S. Korea - The government decided to increase penalties against those who illegally transfer technology.
Under
the currently law, the penalty for committing espionage involving core
national technologies is a maximum of 15 years in jail. The government
plans to change the duration to at least three years, with no limits...
Information security gross negligence. (Murray Associates case history photo)
Regardless
of whether the offense was intentional or the result of gross
negligence, the guilty party will have to pay treble damages, while the
government will seize all gains realized from the illegal transfer. more ...very similar to a cunning plan for the United States, first proposed in 2012.
ROBOTS spying on your social media profiles could stop you from getting your dream job.
Recruitment AI used by companies to pick out applicants scans your posts for signs you might not be right for the role.
Known as DeepSense, the tool assesses your personality based on your online activity – even if you haven't applied for the role and don't know you're being assessed. The language you use, your photos, how often you post and more is merged into a data profile that tells recruiters your interests, teamwork skills, how extroverted or introverted you are, and even your emotional stability. more
2019 may be the year you consider smaller shoes...
Those of us at a certain age grew up in a simpler time. Email was largely unheard of. There was no social media, no Facebook, Twitter or Instagram. There was no e-commerce, no Amazon, Alibaba or Taobao. No online banking. No online dating. Credit card transactions were processed manually. Local businesses accepted personal checks.
In short, there really wasn’t any such thing as a “digital footprint,” where personal information resides virtually, in an electronic ether, potentially available for anyone to see.
But over the last two decades, we’ve moved more and more of our lives into that realm. And almost as soon as we began, people attempted to gain inappropriate access to information of all kinds...
Will we have to change our standards... Time will tell. But there’s no denying our expanding digital footprints are changing the nature of both personal and organizational security.
Monitoring and managing our online personas has become an essential task...moresing-a-long
Students at more than 10 schools in Guizhou Province, one of China’s poorest provinces, and the neighboring Guangxi region are now required to wear “intelligent uniforms,” which are embedded with electronic chips that track their movements.
The uniforms allow school officials, teachers, and parents to keep track of the exact times that students leave or enter the school, Lin Zongwu, principal of the No. 11 School of Renhuai in Guizhou Province, told the state-run newspaper Global Times on Dec. 20.
If students skip school without permission, an alarm will be triggered.
If students try to game the system by swapping uniforms, an alarm also will sound, as facial-recognition equipment stationed at the school entrance can match a student’s face with the chip embedded in the uniform. more
‘We didn‘t do anything illegal!‘ Spy games: German club admit to spying on rivals using drones
German football was stunned at the news that Werder Bremen one of the biggest clubs in the Bundesliga spied on training sessions of rivals Hoffenheim by using drones piloted by club officials...
And remarkably, Werder Bremen has issued a statement taking responsibility for the incident, admitting it was they who arranged for the drone to conduct surveillance of Hoffenheim‘s training session.
An official statement was released, explaining that the drone was piloted by a member of club staff, while the club‘s general manager Frank Bauman made a formal apology and took full responsibility for the incident. more
Can an undercover nerd become a superstar agent? Ben Ripley sure hopes so—and his life may depend on it!
When Ben Ripley is recruited to the CIA’s Academy of Espionage, it’s a dream come true. But as soon as he gets on campus, Ben finds out that Spy Schoolis way more deadly than debonair. And given his total lack of coordination and failure to grasp even the most basic spying skills, Ben begins to wonder what he’s doing here in the first place.
Luckily, through a series of hilarious misadventures, Ben realizes he could actually become a halfway decent spy…if he can survive all the attempts being made on his life! more
1. Real-Time Facial Surveillance That Doesn't Require Clear, Unobstructed Images
2. Tools That Detect Activity Based on a Phone's Characteristics
3. Increased Uses for Artificial Intelligence 4. Technology to Detect Suspicious Body Language
Although it's not possible to know exactly how espionage experts will depend on the things on this list and others, it's evident that technology will help spies achieve their missions. It may also allow them to diversify their responsibilities as tech takes care of past tasks. more
Rich Roth condenses over four decades of experience as a member of the United States Secret Service, and as a private security consultant and bodyguard.
His business portfolio includes cyber security, executive protection, aircraft and airport vulnerability, threat assessment and mitigation, training, perimeter detection and CCTV systems design and crisis management.
From the plazas of Paris, to dodging the guns in the Gaza strip, to the cafes in Caracas, Roth slips out of the shadows of surveillance to inform readers about how they can protect themselves through situational awareness, adaptation, and employ techniques and tactics for survival and mitigation.
Being Your Own Bodyguard deals with physical layouts and boundaries, psychological characteristics, and physiognomic [facial expressions] clues in assessing threats. Rich draws heavily on his experience with the USSS that includes over one hundred protection assignments. more
Foreign intelligence entities, which may include foreign governments, corporations, and their proxies, are actively targeting information, assets, and technologies that are vital to both U.S. national security and our global competitiveness.
Increasingly, U.S. companies are in the cross-hairs of these foreign intelligence entities, which are breaching private computer networks, pilfering American business secrets and innovation, and carrying out other illicit activities.
The National Counterintelligence and Security Center is dedicated to raising awareness among government employees and private industry about these foreign intelligence threats, the risks they pose, and the defensive measures necessary for individuals and organizations to safeguard that which has been entrusted to their protection.
The following products will enable personnel to better understand these threats and provide guidance and tips for protecting the sensitive information, assets, technologies, and networks to which employees have access. It will also serve to help them protect their personal, confidential information that may be used by others to gain their trust. more
The KGB Spy Museum (in New York City) features the largest collection of USSR KGB espionage artifacts.
The KGB, an initialism for КГБ Komitet gosudarstvennoy bezopasnosti translated in English as Committee for State Security, was the main security agency for the Soviet Union. During the Cold War, KGB always wanted to compete with the CIA in all possible ways.
Interactive spy museum presents to visitors that era special technique: spy cameras, KGB concealment devices, secret recorders, crypto and cipher machines, spy radios, secure telephones...
The museum exhibition, much of which is only now being made public, presents a never-before-seen collection of items covering the activities of prominent KGB agents and revealing the strategies and methods that underlay many of history’s top secret espionage operations. more
Alexa, what’s my neighbor doing? ‘Human error’ allows user to eavesdrop on stranger’s life.
A German Amazon customer was able to access hours of audio files from a stranger‘s Alexa device that included recordings of him in the shower thanks to a “mistake” by one of Amazon‘s human employees.
Amazon sent the customer a link that included 1,700 recordings of another man and his female companion when he asked to play back the recordings from his own Alexa voice assistant.
He reported the anomaly to Amazon, but the company did not immediately reply, except to delete the files. By then, he had already downloaded them. After weeks of no response from Amazon, the customer notified German trade c‘t, worried the company would just cover up the incident otherwise.
Using the information contained in the recordings, which included their first and last name, the name of their partner, where they lived – even audio of the person in the shower – c‘t was able to locate and the victim, who was... more
The Spy Museum in Tampere, Finland opened to the public in the summer of 1998. It was the world's first spy museum dedicated exclusively to espionage. This year, the Spy Museum celebrated its 20th anniversary.
Two years later, in 2000, a sister museum, the International Spy Museum, opened its doors in Washington, D.C. more