While millions are awaiting their payments to help with necessities,
landlords are also eager for their tenants to receive stimulus checks,
so they can pay rent. Unfortunately, some landlords have not just been
waiting patiently...
In order to help Americans to track the status of their stimulus payments, the IRS and Treasury Department launched a new tool, Get My Payment. The tool provides individuals “with
the status of your payment, including the date your payment is
scheduled to be deposited into your bank account or mailed.”...
In order to check the status of a stimulus payment, one only needs to
provide basic information, including name, date of birth, street
address, and Social Security Number (SSN) ... This basic information is readily available on the dark web ... it
is also readily available to many landlords through the applications
that tenants complete when applying to rent a property.
You may want to speak with a lawyer to evaluate options if your landlord checks your payment status on the IRS portal. You may also want to consider filing a police report. more
Wednesday, April 22, 2020
Monday, April 20, 2020
7 Espionage Tricks to Avoid While Working From Home
Don't get tricked into giving away personal information.
Why? Because this is what you use for your passwords.
Why? Because this is what you use for your passwords.
- Facebook Quizzes
Quizzes are all over Facebook: What does your eye color say about you? What kind of dog are you according to your zodiac sign? (Facebook says these were questions the criminals used.) - 10 Things About You
As people try to connect during the stay-at-home order, they are answering cut-and-paste questionnaires from their friends. They usually start with something like “Tell me 10 things I don’t know about you” and go on to ask questions like: Who was your first love? ... Here's the problem: those are the exact same questions asked when you forget your password. So, be wary of posting the answers on social media.
- Posting Information about Your Passwords
People are posting all sorts of information about what’s going on at their homes with their children or with their pets. That’s fine, unless they use those same names as their passwords. - Photos of the Home Work Station
At this point, people are pretty proud of their work from home stations. They have a new webcam, a makeshift desk, and maybe even a good microphone. But posting photos of that home work station might give criminals too much information. Can someone see the screen from a window? Are they giving away the brands and models of their IoT devices (which might or might not have exploitable vulnerabilities)? - Clicking Questionable Links
There are a lot of questionable links on the internet. Users should be wary of sites they don’t recognize. While this is rudimentary advice, it’s a good reminder that the headline “New Pandemic Cure No One Is Talking About” likely leads to a malicious site. - Be Aware of What’s Public
Savvy users have changed their Facebook and Instagram profile settings to make them more private. But as soon as you post to a group or comment on someone’s post without strong privacy settings, folks outside your friend's group can see what you’re doing. And, other sites like Twitter and Reddit are not generally private. more
Labels:
#espionage,
#hack,
advice,
amateur,
business,
cybersecurity,
employee,
privacy,
Tips
Sunday, April 19, 2020
10 Best Spy Comedy Films, Ranked (According To IMDb)
There are better things to do other than watch CNN (Covid-19 News) 24/7.
Here are some suggestions. ~Kevin
A Few Others
Here are some suggestions. ~Kevin
- Mr. & Mrs. Smith (6.5)
- Burn After Reading (7.0)
- Red (7.0)
- Spy (7.0)
- Austin Powers: International Man Of Mystery (7.0)
- Top Secret! (7.2) *****
- True Lies (7.2)
- The Man From U.N.C.L.E. (7.3)
- Despicable Me (7.6)
- Kingsman: The Secret Service (7.7)
A Few Others
- Spies Like Us
- The Man Who Knew Too Little
- The Spy Who Dumped Me
- Despicable Me 2 / 3
- My Spy
- Johnny English / Strikes Again / Reborn
- Keeping Up with the Joneses
- This Means War
- Central Intelligence
- Kingsmen: The Golden Circle
- The Spy Next Door
- Austin Powers: The Spy Who Shagged Me / Goldmember
- Get Smart
- OSS 117 Cairo (subtitles)
- Casino Royale
- Spy Hard
- Knight and Day
- Agent Cody Banks / Destination London
- Spy Kids / 2 / All the time in the World (kids)
- Our Man Flint / In Like Flint
- Confessions of a Dangerous Mind
- The Tailor Of Panama
- Undercover Blues
- Undercover Brother
- The Man With One Red Shoe
- The Tall Blond Man with One Black Shoe (subtitles)
- If Looks Could Kill
- Red 2
- The President's Analyst
- Spies in Disguise (kids)
- What’s Up, Tiger Lily?
- Gotcha!
- Jumpin' Jack Flash
- My Favorite Spy
- Real Men
- The Glass Bottom Boat
- The In-Laws
- Rio Rita
- A Southern Yankee
- The Tuxedo
- One Of Our Dinosaurs Is Missing
- Rendezvous
- The Fastest Guitar Alive (one star)
"The Warehouse" by Rob Hart (book)
"A chilling and all-too-believable portrait of a not-so-far-off future where free will succumbs to big business."--Alafair Burke, New York Times bestselling author of The Better Sister
more
The Machine Never Blinks: A Graphic History of Spying and Surveillance (book)
In The Machine Never Blinks, the story of surveillance is presented from its earliest days, to help you more fully understand today's headlines about every-increasing, constant, and unrelenting monitoring and global data collection.
This book spans surveillance from the Trojan Horse, through 9/11 and to the so-called War on Terror, which enabled the exponential growth of government and corporate intercepts and databases.
It also explains spying as entertainment (reality TV) and convenience (smart speakers). Take a look around... Who's watching you right now? Black & white illustrations. more
This book spans surveillance from the Trojan Horse, through 9/11 and to the so-called War on Terror, which enabled the exponential growth of government and corporate intercepts and databases.
It also explains spying as entertainment (reality TV) and convenience (smart speakers). Take a look around... Who's watching you right now? Black & white illustrations. more
Office Printers: The Ticking IT Time Bomb
Unsecured printers are one of the items on our inspection checklist. Why? Because it is a very common problem. Normally buttoned-up networks put out a hacker welcome mat with just one unsecured printer. ~Kevin
Office printers don’t have to be security threats: with foresight and maintenance they’re very easily threat-proofed. The problem is that system administrators rarely give the humble printer (or scanner, or multifunction printer) much attention.
Hackers haven’t forgotten about printers – not by a long shot. Last summer, a Russian hacker group penetrated numerous organizations by first infiltrating unprotected printers, which were connected to the same network as every other device, and then laddering up to exploit increasingly sensitive areas.
Furthermore, according to a recent report, foreign governments can also easily conduct industrial espionage by targeting this under-the-radar beachhead into the organizational networks...
Using third parties to continually help identify security risks is a smart course of action for enterprises that are truly serious about security measures. more
Office printers don’t have to be security threats: with foresight and maintenance they’re very easily threat-proofed. The problem is that system administrators rarely give the humble printer (or scanner, or multifunction printer) much attention.
Hackers haven’t forgotten about printers – not by a long shot. Last summer, a Russian hacker group penetrated numerous organizations by first infiltrating unprotected printers, which were connected to the same network as every other device, and then laddering up to exploit increasingly sensitive areas.
Furthermore, according to a recent report, foreign governments can also easily conduct industrial espionage by targeting this under-the-radar beachhead into the organizational networks...
Using third parties to continually help identify security risks is a smart course of action for enterprises that are truly serious about security measures. more
Managers: Don’t Rush to Workplace Spyware during Pandemic
A Rutgers organizational psychologist explains ramifications of putting spy software in place.
With millions of employees working remotely due to the coronavirus pandemic, managers—likely new to virtual management—are scrambling to find the best ways to oversee them online.
Computer performance monitoring may interest those looking for “an extra set of eyes,” but workplace surveillance is not that simple, according to John Aiello, an expert in organizational psychology at Rutgers School of Arts and Sciences.“While spy software may relieve the manager’s anxieties, organizations will see an increase in stress on employees and it could decrease productivity,” said Aiello, who has researched the electronic monitoring of workers over the last three decades.
Topics addressed...
How does monitoring software affect productivity?
How does implementing this surveillance affect managers?
Can electronic monitoring be used for “the greater good?”
If employers are thinking about implementing this surveillance, what might be done first?
more
With millions of employees working remotely due to the coronavirus pandemic, managers—likely new to virtual management—are scrambling to find the best ways to oversee them online.
Computer performance monitoring may interest those looking for “an extra set of eyes,” but workplace surveillance is not that simple, according to John Aiello, an expert in organizational psychology at Rutgers School of Arts and Sciences.“While spy software may relieve the manager’s anxieties, organizations will see an increase in stress on employees and it could decrease productivity,” said Aiello, who has researched the electronic monitoring of workers over the last three decades.
Topics addressed...
How does monitoring software affect productivity?
How does implementing this surveillance affect managers?
Can electronic monitoring be used for “the greater good?”
If employers are thinking about implementing this surveillance, what might be done first?
more
Thursday, April 16, 2020
Gad Zoox - Tesla Settles Trade Secret Theft Law Suit
Zoox Inc. said on Tuesday it had settled a lawsuit with Tesla Inc. after admitting that some new hires from the electric carmaker were in possession of certain Tesla documents when they joined the U.S. self-driving car startup.
Tesla lawyers filed a lawsuit in March last year against four former employees and Zoox, alleging the employees stole proprietary information and trade secrets for developing warehousing, logistics and inventory control operations.
Zoox said the settlement required it to pay Tesla an undisclosed amount and undergo an audit to ensure that none of its employees had retained or are using Tesla's confidential information. more
Tesla lawyers filed a lawsuit in March last year against four former employees and Zoox, alleging the employees stole proprietary information and trade secrets for developing warehousing, logistics and inventory control operations.
Zoox said the settlement required it to pay Tesla an undisclosed amount and undergo an audit to ensure that none of its employees had retained or are using Tesla's confidential information. more
Zeroing in on Zoom’s Threat to Financial Services
COVID-19 has induced a significant shift in the way we work. Remote is the new reality.
There may be, however, a tremendous cost to Zoom’s convenience... For many, Zoom has been the answer to staying connected in the workplace.
Simply put, the widespread adoption of Zoom amid a global pandemic might be the security vulnerability of the decade.
In fact, any financial services organization using the service should immediately assume their user credentials are under malicious parties’ control.
In recent weeks, New York Attorney General Letitia James has probed Zoom’s data security strategy, and whether the company’s security protections can keep up with the spike in users. It is also our understanding the FBI, among other federal government agencies, has also prohibited the use of Zoom and WebEx due to security concerns. more
Suit Claims Facebook, LinkedIn Eavesdropped on Zoom Calls
More Zoom news.
There may be, however, a tremendous cost to Zoom’s convenience... For many, Zoom has been the answer to staying connected in the workplace.
Simply put, the widespread adoption of Zoom amid a global pandemic might be the security vulnerability of the decade.
In fact, any financial services organization using the service should immediately assume their user credentials are under malicious parties’ control.
In recent weeks, New York Attorney General Letitia James has probed Zoom’s data security strategy, and whether the company’s security protections can keep up with the spike in users. It is also our understanding the FBI, among other federal government agencies, has also prohibited the use of Zoom and WebEx due to security concerns. more
Suit Claims Facebook, LinkedIn Eavesdropped on Zoom Calls
More Zoom news.
Business Espionage - You Staying in Jail
U.S. District Judge Ronnie Greer Wednesday temporarily stayed – or
postponed – the pretrial release of Xiorong “Shannon” You, a 56-year-old
Chinese-born chemical engineer accused of stealing $17 million in trade
secrets from Eastman Chemical Company and more than $100 million more
while working for Coca-Cola in Atlanta, according to court documents. more
Spycam Story # 834 - Deputy Danner Investigates Rectangular Turd
FL - Citrus County Sheriff’s Office deputies following up on a tip ... led to an investigation and arrest of a Dunnellon man for
video voyeurism, according to a Citrus County Sheriff’s Office arrest
affidavit...
Upon observing the interior of the portable toilet, the deputies could observe a black box-type object floating in the water, the report stated. (a la Caddyshack pool scene)
Deputy Danner was able to safely retrieve the object from the toilet. Deputies noted the item was a portable Brickhouse security camera. They were able to remove the subscriber identity module (SIM) card (more accurately an SD card) located inside the camera.
Deputies observed multiple files on the SIM card and opened one. At the 16:39.48 timestamp mark deputies observed a white male subject wearing a collared white, red, blue and green striped shirt with white/khaki shorts affixing the camera to the inside of the toilet...
Deputies confirmed he was wearing the same clothing found on the file located on the SIM card where he placed the camera in the toilet. more (You can't make this sh-t up. Perp gets the Darwin Award from us for filming himself.)
Upon observing the interior of the portable toilet, the deputies could observe a black box-type object floating in the water, the report stated. (a la Caddyshack pool scene)
Deputy Danner was able to safely retrieve the object from the toilet. Deputies noted the item was a portable Brickhouse security camera. They were able to remove the subscriber identity module (SIM) card (more accurately an SD card) located inside the camera.
Deputies observed multiple files on the SIM card and opened one. At the 16:39.48 timestamp mark deputies observed a white male subject wearing a collared white, red, blue and green striped shirt with white/khaki shorts affixing the camera to the inside of the toilet...
Deputies confirmed he was wearing the same clothing found on the file located on the SIM card where he placed the camera in the toilet. more (You can't make this sh-t up. Perp gets the Darwin Award from us for filming himself.)
Wednesday, April 15, 2020
China May Be Tapped Out
The Trump administration is continuing with actions that cut telecom ties with China, including a new filing from the National Telecommunications and Information Administration that recommends that the Federal Communications Commission revoke China Telecom’s ability to carry international voice traffic between the U.S. and other countries...
China Telecom was authorized in 2007 to operate in the U.S. and it provides a suite of services that include voice, data television and business network services. It also operates a mobile virtual network operator, CTExcel, that targets Chinese Americans and Chinese tourists and students, according to the filing—but times and risks have changed, NTIA has concluded.
It also said that 80% of the DoJ’s economic espionage cases where a foreign entity or government would benefit, have involved China. more
It also said that 80% of the DoJ’s economic espionage cases where a foreign entity or government would benefit, have involved China. more
Attorney Approved - A Strange Reality Hollywood Spy Camera Story
Aaron Kaplan,
the prolific TV producer, has been accused in a lawsuit of installing
cameras in his sister-in-law’s bedroom — with one focused on her closet —
in order to spy on her...
Aaron Kaplan, producer of “The Chi,” “Santa Clarita Diet” and other shows, has been embroiled in a probate fight with his sister-in-law since the death of his brother, Joe, in July 2018.
In a probate filing in February, Aaron Kaplan acknowledged that he arranged for the cameras to be placed in the closet because he worried that Elizabeth Kaplan would break into a safe that held valuables belonging to her late husband’s trust...
According to Elizabeth Kaplan’s lawsuit, two weeks after she returned to the couple’s home in Malibu, she and her mother discovered two cameras in her husband’s closet in the master bedroom. The suit alleges that the second camera was positioned such that it pointed at Elizabeth Kaplan’s closet...
In his probate filing, Aaron Kaplan said he became suspicious soon after his brother’s death, when he heard that Elizabeth’s friends had been seen entering the Malibu house and that artwork had been removed from the walls.
“Based on consultations with his attorney, the Trustee understood that he could — and should — have motion-activated cameras installed in Joe’s personal closet to monitor and protect those assets for the beneficiaries of Joe’s Trust,” Aaron Kaplan’s attorneys wrote.
According to the filing, the cameras captured Elizabeth Kaplan and her mother rifling through Joe Kaplan’s belongings in search of cash. They also allegedly hired a locksmith to try to break into the safe, in spite of instructions from Aaron’s attorney that the contents belonged to the separate trust.
The video also captured Elizabeth discovering $10,000 in cash, counting it out, and pocketing it, according to the filing.
The recordings stopped once Elizabeth and her mother discovered and disabled the cameras. more
Aaron Kaplan, producer of “The Chi,” “Santa Clarita Diet” and other shows, has been embroiled in a probate fight with his sister-in-law since the death of his brother, Joe, in July 2018.
In a probate filing in February, Aaron Kaplan acknowledged that he arranged for the cameras to be placed in the closet because he worried that Elizabeth Kaplan would break into a safe that held valuables belonging to her late husband’s trust...
According to Elizabeth Kaplan’s lawsuit, two weeks after she returned to the couple’s home in Malibu, she and her mother discovered two cameras in her husband’s closet in the master bedroom. The suit alleges that the second camera was positioned such that it pointed at Elizabeth Kaplan’s closet...
In his probate filing, Aaron Kaplan said he became suspicious soon after his brother’s death, when he heard that Elizabeth’s friends had been seen entering the Malibu house and that artwork had been removed from the walls.
“Based on consultations with his attorney, the Trustee understood that he could — and should — have motion-activated cameras installed in Joe’s personal closet to monitor and protect those assets for the beneficiaries of Joe’s Trust,” Aaron Kaplan’s attorneys wrote.
According to the filing, the cameras captured Elizabeth Kaplan and her mother rifling through Joe Kaplan’s belongings in search of cash. They also allegedly hired a locksmith to try to break into the safe, in spite of instructions from Aaron’s attorney that the contents belonged to the separate trust.
The video also captured Elizabeth discovering $10,000 in cash, counting it out, and pocketing it, according to the filing.
The recordings stopped once Elizabeth and her mother discovered and disabled the cameras. more
Daughter Saves Mom from Video Voyeurism
UT - A Kamas man has been charged with multiple offenses after he allegedly hid cameras in the heat vents of a woman’s Summit County residence.
Matthew Ryan Ingoldsby, 48, was arrested on March 31 and is facing charges of:
Matthew Ryan Ingoldsby, 48, was arrested on March 31 and is facing charges of:
- Burglary of a dwelling, a second-degree felony
- Voyeurism by electronic equipment concealed or disguised, a class A misdemeanor
- Stalking, a third-degree felony
- Tampering with a witness, a third-degree felony
Corporate Privacy & Information Security Challenges from Covid-19
This is an excellent information security article written by a respected colleague. ~Kevin
via Charles Patterson - Exec Security
The CoVid-19 response has had serious and often devastating effects on individuals and businesses throughout the world... But there are a number of side-effects from this, many of which affect privacy and information security...
Company offices may be left mostly empty with a skeleton crew, and access being granted to maintenance staff or a few lone employees who may still be carrying out basic operations or some who may have just needed to return to pick up something from their desk to help them work better from home. This means the employees, cleaners, and other staff will be largely unsupervised and may have easy access to areas not normally permitted...
When reviewing your security during this period, here are some very important points to consider:
via Charles Patterson - Exec Security
The CoVid-19 response has had serious and often devastating effects on individuals and businesses throughout the world... But there are a number of side-effects from this, many of which affect privacy and information security...
Company offices may be left mostly empty with a skeleton crew, and access being granted to maintenance staff or a few lone employees who may still be carrying out basic operations or some who may have just needed to return to pick up something from their desk to help them work better from home. This means the employees, cleaners, and other staff will be largely unsupervised and may have easy access to areas not normally permitted...
When reviewing your security during this period, here are some very important points to consider:
- How secure was your facility during the down time?
- Note what areas were weakened, where was less manpower deployed?
- Who continued to have access?
- What types of staff were still given access? Were employees still allowed back in?
- Were any private or classified areas left open and unattended?
- Pay particular attention to board rooms, conference areas, and C-suites. Look for any signs of unauthorized activity.
- What incidents may have occurred during the period?
- Review logs of any security incidents, look for any correlations that could indicate suspicious activity.
- Were there any areas accessed by unauthorized personnel?
- Investigate thoroughly any reports of employees found in unauthorized areas.
- Did any break-ins or vandalism occur?
- Security breaches or other incidents could be used as a cover for actual espionage activity. If a break-in or theft was reported, pay attention to any nearby areas that may have been accessed as well.
Subscribe to:
Posts (Atom)