The California Supreme Court seemed unlikely Wednesday to authorize employers to spy on their workers with hidden cameras.
At the same time, some members of the state high court appeared skeptical that two women who discovered a surveillance camera in their office had suffered serious harm. The women said they suffered emotional distress when they discovered the camera by chance after noticing a blinking red light. (more)
Thursday, June 4, 2009
Suit Suits the Black Suits - EFF & ACLU Dispute
A U.S. District Court on Wednesday dismissed lawsuits against telecommunications companies in a warrantless wiretap case, ruling that former President George W. Bush's administration had properly requested the cases closed for national security reasons.
Companies including AT&T Inc and Verizon Communications Inc faced dozens of suits accusing them of improper participation in a warrantless wiretap program launched by Bush after the September 11 attack...
The Electronic Frontier Foundation and the American Civil Liberties Union, which are coordinating the cases, said they would appeal, arguing the amended act was unconstitutional. (more)
Companies including AT&T Inc and Verizon Communications Inc faced dozens of suits accusing them of improper participation in a warrantless wiretap program launched by Bush after the September 11 attack...
The Electronic Frontier Foundation and the American Civil Liberties Union, which are coordinating the cases, said they would appeal, arguing the amended act was unconstitutional. (more)
"How silly can you get?"
US - The Pentagon may have issued top-secret clearances last year to as many as one-in-four applicants who had "significant derogatory information" in their backgrounds, including a record of foreign influence or criminal conduct, a little-noticed government audit says. (more) (sing-a-long)
Ok, so your company is not The Pentagon, but it is as important to you as the United States is to a General. You depend on your employees not picking your intellectual pockets.
• Do you conduct background checks on key employees?
• Do you have them sign an intellectual property agreement?
• Do you have legally acceptable security measures in place?
• When was the last time you had your offices checked for illegal electronic surveillance?
UPDATE (the very next day) - A Pentagon official with "top secret" security Clearance has been charged with conspiracy to pass classified information to an Agent of China, officials said Wednesday.
Retired air force Lieutenant Colonel James Wilbur Fondren, a deputy Director of the US Pacific Command's Washington Liaison Office, became the fourth person targeted after a Chinese espionage ring was unmasked last year. (more)
Ok, so your company is not The Pentagon, but it is as important to you as the United States is to a General. You depend on your employees not picking your intellectual pockets.
• Do you conduct background checks on key employees?
• Do you have them sign an intellectual property agreement?
• Do you have legally acceptable security measures in place?
• When was the last time you had your offices checked for illegal electronic surveillance?
UPDATE (the very next day) - A Pentagon official with "top secret" security Clearance has been charged with conspiracy to pass classified information to an Agent of China, officials said Wednesday.
Retired air force Lieutenant Colonel James Wilbur Fondren, a deputy Director of the US Pacific Command's Washington Liaison Office, became the fourth person targeted after a Chinese espionage ring was unmasked last year. (more)
Wednesday, June 3, 2009
How to Spy on Your Kid Online
via Fox News...
Trust, But Verify
"The difference between responsible monitoring and spying is the 'Gotcha' factor," says Nurit Sheinberg, Ed.D., director of research and evaluation at the Mailman Segal Institute for Early Childhood Studies at Nova Southeastern University in Fort Lauderdale, FL. If your kids don't know you'll be monitoring their use and you find something and go "Gotcha!" they'll be shocked and probably resentful, and may start hiding things from you. So once you decide how much and what kind of monitoring you'll do, let them in on it.
Your honesty has its perks: If they know you're watching, their self-monitoring instinct will likely kick in. (Of course, kids are masters at finding ways around parental control — more on that later.) One of the best things you can do: Put the computer in a central location. There's no better way to keep an eye on things than to be able to wander by and casually say, "Hey, what website is that?"
Yes, you want to trust your kids. But they're kids — relying on their word may not be enough to keep them safe. (more)
Trust, But Verify
"The difference between responsible monitoring and spying is the 'Gotcha' factor," says Nurit Sheinberg, Ed.D., director of research and evaluation at the Mailman Segal Institute for Early Childhood Studies at Nova Southeastern University in Fort Lauderdale, FL. If your kids don't know you'll be monitoring their use and you find something and go "Gotcha!" they'll be shocked and probably resentful, and may start hiding things from you. So once you decide how much and what kind of monitoring you'll do, let them in on it.
Your honesty has its perks: If they know you're watching, their self-monitoring instinct will likely kick in. (Of course, kids are masters at finding ways around parental control — more on that later.) One of the best things you can do: Put the computer in a central location. There's no better way to keep an eye on things than to be able to wander by and casually say, "Hey, what website is that?"
Yes, you want to trust your kids. But they're kids — relying on their word may not be enough to keep them safe. (more)
SpyCam Story #532 - "The doctor will see you now."
Philippines - Hayden Kho Jr. already said he was to blame for covertly filming his sexual encounters with women. The controversial doctor said he did not upload the video on the Web, and that someone was out to destroy his reputation by leaking those ‘stolen’ videos. But one of the last basic questions that remain unanswered is, “Why did he have the habit of recording his sex acts?" Unfortunately, the controversial doctor has no answer to this question. He said he has been consulting with a psychologist since last year just to get the answers to this question. (more)
SpyCam Story #531 - Bug in the Bathroom
OH - A Casstown-area man is accused of using a spy camera in the bathroom of his home to videotape a 19-year-old female. On Wednesday morning, 43-year-old John Miller was arraigned on charges of wiretapping, three counts of voyeurism, a charge of possession of marijuana and possession of drug paraphernalia. Miller’s bond was set at $11,000. He remains in jail. (more)
Corrections officer sentenced for attempted eavesdropping
MI - William James Johnson, 34, of 127 Michigan Ave., Gladstone, was sentenced to 90 days in the Menominee County Jail on a charge of attempted eavesdropping/installing a device. He is scheduled to report to the jail by 8 p.m. Friday.
According to court records, Johnson attempted to install in the Delta County Sheriff's Department, without the consent of the sheriff, a device for "observing, recording, transmitting, photographing or eavesdropping." (more)
According to court records, Johnson attempted to install in the Delta County Sheriff's Department, without the consent of the sheriff, a device for "observing, recording, transmitting, photographing or eavesdropping." (more)
iPhone SpyWare
from the Web site...
"Mobile Spy is proud to announce the availability of the world's first commercial spy software for the Apple iPhone. Now you can use the powerful monitoring features of Mobile Spy on your iPhone! Works with ALL iPhones!
Mobile Spy will reveal the truth for any company or family using Apple smartphones. You will SILENTLY learn the truth about their calls, text messages and GPS locations by logging into your Mobile Spy account from any web browser." (more)
Why do I mention it?
So you will know what you're up against.
"Mobile Spy is proud to announce the availability of the world's first commercial spy software for the Apple iPhone. Now you can use the powerful monitoring features of Mobile Spy on your iPhone! Works with ALL iPhones!
Mobile Spy will reveal the truth for any company or family using Apple smartphones. You will SILENTLY learn the truth about their calls, text messages and GPS locations by logging into your Mobile Spy account from any web browser." (more)
Why do I mention it?
So you will know what you're up against.
Fight Fire With Fire, Get Fired?
IL - A firefighter in the northern Illinois community of Sycamore has been charged with eavesdropping.
Authorities contend 42-year-old Kurt Mathey recorded a conversation between his fire chief and an assistant chief without their knowledge.
Mathey is out on bond after being indicted on one count of felony eavesdropping. He's on administrative leave from the department.
Mathey is the former president of Sycamore's firefighters union, which has been in heated negotiations with the city for several months. (more)
Authorities contend 42-year-old Kurt Mathey recorded a conversation between his fire chief and an assistant chief without their knowledge.
Mathey is out on bond after being indicted on one count of felony eavesdropping. He's on administrative leave from the department.
Mathey is the former president of Sycamore's firefighters union, which has been in heated negotiations with the city for several months. (more)
TSCM Technical Security Officer - Job Opening
Shift: None
Type of Travel: Continental US, Outside Continental US - Hazard, Local
Percent of Travel Required: Up to 75%
Description: The candidate will assist in all aspects of of TSCM management that involves technical security (including TEMPEST) entailing new construction, modification, accreditation, re-accreditation, withdrawal and advice and assistance (SAV). The candidate will help schedule and perform TSCM evaluations and security staff visits of facilities locate CONUS/OCONUS, provide comprehensive, risk-based technical security advice, guidance, and general security support to program offices and contractor facility security offices. The candidate will prepare written correspondence to include facility file reports, cable messages, approvals, status/technical briefs and inspections reports, SAV reports, maintain databases; which includes entering new data and correspondence and quality controlling file records. Conduct analysis of complex technical, surveillance, counter surveillance, surveillance detection or other technical vulnerabilities. Provide technical support to projects in areas such as training, logistics, acquisition and technical counterintelligence investigations. Assists in developing and monitoring project tasks and schedules. Maintain a thorough knowledge of all technical security governing directives. The candidate must be a graduate of the Interagency Training Center for TSCM and an EXPERT in two of the following areas: a) Counterintelligence , b)Automated Information Systems, c) Lock and Key Control Systems, d) Access Control Systems, g) TEMPEST, h) DoD SCIF construction standards. Experience using a variety of ADP systems that include Microsoft Office applications (e.g. Word, Excel, Outlook, PowerPoint). Requires a Bachelors degree and 10-12 years experience. (more)
"Hazard," ok.
PowerPoint?!?... I'm outta here.
Type of Travel: Continental US, Outside Continental US - Hazard, Local
Percent of Travel Required: Up to 75%
Description: The candidate will assist in all aspects of of TSCM management that involves technical security (including TEMPEST) entailing new construction, modification, accreditation, re-accreditation, withdrawal and advice and assistance (SAV). The candidate will help schedule and perform TSCM evaluations and security staff visits of facilities locate CONUS/OCONUS, provide comprehensive, risk-based technical security advice, guidance, and general security support to program offices and contractor facility security offices. The candidate will prepare written correspondence to include facility file reports, cable messages, approvals, status/technical briefs and inspections reports, SAV reports, maintain databases; which includes entering new data and correspondence and quality controlling file records. Conduct analysis of complex technical, surveillance, counter surveillance, surveillance detection or other technical vulnerabilities. Provide technical support to projects in areas such as training, logistics, acquisition and technical counterintelligence investigations. Assists in developing and monitoring project tasks and schedules. Maintain a thorough knowledge of all technical security governing directives. The candidate must be a graduate of the Interagency Training Center for TSCM and an EXPERT in two of the following areas: a) Counterintelligence , b)Automated Information Systems, c) Lock and Key Control Systems, d) Access Control Systems, g) TEMPEST, h) DoD SCIF construction standards. Experience using a variety of ADP systems that include Microsoft Office applications (e.g. Word, Excel, Outlook, PowerPoint). Requires a Bachelors degree and 10-12 years experience. (more)
"Hazard," ok.
PowerPoint?!?... I'm outta here.
Time to Review and Clean Up Your On Line Act
via Tamara Thompson, PI Magazine...
Intelius is the ubiquitous Internet provider of background reports — serving the consumer hungry for criminal records and other dirt on potential dates, family members and service providers — but more expensive and not as comprehensive as professional databases...
Spock is a fee-based search engine — with a free teaser — for finding social networking profiles. Spock crawls websites, matching the personal information you provide, then returns the links. You’ll probably get more results from snitch.name, Wink or Pipl, and more refined returns from an advanced query at the top search engines. (more)
Time to run your name and delete those old college party photos before you hand in that resume. ~Kevin
Intelius is the ubiquitous Internet provider of background reports — serving the consumer hungry for criminal records and other dirt on potential dates, family members and service providers — but more expensive and not as comprehensive as professional databases...
Spock is a fee-based search engine — with a free teaser — for finding social networking profiles. Spock crawls websites, matching the personal information you provide, then returns the links. You’ll probably get more results from snitch.name, Wink or Pipl, and more refined returns from an advanced query at the top search engines. (more)
Time to run your name and delete those old college party photos before you hand in that resume. ~Kevin
Nuke Web Page Nuked
The federal government mistakenly made public a 266-page report, its pages marked “highly confidential,” that gives detailed information about hundreds of the nation’s civilian nuclear sites and programs, including maps showing the precise locations of stockpiles of fuel for nuclear weapons...
On Tuesday evening, after inquiries from The New York Times, the document was withdrawn from a Government Printing Office Web site. (more)
Finished feeling smug? Now, go check your corporate web site, marketing department, Boardroom and secretarial desks to see what confidential materials you have out for the taking. ~Kevin
On Tuesday evening, after inquiries from The New York Times, the document was withdrawn from a Government Printing Office Web site. (more)
Finished feeling smug? Now, go check your corporate web site, marketing department, Boardroom and secretarial desks to see what confidential materials you have out for the taking. ~Kevin
Monday, June 1, 2009
First Economic Espionage Trial in California
CA - Dongfan "Greg" Chung developed a reputation as an innovator during his three decades as an engineer for Boeing Co. and Rockwell International.
Federal prosecutors say he was also a hardworking spy.
On Tuesday, Chung is scheduled to become the first person to stand trial under the Economic Espionage Act, which was passed more than a decade ago.
Prosecutors say the Chinese-born Chung, 73, stole hundreds of thousands of pages of highly sensitive documents on the U.S. space shuttle, Delta IV rockets and the C-17 military troop transport, then relayed the secrets to contacts in China. (more)
Federal prosecutors say he was also a hardworking spy.
On Tuesday, Chung is scheduled to become the first person to stand trial under the Economic Espionage Act, which was passed more than a decade ago.
Prosecutors say the Chinese-born Chung, 73, stole hundreds of thousands of pages of highly sensitive documents on the U.S. space shuttle, Delta IV rockets and the C-17 military troop transport, then relayed the secrets to contacts in China. (more)
Ever Wonder How-to...
...eavesdrop with a cell phone
...hack a cell phone into a spy device
...make a spy listening bug for $20
...build a laser microphone
...build a spy microphone
...hack a Mr. Microphone into a high tech spy device
...make a high-tech spy stethoscope
...make a portable spy scope cellphone camera
...make your own spy sunglasses
...build a $40 USB spy telescope
...spy on friends with a hidden camera
...spy on your partner
...build a wireless finger phone
Ok, I'll stop.
You get the point.
There is no shortage of creative minds out there.
By the way, there has never been a time in history when spying has been easier or cheaper for the average person. ~Kevin
...hack a cell phone into a spy device
...make a spy listening bug for $20
...build a laser microphone
...build a spy microphone
...hack a Mr. Microphone into a high tech spy device
...make a high-tech spy stethoscope
...make a portable spy scope cellphone camera
...make your own spy sunglasses
...build a $40 USB spy telescope
...spy on friends with a hidden camera
...spy on your partner
...build a wireless finger phone
Ok, I'll stop.
You get the point.
There is no shortage of creative minds out there.
By the way, there has never been a time in history when spying has been easier or cheaper for the average person. ~Kevin
SpyCam Story #530 - "Shrimps in the barbie."
An Antwerp man was indicted Wednesday by a Jefferson County grand jury on a charge that he used a spycam to watch people in his bathroom.
Dennis J. Koerick Jr., 44, of 35558 Pulpit Rock Road, faces two counts of second-degree unlawful surveillance and one count each of tampering with physical evidence and making a punishable false written statement.
Mr. Koerick is accused of using the tiny camera between Dec. 10 and 15 and then burning it and a computer in an outdoor wood-burning boiler before police could question him. He is further accused of telling police Dec. 18 that he was unaware that a camera was installed in his bathroom. (more)
Dennis J. Koerick Jr., 44, of 35558 Pulpit Rock Road, faces two counts of second-degree unlawful surveillance and one count each of tampering with physical evidence and making a punishable false written statement.
Mr. Koerick is accused of using the tiny camera between Dec. 10 and 15 and then burning it and a computer in an outdoor wood-burning boiler before police could question him. He is further accused of telling police Dec. 18 that he was unaware that a camera was installed in his bathroom. (more)
Subscribe to:
Posts (Atom)