Peeping into Britney Spears’ home in California has landed a woman three years’ probation, and a court order do 240 hours of community service.
Miranda Tozier-Robbins, 26, was arrested in April after being spotted by Britney’s security guards in the grounds of the singer’s Calabasas property. Miranda, claimed that she was filming a documentary. (more)
Friday, August 21, 2009
Business Espionage - "Has anyone told the Pope?"
A campaign group calling for Switzerland to give up its army has accused the weapons industry of planting a spy within its organisation. The Group for Switzerland without an Army says the Farner communications firm, acting on behalf of the armaments industry, sent a spy to observe them in the lead up to a vote on weapons exports. The group is demanding to know who exactly the sensitive information was passed on to and are threatening to sue both the spy and the communications company. (more)
FREE Concert - Music to Spy By
FREE AND SEATING IS LIMITED.
SUNDAY, OCTOBER 18, 2009
PA - The acclaimed 15-piece City Rhythm Orchestra concert features music from the soundtracks of your favorite spy movies and television shows. The scores from these classics are as memorable as the characters themselves, and City Rhythm's "arresting" arrangements will bring them to life on stage.
The band will perform works by Henry Mancini, Lalo Schifrin, and Billy May, including the themes from Mission Impossible, Pink Panther, James Bond, Peter Gunn, Live and Let Die, and much more. Free admission. Seating is limited. (more)
Doors Open 2:00pm
2:30pm, Sutherland Auditorium PENN STATE ABINGTON / OGONTZ CAMPUS
SUNDAY, OCTOBER 18, 2009
PA - The acclaimed 15-piece City Rhythm Orchestra concert features music from the soundtracks of your favorite spy movies and television shows. The scores from these classics are as memorable as the characters themselves, and City Rhythm's "arresting" arrangements will bring them to life on stage.
The band will perform works by Henry Mancini, Lalo Schifrin, and Billy May, including the themes from Mission Impossible, Pink Panther, James Bond, Peter Gunn, Live and Let Die, and much more. Free admission. Seating is limited. (more)
Doors Open 2:00pm
2:30pm, Sutherland Auditorium PENN STATE ABINGTON / OGONTZ CAMPUS
Wednesday, August 19, 2009
You don't know her, but she could be...
...anybody sitting right near you.
This time, she is: Alicia DeLeon-Torres, a Commissioner for the City of San Diego’s Commission on Gang Prevention and Intervention, and the National Director for National Asian Pacific American Families Against Substance Abuse.
We thank her for sharing her story with the San Diego News Network.
"I’m on the Los Angeles to San Diego Amtrak afternoon commuter train. The guy across from me is looking at his laptop screen. As he scrolls through his documents, I easily see the pretty graphics, staff assignments and other information I’m sure that I - and others on the train - are not meant to see. If you think I’m spying, I’m not. I’m annoyed!" (more)
Summary - Don't blab your sensitive business in public. You never know who may be listening... or what they will do with what they hear.
This time, she is: Alicia DeLeon-Torres, a Commissioner for the City of San Diego’s Commission on Gang Prevention and Intervention, and the National Director for National Asian Pacific American Families Against Substance Abuse.
We thank her for sharing her story with the San Diego News Network.
"I’m on the Los Angeles to San Diego Amtrak afternoon commuter train. The guy across from me is looking at his laptop screen. As he scrolls through his documents, I easily see the pretty graphics, staff assignments and other information I’m sure that I - and others on the train - are not meant to see. If you think I’m spying, I’m not. I’m annoyed!" (more)
Summary - Don't blab your sensitive business in public. You never know who may be listening... or what they will do with what they hear.
Do you have what it takes to be a spy?
Better yet do you even have a clue what it takes to be a spy photographer and what it takes to be on the leading edge?
Last Night ABC News showcased probably the most prolific of the professional photographers in the business, the legendary Brenda Priddy. (more) (ABC News video)
Better yet do you even have a clue what it takes to be a spy photographer and what it takes to be on the leading edge?
Last Night ABC News showcased probably the most prolific of the professional photographers in the business, the legendary Brenda Priddy. (more) (ABC News video)
Positively 4th Street
A former US government informant, who hacked into retail networks to steal 130 million debit and credit card numbers, has been charged over the country's largest financial data theft.
Albert Gonzalez, 28, of Florida, is accused of stealing 130 million accounts, on top of 40 million he himself stole previously, according to prosecutors.
He was an ex-informant for the US Secret Service, which he helped hunt hackers, authorities say. (more) (sing-a-long)
Albert Gonzalez, 28, of Florida, is accused of stealing 130 million accounts, on top of 40 million he himself stole previously, according to prosecutors.
He was an ex-informant for the US Secret Service, which he helped hunt hackers, authorities say. (more) (sing-a-long)
SpyCam Story #548 - Sick Hospital Cam
Canada - A Grande Prairie man has pleaded guilty to voyeurism, in connection with a bathroom video-taping scandal. The Grande Prairie Herald-Tribune reports 30 year-old Blair Stouffer made the plea Wednesday in provincial court.
A ten-year employee at the Q.E.II hospital, Stouffer is the second person to be picked up by police in the scandal, but the first to face formal charges.
The Herald-Tribune says he admits that he is the man seen in some of the footage, setting up the camera, in a bathroom at the Q.E.II hospital. Before its discovery, the camera captured 70 videos of three different victims. (more)
A ten-year employee at the Q.E.II hospital, Stouffer is the second person to be picked up by police in the scandal, but the first to face formal charges.
The Herald-Tribune says he admits that he is the man seen in some of the footage, setting up the camera, in a bathroom at the Q.E.II hospital. Before its discovery, the camera captured 70 videos of three different victims. (more)
Monday, August 17, 2009
New BlackBerry OS Leaked
News is spreading quickly within the underground BlackBerry community of a leak within Research in Motion, the company that makes the phone, of the latest BlackBerry operating system. Designed for the Curve, the new OS (which has been rumored for some time) could easily be the upcoming release for other models such as the popular Bold. (more)
Undeclared Warfare with an Unknown Enemy
...it's sortalike shadowboxing with The Shadow.
Australia's diplomats have been targets of a cyber espionage attack strongly suspected to have originated from China.
According to an internal Department of Foreign Affairs and Trade briefing, a fake email was sent to a number of DFAT officers in the week beginning July 12, just over a week after the arrest in China of Rio Tinto executive Stern Hu.
DFAT insiders said the format and content of the email strongly suggested that it originated in China and was designed to collect intelligence from department computers. (more)
FutureWatch - Warfare (political and commercial) continues to morph, with human combatants being replaced by technobots. The enemies are stepping out of uniform ...and into obscurity.
"One never knows, do one?" opines Fats Waller.
"The Shadow knows," smirks Lamont Cranston.
The Big Security Mistake...
Focusing the security budget on hardware and personnel.
Today's losses are coming at you from the shadows.
• Eavesdropping on your strategies.
• Viewing your private moments.
• Stealing your intellectual property.
Budget for electronic countermeasures.
Get a knowledgeable specialist on your side.
Australia's diplomats have been targets of a cyber espionage attack strongly suspected to have originated from China.
According to an internal Department of Foreign Affairs and Trade briefing, a fake email was sent to a number of DFAT officers in the week beginning July 12, just over a week after the arrest in China of Rio Tinto executive Stern Hu.
DFAT insiders said the format and content of the email strongly suggested that it originated in China and was designed to collect intelligence from department computers. (more)
FutureWatch - Warfare (political and commercial) continues to morph, with human combatants being replaced by technobots. The enemies are stepping out of uniform ...and into obscurity.
"One never knows, do one?" opines Fats Waller.
"The Shadow knows," smirks Lamont Cranston.
The Big Security Mistake...
Focusing the security budget on hardware and personnel.
Today's losses are coming at you from the shadows.
• Eavesdropping on your strategies.
• Viewing your private moments.
• Stealing your intellectual property.
Budget for electronic countermeasures.
Get a knowledgeable specialist on your side.
Sunday, August 16, 2009
SpyCam Story #547 - Nurse Kimberly
FL - A nurse working at the assisted living facility Hawthorne House was arrested after she admitted to taking medication from the residents there.
According to her arrest report, Kimberly Shannon King, 27, had been taking prescription medicine from resident rooms for about two months. King was working each time medicine was taken, the report said. That’s when the administrators asked permission from one of the residents to install a covert video camera in his room to try and catch the thief in action.
One night, King entered the room and stole one and a half Oxycodone pills. King also stole the camera, so Hawthorne House administrators could not prove she was the culprit.
Administrators then installed a second camera in the same room.
When administrators watched the video, they saw King go to the drawer, remove a medicine bottle and take medication out of it. She placed the pills in her pocket, replaced the bottle and left the room, the report said. (more)
According to her arrest report, Kimberly Shannon King, 27, had been taking prescription medicine from resident rooms for about two months. King was working each time medicine was taken, the report said. That’s when the administrators asked permission from one of the residents to install a covert video camera in his room to try and catch the thief in action.
One night, King entered the room and stole one and a half Oxycodone pills. King also stole the camera, so Hawthorne House administrators could not prove she was the culprit.
Administrators then installed a second camera in the same room.
When administrators watched the video, they saw King go to the drawer, remove a medicine bottle and take medication out of it. She placed the pills in her pocket, replaced the bottle and left the room, the report said. (more)
SpyCam Story #546 - Street Cams
Ever wonder about municipal street cameras?
What do they see?
What about picture quality?
Is anybody really watching them?
Check here for three fascinating videos.
What do they see?
What about picture quality?
Is anybody really watching them?
Check here for three fascinating videos.
Opening Soon - Lebanese Phone Bugging Center
A new phone monitoring station is nearing completion in Lebanon and will be capable of recording up to 72,000 calls every day. (more)
Apple Keyboard Secret Keystroke Logger
Translation...
Keystroke logging software may be inserted directly into some keyboards. A physical inspection won't find it. Reloading your system software won't destroy it.
"The security posture of a computer can be adversely affected by poorly-designed devices on its USB bus. Many modern embedded devices permit firmware to be upgraded in the field and the use of low-cost microcontrollers in these devices can make it difficult to perform the mathematical operations needed to verify a cryptographic signature. The security of many of these upgrade mechanisms is very much in question. For a concrete example, we describe how to tamper with a firmware upgrade to the Apple Aluminum Keyboard. We describe how an attacker can subvert an off-the-shelf keyboard by embedding into the firmware malicious code which allows a rootkit to survive a clean re-installation of the host operating system." K. Chen - Georgia Institute of Technology (more)
Keystroke logging software may be inserted directly into some keyboards. A physical inspection won't find it. Reloading your system software won't destroy it.
"The security posture of a computer can be adversely affected by poorly-designed devices on its USB bus. Many modern embedded devices permit firmware to be upgraded in the field and the use of low-cost microcontrollers in these devices can make it difficult to perform the mathematical operations needed to verify a cryptographic signature. The security of many of these upgrade mechanisms is very much in question. For a concrete example, we describe how to tamper with a firmware upgrade to the Apple Aluminum Keyboard. We describe how an attacker can subvert an off-the-shelf keyboard by embedding into the firmware malicious code which allows a rootkit to survive a clean re-installation of the host operating system." K. Chen - Georgia Institute of Technology (more)
Thursday, August 13, 2009
How to Be a Corporate Mole
Some co-workers may have mole-like personal habits, but a true corporate mole is a dangerous animal. They burrow in, keep a low profile and eat profits buy selling intellectual property.
Why do they do it?
Primarily money. They are on two payroll at the same time, and one of them may be very remunerative. A sense of power, adventure or righteousness are also motivating factors.
How does one learn how to be a corporate mole?
There are many books, but one can also learn for free at ehow.com where you can learn "How to do just about everything."
Part of the How to Be a Corporate Mole training (listed under Resources) is to Review counterespionage practices. Guess who that links to. I am flattered. ~Kevin
P.S. You may also want to read their How to Spot a Corporate Mole tutorial which is missing...
Step 8: Conduct electronic eavesdropping detection audits regularly. Moles are in the best position, and have the highest motivation, to plant electronic eavesdropping devices.
Why do they do it?
Primarily money. They are on two payroll at the same time, and one of them may be very remunerative. A sense of power, adventure or righteousness are also motivating factors.
How does one learn how to be a corporate mole?
There are many books, but one can also learn for free at ehow.com where you can learn "How to do just about everything."
Part of the How to Be a Corporate Mole training (listed under Resources) is to Review counterespionage practices. Guess who that links to. I am flattered. ~Kevin
P.S. You may also want to read their How to Spot a Corporate Mole tutorial which is missing...
Step 8: Conduct electronic eavesdropping detection audits regularly. Moles are in the best position, and have the highest motivation, to plant electronic eavesdropping devices.
Trial by Fire... or, You're a Pane
Testing Bulletproof Glass - 1952
...how far would your significant other go for you?
Labels:
business,
employee,
historical,
miscellaneous,
movie,
product,
weird
Subscribe to:
Posts (Atom)