A Japanese research team has revealed it had created a technology that could eventually display on a computer screen what people have on their minds, such as dreams.
Researchers at the ATR Computational Neuroscience Laboratories succeeded in processing and displaying images directly from the human brain, they said in a study unveiled ahead of publication in the US magazine Neuron.
While the team for now has managed to reproduce only simple images from the brain, they said the technology could eventually be used to figure out dreams and other secrets inside people's minds. (more)
Thursday, December 11, 2008
Bad Economy = Watch Your Corporate Assets
Two stories today warn employee crime increases during tough times.
Businesses Say Theft by Their Workers Is Up
Companies Find That Trusted Employees Often Commit the Crimes, and They Believe the Recession Is to Blame (more)
Economic Woes May Bring out the Worst in IT Staff
IBM Corp.'s ISS X-Force research team reports that its Web-based monitors have picked up a 30 percent increase in network and Internet-related security events in the last 120 days. Worldwide, the total number of such events has risen from 1.8 billion to 2.5 billion. "With a little planning and forethought, a disgruntled employee can do a lot of damage with little fear of being caught and prosecuted," said IBM security expert Gunter Ollman... (more)
Biggest return for the lowest risk... your intellectual property and privacy. Keep alert. Conduct information security audits regularly.
Businesses Say Theft by Their Workers Is Up
Companies Find That Trusted Employees Often Commit the Crimes, and They Believe the Recession Is to Blame (more)
Economic Woes May Bring out the Worst in IT Staff
IBM Corp.'s ISS X-Force research team reports that its Web-based monitors have picked up a 30 percent increase in network and Internet-related security events in the last 120 days. Worldwide, the total number of such events has risen from 1.8 billion to 2.5 billion. "With a little planning and forethought, a disgruntled employee can do a lot of damage with little fear of being caught and prosecuted," said IBM security expert Gunter Ollman... (more)
Biggest return for the lowest risk... your intellectual property and privacy. Keep alert. Conduct information security audits regularly.
The New Age of Wiretapping
The New Age of Wiretapping
Law enforcement is using new eavesdropping techniques
(video) ...many of the same audio/video eavesdropping tools are also available to people engaged in business espionage.
Law enforcement is using new eavesdropping techniques
(video) ...many of the same audio/video eavesdropping tools are also available to people engaged in business espionage.
Labels:
business,
eavesdropping,
espionage,
FBI,
police,
wiretapping
How Did Feds Listen In on Blagojevich?
Court records from the investigation into Illinois Gov. Rod Blagojevich are filled with recorded conversations of the governor allegedly offering to sell an appointment to President-elect Barack Obama's former U.S. Senate seat. How did the government find out what he was saying?
Federal investigators tapped Blagojevich's home phone and bugged his personal office and a conference room in the Friends of Blagojevich campaign headquarters. Officials began listening to conversations in late October, the court documents say.
Former law enforcement officials and security experts, who were not familiar with the details of the investigation, said it may be easier than one would think to listen in on private conversations, even those of a governor...
"It's amazing to me how easy it is to get into most places," said Kevin Murray, a security consultant. "Locks and alarms are not really good enough to deter espionage." [speaking about covert entry into commercial buildings]
Listening devices can be very small and easily concealed, with some so tiny they can "fit underneath your fingernail," said Murray. Bugs have been placed inside walls, in light fixtures, lamps, phones and coasters. (more)
Federal investigators tapped Blagojevich's home phone and bugged his personal office and a conference room in the Friends of Blagojevich campaign headquarters. Officials began listening to conversations in late October, the court documents say.
Former law enforcement officials and security experts, who were not familiar with the details of the investigation, said it may be easier than one would think to listen in on private conversations, even those of a governor...
"It's amazing to me how easy it is to get into most places," said Kevin Murray, a security consultant. "Locks and alarms are not really good enough to deter espionage." [speaking about covert entry into commercial buildings]
Listening devices can be very small and easily concealed, with some so tiny they can "fit underneath your fingernail," said Murray. Bugs have been placed inside walls, in light fixtures, lamps, phones and coasters. (more)
Labels:
eavesdropping,
espionage,
FBI,
government,
KDM,
political,
wiretapping
Man fined for selling illegal 'spy bug' kits
UK - A businessman has been fined thousands of pounds for selling illegal spy equipment that could have interfered with aircraft – and even Ministry of Defence communications.
The "spy bugs" were sold by Umesh Bharakhada (43), of Millers Close, Syston.
The bugs used the same radio frequencies as the aviation industry and could disrupt communications with aircraft flying overhead.
Bharakhada made the illegal kit and sold it on to surveillance supply firms in Chesterfield and Coventry – who sold it on to anyone who asked, city magistrates were told...
He was fined £4,200 and ordered to pay £6,000 in legal costs... It is the second time he has been fined. In 2003, he was prosecuted for selling bugging devices to private investigation companies to eavesdrop on conversations. (more)
The "spy bugs" were sold by Umesh Bharakhada (43), of Millers Close, Syston.
The bugs used the same radio frequencies as the aviation industry and could disrupt communications with aircraft flying overhead.
Bharakhada made the illegal kit and sold it on to surveillance supply firms in Chesterfield and Coventry – who sold it on to anyone who asked, city magistrates were told...
He was fined £4,200 and ordered to pay £6,000 in legal costs... It is the second time he has been fined. In 2003, he was prosecuted for selling bugging devices to private investigation companies to eavesdrop on conversations. (more)
From the police blotter... eavesdropping arrest
GA - Terry McCrary, 40, 29 Woodland Circle, Columbus, was charged Friday with unlawful eavesdropping and surveillance. (source)
Another Political Hack in Illinois (not Blago)
Steinbach accuses mayor of spying
Former rival says Calderone hacked municipal e-mail accounts
IL - Using information gleaned from the hard drives of a dozen village-owned computers, former commissioner Theresa Steinbach has named Mayor Anthony Calderone, her next-door neighbor, as the culprit responsible for allegedly hacking into her municipal e-mail account.
The accusation was filed in federal court this month as an amendment to the 2006 suit in which Steinbach accused three unknown Forest Park officials of privacy violations. Supporting the accusation is a third-party report that concludes the mayor's laptop was used to access the e-mail accounts of five employees and public officials, including Steinbach's. (more)
Former rival says Calderone hacked municipal e-mail accounts
IL - Using information gleaned from the hard drives of a dozen village-owned computers, former commissioner Theresa Steinbach has named Mayor Anthony Calderone, her next-door neighbor, as the culprit responsible for allegedly hacking into her municipal e-mail account.
The accusation was filed in federal court this month as an amendment to the 2006 suit in which Steinbach accused three unknown Forest Park officials of privacy violations. Supporting the accusation is a third-party report that concludes the mayor's laptop was used to access the e-mail accounts of five employees and public officials, including Steinbach's. (more)
"Hugh jump in surveillance equipment sales."
A UK internet retailer specialising in surveillance equipment is reporting a huge jump in sales. Spy Catcher Online is the internet retail outlet of the Spy Master Store located in Central London...
Director Julia Wing says the credit crunch is encouraging people to use their products to get concrete evidence of deals reached with other parties. 'People want to have, on record, what someone has agreed to,' she says. (more)
Director Julia Wing says the credit crunch is encouraging people to use their products to get concrete evidence of deals reached with other parties. 'People want to have, on record, what someone has agreed to,' she says. (more)
Wednesday, December 10, 2008
Sales Trump Security Again - Hacker's Cheer
Motorola sees all LANs wireless in future...
Corporate networks will increasingly be deployed using wireless technology. ...69 percent of IT directors said they planned to make their LAN completely wireless by 2010, providing key concerns were met...
Businesses may still have concerns over wireless with regards to the security of the technology against eavesdropping, performance of the network, and its reliability.
However, Angelo Lamme, wireless director of Motorola's Enterprise Mobility, said that the newer 802.11n equipment now being deployed addresses many of these concerns. (more)
Just "many"; not all? Which ones?
Hit the brakes!
screeeech!!!!!!!!
What could possibly go wrong?!?!
• Hackers have already cracked every level of Wi-Fi security.
• Laptop users are already corporate info-sieves due to WiPhishing and Evil Twin loopholes.
• And, public access Wi-Fi is a data voyeur's delight.
Advice: Demand better before you pull out the corporate wallet, and unlock your info-vault.
Corporate networks will increasingly be deployed using wireless technology. ...69 percent of IT directors said they planned to make their LAN completely wireless by 2010, providing key concerns were met...
Businesses may still have concerns over wireless with regards to the security of the technology against eavesdropping, performance of the network, and its reliability.
However, Angelo Lamme, wireless director of Motorola's Enterprise Mobility, said that the newer 802.11n equipment now being deployed addresses many of these concerns. (more)
Just "many"; not all? Which ones?
Hit the brakes!
screeeech!!!!!!!!
What could possibly go wrong?!?!
• Hackers have already cracked every level of Wi-Fi security.
• Laptop users are already corporate info-sieves due to WiPhishing and Evil Twin loopholes.
• And, public access Wi-Fi is a data voyeur's delight.
Advice: Demand better before you pull out the corporate wallet, and unlock your info-vault.
Take the CIA Personality Quiz
Think you are ready for a career with the CIA. Let's see what they think about you... Take "The CIA Personality Quiz" They have many job openings and are looking for selfish types... self-reliant, self-disciplined, self-starters.
Here is what they had to say about me...
Guess I'll keep my day job.
(another spy personality quiz)
Corporate spies clean up
via money.cnn.com...
The financial crisis means boom times for spooks-for-hire.
NEW YORK (Fortune) -- If James Bond's "License to Kill" gets revoked, he'd have no problem finding work as a corporate spy. To the short list of sectors that stand to gain from the financial crisis, add corporate intelligence firms. They are seeing a dramatic uptick in business... (more)
Legal corporate Paladins are only half the story. Covert corporate moles are also having "boom times"; tapping disgruntled employees to plant bugs and feed them inside information. Very lucrative for all concerned.
The financial crisis means boom times for spooks-for-hire.
NEW YORK (Fortune) -- If James Bond's "License to Kill" gets revoked, he'd have no problem finding work as a corporate spy. To the short list of sectors that stand to gain from the financial crisis, add corporate intelligence firms. They are seeing a dramatic uptick in business... (more)
Legal corporate Paladins are only half the story. Covert corporate moles are also having "boom times"; tapping disgruntled employees to plant bugs and feed them inside information. Very lucrative for all concerned.
Tuesday, December 9, 2008
The Underestimated Power of Bugs and Wiretaps
2008 – A year of memorable bug and tap stories...
• New York, Governor Elliot Spitzer
• Illinois, Governor Rod Blagojevich
"If anybody wants to tape my conversations, go right ahead, feel free to do it. I appreciate anybody who wants to tape me openly and notoriously. And those who feel like they wanna sneakily and wear taping devices, I would remind them that it kinda smells like Nixon and Watergate." Spoken the day before his arrest.
• Nevada, O.J. Simpson
• California, Hollywood Private Investigator, Anthony Pellicano
Each person failed to respect the power of electronic surveillance. Sheer arrogance.
In the private sector, electronic surveillance works just as well for "getting the goods." The difference is that business respects the havoc electronic surveillance can bring. Because they respect, they inspect. Frequent eavesdropping detection audits of sensitive offices, conference rooms, executive homes, off-site meetings, etc. are a standard practice.
I know. I help businesses keep their business from becoming front-page news, or worse. Need some help? Just let me know.
~ Kevin
• New York, Governor Elliot Spitzer
• Illinois, Governor Rod Blagojevich
"If anybody wants to tape my conversations, go right ahead, feel free to do it. I appreciate anybody who wants to tape me openly and notoriously. And those who feel like they wanna sneakily and wear taping devices, I would remind them that it kinda smells like Nixon and Watergate." Spoken the day before his arrest.
• Nevada, O.J. Simpson
• California, Hollywood Private Investigator, Anthony Pellicano
Each person failed to respect the power of electronic surveillance. Sheer arrogance.
In the private sector, electronic surveillance works just as well for "getting the goods." The difference is that business respects the havoc electronic surveillance can bring. Because they respect, they inspect. Frequent eavesdropping detection audits of sensitive offices, conference rooms, executive homes, off-site meetings, etc. are a standard practice.
I know. I help businesses keep their business from becoming front-page news, or worse. Need some help? Just let me know.
~ Kevin
Monday, December 8, 2008
FutureWatch - RFID License Plates "...knows when you've been speeding."
The European Union is spending $10.3 million on wireless tracking systems designed to allow authorities to issue automated tickets for increasingly minor traffic infractions.
Radio Frequency Identification (RFID) is a key component in achieving the goal described as "traffic violations detected in a flash." Many of the ideas have already made their way to the United States. (more)
RFID Plates Are Coming to Town
You better watch out
You better not lie
Better not speed
I'm telling you why
RFID plates are coming to town
They're making a list
And checking it twice
Gonna find out who's driving ain't nice
RFID plates are coming to town
They'll see you when you're speeding
They'll toll you at the gate
They'll know if you're tailgating
So back off for goodness sake!
O! You better watch out!
You better not lie
Better not speed
I'm telling you why
RFID plates are coming to town
Radio Frequency Identification (RFID) is a key component in achieving the goal described as "traffic violations detected in a flash." Many of the ideas have already made their way to the United States. (more)
RFID Plates Are Coming to Town
You better watch out
You better not lie
Better not speed
I'm telling you why
RFID plates are coming to town
They're making a list
And checking it twice
Gonna find out who's driving ain't nice
RFID plates are coming to town
They'll see you when you're speeding
They'll toll you at the gate
They'll know if you're tailgating
So back off for goodness sake!
O! You better watch out!
You better not lie
Better not speed
I'm telling you why
RFID plates are coming to town
Labels:
FutureWatch,
government,
police,
privacy,
product,
tracking
Controlling Brain Sucking Spiders - DeviceLock
from the manufacturer's website...
"Firewalls and antivirus software are no defense against acts of data theft and corruption from within your organization at local endpoints. You don't have to be an administrator to connect a small digital camera, MP3 player, or flash memory stick to the USB and begin uploading or downloading whatever you want. If you are a system administrator, you know you can't manage such device-level activity via Group Policy.
Using endpoint device security solution called DeviceLock®, network administrators can lock out unauthorized users from USB and FireWire devices, WiFi and Bluetooth adapters, CD-Rom and floppy drives, serial and parallel ports, PDAs and smartphones, local and network printers and many other plug-and-play devices. Once DeviceLock® is installed, administrators can control access to any device, depending on the time of day and day of the week.
For enterprises standardized on software and hardware-based encryption solutions like PGP® Whole Disk Encryption, TrueCrypt and Lexar® SAFE PSD S1100 USB drives, DeviceLock® allows administrators to centrally define and remotely control the encryption policies their employees must follow when using removable devices for storing and retrieving corporate data. For example, certain employees or their groups can be allowed to write to and read from only specifically encrypted USB flash drives, while other users of the corporate network can be permitted to "read only" from non-encrypted removable storage devices but not write to them. (more)
"Firewalls and antivirus software are no defense against acts of data theft and corruption from within your organization at local endpoints. You don't have to be an administrator to connect a small digital camera, MP3 player, or flash memory stick to the USB and begin uploading or downloading whatever you want. If you are a system administrator, you know you can't manage such device-level activity via Group Policy.
Using endpoint device security solution called DeviceLock®, network administrators can lock out unauthorized users from USB and FireWire devices, WiFi and Bluetooth adapters, CD-Rom and floppy drives, serial and parallel ports, PDAs and smartphones, local and network printers and many other plug-and-play devices. Once DeviceLock® is installed, administrators can control access to any device, depending on the time of day and day of the week.
For enterprises standardized on software and hardware-based encryption solutions like PGP® Whole Disk Encryption, TrueCrypt and Lexar® SAFE PSD S1100 USB drives, DeviceLock® allows administrators to centrally define and remotely control the encryption policies their employees must follow when using removable devices for storing and retrieving corporate data. For example, certain employees or their groups can be allowed to write to and read from only specifically encrypted USB flash drives, while other users of the corporate network can be permitted to "read only" from non-encrypted removable storage devices but not write to them. (more)
Sunday, December 7, 2008
Bambi... and her spy past...
Did you know...
"The book “Bambi: A Life in the Woods,” on which the Disney movie was based, was translated from German to English by Whittaker Chambers, the famous Soviet spy." (source)
"The book “Bambi: A Life in the Woods,” on which the Disney movie was based, was translated from German to English by Whittaker Chambers, the famous Soviet spy." (source)
Subscribe to:
Posts (Atom)