via the Weinberger Law Group...
It’s a common situation we hear about when adultery (either actual or suspected) is involved in the demise of a marriage: one spouse decides to spy on the other. While in years past, snooping on a spouse usually entailed rifling through purses or pockets (or hiring a private investigator to catch cheaters in the act), in this day and age, spousal snooping more often involves hacking into email accounts and installing tracer apps on smartphones.
Beyond the moral issues any form of spying raises, are these high tech forms of snooping even legal?
As the law on “inter-spousal spying” stands right now, it depends on the type of snooping and spying you’re engaged in. According to the federal wiretapping laws and the New Jersey Wiretapping and Electronic Surveillance Control Act (N.J.S.A. 2A:156A), activities that may be illegal or constitute a violation of privacy include the following... (more)
Also... Learn how to protect yourself from high tech snooping (and learn when
spying can be considered stalking) at the Weinberger Law Group companion blog, Spying on Your Spouse During Divorce: How Far is Too Far?
Sunday, September 7, 2014
Spy Rule 1 - If you find a bug, don't touch it.
Israel remotely detonated a spying device planted in south Lebanon, killing a member of the Lebanese militant Hezbollah in the explosion, the group said Friday.
Hezbollah Al-Manar TV said Hassan Ali Haidar was killed after army intelligence spotted a "strange device" in the village of Adloun. A jet detonated the device remotely after it was discovered, killing Haidar, it said.
The device was planted on the militant group's telecommunications network. (more)
Hezbollah Al-Manar TV said Hassan Ali Haidar was killed after army intelligence spotted a "strange device" in the village of Adloun. A jet detonated the device remotely after it was discovered, killing Haidar, it said.
The device was planted on the militant group's telecommunications network. (more)
From the If You Can't Beat Them, Join Them File...
When disclosures from National Security Agency whistleblower Edward Snowden were first published by journalists, government officials in the United States insisted that US intelligence agencies do not engage in economic espionage. But, as the revelations continued to trickle out and expose the duplicity of this assertion, officials shifted to suggesting that any economic espionage is not done to benefit the bottom lines of US corporations.
Now, a copy of a secret 2009 report [PDF], the Quadrennial Intelligence Community Review, from the Office of Director for National Intelligence (ODNI), which is headed by James Clapper, has been published by The Intercept. It was provided by Snowden and shows “intelligence community” plans to acquire “proprietary information” from companies around the world and assess whether and how “findings would be useful to US industry.” (more)
Wouldn't we just be
ge, ge, ge, getting
our own secrets back? Hah!
Now, a copy of a secret 2009 report [PDF], the Quadrennial Intelligence Community Review, from the Office of Director for National Intelligence (ODNI), which is headed by James Clapper, has been published by The Intercept. It was provided by Snowden and shows “intelligence community” plans to acquire “proprietary information” from companies around the world and assess whether and how “findings would be useful to US industry.” (more)
Wouldn't we just be
ge, ge, ge, getting
our own secrets back? Hah!
You Know Spying Paranoia Has Gone Too Far When...
...a neighbors' spying fears may sink young seadog's pirate ship.
UK - When his parents built a play pirate ship in his back garden, four-year-old Joseph Bailey was thrilled.
The wooden ship, crafted from recycled timber, became his pride and joy and the ‘labour of love’ was admired by everyone who saw it.
But then a neighbor complained to the council that Joseph was invading their privacy, claiming he could spy on them over the fence.
And despite his parents erecting a bamboo screen to solve any privacy issues, the 19ft by 8ft ship, complete with Jolly Roger, now faces demolition. (more)
P.S. The "pirate" doesn't appear to own a spyglass.
UK - When his parents built a play pirate ship in his back garden, four-year-old Joseph Bailey was thrilled.
The wooden ship, crafted from recycled timber, became his pride and joy and the ‘labour of love’ was admired by everyone who saw it.
But then a neighbor complained to the council that Joseph was invading their privacy, claiming he could spy on them over the fence.
And despite his parents erecting a bamboo screen to solve any privacy issues, the 19ft by 8ft ship, complete with Jolly Roger, now faces demolition. (more)
P.S. The "pirate" doesn't appear to own a spyglass.
Thursday, September 4, 2014
College of Security and Intelligence Opens for Business
Embry-Riddle University -
The College of Security and Intelligence was kicked off last spring and the Doherty center was unveiled, but this fall marks the time when activities have begun in earnest.
The College of Security and Intelligence welcomed the first incoming students for the Masters program in Security and Intelligence Studies...
This semester, the college brought in more than 100 new incoming students in its different programs. The Cyber program will double in size, and just in time, the new Cyber Lab is taking shape next to the Eagle Operations Center. It will house 24 workstations, a rack of servers, and an area for forensics activities. (more)
The College of Security and Intelligence welcomed the first incoming students for the Masters program in Security and Intelligence Studies...
This semester, the college brought in more than 100 new incoming students in its different programs. The Cyber program will double in size, and just in time, the new Cyber Lab is taking shape next to the Eagle Operations Center. It will house 24 workstations, a rack of servers, and an area for forensics activities. (more)
Wednesday, September 3, 2014
Customs Foils Bid to Smuggle Spying, Eavesdropping Items
KUWAIT - Customs inspectors at the Air Cargo section recently foiled an attempt by Kuwaitis to smuggle into the country sophisticated spying, eavesdropping and photography items, reports Al-Shahed daily. The confiscated items include cigarette lighters, pens and stationery. The cargo reportedly arrived from one of the Asian countries and the bill of lading listed the contents as stationery items. Police are investigating. (more)
98-Year-Old NJ Woman Seeks to Erase Atomic Spy Case Conviction
A 98-year-old New Jersey woman convicted of conspiracy in the run-up to the atomic spy trial of Julius and Ethel Rosenberg has come back to a New York court to clear her name.
Miriam Moskowitz said after a brief court hearing Monday that she needs an official vindication that she was wrongly convicted in 1950. She was sentenced to two years in prison after she was convicted on a charge that she conspired with two men to lie to a grand jury investigating atomic espionage...
She filed the request two weeks ago, saying documents now prove the government withheld evidence that would have exonerated her. (more)
Miriam Moskowitz said after a brief court hearing Monday that she needs an official vindication that she was wrongly convicted in 1950. She was sentenced to two years in prison after she was convicted on a charge that she conspired with two men to lie to a grand jury investigating atomic espionage...
She filed the request two weeks ago, saying documents now prove the government withheld evidence that would have exonerated her. (more)
28-year-old Spying Woman Run Over by Boyfriend’s Car
UAE - A 28-year-old woman sustained serious injuries after she was run over by her boyfriend’s car in Sharjah on Monday evening... A day before the incident, she said, she had a talk with him about their future, during which her boyfriend remained non committal. This prompted the woman to follow and spy on her boyfriend... She claimed that when she confronted him, he ran over her with his car twice. (more)
37 Industrial Espionage Tactics that Threaten to Kill Your International Business
By Santiago A. Cueto
Industrial Espionage is the biggest threat to U.S. business interests. No other threat even comes close. It’s the fastest and least expensive way for our foreign competitors to bridge the innovation gap with the U.S. Using cutting-edge technology and age-old techniques of deceit and manipulation, corporate spies are the greatest post-cold war threat to international business.
Today’s international conflicts are not limited to nation to nation disputes. Increasingly, they include corporation versus corporation. (The 37 Tactics)
Industrial Espionage is the biggest threat to U.S. business interests. No other threat even comes close. It’s the fastest and least expensive way for our foreign competitors to bridge the innovation gap with the U.S. Using cutting-edge technology and age-old techniques of deceit and manipulation, corporate spies are the greatest post-cold war threat to international business.
Today’s international conflicts are not limited to nation to nation disputes. Increasingly, they include corporation versus corporation. (The 37 Tactics)
NSA Quits Spying on Americans Out of Disgust
Citing an endless river of filth, vacuous conversations, idiotic Tweets and endless cat videos, the NSA announced it is “freaking done” with spying on Americans.
The NSA decision came only hours after thousands of analysts, following similar threats at CIA, said they planned to quit and apply for jobs as Apple Geniuses and Best Buy Geek Squad Support workers.
Speaking on background, one disgruntled NSA employee said “Go ahead, throw me in jail for an Espionage Act violation, that would be better than doing this job." (more)
The NSA decision came only hours after thousands of analysts, following similar threats at CIA, said they planned to quit and apply for jobs as Apple Geniuses and Best Buy Geek Squad Support workers.
Speaking on background, one disgruntled NSA employee said “Go ahead, throw me in jail for an Espionage Act violation, that would be better than doing this job." (more)
Sunday, August 31, 2014
Broker, Trader, Lawyer, Spy: The Secret World of Corporate Espionage
In this penetrating work of investigative and historical journalism, Eamon Javers explores the dangerous and combustible power spies hold over international business.
Today's global economy has a dark underbelly: the world of corporate espionage. Using cutting-edge technology, age-old techniques of deceit and manipulation, and sheer talent, spies act as the hidden puppeteers of globalized businesses... Readers meet the spies who conduct surveillance operations, satellite analysts who peer down on corporate targets from the skies, veteran CIA officers who work for hedge funds, and even a Soviet military intelligence officer who now sells his services to American companies.
Intelligence companies and the spies they employ are setting up fake Web sites to elicit information, trailing individuals and mirroring travel itineraries, dumpster-diving in household and corporate trash, using ultrasophisticated satellite surveillance to spy on facilities, acting as impostors to take jobs within companies or to gain access to corporations, concocting elaborate schemes of fraud and deceit, and hacking e-mail and secure computer networks.
This globalized industry is not a recent phenomenon, but rather a continuation of a fascinating history. The story begins with Allan Pinkerton, the nation's first true "private eye," and extends through the annals of a rich history that includes tycoons and playboys, presidents and FBI operatives, CEOs and accountants, Cold War veterans and military personnel. (more)
Today's global economy has a dark underbelly: the world of corporate espionage. Using cutting-edge technology, age-old techniques of deceit and manipulation, and sheer talent, spies act as the hidden puppeteers of globalized businesses... Readers meet the spies who conduct surveillance operations, satellite analysts who peer down on corporate targets from the skies, veteran CIA officers who work for hedge funds, and even a Soviet military intelligence officer who now sells his services to American companies.
Intelligence companies and the spies they employ are setting up fake Web sites to elicit information, trailing individuals and mirroring travel itineraries, dumpster-diving in household and corporate trash, using ultrasophisticated satellite surveillance to spy on facilities, acting as impostors to take jobs within companies or to gain access to corporations, concocting elaborate schemes of fraud and deceit, and hacking e-mail and secure computer networks.
This globalized industry is not a recent phenomenon, but rather a continuation of a fascinating history. The story begins with Allan Pinkerton, the nation's first true "private eye," and extends through the annals of a rich history that includes tycoons and playboys, presidents and FBI operatives, CEOs and accountants, Cold War veterans and military personnel. (more)
A Good Short Spy Story...
The green metal file box was about the size and shape of an ammunition case.
It was scuffed and serious-looking and packed tight with personal letters and papers that had belonged to my grandfather, who died in 1989. The line in the family had always been that he “did intelligence work in Washington after the war.” This file box gave up a better story: My grandfather was an operations officer with the C.I.A. from January 1948 to August 1951. But that revelation brought up another question: Why only three years? (more)
It was scuffed and serious-looking and packed tight with personal letters and papers that had belonged to my grandfather, who died in 1989. The line in the family had always been that he “did intelligence work in Washington after the war.” This file box gave up a better story: My grandfather was an operations officer with the C.I.A. from January 1948 to August 1951. But that revelation brought up another question: Why only three years? (more)
Dyson Project N223 - Coming Spetember 4th
FutureWatch: Teaser video suggests Dyson’s new vacuum cleaner may spy on you...
BAT Hauled to Court Over Spy Claims
Cigarette giant British American Tobacco (BAT) could have its dirty linen aired in court following a sensational high court application launched by local "value brand" producer Carnilinx for alleged "corporate espionage".
In the application, Carnilinx director Kyle Phillips claimed BAT paid Pretoria attorney Belinda Walter for commercially sensitive information she obtained while "infiltrating " the company and the FairTrade Independent Tobacco Association (Fita) in 2012 and 2013. If this goes to trial, these spy claims could be extremely damaging for BAT, which is based in London and is the largest company listed on the JSE Securities Exchange, worth R1.26-trillion.
"BAT has used unlawful means to interfere in the business of the applicant. It has paid [Walter] monies to spy [on Carnilinx]," Mr Phillips claimed. (more)
"BAT has used unlawful means to interfere in the business of the applicant. It has paid [Walter] monies to spy [on Carnilinx]," Mr Phillips claimed. (more)
Start Protecting Your Trade Secrets - Yes, You Have Trade Secrets
Every company has information, business methods or techniques or a unique service delivery model that has competitive value worth protecting. Some information, processes and techniques may benefit from patent, trademark or copyright protection, but there is a much broader universe of your company's R&D, business analysis and process improvement that is potentially protectable as a trade secret.
The first step in securing that protection is to identify your trade secrets. Once trade secrets have been identified, you can then design documents and procedures to maximize the available protections and to preserve the value of your business.
Protectable trade secrets may be found in many aspects of your business. Common examples could include your marketing strategies, key analysis of your customers' purchasing habits and preferences, proprietary statistical models and the terms of your strategic alliances with business partners.
Less obvious, but no less important, examples could include an innovative risk management strategy, unique processes to continuously evaluate and improve the delivery of your products and services, or methodologies to assist in evaluating and responding to RFPs. (more)
Before you discuss all these things, make sure the room is not bugged. The folks at counterespionage.com can help.
The first step in securing that protection is to identify your trade secrets. Once trade secrets have been identified, you can then design documents and procedures to maximize the available protections and to preserve the value of your business.
Protectable trade secrets may be found in many aspects of your business. Common examples could include your marketing strategies, key analysis of your customers' purchasing habits and preferences, proprietary statistical models and the terms of your strategic alliances with business partners.
Less obvious, but no less important, examples could include an innovative risk management strategy, unique processes to continuously evaluate and improve the delivery of your products and services, or methodologies to assist in evaluating and responding to RFPs. (more)
Before you discuss all these things, make sure the room is not bugged. The folks at counterespionage.com can help.
Subscribe to:
Posts (Atom)