Italian prime minister Silvio Berlusconi does not rule out a vote of confidence on the wiretap bill. Speaking to SkyTg24 he stated that "It would be better not to have a vote of confidence, but if we run into the slightest opposition we will immediately call a vote of confidence". Berlusconi pointed out that wiretaps cost the State 400 million euro every year, and that "the right to privacy is fundamental". (more) (background)
Photographers – Next on The List
Italian PM Silvio Berlusconi has reacted angrily to the publication in Spain of photographs showing topless women and a naked man at his villa. He has threatened to sue Spain's El Pais newspaper, calling the photos an invasion of privacy. The photos - banned in Italy on privacy grounds - were taken from outside Mr Berlusconi's villa in Sardinia during a party for a Czech delegation. (more)
Friday, June 5, 2009
SpyCam Story #534 - Almost Identical to #531
NY - West Seneca Police have arrested a man they say used a camera to spy on his ex-girlfriends teenage daughter. Police say 38-year old Richard R. Vieira installed the camera inside the 19-year old's bedroom and videotaped her getting undressed. Police say Vieira had DVD copies of the video. Vieira's ex-girlfriend discovered the camera equipment but only after Vieira had already moved out of her home. (more)
Fuzzbusters Busted - Bug held photo of bugger
Korea - Two reporters from a local news agency were taken into custody on suspicion of attempting to eavesdrop on a meeting convened by the national police chief, investigators said yesterday.
According to police, the journalists installed a small recorder at a restaurant in Suwon, some 46 kilometers (29 miles) south of Seoul, where National Police Agency Commissioner Kang Hee-rak was hosting a dinner with senior police officers. (more)
UPDATE - The Gyeonggi Police Agency said the reporters from Asia News Agency installed an MP3 player with recording function on the ceiling of a restaurant in Suwon, Gyeonggi Province, where National Police Agency Commissioner Kang Hee-rak was hosting a banquet Thursday for nearly 40 senior police officers in the province.
The event was held after Kang's regular inspection of police stations there, police said.
Choi Won-il, who was at the banquet, said, "At around 8:20, a restaurant employee informed me that a couple of people with suspicious gadgets had dropped by the restaurant before the dinner began."
Choi and restaurant employees searched the venue and found a recorder attached to the ceiling.
Police found a picture of one of the reporters saved on the gadget. During questioning, the journalist confessed to having installed the recorder with two other colleagues. (more)
According to police, the journalists installed a small recorder at a restaurant in Suwon, some 46 kilometers (29 miles) south of Seoul, where National Police Agency Commissioner Kang Hee-rak was hosting a dinner with senior police officers. (more)
UPDATE - The Gyeonggi Police Agency said the reporters from Asia News Agency installed an MP3 player with recording function on the ceiling of a restaurant in Suwon, Gyeonggi Province, where National Police Agency Commissioner Kang Hee-rak was hosting a banquet Thursday for nearly 40 senior police officers in the province.
The event was held after Kang's regular inspection of police stations there, police said.
Choi Won-il, who was at the banquet, said, "At around 8:20, a restaurant employee informed me that a couple of people with suspicious gadgets had dropped by the restaurant before the dinner began."
Choi and restaurant employees searched the venue and found a recorder attached to the ceiling.
Police found a picture of one of the reporters saved on the gadget. During questioning, the journalist confessed to having installed the recorder with two other colleagues. (more)
Thursday, June 4, 2009
SpyCam Story #533 - Blinky the TV Spy
The California Supreme Court seemed unlikely Wednesday to authorize employers to spy on their workers with hidden cameras.
At the same time, some members of the state high court appeared skeptical that two women who discovered a surveillance camera in their office had suffered serious harm. The women said they suffered emotional distress when they discovered the camera by chance after noticing a blinking red light. (more)
At the same time, some members of the state high court appeared skeptical that two women who discovered a surveillance camera in their office had suffered serious harm. The women said they suffered emotional distress when they discovered the camera by chance after noticing a blinking red light. (more)
Suit Suits the Black Suits - EFF & ACLU Dispute
A U.S. District Court on Wednesday dismissed lawsuits against telecommunications companies in a warrantless wiretap case, ruling that former President George W. Bush's administration had properly requested the cases closed for national security reasons.
Companies including AT&T Inc and Verizon Communications Inc faced dozens of suits accusing them of improper participation in a warrantless wiretap program launched by Bush after the September 11 attack...
The Electronic Frontier Foundation and the American Civil Liberties Union, which are coordinating the cases, said they would appeal, arguing the amended act was unconstitutional. (more)
Companies including AT&T Inc and Verizon Communications Inc faced dozens of suits accusing them of improper participation in a warrantless wiretap program launched by Bush after the September 11 attack...
The Electronic Frontier Foundation and the American Civil Liberties Union, which are coordinating the cases, said they would appeal, arguing the amended act was unconstitutional. (more)
"How silly can you get?"
US - The Pentagon may have issued top-secret clearances last year to as many as one-in-four applicants who had "significant derogatory information" in their backgrounds, including a record of foreign influence or criminal conduct, a little-noticed government audit says. (more) (sing-a-long)
Ok, so your company is not The Pentagon, but it is as important to you as the United States is to a General. You depend on your employees not picking your intellectual pockets.
• Do you conduct background checks on key employees?
• Do you have them sign an intellectual property agreement?
• Do you have legally acceptable security measures in place?
• When was the last time you had your offices checked for illegal electronic surveillance?
UPDATE (the very next day) - A Pentagon official with "top secret" security Clearance has been charged with conspiracy to pass classified information to an Agent of China, officials said Wednesday.
Retired air force Lieutenant Colonel James Wilbur Fondren, a deputy Director of the US Pacific Command's Washington Liaison Office, became the fourth person targeted after a Chinese espionage ring was unmasked last year. (more)
Ok, so your company is not The Pentagon, but it is as important to you as the United States is to a General. You depend on your employees not picking your intellectual pockets.
• Do you conduct background checks on key employees?
• Do you have them sign an intellectual property agreement?
• Do you have legally acceptable security measures in place?
• When was the last time you had your offices checked for illegal electronic surveillance?
UPDATE (the very next day) - A Pentagon official with "top secret" security Clearance has been charged with conspiracy to pass classified information to an Agent of China, officials said Wednesday.
Retired air force Lieutenant Colonel James Wilbur Fondren, a deputy Director of the US Pacific Command's Washington Liaison Office, became the fourth person targeted after a Chinese espionage ring was unmasked last year. (more)
Wednesday, June 3, 2009
How to Spy on Your Kid Online
via Fox News...
Trust, But Verify
"The difference between responsible monitoring and spying is the 'Gotcha' factor," says Nurit Sheinberg, Ed.D., director of research and evaluation at the Mailman Segal Institute for Early Childhood Studies at Nova Southeastern University in Fort Lauderdale, FL. If your kids don't know you'll be monitoring their use and you find something and go "Gotcha!" they'll be shocked and probably resentful, and may start hiding things from you. So once you decide how much and what kind of monitoring you'll do, let them in on it.
Your honesty has its perks: If they know you're watching, their self-monitoring instinct will likely kick in. (Of course, kids are masters at finding ways around parental control — more on that later.) One of the best things you can do: Put the computer in a central location. There's no better way to keep an eye on things than to be able to wander by and casually say, "Hey, what website is that?"
Yes, you want to trust your kids. But they're kids — relying on their word may not be enough to keep them safe. (more)
Trust, But Verify
"The difference between responsible monitoring and spying is the 'Gotcha' factor," says Nurit Sheinberg, Ed.D., director of research and evaluation at the Mailman Segal Institute for Early Childhood Studies at Nova Southeastern University in Fort Lauderdale, FL. If your kids don't know you'll be monitoring their use and you find something and go "Gotcha!" they'll be shocked and probably resentful, and may start hiding things from you. So once you decide how much and what kind of monitoring you'll do, let them in on it.
Your honesty has its perks: If they know you're watching, their self-monitoring instinct will likely kick in. (Of course, kids are masters at finding ways around parental control — more on that later.) One of the best things you can do: Put the computer in a central location. There's no better way to keep an eye on things than to be able to wander by and casually say, "Hey, what website is that?"
Yes, you want to trust your kids. But they're kids — relying on their word may not be enough to keep them safe. (more)
SpyCam Story #532 - "The doctor will see you now."
Philippines - Hayden Kho Jr. already said he was to blame for covertly filming his sexual encounters with women. The controversial doctor said he did not upload the video on the Web, and that someone was out to destroy his reputation by leaking those ‘stolen’ videos. But one of the last basic questions that remain unanswered is, “Why did he have the habit of recording his sex acts?" Unfortunately, the controversial doctor has no answer to this question. He said he has been consulting with a psychologist since last year just to get the answers to this question. (more)
SpyCam Story #531 - Bug in the Bathroom
OH - A Casstown-area man is accused of using a spy camera in the bathroom of his home to videotape a 19-year-old female. On Wednesday morning, 43-year-old John Miller was arraigned on charges of wiretapping, three counts of voyeurism, a charge of possession of marijuana and possession of drug paraphernalia. Miller’s bond was set at $11,000. He remains in jail. (more)
Corrections officer sentenced for attempted eavesdropping
MI - William James Johnson, 34, of 127 Michigan Ave., Gladstone, was sentenced to 90 days in the Menominee County Jail on a charge of attempted eavesdropping/installing a device. He is scheduled to report to the jail by 8 p.m. Friday.
According to court records, Johnson attempted to install in the Delta County Sheriff's Department, without the consent of the sheriff, a device for "observing, recording, transmitting, photographing or eavesdropping." (more)
According to court records, Johnson attempted to install in the Delta County Sheriff's Department, without the consent of the sheriff, a device for "observing, recording, transmitting, photographing or eavesdropping." (more)
iPhone SpyWare
from the Web site...
"Mobile Spy is proud to announce the availability of the world's first commercial spy software for the Apple iPhone. Now you can use the powerful monitoring features of Mobile Spy on your iPhone! Works with ALL iPhones!
Mobile Spy will reveal the truth for any company or family using Apple smartphones. You will SILENTLY learn the truth about their calls, text messages and GPS locations by logging into your Mobile Spy account from any web browser." (more)
Why do I mention it?
So you will know what you're up against.
"Mobile Spy is proud to announce the availability of the world's first commercial spy software for the Apple iPhone. Now you can use the powerful monitoring features of Mobile Spy on your iPhone! Works with ALL iPhones!
Mobile Spy will reveal the truth for any company or family using Apple smartphones. You will SILENTLY learn the truth about their calls, text messages and GPS locations by logging into your Mobile Spy account from any web browser." (more)
Why do I mention it?
So you will know what you're up against.
Fight Fire With Fire, Get Fired?
IL - A firefighter in the northern Illinois community of Sycamore has been charged with eavesdropping.
Authorities contend 42-year-old Kurt Mathey recorded a conversation between his fire chief and an assistant chief without their knowledge.
Mathey is out on bond after being indicted on one count of felony eavesdropping. He's on administrative leave from the department.
Mathey is the former president of Sycamore's firefighters union, which has been in heated negotiations with the city for several months. (more)
Authorities contend 42-year-old Kurt Mathey recorded a conversation between his fire chief and an assistant chief without their knowledge.
Mathey is out on bond after being indicted on one count of felony eavesdropping. He's on administrative leave from the department.
Mathey is the former president of Sycamore's firefighters union, which has been in heated negotiations with the city for several months. (more)
TSCM Technical Security Officer - Job Opening
Shift: None
Type of Travel: Continental US, Outside Continental US - Hazard, Local
Percent of Travel Required: Up to 75%
Description: The candidate will assist in all aspects of of TSCM management that involves technical security (including TEMPEST) entailing new construction, modification, accreditation, re-accreditation, withdrawal and advice and assistance (SAV). The candidate will help schedule and perform TSCM evaluations and security staff visits of facilities locate CONUS/OCONUS, provide comprehensive, risk-based technical security advice, guidance, and general security support to program offices and contractor facility security offices. The candidate will prepare written correspondence to include facility file reports, cable messages, approvals, status/technical briefs and inspections reports, SAV reports, maintain databases; which includes entering new data and correspondence and quality controlling file records. Conduct analysis of complex technical, surveillance, counter surveillance, surveillance detection or other technical vulnerabilities. Provide technical support to projects in areas such as training, logistics, acquisition and technical counterintelligence investigations. Assists in developing and monitoring project tasks and schedules. Maintain a thorough knowledge of all technical security governing directives. The candidate must be a graduate of the Interagency Training Center for TSCM and an EXPERT in two of the following areas: a) Counterintelligence , b)Automated Information Systems, c) Lock and Key Control Systems, d) Access Control Systems, g) TEMPEST, h) DoD SCIF construction standards. Experience using a variety of ADP systems that include Microsoft Office applications (e.g. Word, Excel, Outlook, PowerPoint). Requires a Bachelors degree and 10-12 years experience. (more)
"Hazard," ok.
PowerPoint?!?... I'm outta here.
Type of Travel: Continental US, Outside Continental US - Hazard, Local
Percent of Travel Required: Up to 75%
Description: The candidate will assist in all aspects of of TSCM management that involves technical security (including TEMPEST) entailing new construction, modification, accreditation, re-accreditation, withdrawal and advice and assistance (SAV). The candidate will help schedule and perform TSCM evaluations and security staff visits of facilities locate CONUS/OCONUS, provide comprehensive, risk-based technical security advice, guidance, and general security support to program offices and contractor facility security offices. The candidate will prepare written correspondence to include facility file reports, cable messages, approvals, status/technical briefs and inspections reports, SAV reports, maintain databases; which includes entering new data and correspondence and quality controlling file records. Conduct analysis of complex technical, surveillance, counter surveillance, surveillance detection or other technical vulnerabilities. Provide technical support to projects in areas such as training, logistics, acquisition and technical counterintelligence investigations. Assists in developing and monitoring project tasks and schedules. Maintain a thorough knowledge of all technical security governing directives. The candidate must be a graduate of the Interagency Training Center for TSCM and an EXPERT in two of the following areas: a) Counterintelligence , b)Automated Information Systems, c) Lock and Key Control Systems, d) Access Control Systems, g) TEMPEST, h) DoD SCIF construction standards. Experience using a variety of ADP systems that include Microsoft Office applications (e.g. Word, Excel, Outlook, PowerPoint). Requires a Bachelors degree and 10-12 years experience. (more)
"Hazard," ok.
PowerPoint?!?... I'm outta here.
Time to Review and Clean Up Your On Line Act
via Tamara Thompson, PI Magazine...
Intelius is the ubiquitous Internet provider of background reports — serving the consumer hungry for criminal records and other dirt on potential dates, family members and service providers — but more expensive and not as comprehensive as professional databases...
Spock is a fee-based search engine — with a free teaser — for finding social networking profiles. Spock crawls websites, matching the personal information you provide, then returns the links. You’ll probably get more results from snitch.name, Wink or Pipl, and more refined returns from an advanced query at the top search engines. (more)
Time to run your name and delete those old college party photos before you hand in that resume. ~Kevin
Intelius is the ubiquitous Internet provider of background reports — serving the consumer hungry for criminal records and other dirt on potential dates, family members and service providers — but more expensive and not as comprehensive as professional databases...
Spock is a fee-based search engine — with a free teaser — for finding social networking profiles. Spock crawls websites, matching the personal information you provide, then returns the links. You’ll probably get more results from snitch.name, Wink or Pipl, and more refined returns from an advanced query at the top search engines. (more)
Time to run your name and delete those old college party photos before you hand in that resume. ~Kevin
Nuke Web Page Nuked
The federal government mistakenly made public a 266-page report, its pages marked “highly confidential,” that gives detailed information about hundreds of the nation’s civilian nuclear sites and programs, including maps showing the precise locations of stockpiles of fuel for nuclear weapons...
On Tuesday evening, after inquiries from The New York Times, the document was withdrawn from a Government Printing Office Web site. (more)
Finished feeling smug? Now, go check your corporate web site, marketing department, Boardroom and secretarial desks to see what confidential materials you have out for the taking. ~Kevin
On Tuesday evening, after inquiries from The New York Times, the document was withdrawn from a Government Printing Office Web site. (more)
Finished feeling smug? Now, go check your corporate web site, marketing department, Boardroom and secretarial desks to see what confidential materials you have out for the taking. ~Kevin
Subscribe to:
Posts (Atom)