Matthew C. Devlin, a former Lehman Brothers broker who gleaned tips about pending mergers from his wife, a partner at a high-powered public relations firm, has been charged in a wide-ranging insider trading scheme that earned $4.8 million in profits for several people including a former Playboy model and two lawyers, authorities said.
The SEC said Devlin took secrets from March 2004 through last July about more than a dozen pending mergers and acquisitions from his wife, Nina, a partner at Brunswick Group LLC, an international public relations firm.
Attorney Jim Benjamin, who represents Nina Devlin, said her husband obtained the information without her knowledge by being close to her and monitoring her travel schedule.
The SEC said Devlin gave the secrets to his clients and friends, including three who worked in the securities or legal professions. (more)
Saturday, December 20, 2008
The Casanova Tour of Venice
...The route to Casanova's cell ran through the original offices of the republic's most powerful bureaucrats. One door led to the chancellor's little no-frills cubicle; it was made with special hinges to create an airtight fit in order to prevent eavesdropping. Next came the State Inquisitor's Room. Then the Torture Room, where prisoners had their... (more)
"NAL UM NFL"
Snitch Culture continues to spread...
Many of the National Football League's 32 teams have implemented a new text-messaging system that allows fans to report disruptive conduct to security. Although fans can still complain to an usher in person, the text messaging system allows fans to alert security without missing any of the game or getting physically involved in a conflict. Teams are asking fans to help identify disruptive behavior as part of a league-wide initiative to crackdown on fan misconduct. (more)
Many of the National Football League's 32 teams have implemented a new text-messaging system that allows fans to report disruptive conduct to security. Although fans can still complain to an usher in person, the text messaging system allows fans to alert security without missing any of the game or getting physically involved in a conflict. Teams are asking fans to help identify disruptive behavior as part of a league-wide initiative to crackdown on fan misconduct. (more)
Labels:
amateur,
business,
cell phone,
FutureWatch,
mores,
sports
Friday, December 19, 2008
Want to spy? Offer to build their network!
Australia - National security concerns about Chinese espionage could threaten the new frontrunner for Australia's $15 billion publicly backed national broadband network.
Security agencies will closely examine the bid lodged by Singtel Optus, which is believed to propose the involvement of Chinese telecommunications equipment-maker Huawei Technologies to help build its network.
Huawei was the subject of a US congressional investigation on national security grounds this year after legislators expressed concern about its links to the Chinese military and intelligence apparatus. The concerns led Huawei to withdraw from its joint $US2.2billion ($3.3billion) bid to buy a stake in US internet router and networking giant 3Com. (more)
Security agencies will closely examine the bid lodged by Singtel Optus, which is believed to propose the involvement of Chinese telecommunications equipment-maker Huawei Technologies to help build its network.
Huawei was the subject of a US congressional investigation on national security grounds this year after legislators expressed concern about its links to the Chinese military and intelligence apparatus. The concerns led Huawei to withdraw from its joint $US2.2billion ($3.3billion) bid to buy a stake in US internet router and networking giant 3Com. (more)
Employee vs. Boss = Spy vs. Spy
A cautionary tale, excerpted from...
Chained Exploits: Advanced Hacking Attacks from Start to Finish
"Phoenix knows that Mr. Minutia has been spying on him for some time now. Phoenix sees Mr. Minutia at his desk, shuffling through papers, whenever he leaves his desk to go to the copy machine. Phoenix notices Mr. Minutia walk over to his desk whenever he is on the phone to eavesdrop on his conversations. Now Mr. Minutia has taken it to the next step by reading all of Phoenix’s e-mails and reviewing the Web sites Phoenix views.
The word hypocrite echoes in Phoenix’s mind. He knows his boss spends the majority of his time at work surfing the Internet. Phoenix is not sure what his boss is looking at, but Phoenix is determined to find out because he suspects it might not be work related. Then Phoenix can approach Mr. Minutia with a taste of his own medicine and expose his Internet-surfing habits. Phoenix begins to plot how he is going to spy on his boss." (more)
Make sure your employees are not spying on you.
Hey, there are textbooks writing about this.
Inspect for electronic surveillance regularly.
Chained Exploits: Advanced Hacking Attacks from Start to Finish
"Phoenix knows that Mr. Minutia has been spying on him for some time now. Phoenix sees Mr. Minutia at his desk, shuffling through papers, whenever he leaves his desk to go to the copy machine. Phoenix notices Mr. Minutia walk over to his desk whenever he is on the phone to eavesdrop on his conversations. Now Mr. Minutia has taken it to the next step by reading all of Phoenix’s e-mails and reviewing the Web sites Phoenix views.
The word hypocrite echoes in Phoenix’s mind. He knows his boss spends the majority of his time at work surfing the Internet. Phoenix is not sure what his boss is looking at, but Phoenix is determined to find out because he suspects it might not be work related. Then Phoenix can approach Mr. Minutia with a taste of his own medicine and expose his Internet-surfing habits. Phoenix begins to plot how he is going to spy on his boss." (more)
Make sure your employees are not spying on you.
Hey, there are textbooks writing about this.
Inspect for electronic surveillance regularly.
Amazing Stories #101 - "Chief speak with forked tongue?"
NC - The state auditor's office has more than 234 laptop computers that lack encryption software to guard against security lapses, a political newsletter reported today.
The Insider, an e-mail newsletter published by The News & Observer, cited correspondence from George Bakolia, the state's chief information officer, showing that the software has not been a high priority for the auditor's office.
Bakolia's office issued standards in December 2007 calling for state agencies to put encryption software on laptops. (more)
The Insider, an e-mail newsletter published by The News & Observer, cited correspondence from George Bakolia, the state's chief information officer, showing that the software has not been a high priority for the auditor's office.
Bakolia's office issued standards in December 2007 calling for state agencies to put encryption software on laptops. (more)
Labels:
business,
computer,
data,
employee,
encryption,
government,
leaks,
weird
via Forbes magazine...
On Thursday researchers at Finnish cybersecurity firm F-Secure said they have spotted the first known instance of iPhone "spyware" called Mobile Spy, a piece of commercial software that sells for $99 a year. (more)
On Thursday researchers at Finnish cybersecurity firm F-Secure said they have spotted the first known instance of iPhone "spyware" called Mobile Spy, a piece of commercial software that sells for $99 a year. (more)
Watergate's 'Deep Throat' Dies
W. Mark Felt, the former FBI second-in-command who revealed himself as "Deep Throat" 30 years after he tipped off reporters to the Watergate scandal that toppled a president, has died. He was 95. (more)
Thursday, December 18, 2008
This Man Is Wanted...
...by you, if you have a computer network to protect.
His name is Gideon J. Lenkey.
This is his story...
"The job starts like any other. We park down the street so we can just barely see the target. We wait patiently to get the rhythm of the smokers popping in and out of the side door. Waiting until no one's there, we walk up, holding cigarette butts (neither of us smokes) and wait for the door to open. Crush the butt into the ash tray, nod to the person holding the door, and we're in. Now to find an empty office or conference room -- any place we can access the company network.
This time we're lucky -- there is a dark conference room not far from the smoking door, so we don't have to walk the halls for very long. We go in, close the door, there is a PC in the corner as there usually is these days. We're almost done, I think. In 15 minutes we'll be back in the car snickering about how easy it was and suggesting that stupidity should be more physically painful..."
What happens next is not what you expect. (more)
His name is Gideon J. Lenkey.
This is his story...
"The job starts like any other. We park down the street so we can just barely see the target. We wait patiently to get the rhythm of the smokers popping in and out of the side door. Waiting until no one's there, we walk up, holding cigarette butts (neither of us smokes) and wait for the door to open. Crush the butt into the ash tray, nod to the person holding the door, and we're in. Now to find an empty office or conference room -- any place we can access the company network.
This time we're lucky -- there is a dark conference room not far from the smoking door, so we don't have to walk the halls for very long. We go in, close the door, there is a PC in the corner as there usually is these days. We're almost done, I think. In 15 minutes we'll be back in the car snickering about how easy it was and suggesting that stupidity should be more physically painful..."
What happens next is not what you expect. (more)
First iPhone Spy Software Hits the Market
Retina-X Studios, LLC, announced today the immediate availability of Mobile Spy for the Apple iPhone. Using this groundbreaking iPhone spy technology, users can silently monitor incoming and outgoing text messages (SMS) and call information of children or employees - even if activity logs are erased. (more)
Spybusters Tip #387
Keep in mind that this only for 2nd generation iPhones (3G), and it only let's the spy see a log of calls and SMS text messages. There is no eavesdropping on the call itself. Installation requires "jailbreaking" the iPhone first.
The manufacturer's spyware removal instructions.
(Not yet updated to include iPhone, but should be soon.)
Spybusters Tip #387
Keep in mind that this only for 2nd generation iPhones (3G), and it only let's the spy see a log of calls and SMS text messages. There is no eavesdropping on the call itself. Installation requires "jailbreaking" the iPhone first.
The manufacturer's spyware removal instructions.
(Not yet updated to include iPhone, but should be soon.)
Ring, ring, it’s Rod
Press ‘3’ for corruption
You can no longer buy a Senate seat from Illinois Gov. Rod Blagojevich, but you can buy “his” ringtones. FunMobility.com, a company based in Pleasanton, Calif., has released five new “Blagotones”... Two of the funniest ringtones are called “Wiretap” and have such quotes from an impersonator saying, “If I don’t get what I want ... I’ll just take the Senate seat myself” and “Our recommendation is to fire all the [expletive] people ... and get us some editorial support” (referring to Blagojevich’s alleged attempt to pressure the Chicago Tribune). (more)
This was my first close look at the ringtone biz.
Did you know these things cost $8.99 ...per month!?!?
Sorta takes the edge off of Blago's alleged crimes.
You can no longer buy a Senate seat from Illinois Gov. Rod Blagojevich, but you can buy “his” ringtones. FunMobility.com, a company based in Pleasanton, Calif., has released five new “Blagotones”... Two of the funniest ringtones are called “Wiretap” and have such quotes from an impersonator saying, “If I don’t get what I want ... I’ll just take the Senate seat myself” and “Our recommendation is to fire all the [expletive] people ... and get us some editorial support” (referring to Blagojevich’s alleged attempt to pressure the Chicago Tribune). (more)
This was my first close look at the ringtone biz.
Did you know these things cost $8.99 ...per month!?!?
Sorta takes the edge off of Blago's alleged crimes.
Thus, the hunter becomes the hunted...
Germany - German prosecutors on Wednesday said one person has been arrested in a scandal at Deutsche Telekom AG that involved monitoring managers' call records to track possible leaks.
Media reports have identified the suspect as Klaus T., a former head of Telekom's division for internal investigations. According to the daily Sueddeutsche Zeitung, he is suspected of fraud for embezzlement and authorizing payments for business that violates company policy. (more)
Media reports have identified the suspect as Klaus T., a former head of Telekom's division for internal investigations. According to the daily Sueddeutsche Zeitung, he is suspected of fraud for embezzlement and authorizing payments for business that violates company policy. (more)
Spybusters Tip #386 - Your Possessed Computer
Is your computer acting a little freaky?
Are you seeing random mouse movements?
Is the 'caps lock' turning on and off by itself?
Is your computer typing random garbage?
Or, burping up odd phrases?
"Who you gonna call?"
In this case, not us!
Spybusters Tip #386 to the rescue...
Check your USB ports for this.
Are you seeing random mouse movements?
Is the 'caps lock' turning on and off by itself?
Is your computer typing random garbage?
Or, burping up odd phrases?
"Who you gonna call?"
In this case, not us!
Spybusters Tip #386 to the rescue...
Check your USB ports for this.
Cheney Understands the Power of Eavesdropping
In a chilling, unapologetic interview with ABC News, the vice president did nothing to dispel his reputation as the hardest of hard-liners in the war on terror... Wiretapping? "It's worked. It's been successful," he said, brushing off constitutional quibbles. (more)
No doubt about it. Bugs and wiretaps are extremely effective... which is why businesses inspect their sensitive areas quarterly to make sure electronic surveillance is not being used against them!
No doubt about it. Bugs and wiretaps are extremely effective... which is why businesses inspect their sensitive areas quarterly to make sure electronic surveillance is not being used against them!
Leaks Are Costly ($310,760.00 in this case)
UK - A police inquiry into the leaking of information, which ended with a judge clearing a Milton Keynes journalist, cost £205,000 it has been revealed. (more)
Conversely, preventing leaks is cheap.
Conversely, preventing leaks is cheap.
Subscribe to:
Posts (Atom)