{"id":52669,"date":"2022-06-26T07:19:49","date_gmt":"2022-06-26T12:19:49","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=52669"},"modified":"2022-06-26T07:19:49","modified_gmt":"2022-06-26T12:19:49","slug":"bustle-this-netflix-doc-shows-how-an-irs-scammer-uncovered-secret-spy-technology","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=52669","title":{"rendered":"Bustle: This Netflix Doc Shows How An IRS Scammer Uncovered Secret Spy Technology"},"content":{"rendered":"\n<p>Bustle: <a href=\"https:\/\/www.bustle.com\/entertainment\/where-daniel-rigmaiden-is-now-web-of-make-believe\">This Netflix Doc Shows How An IRS Scammer Uncovered Secret Spy Technology<\/a> by Gretchen Smail (referring to Stringray):<\/p>\n\n\n\n<!--more-->\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Technology has often been used to deceive and misinform the general public, as Netflix\u2019s true crime anthology Web of Make Believe: Death, Lies and the Internet clearly points out. While early episodes explore what \u201cswatting\u201d is and the tragic murder of a political staffer, the final two episodes of the series revolve around Daniel Rigmaiden, who schemed to defraud the Internal Revenue Service but ended up stumbling onto secret surveillance tech that law enforcement agencies were using to spy on people\u2019s cellphones. \u201cI never really wanted to commit crimes,\u201d Rigmaiden explains in Episode 5. \u201cThe crimes were a necessary evil to get around a system I didn\u2019t believe in.\u201d<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Bustle: This Netflix Doc Shows How An IRS Scammer Uncovered Secret Spy Technology by Gretchen Smail (referring to Stringray):<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[82,76],"tags":[],"class_list":["post-52669","post","type-post","status-publish","format-standard","hentry","category-cs-sim","category-surveillance-technology"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/52669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=52669"}],"version-history":[{"count":1,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/52669\/revisions"}],"predecessor-version":[{"id":52670,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/52669\/revisions\/52670"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=52669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=52669"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=52669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}