
  • Siblings
  • Multiple addresses

Then they can launch phishing attempts across several family members at once. In other words, one data leak can turn into a family-wide vulnerability.

How genealogy data strengthens data broker profiles

Here is where the situation becomes even more concerning. Data brokers do not just collect phone numbers and addresses. They build detailed relational profiles.

These profiles often include:

  • Household connections
  • Extended relatives
  • Age ranges
  • Property ownership
  • Income indicators

When genealogy data gets scraped or resold, it strengthens those profiles. Your listing may suddenly include:

  • An accurate maiden name
  • Verified birth year
  • Confirmed past addresses
  • Detailed family connections

The richer the profile becomes, the more valuable it is-not only to marketers but also to criminals. “But I set my tree to private.” Privacy settings certainly help. However, they do not solve the entire problem.

Even if your family tree is private:

  • Relatives may publish overlapping information
  • Obituaries remain public records
  • Historical records continue to be digitized
  • Other users may repost or copy data

Once information spreads across multiple websites, tracking it becomes extremely difficult. In addition, data brokers constantly refresh their databases. Even if you remove your data once, it may quietly reappear months later.

COULD HACKERS STEAL YOUR DNA AND SELL IT?
 

Advertisement

A technician works on a device that conducts direct-to-consumer genetic testing at the University of Tokyo’s Institute of Medical Science in Tokyo, Japan, on July 9, 2014. Genealogy websites may help you trace your roots, but experts warn they can also expose personal data that scammers use to target entire families. (Kiyoshi Ota/Bloomberg via Getty Images)

How to enjoy genealogy without exposing yourself

You do not have to give up genealogy. You simply need to approach it the same way you approach social media.

Consider these precautions:

  • Limit public visibility on family trees
  • Avoid posting full birthdates
  • Be cautious with maiden names
  • Remove exact address histories
  • Think carefully before sharing details about living relatives

Most importantly, remember that the real risk is not the genealogy site itself. The risk is where that data travels next.

Stop your family history from becoming a scammer’s playbook

Once personal information enters the data broker ecosystem, it can spread far beyond the original platform. That is why proactive privacy protection matters.

Data brokers collect and resell personal information gathered from public records, websites and scraped databases. If genealogy details such as maiden names, birthplaces and family relationships get pulled into those systems, they can quietly appear across people-search sites and background check databases.

Advertisement

Over time, this information can make it easier for scammers to build detailed identity profiles. Those profiles can be used for impersonation scams, phishing attacks or attempts to bypass security questions.

You can take steps by searching your name and relatives online to see what information is publicly visible, submitting removal requests to people-search sites and limiting what you share publicly on genealogy platforms. Taking these precautions can help prevent your family history from becoming a roadmap for scammers.

However, manually tracking down and removing your information across hundreds of sites can be time-consuming and difficult to keep up with.

One of the most effective steps you can take is to use a data removal service to help remove your information from data broker and people-search websites. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.

These services do the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. They also continue scanning for new exposures, which helps prevent your data from quietly reappearing later.

Advertisement

It’s what gives me peace of mind and has proven to be one of the most effective ways to erase personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing breach data with details they might find online, making it much harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Kurt’s key takeaways

Genealogy can be an incredibly rewarding hobby. Discovering where your family came from often creates a deeper sense of connection and identity. But the digital tools that make this research easier can also expose more information than many people realize. A family tree filled with birthplaces, maiden names and relatives may look harmless, yet it can quietly create a roadmap for scammers. The good news is you do not have to stop exploring your ancestry. You simply need to share carefully, protect your data and understand how information travels online.

Have you ever searched for your own name or family members online and been surprised by how much personal information was publicly available? Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

The FBI is buying Americans’ location data

Published

on

The FBI is buying Americans’ location data
Senate Intelligence Committee Hears Testimony From Top Officials On Worldwide Threats

WASHINGTON, DC – MARCH 18: Federal Bureau of Investigation Director Kash Patel testifies during a Senate Intelligence Committee hearing on worldwide threats in the Hart Senate Office Building on March 18, 2026 in Washington, DC. A closed session immediately followed the hearing. (Photo by Kevin Dietsch/Getty Images)
Getty Images

Continue Reading

Technology

Trump’s AI chief’s big Iran warning gets big time ignored

Published

on

Trump’s AI chief’s big Iran warning gets big time ignored

Hello and welcome to Regulator, a newsletter for Verge subscribers about the politics of technology and the technology of politics — now landing in your inbox on Wednesdays! If someone has forwarded this email to you, and you’re not a Verge subscriber yet, you should sign up right here, and not just because it would be really, really cool if you do that. We can apparently see how many non-subscribers have opened this email, and why should Palantir get all the “spying on people” fun?

Do you have cool events to highlight, tips to toss over, and secrets to spill? Send everything to tina.nguyen+tips@theverge.com. Or, if you’re truly tech-pilled, send me a message on LinkedIn.

Surprisingly, artificial intelligence does not take the highest political priority during a war — much less an ill-conceived war with Iran that’s paralyzed the energy markets, destabilized America’s relationships with the Middle East and Europe, and alienated members of President Donald Trump’s diehard MAGA coalition. (Just yesterday, Joe Kent, election denier and onetime Trump-endorsed congressional candidate, announced that he was stepping down as the director of the National Counterterrorism Center in protest of the Iran war.) But the effect it’ll have on the tech and AI industry — and industry in general — is so dire that David Sacks, billionaire and the AI and crypto czar shaping the Trump administration’s tech policies, did something politically risky: He publicly suggested that Donald Trump find some way to get out of the Iran war.

Last Friday on his podcast All In, Sacks and his crew laid out several alarmingly realistic scenarios based on recent developments: Iran indicated it was willing to attack oil and gas depots in neighboring countries, destroy desalination plants crucial for supplying water to over 100 million people (which Sacks described as a “humanitarian crisis” that would render the Middle East uninhabitable), and bombard Israel until it either relented or decided to use a nuclear weapon. The Democrats would probably win the midterms. But also, and arguably worse, World War III was possible. “This would be a really good time to take stock of where we are and try, I think, to seek an off-ramp,” he told his co-hosts. “And look, if escalation doesn’t lead anywhere good, then you have to think about, well, how do you de-escalate? And de-escalation, I think, involves reaching some sort of ceasefire agreement or some sort of negotiated settlement with Iran.”

Whatever advice Sacks may have tried to offer has fallen on deaf ears. On top of the US military’s continued assault on Iranian oil infrastructure, over the past few days, Trump said he was open to putting US troops on the ground in Iran, said that NATO countries hesitant to support him were making a “foolish” decision, and just because, added that he was thinking of invading Cuba next. Trump also told reporters this week that Sacks had not spoken to him about the war, either. Whether that’s true or not, Trump often defaults to this explanation when trying to diminish a critic. And the sources I speak to around the White House — especially the ones familiar with Trump’s MO — are pessimistic that Sacks will have any shot at getting the president to listen to him.

Advertisement

A David Sacks hater may note that the billionaire has hit the boundaries of his perceived influence on Trump. At the same time, every single one of Trump’s former allies — especially the ones who don’t work for him — have hit that limit, too. The MAGA anti-war isolationists have been completely betrayed. The titans of industry who care about the markets are at the mercy of Trump’s whims. Heck, Trump has turned around and embraced the neoconservatives who used to despise him, but are now the only people on the right clamoring for regime change in Iran. (If you want to get a sense of how his administration underlings are enabling Trump, I was literally at the Pentagon last week for a vibe check.)

Out of the Trump oligarch classes, the technologists may suffer the longest term effects. Unlike the MAGA base, who’d supported Trump for intangible ideological reasons, Big Tech’s got a deeply financial incentive to stay allied with the president. So much of their current advantages rely on their direct relationships and ability to assuage his ego, which has certainly paid dividends for them over the past year: antitrust investigations dropped, trade loopholes opened, executive orders signed, and so on. (What do you think the ballroom donations were for?) And it’s possible that they believed that the Iran situation would be similar to Venezuela, wherein they’d reap the benefits of seizing Iran’s oil supply, and decided not to intervene.

But there’s a critical characteristic they overlooked, one that dates back to Trump’s relationship with Roy Cohn in the ’70s: Trump does not like to be humiliated by his foes, and Trump is always inclined to strike back twice as hard in order to crush their spirits, with little care for consequences or long-term damage. It mostly manifests via legal challenges and lawsuits in America, but has occasionally gone in a violent direction (see: January 6th and the ICE protests in Minnesota). In this case, he is trying to one-up a violent religious theocracy, which declared a military jihad against the United States in the wake of Khamenei’s death, and also possesses missiles. The rich nerds who make the beep-boops have very little chance of changing Trump’s mind — especially so long as there’s a political contingent on the right egging him on — and even if Sacks believed he was talking to a friendly audience in an online safe space, there’s no guarantee that Trump will be happy that he voiced dissent at all.

Oh, right, crypto is still happening, too.

Unfortunately, I couldn’t catch a lot of the Blockchain Conference this year (see: Iran) but it seems like some major developments came out of it, including the CFTC and the SEC dropping a major guidance that most digital assets are not securities, clarifying the way that certain cryptocurrency is regulated and whose rules apply. But though it’s the most comprehensive document released around this crucial issue, they also warned that it still needs Congress to pass laws that would make those changes permanent, and the CFTC is pretty busy as is. In other words: The Clarity Act still needs to be passed, guys. And that seems to be going great. Right?

Advertisement

.. another blockchain-based bar! This time, Polymarket announced the surprise opening of The Situation Room, “the world’s first bar dedicated to monitoring the situation.” According to renderings posted on X, the bar, described as a “sports bar just for situation monitoring,” will have everything one needs to monitor the situation: live feeds on X, sports games, and Bloomberg terminals. (Polymarket did not immediately comment on where said bar would be located.)

screenshot via @polymarket/X.

I’ve been doing some spring cleaning at home and recently found a quart-sized Ziploc bag that’s got a handful of spare change that I’ve been meaning to drop off at a Coinstar for over a year. But I’m lazy, and if there’s anything I’ve learned from TMZ, it’s that paying money for stories works (sometimes). So I will give this bag of loose change to anyone who can send authentic, verified, non-AI generated footage of this reported fight between Sam Altman and playwright Jeremy O. Harris at the exclusive, off-the-record Vanity Fair Oscar Party, allegedly over OpenAI’s contract with the Pentagon. (I presume the audience of Regulator is composed of Hollywood A-listers.)

And, no, I’m not going to send you the cash equivalent of the bag’s value. The condition for the payout is that you have to take this bag off of my hands, including all of the Costa Rican currency. AND I’m keeping all the quarters. And in the extraordinarily unlikely event that someone follows through on this offer, I have to get permission from Nilay Patel to break the ethics policy this one time, because this is technically a quid pro quo, albeit an extremely awful quid pro quo for whomever sends it.

This bag of untold riches (sans quarters) could be yours!

This bag of untold riches (sans quarters) could be yours!
Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.
Advertisement

Advertisement
Continue Reading

Technology

How surveillance tech led police to accuse the wrong person

Published

on

How surveillance tech led police to accuse the wrong person

NEWYou can now listen to Fox News articles!

Most people never expect a knock on the door from a police officer to flip their life upside down. Yet that is exactly what happened to Chrisanna Elser in the Denver area of Colorado, near the small towns of Bow Mar and Columbine Valley.

An officer from the Columbine Valley Police Department arrived at her home and accused her of stealing a $25 package from a porch in the neighboring town of Bow Mar, Colorado.

The officer said surveillance technology pointed directly to her vehicle, a forest green Rivian R1T electric pickup truck. But Chrisanna insists she never stole anything.

What followed became a real-world lesson in modern surveillance. Doorbell cameras, license plate readers and phone location data suddenly became evidence in a case she had to fight herself.

Advertisement

CALIFORNIA PORCH PIRATE CAUGHT STEALING SURVEILLANCE CAMERAS INSTALLED TO CATCH HIM
 

Flock cameras are used in towns across the nation as license plate readers. A Colorado woman was accused of porch theft after police relied on surveillance tech, including Flock cameras, that incorrectly linked her vehicle to the scene. (Lori Van Buren/Albany Times Union via Getty Images)

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

The moment the accusation began

Chrisanna recently joined me on my Beyond Connected podcast to walk through the moment everything started. She remembers the day clearly. “So I laid down because I had a headache and my husband came in and said, there’s a police officer here for you.”

The officer told her a package had been stolen from a home roughly 1.3 miles away in Bow Mar, Colorado. The officer who confronted her was Sgt. Jamie Milliman of the Columbine Valley Police Department, which provides policing services for both Columbine Valley and Bow Mar.

Advertisement

He believed she was responsible. The accusation was based on surveillance tools used around the area. According to the officer, Flock license plate reader cameras had captured her forest green Rivian driving through Bow Mar between 11:52 a.m. and 12:09 p.m. on the day of the theft.

Bodycam footage captured the officer describing the town’s monitoring network. “You can’t get a breath of fresh air in or out of that place without us knowing.”

Chrisanna said she tried to show the officer evidence that she had nothing to do with the theft. But she says he would not review it. “And basically, he just continued to start with that. I was lying to him. Never lied to him once.”

Instead, the officer issued a summons ordering her to appear in court in Jefferson County, Colorado.

The porch camera video that sparked the case

Chrisanna later found the video that triggered the accusation. Neighbors had posted the porch camera footage on the community app Nextdoor while trying to identify the thief. At first, she could understand why the police thought the suspect resembled her. “When I saw the video from far away, I was like, wow, I guess that kind of looks like me.”

Advertisement

But the closer she examined the footage, the more differences she noticed. “She was significantly younger, and she had a bit of a shaved underside under her head.” The suspect ran away from the house and disappeared off camera.

Importantly, the person in the video ran away on foot and did not get into any vehicle, something that conflicted with the police theory involving Elser’s truck. Still, the investigation continued.

COLORADO WOMAN CHASES DOWN ‘PORCH PIRATE’ AND SHAMES HER ON VIDEO
 

Chrisanna Elser’s situation highlights how surveillance tools can generate leads but still require human verification to avoid mistakes. (Antranik Tavitian/Bloomberg via Getty Images)

What a Flock camera actually is

One of the technologies involved in the investigation was a Flock camera. Flock cameras are automated license plate reader systems made by the company Flock Safety. Cities and neighborhoods across the United States install them at intersections and neighborhood entrances.

Advertisement

They automatically capture:

  • License plate numbers
  • Vehicle color and approximate vehicle type
  • Date, time and location

Police departments can search the camera network to see when a vehicle passed certain locations. In Bow Mar and Columbine Valley, Colorado, the cameras are used by the Columbine Valley police to help identify vehicles connected to investigations.

The systems are designed to help solve crimes such as stolen vehicles, kidnappings and hit-and-run cases. But they generate investigative leads, not proof.

Chrisanna’s case shows what can happen when technology is treated as a conclusion rather than a starting point.

The overlooked camera that could have cleared her

Chrisanna began doing something she never expected. She started investigating the accusation herself. While reviewing the evidence, she discovered something critical. Her truck had been parked directly in front of another Flock surveillance camera controlled by the town of Bo Mar during the entire time police claimed she committed the theft.

“Actually, my truck was parked right in front of a Flock camera in my neighbor’s driveway the whole time.” If investigators had reviewed that camera first, the case might have ended immediately.

Advertisement

The hidden phone feature that helped prove her innocence

Chrisanna also discovered another piece of evidence hiding in her own phone. It was a feature called Google Location Timeline.

The setting tracks where your phone travels if location history is enabled. “Anywhere your phone is, if you have your timeline turned on, it will track you,” Chrisanna said.  In her case, it helped reconstruct exactly where she had been that day.

She later discovered the data showed she had visited a tailor just outside of Bow Mar for a noon appointment located more than a quarter mile from the theft location.

A Columbine Valley Police officer questions Chrisanna Elser on her front porch near Bow Mar, Colorado. Police later dropped the case after reviewing new evidence showing Elser’s vehicle was parked during the alleged crime. (Columbine Valley Police Department)

How Chrisanna built the timeline that cleared her

Chrisanna gathered multiple sources of proof to show where she had actually been.

Advertisement

Her evidence included:

• Google Location Timeline data
• Flock camera images
• Photos from other stops she made that day
• Video from her own vehicle’s onboard cameras and GPS system

She built a timeline and sent the evidence to the police. Eventually, the Columbine Valley Police Chief, Bret Cottrell, reviewed the information and responded by email. Chrisanna read the message she received.

“Hi, Anna. After reviewing the evidence you’ve provided. (nicely done btw), we have voided the summons that was issued. We have double checked with Jefferson County courts, and the case was not yet entered into the system; therefore, there is no record on file.  Thank you for getting back to us with the evidence you said you would be able to provide. Sincerely, Bret”.

After roughly two weeks, the summons was voided, and the case was dropped. The actual porch theft was never solved, Chrisanna said. The officer involved later received a formal reprimand and was ordered to complete additional training, according to internal police documents.

Advertisement

We reached out to the Columbine Valley Police Department for comment, but did not receive a response before our deadline.

How someone might obtain Flock camera footage

Many people assume they cannot access surveillance footage used by police. In some cases and jurisdictions, they can. For example, in Colorado, residents can request certain government records under the Colorado Open Records Act (CORA), the state’s public-records law similar to the federal Freedom of Information Act.

Chrisanna said her husband suggested requesting the footage through public records laws. “If the city, if they’re using any surveillance on you at all, you can do a Freedom of Information Act.” While FOIA technically applies to federal agencies, people often use the term to describe public-records requests more broadly.

Steps to request Flock camera footage

  • Identify the police department operating the cameras
  • Submit a public records or FOIA request
  • Include the date, time and location you need
  • Request related bodycam or license plate reader records if necessary

Access rules vary by state and department. Still, the footage may be available when cameras are owned by a city or town.

Technology still needs human judgment

Chrisanna does not believe surveillance tools should disappear. But she believes they need clear guardrails. “They are a useful tool, but they are not a replacement for police work as it was in this case,” she said.

Technology can help solve crimes and protect communities. Yet when investigators rely on it without verifying the facts, mistakes can happen.

Advertisement

DOORBELL-CAM COMPANY RING PARTNERS WITH 405 POLICE AGENCIES ACROSS US TO SHARE FOOTAGE, FIGHT CRIME
 

License plate reader data and doorbell footage led police to accuse the wrong suspect before new evidence cleared her. (Chip Somodevilla/Getty Images)

How to turn Google Location Timeline on or off

Chrisanna used Google’s Location Timeline as part of the evidence that helped prove where she was on the day of the alleged theft. Many people do not realize this feature exists, but you can check it anytime through Google Maps.

Steps to check Google Location Timeline

  • Open the Google Maps app
  • Tap your profile icon in the top right
  • Select Your Timeline
  • Tap the three-dot menu or More
  • Tap Location & privacy settings
  • Turn Timeline / Location History on or off

If enabled, Google Maps may store a record of places your phone has been. Some people use it to remember trips or travel routes. Others prefer to turn it off for privacy. Either way, the data can become important if you ever need to prove where you were at a certain time. 

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Most people assume surveillance protects them. Doorbell cameras catch porch pirates. License plate readers track stolen cars. Phone location data helps people retrace trips. But Chrisanna’s experience reveals another side of the technology. Data can suggest conclusions before investigators verify them. And when that happens, the person accused may have to gather their own evidence. Her takeaway is simple. “If they have evidence on you, you should have evidence on yourself.” For more of Chrisanna’s story and the full conversation, you can listen to or watch the complete episode on the Beyond Connected podcast at getbeyondconnected.com.

Advertisement

Let me leave you with this question. If technology ever pointed the finger at you tomorrow, would you have the data needed to prove where you really were? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Trending