{"id":32845,"date":"2020-01-18T14:06:10","date_gmt":"2020-01-18T14:06:10","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/"},"modified":"2020-01-18T14:06:10","modified_gmt":"2020-01-18T14:06:10","slug":"to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/","title":{"rendered":"To catch a thief, go to Google with a geofence warrant \u2013 and it will give you all the details"},"content":{"rendered":"<p>At 1030 on April 27, 2019, four unidentified individuals attempted to rob a Brinks armored truck parked outside of Michaels, an art supply and home decor store at the Point Loomis Shopping Center in Milwaukee, Wisconsin. To find out who they are, local authorities plan to ask Google.<\/p>\n<p>According to <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.courtlistener.com\/recap\/gov.uscourts.wied.88454\/gov.uscourts.wied.88454.1.0.pdf\">an affidavit<\/a> [PDF] filed by Matthew Gibson, a law enforcement officer with the Milwaukee FBI Violent Crime Task Force, the Brinks driver narrowly escaped a confrontation with one of the robbers, armed with an AR-15 semi-automatic rifle, by retreating into his vehicle and closing the door.<\/p>\n<p>Unable to enter the truck, the masked robbers fled in a green Honda Accord without license plates.<\/p>\n<p>The following morning at around 0109, Milwaukee Police were called to the scene of a burning vehicle, subsequently determined to be the same green Honda \u2013 reported stolen a week earlier \u2013 that the unsuccessful thieves had used to escape the crime scene.<\/p>\n<p>The police proceeded to collect surveillance video from houses near the torched Accord, and noticed the suspects getting into an older model Honda CRV and a white pickup truck shortly after the failed robbery.<\/p>\n<p>The surveillance video shows the Honda CRV arrived in the neighborhood at 0709 on the morning of April 27. And when it departed, no one got into the driver&#8217;s seat, indicating that a driver had waited with the car for accomplices to show up.<\/p>\n<p>Citing past experience, Gibson speculates that the robbery suspects may have used their mobile phones while doing reconnaissance for their rendezvous point and that the getaway driver may have done so while killing time in the CRV.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/01\/17\/youtube_scottish_police_vid_cellebrite.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Still from Scottish police YouTube video showing use of a Cellebrite device\"><\/p>\n<h2 title=\"New perspective on FBI, Interpol demands for backdoors\">Unlocking news: We decrypt those cryptic headlines about Scottish cops bypassing smartphone encryption<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2020\/01\/17\/scottish_cops_cellebrite_kiosks\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>So the Milwaukee County District Attorney&#8217;s Office has requested that Google provide the location data history, sourced from GPS, Bluetooth, and Wi-Fi signals, from every device in a small geofenced area \u2013 the 25 meters around the spot occupied by Honda CRV.<\/p>\n<p>The authorities want Google to provide an anonymized list of every device reporting its location back to the Chocolate Factory from 0645 to 1115 on the morning of the failed robbery. Investigators will then review the list to determine the devices they want Google to identify through personal information.<\/p>\n<p>This appears to be an example of the sort of geofence warrant described <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.nytimes.com\/interactive\/2019\/04\/13\/us\/google-location-tracking-police.html\">by the New York Times<\/a> last year in which authorities ask for information about every network-connected device within a given set of map coordinates rather than for details about a specific suspect&#8217;s devices.<\/p>\n<p>Google reportedly has a database called Sensorvault in which it stores location data for millions of devices going back almost a decade.<\/p>\n<p>And, it seems, it&#8217;s open for business. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1889\/-8120\/detecting-cyber-attacks-as-a-small-to-medium-business?td=wptl1889\">Detecting cyber attacks as a small to medium business<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/01\/18\/google_geofence_warrant\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Investigators ask Chocolate Factory to help them connect the geographic dots At 1030 on April 27, 2019, four unidentified individuals attempted to rob a Brinks armored truck parked outside of Michaels, an art supply and home decor store at the Point Loomis Shopping Center in Milwaukee, Wisconsin. To find out who they are, local authorities plan to ask Google.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32846,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-32845","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>To catch a thief, go to Google with a geofence warrant \u2013 and it will give you all the details 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"To catch a thief, go to Google with a geofence warrant \u2013 and it will give you all the details 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-18T14:06:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"To catch a thief, go to Google with a geofence warrant \u2013 and it will give you all the details\",\"datePublished\":\"2020-01-18T14:06:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\\\/\"},\"wordCount\":476,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\\\/\",\"name\":\"To catch a thief, go to Google with a geofence warrant \u2013 and it will give you all the details 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details.jpg\",\"datePublished\":\"2020-01-18T14:06:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"To catch a thief, go to Google with a geofence warrant \u2013 and it will give you all the details\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"To catch a thief, go to Google with a geofence warrant \u2013 and it will give you all the details 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/","og_locale":"en_US","og_type":"article","og_title":"To catch a thief, go to Google with a geofence warrant \u2013 and it will give you all the details 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-18T14:06:10+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"To catch a thief, go to Google with a geofence warrant \u2013 and it will give you all the details","datePublished":"2020-01-18T14:06:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/"},"wordCount":476,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/","url":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/","name":"To catch a thief, go to Google with a geofence warrant \u2013 and it will give you all the details 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details.jpg","datePublished":"2020-01-18T14:06:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/to-catch-a-thief-go-to-google-with-a-geofence-warrant-and-it-will-give-you-all-the-details\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"To catch a thief, go to Google with a geofence warrant \u2013 and it will give you all the details"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32845"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32845\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32846"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}