That seemed to be the case this week after the Central Florida wide receiver chased down a man accused of filming teenaged girls in a bathroom on campus, CBS Sports reported.
The girls were attending a cheerleading camp Wednesday at UCF's basketball facilities on campus when they saw a phone recording them inside a bathroom stall.
They told their coach and staff members, saw the man with the phone and chased him, with UCF police soon joining the pursuit.
The man, identified as 21-year-old Jonathan J. Hui, evaded police and the staff but was soon caught by Payton, who saw the commotion and joined the chase.
Payton quickly snagged Hui's phone before he could delete any information on it. more
Saturday, July 23, 2016
Professor Accused of Spying on Students Found Dead
An NYIT professor accused of spying on students in the bathroom has been found dead days after his arrest.
Law enforcement sources tell News 12 the body of Professor Jackie Conrad was found in his Harlem home last night.
The 39-year-old had been arrested last week after police say a camera was found hidden inside a handicapped stall at the school’s health care center in Old Westbury. more
An autopsy will determine his cause of death, but police suspect he killed himself, according to sources.
Conrad, a professor at New York Institute of Technology, planted a camera disguised as a pen in a handicapped-accessible bathroom at the school’s Old Westbury campus in Nassau County on July 13, according to a criminal complaint. more
Law enforcement sources tell News 12 the body of Professor Jackie Conrad was found in his Harlem home last night.
The 39-year-old had been arrested last week after police say a camera was found hidden inside a handicapped stall at the school’s health care center in Old Westbury. more
An autopsy will determine his cause of death, but police suspect he killed himself, according to sources.
Conrad, a professor at New York Institute of Technology, planted a camera disguised as a pen in a handicapped-accessible bathroom at the school’s Old Westbury campus in Nassau County on July 13, according to a criminal complaint. more
The Complete Guide to Facebook Privacy
The Techlicious folks have the tips on how to keep your privacy on Facebook...
Privacy concerns and privacy controls on Facebook are ever changing. When you post a picture of your kids at a family gathering, which one of your Facebook friends can share it? What private information are those Facebook game apps collecting on you for "third-party uses"? How do you make sure that live video stream is seen only by people you choose? Every action you take on Facebook has privacy and sharing implications that need to be considered before you upload that next selfie.
Fortunately, thanks to vocal demands for transparency from both Facebook users and government regulators around the world, Facebook has been making the process of managing your privacy easier. Below is our step-by-step guide to taking full control of your Facebook privacy settings... more
Privacy concerns and privacy controls on Facebook are ever changing. When you post a picture of your kids at a family gathering, which one of your Facebook friends can share it? What private information are those Facebook game apps collecting on you for "third-party uses"? How do you make sure that live video stream is seen only by people you choose? Every action you take on Facebook has privacy and sharing implications that need to be considered before you upload that next selfie.
Fortunately, thanks to vocal demands for transparency from both Facebook users and government regulators around the world, Facebook has been making the process of managing your privacy easier. Below is our step-by-step guide to taking full control of your Facebook privacy settings... more
Summer Reading: Gulity Minds, by Joe Finder
New York Times bestselling author Joseph Finder delivers an exhilarating and timely thriller exploring how even the most powerful among us can be brought down by a carefully crafted lie and how the secrets we keep can never truly stay buried in Guilty Minds.
Nick Heller is a private spy—an intelligence operative based in Boston, hired by lawyers, politicians, and even foreign governments. A high-powered investigator with a penchant for doing things his own way, he’s called to Washington, DC, to help out with a delicate, potentially explosive situation.
The chief justice of the Supreme Court is about to be defamed, his career destroyed, by a powerful gossip website that specializes in dirt on celebs and politicians. Their top reporter has written an exposé claiming that he had liaisons with an escort, a young woman prepared to tell the world her salacious tale. But the chief justice is not without allies and his greatest supporter is determined to stop the story in its tracks.
Nick has just forty-eight hours to disprove the story about the chief justice. But when the call girl is found murdered, the case takes a dangerous turn, and Nick resolves to find the mastermind behind the conspiracy before anyone else falls victim to the maelstrom of political scandal and ruined reputations predicated upon one long-buried secret.
(The story may be fiction, but the technical surveillance/security details are accurate. Joe consults with several well-known specialists, including: Kevin D. Murray, and Adam Hernandez, to give his novel the ring of authenticity. This attention to detail is just one of the things that sets Joe Finder apart from other authors... not to mention his gripping plots.)
Nick Heller is a private spy—an intelligence operative based in Boston, hired by lawyers, politicians, and even foreign governments. A high-powered investigator with a penchant for doing things his own way, he’s called to Washington, DC, to help out with a delicate, potentially explosive situation.
The chief justice of the Supreme Court is about to be defamed, his career destroyed, by a powerful gossip website that specializes in dirt on celebs and politicians. Their top reporter has written an exposé claiming that he had liaisons with an escort, a young woman prepared to tell the world her salacious tale. But the chief justice is not without allies and his greatest supporter is determined to stop the story in its tracks.
Nick has just forty-eight hours to disprove the story about the chief justice. But when the call girl is found murdered, the case takes a dangerous turn, and Nick resolves to find the mastermind behind the conspiracy before anyone else falls victim to the maelstrom of political scandal and ruined reputations predicated upon one long-buried secret.
(The story may be fiction, but the technical surveillance/security details are accurate. Joe consults with several well-known specialists, including: Kevin D. Murray, and Adam Hernandez, to give his novel the ring of authenticity. This attention to detail is just one of the things that sets Joe Finder apart from other authors... not to mention his gripping plots.)
Compilation of State and Federal Privacy Laws (US & Canada)
The 2016 Supplement to Privacy Journal's "Compilation of State and Federal Privacy Laws" (2013) has been published, adding 30 more laws enacted by states and provinces in the past 12 months.
The Compilation of State and Federal Privacy Laws (ISBN 978-0-930072-56-8) cites and describes more than 700 state, provincial, and federal laws affecting the confidentiality of personal information and electronic surveillance. The laws are listed by state, grouped in categories like medical, credit, financial, security breaches, tracking technologies, employment, government, school records, Social Security numbers, marketing, telephone privacy and many more. Canadian laws too.
PRIVACY JOURNAL
PO Box 28577
Providence RI 02908
Phone: 401/274-7861
Fax: 401/274-4747
www.privacyjournal.net
The Compilation of State and Federal Privacy Laws (ISBN 978-0-930072-56-8) cites and describes more than 700 state, provincial, and federal laws affecting the confidentiality of personal information and electronic surveillance. The laws are listed by state, grouped in categories like medical, credit, financial, security breaches, tracking technologies, employment, government, school records, Social Security numbers, marketing, telephone privacy and many more. Canadian laws too.
PRIVACY JOURNAL
PO Box 28577
Providence RI 02908
Phone: 401/274-7861
Fax: 401/274-4747
www.privacyjournal.net
Friday, July 22, 2016
Amazon Mute on Echo Eavesdropping
We may never know if the feds have hijacked Amazon Echo.
Amazon has so far issued two transparency reports since it began declaring how many government data demands and wiretap orders it receives.
Both reports outlined how many subpoenas, search warrants, and court orders the company received to cloud service Amazon Web Services. While its cloud makes up a significant portion of the data that it gathers, the company also collects vast amounts of data from its retail businesses, mobile services, book purchases, and requests made to Echo.
But an Amazon spokesperson wouldn't comment on whether the company will expand its transparency report. more
Amazon has so far issued two transparency reports since it began declaring how many government data demands and wiretap orders it receives.
Both reports outlined how many subpoenas, search warrants, and court orders the company received to cloud service Amazon Web Services. While its cloud makes up a significant portion of the data that it gathers, the company also collects vast amounts of data from its retail businesses, mobile services, book purchases, and requests made to Echo.
But an Amazon spokesperson wouldn't comment on whether the company will expand its transparency report. more
Kim Kardashian Could Get a Swift Kick for Eavesdropping
Kim Kardashian was apparently bluffing when she said that she has a video of Taylor Swift approving the lyric “I made that bitch famous,” even if the reality star had released a video on Sunday night on her Snapchat.
A legal expert said that the turn of events could lead to a major legal battle between Swift on one hand, and Kanye West and Kim Kardashian on the other hand.
For releasing the recording of West’s conversation with Swift – even minus the alleged approval by Swift of the controversial lyric – because the singer was unaware their conversation was being recorded, West and Kardashian breached California’s law on eavesdropping, noted E! News. more
A legal expert said that the turn of events could lead to a major legal battle between Swift on one hand, and Kanye West and Kim Kardashian on the other hand.
For releasing the recording of West’s conversation with Swift – even minus the alleged approval by Swift of the controversial lyric – because the singer was unaware their conversation was being recorded, West and Kardashian breached California’s law on eavesdropping, noted E! News. more
North Korea Revives Coded Spy Numbers Broadcasts
In an era of sophisticated spycraft, North Korea appears to be returning to the days of shortwave radio.
The North broadcast a series of seemingly random numbers on Pyongyang Radio twice recently, an eerie reminder of the days when the North encrypted messages to its spies in South Korea.
In the latest episode last Friday, an announcer read what she described as “a mathematics review assignment for investigative agent No. 27,” engaged in a “distance learning” program.
“Turn to Page 459, No. 35; Page 913, No. 55; Page 135, No. 86,” she said, continuing to cite numbers for 14 minutes.Decades ago, it was not unusual for late-night radio listeners in the South to hear mysterious numbers arriving on static-filled signals from the North. more
Click to enlarge. |
In the latest episode last Friday, an announcer read what she described as “a mathematics review assignment for investigative agent No. 27,” engaged in a “distance learning” program.
“Turn to Page 459, No. 35; Page 913, No. 55; Page 135, No. 86,” she said, continuing to cite numbers for 14 minutes.Decades ago, it was not unusual for late-night radio listeners in the South to hear mysterious numbers arriving on static-filled signals from the North. more
Survey: Do Swiss Spy?
The survey, conducted by a research company on behalf of comparis.ch, asked more than 1,000 people across Switzerland their views on spying and being spied on.
Some 22 percent admitted to keeping an eye on their neighbours using binoculars, cameras and cameraphones, or through the spyhole of their front door.
The most popular reason for spying was to check out a neighbour’s plants (28 percent), followed by how they renovate their home (24 percent), and the way in which they behave with their children (18 percent) and partner (13 percent).
Those that do the most spying are in the 15-29 age bracket, while those aged between 60-74 are the least bothered by what their neighbours are up to.
The survey also asked respondents if they felt observed, with 48 percent of young people saying they do, against a national average of 40 percent. more
Some 22 percent admitted to keeping an eye on their neighbours using binoculars, cameras and cameraphones, or through the spyhole of their front door.
The most popular reason for spying was to check out a neighbour’s plants (28 percent), followed by how they renovate their home (24 percent), and the way in which they behave with their children (18 percent) and partner (13 percent).
Those that do the most spying are in the 15-29 age bracket, while those aged between 60-74 are the least bothered by what their neighbours are up to.
The survey also asked respondents if they felt observed, with 48 percent of young people saying they do, against a national average of 40 percent. more
Monday, July 18, 2016
IT Security Alert - Got Juniper Equipment? Better get the patch.
Juniper Networks patched a crypto bug tied to its public key infrastructure that could have allowed hackers to access the company’s routers, switches and security devices and eavesdrop on sensitive communications. The flaw was tied to Juniper products and platforms running Junos, the Juniper Network Operating System.
The bug (CVE-2016-1280) was reported and patched by Juniper on Wednesday, with public disclosure Friday. Juniper also posted its own information on the security vulnerability, which was found internally.
...The vulnerability allowed attackers to create specially crafted self-signed certificates that can bypass certificate validation within Juniper hardware running the Junos OS. If exploited, the vulnerability could have allowed an attacker in a man-in-the-middle position on the victim’s network to read supposedly secure communications. more
The bug (CVE-2016-1280) was reported and patched by Juniper on Wednesday, with public disclosure Friday. Juniper also posted its own information on the security vulnerability, which was found internally.
...The vulnerability allowed attackers to create specially crafted self-signed certificates that can bypass certificate validation within Juniper hardware running the Junos OS. If exploited, the vulnerability could have allowed an attacker in a man-in-the-middle position on the victim’s network to read supposedly secure communications. more
Quote of the Week
"Lord knows how much industrial espionage has gone on." —Bill Curtis, a Fellow of the IEEE more
The Man with the Butterfly Net was a Spy... and then founded the Boy Scouts
Just a few years into his military service, Robert Baden-Powell had served in South Africa and was transferred to Malta, where he began his spy career as an intelligence officer for the director of military intelligence. One of his favorite disguises was that of an entomologist who studied butterflies, a cover that allowed him to move around freely without looking suspicious. He revealed his scientific subterfuge in his book "My Adventures as a Spy."
"Carrying this book and a colour-box and a butterfly net in my hand, I was above all suspicion to anyone who met me on the lonely mountain side, even in the neighbourhood of the forts," Baden-Powell wrote. And not only did he disguise himself as a butterfly collector; he hid secret information about those forts, as well as other military secrets in drawings of insects and other natural ephemera, which you can see scattered throughout this post.
In Baden-Powell's illustrations, natural patterns are used to transmit messages and information within a drawing; a leaf's pattern could reveal the contours of an area to be invaded, as above. Once a recipient knew how to read the illustrations, it was possible to convey the information easily, without much translation or complex code-breaking needed. more
Click to enlarge. |
In Baden-Powell's illustrations, natural patterns are used to transmit messages and information within a drawing; a leaf's pattern could reveal the contours of an area to be invaded, as above. Once a recipient knew how to read the illustrations, it was possible to convey the information easily, without much translation or complex code-breaking needed. more
Labels:
art,
espionage,
historical,
spy school,
steganography,
weird
Saturday, July 16, 2016
Business Espionage: FBI's 6-Step Advice
Via REI press release: Corporate Espionage Continues to Grow
Companies should be on guard and take the following steps to protect business related information, as stated on the FBI´s website:
1. Recognize there is an insider and outsider threat to your company.
2. Identify and valuate trade secrets.
3. Implement a proactive plan for safeguarding trade secrets. (call here for assistance)
4. Secure physical and electronic versions of your trade secrets.
5. Confine intellectual knowledge on a “need-to-know” basis.
6. Provide training to employees about your company’s intellectual property plan and security.
Companies should be on guard and take the following steps to protect business related information, as stated on the FBI´s website:
1. Recognize there is an insider and outsider threat to your company.
2. Identify and valuate trade secrets.
3. Implement a proactive plan for safeguarding trade secrets. (call here for assistance)
4. Secure physical and electronic versions of your trade secrets.
5. Confine intellectual knowledge on a “need-to-know” basis.
6. Provide training to employees about your company’s intellectual property plan and security.
PokemonGo - A data-gathering opportunity for spies.
A retired senior Russian intelligence official is warning his colleagues in the spying game to stay away from PokemonGo.
Alexander Mikhailov, a former Major-General in Russia’s Federal Security Service, or FSB (the successor to the Soviet KGB), says the game poses a serious national security threat in the hands of oblivious government officials or military personnel.
“Imagine, that these ‘animals,’ appear not in a park but in a secret location where the user who is a soldier or a security official takes a photo of it,” he tells RIA Novosti... “It is unlikely that intelligence agencies will pass up the chance to exploit this data-gathering opportunity,” he said...
So far at least four New York City police officers have been filmed catching Pokemon, around the city. more
Alexander Mikhailov, a former Major-General in Russia’s Federal Security Service, or FSB (the successor to the Soviet KGB), says the game poses a serious national security threat in the hands of oblivious government officials or military personnel.
“Imagine, that these ‘animals,’ appear not in a park but in a secret location where the user who is a soldier or a security official takes a photo of it,” he tells RIA Novosti... “It is unlikely that intelligence agencies will pass up the chance to exploit this data-gathering opportunity,” he said...
So far at least four New York City police officers have been filmed catching Pokemon, around the city. more
Privacy Scarf Foils Paparazzi Pics
There's a stylish way to keep paparazzi at bay — the anti-flash scarf.
The ISHU scarf, created by 28-year-old Saif Siddiqui, is made from a special fabric that reflects light.
Siddiqui, who runs the London and Amsterdam-based company, told BuzzFeed that the scarf's purpose is to provide some privacy.
"The main intention is to make people aware of how important privacy actually is," he said. "Everyone has a 'brand' online, and with the ISHU Scarf, people are back in control of their privacy." more
The ISHU scarf, created by 28-year-old Saif Siddiqui, is made from a special fabric that reflects light.
Siddiqui, who runs the London and Amsterdam-based company, told BuzzFeed that the scarf's purpose is to provide some privacy.
"The main intention is to make people aware of how important privacy actually is," he said. "Everyone has a 'brand' online, and with the ISHU Scarf, people are back in control of their privacy." more
Subscribe to:
Posts (Atom)