New York Times bestselling author Joseph Finder delivers an exhilarating and timely thriller exploring how even the most powerful among us can be brought down by a carefully crafted lie and how the secrets we keep can never truly stay buried in Guilty Minds.
Nick Heller is a private spy—an intelligence operative based in Boston, hired by lawyers, politicians, and even foreign governments. A high-powered investigator with a penchant for doing things his own way, he’s called to Washington, DC, to help out with a delicate, potentially explosive situation.
The chief justice of the Supreme Court is about to be defamed, his career destroyed, by a powerful gossip website that specializes in dirt on celebs and politicians. Their top reporter has written an exposé claiming that he had liaisons with an escort, a young woman prepared to tell the world her salacious tale. But the chief justice is not without allies and his greatest supporter is determined to stop the story in its tracks.
Nick has just forty-eight hours to disprove the story about the chief justice. But when the call girl is found murdered, the case takes a dangerous turn, and Nick resolves to find the mastermind behind the conspiracy before anyone else falls victim to the maelstrom of political scandal and ruined reputations predicated upon one long-buried secret.
(The story may be fiction, but the technical surveillance/security details are accurate. Joe consults with several well-known specialists, including: Kevin D. Murray, and Adam Hernandez, to give his novel the ring of authenticity. This attention to detail is just one of the things that sets Joe Finder apart from other authors... not to mention his gripping plots.)
Saturday, July 23, 2016
Compilation of State and Federal Privacy Laws (US & Canada)
The 2016 Supplement to Privacy Journal's "Compilation of State and Federal Privacy Laws" (2013) has been published, adding 30 more laws enacted by states and provinces in the past 12 months.
The Compilation of State and Federal Privacy Laws (ISBN 978-0-930072-56-8) cites and describes more than 700 state, provincial, and federal laws affecting the confidentiality of personal information and electronic surveillance. The laws are listed by state, grouped in categories like medical, credit, financial, security breaches, tracking technologies, employment, government, school records, Social Security numbers, marketing, telephone privacy and many more. Canadian laws too.
PRIVACY JOURNAL
PO Box 28577
Providence RI 02908
Phone: 401/274-7861
Fax: 401/274-4747
www.privacyjournal.net
The Compilation of State and Federal Privacy Laws (ISBN 978-0-930072-56-8) cites and describes more than 700 state, provincial, and federal laws affecting the confidentiality of personal information and electronic surveillance. The laws are listed by state, grouped in categories like medical, credit, financial, security breaches, tracking technologies, employment, government, school records, Social Security numbers, marketing, telephone privacy and many more. Canadian laws too.
PRIVACY JOURNAL
PO Box 28577
Providence RI 02908
Phone: 401/274-7861
Fax: 401/274-4747
www.privacyjournal.net
Friday, July 22, 2016
Amazon Mute on Echo Eavesdropping
We may never know if the feds have hijacked Amazon Echo.
Amazon has so far issued two transparency reports since it began declaring how many government data demands and wiretap orders it receives.
Both reports outlined how many subpoenas, search warrants, and court orders the company received to cloud service Amazon Web Services. While its cloud makes up a significant portion of the data that it gathers, the company also collects vast amounts of data from its retail businesses, mobile services, book purchases, and requests made to Echo.
But an Amazon spokesperson wouldn't comment on whether the company will expand its transparency report. more
Amazon has so far issued two transparency reports since it began declaring how many government data demands and wiretap orders it receives.
Both reports outlined how many subpoenas, search warrants, and court orders the company received to cloud service Amazon Web Services. While its cloud makes up a significant portion of the data that it gathers, the company also collects vast amounts of data from its retail businesses, mobile services, book purchases, and requests made to Echo.
But an Amazon spokesperson wouldn't comment on whether the company will expand its transparency report. more
Kim Kardashian Could Get a Swift Kick for Eavesdropping
Kim Kardashian was apparently bluffing when she said that she has a video of Taylor Swift approving the lyric “I made that bitch famous,” even if the reality star had released a video on Sunday night on her Snapchat.
A legal expert said that the turn of events could lead to a major legal battle between Swift on one hand, and Kanye West and Kim Kardashian on the other hand.
For releasing the recording of West’s conversation with Swift – even minus the alleged approval by Swift of the controversial lyric – because the singer was unaware their conversation was being recorded, West and Kardashian breached California’s law on eavesdropping, noted E! News. more
A legal expert said that the turn of events could lead to a major legal battle between Swift on one hand, and Kanye West and Kim Kardashian on the other hand.
For releasing the recording of West’s conversation with Swift – even minus the alleged approval by Swift of the controversial lyric – because the singer was unaware their conversation was being recorded, West and Kardashian breached California’s law on eavesdropping, noted E! News. more
North Korea Revives Coded Spy Numbers Broadcasts
In an era of sophisticated spycraft, North Korea appears to be returning to the days of shortwave radio.
The North broadcast a series of seemingly random numbers on Pyongyang Radio twice recently, an eerie reminder of the days when the North encrypted messages to its spies in South Korea.
In the latest episode last Friday, an announcer read what she described as “a mathematics review assignment for investigative agent No. 27,” engaged in a “distance learning” program.
“Turn to Page 459, No. 35; Page 913, No. 55; Page 135, No. 86,” she said, continuing to cite numbers for 14 minutes.Decades ago, it was not unusual for late-night radio listeners in the South to hear mysterious numbers arriving on static-filled signals from the North. more
Click to enlarge. |
In the latest episode last Friday, an announcer read what she described as “a mathematics review assignment for investigative agent No. 27,” engaged in a “distance learning” program.
“Turn to Page 459, No. 35; Page 913, No. 55; Page 135, No. 86,” she said, continuing to cite numbers for 14 minutes.Decades ago, it was not unusual for late-night radio listeners in the South to hear mysterious numbers arriving on static-filled signals from the North. more
Survey: Do Swiss Spy?
The survey, conducted by a research company on behalf of comparis.ch, asked more than 1,000 people across Switzerland their views on spying and being spied on.
Some 22 percent admitted to keeping an eye on their neighbours using binoculars, cameras and cameraphones, or through the spyhole of their front door.
The most popular reason for spying was to check out a neighbour’s plants (28 percent), followed by how they renovate their home (24 percent), and the way in which they behave with their children (18 percent) and partner (13 percent).
Those that do the most spying are in the 15-29 age bracket, while those aged between 60-74 are the least bothered by what their neighbours are up to.
The survey also asked respondents if they felt observed, with 48 percent of young people saying they do, against a national average of 40 percent. more
Some 22 percent admitted to keeping an eye on their neighbours using binoculars, cameras and cameraphones, or through the spyhole of their front door.
The most popular reason for spying was to check out a neighbour’s plants (28 percent), followed by how they renovate their home (24 percent), and the way in which they behave with their children (18 percent) and partner (13 percent).
Those that do the most spying are in the 15-29 age bracket, while those aged between 60-74 are the least bothered by what their neighbours are up to.
The survey also asked respondents if they felt observed, with 48 percent of young people saying they do, against a national average of 40 percent. more
Monday, July 18, 2016
IT Security Alert - Got Juniper Equipment? Better get the patch.
Juniper Networks patched a crypto bug tied to its public key infrastructure that could have allowed hackers to access the company’s routers, switches and security devices and eavesdrop on sensitive communications. The flaw was tied to Juniper products and platforms running Junos, the Juniper Network Operating System.
The bug (CVE-2016-1280) was reported and patched by Juniper on Wednesday, with public disclosure Friday. Juniper also posted its own information on the security vulnerability, which was found internally.
...The vulnerability allowed attackers to create specially crafted self-signed certificates that can bypass certificate validation within Juniper hardware running the Junos OS. If exploited, the vulnerability could have allowed an attacker in a man-in-the-middle position on the victim’s network to read supposedly secure communications. more
The bug (CVE-2016-1280) was reported and patched by Juniper on Wednesday, with public disclosure Friday. Juniper also posted its own information on the security vulnerability, which was found internally.
...The vulnerability allowed attackers to create specially crafted self-signed certificates that can bypass certificate validation within Juniper hardware running the Junos OS. If exploited, the vulnerability could have allowed an attacker in a man-in-the-middle position on the victim’s network to read supposedly secure communications. more
Quote of the Week
"Lord knows how much industrial espionage has gone on." —Bill Curtis, a Fellow of the IEEE more
The Man with the Butterfly Net was a Spy... and then founded the Boy Scouts
Just a few years into his military service, Robert Baden-Powell had served in South Africa and was transferred to Malta, where he began his spy career as an intelligence officer for the director of military intelligence. One of his favorite disguises was that of an entomologist who studied butterflies, a cover that allowed him to move around freely without looking suspicious. He revealed his scientific subterfuge in his book "My Adventures as a Spy."
"Carrying this book and a colour-box and a butterfly net in my hand, I was above all suspicion to anyone who met me on the lonely mountain side, even in the neighbourhood of the forts," Baden-Powell wrote. And not only did he disguise himself as a butterfly collector; he hid secret information about those forts, as well as other military secrets in drawings of insects and other natural ephemera, which you can see scattered throughout this post.
In Baden-Powell's illustrations, natural patterns are used to transmit messages and information within a drawing; a leaf's pattern could reveal the contours of an area to be invaded, as above. Once a recipient knew how to read the illustrations, it was possible to convey the information easily, without much translation or complex code-breaking needed. more
Click to enlarge. |
In Baden-Powell's illustrations, natural patterns are used to transmit messages and information within a drawing; a leaf's pattern could reveal the contours of an area to be invaded, as above. Once a recipient knew how to read the illustrations, it was possible to convey the information easily, without much translation or complex code-breaking needed. more
Labels:
art,
espionage,
historical,
spy school,
steganography,
weird
Saturday, July 16, 2016
Business Espionage: FBI's 6-Step Advice
Via REI press release: Corporate Espionage Continues to Grow
Companies should be on guard and take the following steps to protect business related information, as stated on the FBI´s website:
1. Recognize there is an insider and outsider threat to your company.
2. Identify and valuate trade secrets.
3. Implement a proactive plan for safeguarding trade secrets. (call here for assistance)
4. Secure physical and electronic versions of your trade secrets.
5. Confine intellectual knowledge on a “need-to-know” basis.
6. Provide training to employees about your company’s intellectual property plan and security.
Companies should be on guard and take the following steps to protect business related information, as stated on the FBI´s website:
1. Recognize there is an insider and outsider threat to your company.
2. Identify and valuate trade secrets.
3. Implement a proactive plan for safeguarding trade secrets. (call here for assistance)
4. Secure physical and electronic versions of your trade secrets.
5. Confine intellectual knowledge on a “need-to-know” basis.
6. Provide training to employees about your company’s intellectual property plan and security.
PokemonGo - A data-gathering opportunity for spies.
A retired senior Russian intelligence official is warning his colleagues in the spying game to stay away from PokemonGo.
Alexander Mikhailov, a former Major-General in Russia’s Federal Security Service, or FSB (the successor to the Soviet KGB), says the game poses a serious national security threat in the hands of oblivious government officials or military personnel.
“Imagine, that these ‘animals,’ appear not in a park but in a secret location where the user who is a soldier or a security official takes a photo of it,” he tells RIA Novosti... “It is unlikely that intelligence agencies will pass up the chance to exploit this data-gathering opportunity,” he said...
So far at least four New York City police officers have been filmed catching Pokemon, around the city. more
Alexander Mikhailov, a former Major-General in Russia’s Federal Security Service, or FSB (the successor to the Soviet KGB), says the game poses a serious national security threat in the hands of oblivious government officials or military personnel.
“Imagine, that these ‘animals,’ appear not in a park but in a secret location where the user who is a soldier or a security official takes a photo of it,” he tells RIA Novosti... “It is unlikely that intelligence agencies will pass up the chance to exploit this data-gathering opportunity,” he said...
So far at least four New York City police officers have been filmed catching Pokemon, around the city. more
Privacy Scarf Foils Paparazzi Pics
There's a stylish way to keep paparazzi at bay — the anti-flash scarf.
The ISHU scarf, created by 28-year-old Saif Siddiqui, is made from a special fabric that reflects light.
Siddiqui, who runs the London and Amsterdam-based company, told BuzzFeed that the scarf's purpose is to provide some privacy.
"The main intention is to make people aware of how important privacy actually is," he said. "Everyone has a 'brand' online, and with the ISHU Scarf, people are back in control of their privacy." more
The ISHU scarf, created by 28-year-old Saif Siddiqui, is made from a special fabric that reflects light.
Siddiqui, who runs the London and Amsterdam-based company, told BuzzFeed that the scarf's purpose is to provide some privacy.
"The main intention is to make people aware of how important privacy actually is," he said. "Everyone has a 'brand' online, and with the ISHU Scarf, people are back in control of their privacy." more
Friday, July 15, 2016
How a YouTube Video Could Infect Your Phone with Spyware
Researchers from Georgetown University and the University of California, Berkeley say cybercriminals could use hidden voice commands via popular YouTube videos to infect Androids and iPhones with malware.
Micah Sherr, a computer science department professor at Georgetown, says the research was inspired by the proliferation of voice-controlled systems. "Amazon Echo was coming out when we started this work," Sherr notes.
Since then, Google has launched Google Home, a similar always-listening device, and electronic devices lost in a messy bedroom can now be recovered by speaking “Okay Google” or “Hey Siri.”
The new research shows how keeping such devices on always-listen mode could lead to a cyberattack. Sherr says a cybercriminal could attempt to plant malware on the device using a hidden voice command. more
Micah Sherr, a computer science department professor at Georgetown, says the research was inspired by the proliferation of voice-controlled systems. "Amazon Echo was coming out when we started this work," Sherr notes.
Since then, Google has launched Google Home, a similar always-listening device, and electronic devices lost in a messy bedroom can now be recovered by speaking “Okay Google” or “Hey Siri.”
The new research shows how keeping such devices on always-listen mode could lead to a cyberattack. Sherr says a cybercriminal could attempt to plant malware on the device using a hidden voice command. more
Tuesday, July 12, 2016
1970's CIA Dragonfly Spy - Ripley's Believe It or Not
In the 1970s, the CIA developed the Insectothopter, an unmanned surveillance drone disguised as a dragonfly.
video |
- The Insectothopter was the size of a dragonfly
- It was painted to look like a dragonfly
- It was powered by a small gasoline engine made by a watchmaker
- And jets of gas were used to propel it forward
- Because it was too difficult to control in even a slight crosswind, the project was abandoned
Former Basketball Coach / Choir Teacher - Locker Room Spy Pen
A former basketball coach is facing multiple felony counts after authorities say he was caught filming athletes in the shower using a camera disguised as a pen according to the Mankato Free Press.
Zachary Patrick Roberts was employed at Janesville-Waldorf-Pemberton High School as the choir teacher for six years before resigning in January...
According to the criminal complaint, an athlete discovered the pen following a game in December when he wanted to write down a play.
Teammates tried to access the files saved on the camera, but were unsuccessful. After the players turned the pen over to school officials, it was given to the police for investigation. more
Zachary Patrick Roberts was employed at Janesville-Waldorf-Pemberton High School as the choir teacher for six years before resigning in January...
According to the criminal complaint, an athlete discovered the pen following a game in December when he wanted to write down a play.
Teammates tried to access the files saved on the camera, but were unsuccessful. After the players turned the pen over to school officials, it was given to the police for investigation. more
Monday, July 11, 2016
The Open Microphone Strikes Again
The only thing more embarrassing than having to resign after a political gambit (the Brexit) blew up in your face? Getting caught on a hot mic singing a goofy tune immediately after you resign. Godspeed, David Cameron. more
Moral: Treat microphones like a poisonous snakes. Always know where they are and what they are doing. Always.
P.S. It has happened to him before, and before.
Moral: Treat microphones like a poisonous snakes. Always know where they are and what they are doing. Always.
P.S. It has happened to him before, and before.
Scientists Create a Real 'Cone of Silence' UPDATE
A while back the original post, Scientists Create a Real 'Cone of Silence', highlighted the advancement in sound mitigation by Steven Cummer, professor of electrical and computer engineering, and his colleagues at Duke University.
Jeremy Luscombe, of resonics.co.uk, wrote in to tell me about, "a more comprehensive look at future acoustic and soundproofing technologies."
Great progress is being made on many fronts, and Jeremy has written about seven of them. It is a fascinating read.
My favorite is the "Air Transparent Soundproof Window" (below).
While these technologies are being developed mainly for commercial use, the materials and techniques also have counterespionage potential.
Jeremy Luscombe, of resonics.co.uk, wrote in to tell me about, "a more comprehensive look at future acoustic and soundproofing technologies."
Great progress is being made on many fronts, and Jeremy has written about seven of them. It is a fascinating read.
My favorite is the "Air Transparent Soundproof Window" (below).
While these technologies are being developed mainly for commercial use, the materials and techniques also have counterespionage potential.
Saturday, July 9, 2016
World's Biggest Bug (You need it if you want to bug aliens.)
China Wants To ‘Eavesdrop’ On Aliens With This Giant Radio Telescope
China hoisted the final piece into position on what will be the world's largest radio telescope, which it will use to explore space and help in the hunt for extraterrestrial life, state media said.
The Five-hundred-meter Aperture Spherical Telescope, or FAST, is the size of 30 football fields and has been hewed out of a mountain in the poor southwestern province of Guizhou. more
Click to enlarge |
The Five-hundred-meter Aperture Spherical Telescope, or FAST, is the size of 30 football fields and has been hewed out of a mountain in the poor southwestern province of Guizhou. more
Spies Gone Wild, or "Dude, where's MY car?"
This is the moment newly qualified Russian spies parade a cortege of black Mercedes Gelandewagens through the streets of Moscow while blasting their horns.
The cavalcade by recently-qualified 007s from Vladimir Putin's espionage ranks has stunned Cold War specialists schooled in staying in the shadows.
Veteran spies in Russia have reacted in horror after the show of strength by newly graduated agents from the foreign intelligence section of the FSB spy academy.
The FSB was once headed by Putin, who was also a KGB agent in Germany during the Cold War. more
The cavalcade by recently-qualified 007s from Vladimir Putin's espionage ranks has stunned Cold War specialists schooled in staying in the shadows.
Veteran spies in Russia have reacted in horror after the show of strength by newly graduated agents from the foreign intelligence section of the FSB spy academy.
The FSB was once headed by Putin, who was also a KGB agent in Germany during the Cold War. more
US Federal Wiretap Report 2015
This report covers intercepts concluded between January 1, 2015,
and December 31, 2015, and provides supplementary information on arrests and convictions resulting from intercepts concluded in prior years.
Forty-eight jurisdictions (the federal government, the District of Columbia, the Virgin Islands, Puerto Rico, and 44 states) currently have laws that authorize courts to issue orders permitting wire, oral, or electronic surveillance. Table 1 shows that a total of 28 jurisdictions reported using at least one of these types of surveillance as an investigative tool during 2015. more
and December 31, 2015, and provides supplementary information on arrests and convictions resulting from intercepts concluded in prior years.
Forty-eight jurisdictions (the federal government, the District of Columbia, the Virgin Islands, Puerto Rico, and 44 states) currently have laws that authorize courts to issue orders permitting wire, oral, or electronic surveillance. Table 1 shows that a total of 28 jurisdictions reported using at least one of these types of surveillance as an investigative tool during 2015. more
"Spy it out for three months. If you like, we get you court order."
Polish spies could be secretly eyeballing world leaders attending the NATO summit in Warsaw.
.. all thanks to a new law that came into force just last week.
The new anti-terrorism legislation was signed by Polish president Andrzej Duda on June 22. It came into force one week later. Under the law, secret surveillance may be carried out on any foreigner for up to three months without a court order. This includes undercover audio and video taping, bugging private premises, and accessing private electronic and phone communications. more
.. all thanks to a new law that came into force just last week.
The new anti-terrorism legislation was signed by Polish president Andrzej Duda on June 22. It came into force one week later. Under the law, secret surveillance may be carried out on any foreigner for up to three months without a court order. This includes undercover audio and video taping, bugging private premises, and accessing private electronic and phone communications. more
Spy Compound For Sale - "one million dollars..."
The Navy built Sugar Grove Station back in the 1960s out in the Allegheny Mountains of West Virginia. Now they want to get it off their hands and sell it to the highest bidder.
The 120-acre spy base compound housed up to 400 Navy personnel and their families.
A press release for this expansive property more subtly calls it a “United States Spy Compound” for “advanced communications research.” After over 50 years of activity, the base closed down operations in September 2015.
The starting bid is $1,000,000. However, with all that powerful history and stellar views behind it, the final price could be substantially higher. The views of the surrounding hills alone could make this place worth the investment. more
The 120-acre spy base compound housed up to 400 Navy personnel and their families.
A press release for this expansive property more subtly calls it a “United States Spy Compound” for “advanced communications research.” After over 50 years of activity, the base closed down operations in September 2015.
The starting bid is $1,000,000. However, with all that powerful history and stellar views behind it, the final price could be substantially higher. The views of the surrounding hills alone could make this place worth the investment. more
Friday, July 8, 2016
Court: Using a Shared Password is Deemed Hacking.
A federal appeals court has affirmed the computer-hacking conviction of a former executive at a recruiting firm accused of using a shared password to steal headhunting leads from the company’s internal network after he left his job to launch a rival business. more
Spybusters Textbook Tip: Be Careful What You Say in Public
A man has exposed the cheating antics of a relative stranger after overhearing her making arrangements for a liaison with her lover in a petrol station.
Stevie Wilcock, 22, posted a description of the woman, her car and her license plate online in a post that has gone viral... (he) was on his way to work when he was in a queue for coffee in Chester's Shell garage when he overheard the conversation.
But while Mr Wilcock said he was acting in good will his decision to publicly shame the woman appears to have backfired with some.
One user said: "Maybe Dave is an absolute horror and she needs a little TLC. Or maybe Dave would like to try and repair the relationship. But he won't get the chance now because some' fine upstanding citizen' has decided to put Dave's private business out there for everyone to comment on."
Nevertheless Mr Wilcock stands behind his decision to take action. more
PS - Your confidential business discussions are also vulnerable every time you talk in public. Think your office is a safe location? When was the last time you had it swept?
Stevie Wilcock, 22, posted a description of the woman, her car and her license plate online in a post that has gone viral... (he) was on his way to work when he was in a queue for coffee in Chester's Shell garage when he overheard the conversation.
But while Mr Wilcock said he was acting in good will his decision to publicly shame the woman appears to have backfired with some.
One user said: "Maybe Dave is an absolute horror and she needs a little TLC. Or maybe Dave would like to try and repair the relationship. But he won't get the chance now because some' fine upstanding citizen' has decided to put Dave's private business out there for everyone to comment on."
Nevertheless Mr Wilcock stands behind his decision to take action. more
PS - Your confidential business discussions are also vulnerable every time you talk in public. Think your office is a safe location? When was the last time you had it swept?
Spy Demise? You Decide.
Russian intelligence officer, Aleksandr Poteyev, who was sentenced for treason in absentia by Russia after blowing the cover of a spy ring in the US, has reportedly died. Moscow, however, is not confirming the news or taking the defector of its wanted list. more
Thursday, July 7, 2016
The Most Dangerous U.S. Spy You Never Heard of... until now
She put American combat troops in harm's way, betrayed her own people and handed over so many secrets that experts say the U.S. may never know the full extent of the damage.
Ana Montes was the Queen of Cuba, an American who from 1985 to the September 11, 2001 attacks handed over U.S. military secrets to Havana while working as a top analyst for the Pentagon's Defense Intelligence Agency.
But despite her crimes, Montes remains largely unknown.
You might not think Cuba could do much harm to a superpower like the U.S., said retired DIA official Chris Simmons, appearing on CNN's "Declassified." But you'd be wrong... more
Programming note: Explore untold stories of American spies: CNN Original Series "Declassified" airs Sundays at 10 p.m. ET/PT only on CNN.
Ana Montes was the Queen of Cuba, an American who from 1985 to the September 11, 2001 attacks handed over U.S. military secrets to Havana while working as a top analyst for the Pentagon's Defense Intelligence Agency.
But despite her crimes, Montes remains largely unknown.
You might not think Cuba could do much harm to a superpower like the U.S., said retired DIA official Chris Simmons, appearing on CNN's "Declassified." But you'd be wrong... more
Programming note: Explore untold stories of American spies: CNN Original Series "Declassified" airs Sundays at 10 p.m. ET/PT only on CNN.
Business Espionage: A Brief History
by Daniel Corbett and Michael Disotell
...another early example of industrial espionage came about in the late eighteenth century, when France found itself attempting to compete with the emerging industrial strength of Great Britain. The French government surreptitiously placed apprentices in English iron and steel yards to abscond with production formulas. To maintain its market dominance, Britain became the first country to pass legislation aimed at preventing industrial espionage.
In the United States, American businesses employed former Pinkerton detectives to uncover employee theft after the Civil War. And during the 1920s, anxiety over Communist and unionist upheaval caused companies to hire double agents to expose internal threats. According to a report by the U.S. Senate Committee on Education and Labor, a majority of American companies had placed labor spies in their plants and unions around that time.
As labor-management tensions started to ease after World War II, American companies shifted their focus away from themselves and began spying on competitors. Industrial espionage began to follow one of two familiar patterns: (1) a former employee would misappropriate confidential information before departing for a competitor, or (2) a competitor would place a “mole” inside an organization to gain access to corporate secrets.
Industrial espionage became a global affair during the Cold War, as U.S. businesses faced threats from Soviet spies and multinational competitors alike. For example, in 1982 six executives from the Japanese firms Hitachi and Mitsubishi were arrested in Santa Clara, California, for allegedly trying to steal computer parts from IBM. Companies also became increasingly worried about executives overseas defecting to competitors. A dispute between General Motors and Volkswagen arose when a group of GM executives in Germany left GM to join VW. Upon seeing similar designs in VW’s car models, GM accused VW of using proprietary information gained from its former executives. In one of the largest industrial espionage cases ever, VW settled with GM for $100 million and agreed to buy at least $1 billion worth of car parts from the company. more
...another early example of industrial espionage came about in the late eighteenth century, when France found itself attempting to compete with the emerging industrial strength of Great Britain. The French government surreptitiously placed apprentices in English iron and steel yards to abscond with production formulas. To maintain its market dominance, Britain became the first country to pass legislation aimed at preventing industrial espionage.
In the United States, American businesses employed former Pinkerton detectives to uncover employee theft after the Civil War. And during the 1920s, anxiety over Communist and unionist upheaval caused companies to hire double agents to expose internal threats. According to a report by the U.S. Senate Committee on Education and Labor, a majority of American companies had placed labor spies in their plants and unions around that time.
As labor-management tensions started to ease after World War II, American companies shifted their focus away from themselves and began spying on competitors. Industrial espionage began to follow one of two familiar patterns: (1) a former employee would misappropriate confidential information before departing for a competitor, or (2) a competitor would place a “mole” inside an organization to gain access to corporate secrets.
Industrial espionage became a global affair during the Cold War, as U.S. businesses faced threats from Soviet spies and multinational competitors alike. For example, in 1982 six executives from the Japanese firms Hitachi and Mitsubishi were arrested in Santa Clara, California, for allegedly trying to steal computer parts from IBM. Companies also became increasingly worried about executives overseas defecting to competitors. A dispute between General Motors and Volkswagen arose when a group of GM executives in Germany left GM to join VW. Upon seeing similar designs in VW’s car models, GM accused VW of using proprietary information gained from its former executives. In one of the largest industrial espionage cases ever, VW settled with GM for $100 million and agreed to buy at least $1 billion worth of car parts from the company. more
Ranking Chart of Mobile Devices Perceived as Most Secure
According to a Tech Pro Research survey, Apple is viewed by tech decision-makers as the most secure mobile device option. Samsung is threatening Apple's lead, and Microsoft ranks well on tablets thanks to the Surface. more
Click to enlarge. |
Sunday, July 3, 2016
Why Every Business Needs a Spycam Detection Program & Recording in the Workplace Policy
The American Family Association (AFA) has renewed its call to #BoycottTarget after a man was reportedly arrested for recording girls trying clothes on in a dressing room at the store's branch in Bedford, New Hampshire.
Last week, 22-year-old Zachery Bishop was arrested by the Bedford Police Department following reports that a man was videotaping young girls undressing inside Target's dressing room. In response to the report, AFA president Tim Wildmon released a statement calling on the 1.3 million people who have already signed the #BoycottTarget petition to invite one person each to sign it also, The Christian Post details.
"Over the Independence Day holiday and throughout the month of July, we're asking all those who have signed the #BoycottTarget pledge to work diligently to get just one other person in their circle of influence to sign it as well," said Wildmon in his statement. "We want to give another boost to the boycott against Target's unsafe and family unfriendly bathroom and fitting room policy." more
Get your Spycam Detection Program & Recording in the Workplace Policy here.
Last week, 22-year-old Zachery Bishop was arrested by the Bedford Police Department following reports that a man was videotaping young girls undressing inside Target's dressing room. In response to the report, AFA president Tim Wildmon released a statement calling on the 1.3 million people who have already signed the #BoycottTarget petition to invite one person each to sign it also, The Christian Post details.
"Over the Independence Day holiday and throughout the month of July, we're asking all those who have signed the #BoycottTarget pledge to work diligently to get just one other person in their circle of influence to sign it as well," said Wildmon in his statement. "We want to give another boost to the boycott against Target's unsafe and family unfriendly bathroom and fitting room policy." more
Get your Spycam Detection Program & Recording in the Workplace Policy here.
Wiretaps Stymied By Encryption Decreased in 2015
by Cory Bennett
Wiretaps encountering encryption dropped from 22 in 2014 to seven in 2015, according to a new report from the Administrative Office of the U.S. Courts. The report also found that despite this decline, wiretaps overall went up 16 percent during that same time span, from 3,554 in 2014 to 4,148 last year. more (requires sign-in)
Wiretaps encountering encryption dropped from 22 in 2014 to seven in 2015, according to a new report from the Administrative Office of the U.S. Courts. The report also found that despite this decline, wiretaps overall went up 16 percent during that same time span, from 3,554 in 2014 to 4,148 last year. more (requires sign-in)
Wednesday, June 29, 2016
Spy Alert #734: The Olympic Games Warning
If Zika, political instability and contaminated water weren’t enough,
U.S. intelligence officials are warning Americans traveling to the August Olympic Games in Rio and other destinations abroad that proprietary information stored on electronic devices is at high risk for theft by spies and cyber criminals who are increasingly targeting global events as troughs rich in valuable intelligence.
Bill Evanina, the nation’s chief counter-intelligence executive, is urging travelers to carry “clean’’ devices, free of potentially valuable archives that could be tapped for economic advantage, personal data or security information.
Just as the Olympics draw the world’s most talented athletes, Evanina said the games and other international events represent a "great playground’’ for government intelligence services and criminals, if only because of the “sheer number of devices.’’ more
U.S. intelligence officials are warning Americans traveling to the August Olympic Games in Rio and other destinations abroad that proprietary information stored on electronic devices is at high risk for theft by spies and cyber criminals who are increasingly targeting global events as troughs rich in valuable intelligence.
Bill Evanina, the nation’s chief counter-intelligence executive, is urging travelers to carry “clean’’ devices, free of potentially valuable archives that could be tapped for economic advantage, personal data or security information.
Just as the Olympics draw the world’s most talented athletes, Evanina said the games and other international events represent a "great playground’’ for government intelligence services and criminals, if only because of the “sheer number of devices.’’ more
Labels:
advice,
cell phone,
computer,
data,
eavesdropping,
espionage,
government,
Hack,
privacy
Nanny Cam Solves 2013 Home Invasion Case — 2016 Justice Served
A judge sentenced a New Jersey man to life in prison Wednesday for a brutal home invasion beating caught on a nanny cam, after listening to the victim describe how the attack left her with physical and psychological scars...
(Judge) Wigler added an additional five years to Custis' life sentence for the child endangerment conviction. Custis won't be eligible for parole for more than 60 years.
Prosecutors had sought a life sentence for the Newark resident based on a criminal past Wigler termed "rather staggering." It included 38 arrests and 17 felony convictions before the 2013 attack in Millburn, a suburban town several miles from Newark...
"Half-measures of leniency haven't worked to deter this defendant," (Assistant Essex County Prosecutor) Semper said. "He has almost as many arrests as he's had birthdays." more
http://www.usatoday.com/story/news/nation/2013/06/25/home-invasion-millburn-camera/2458129/ |
Prosecutors had sought a life sentence for the Newark resident based on a criminal past Wigler termed "rather staggering." It included 38 arrests and 17 felony convictions before the 2013 attack in Millburn, a suburban town several miles from Newark...
"Half-measures of leniency haven't worked to deter this defendant," (Assistant Essex County Prosecutor) Semper said. "He has almost as many arrests as he's had birthdays." more
Not the World's Smallest "Camera" but... Possibly the World's Smallest Camera Lens
Tiny 3D-printed medical camera could be deployed from inside a syringe.
Getting inside the human body to have a look around is always going to be invasive, but that doesn't mean more can't be done to make things a little more comfortable. With this goal in mind, German researchers have developed a complex lens system no bigger than a grain of salt that fits inside a syringe. The imaging tool could make for not just more productive medical imaging, but tiny cameras for everything from drones to slimmer smartphones.
Scientists from the University of Stuttgart built their three-lens camera using a new 3D printing technique. They say their new approach offers sub-micrometer accuracy that makes it possible to 3D print optical lens systems with two or more lenses for the first time. Their resulting multi-lens system opens up the possibility of correcting for aberration (where a lens cannot bring all wavelengths of color to the same focal plane), which could enable higher image quality from smaller devices. more
Getting inside the human body to have a look around is always going to be invasive, but that doesn't mean more can't be done to make things a little more comfortable. With this goal in mind, German researchers have developed a complex lens system no bigger than a grain of salt that fits inside a syringe. The imaging tool could make for not just more productive medical imaging, but tiny cameras for everything from drones to slimmer smartphones.
Scientists from the University of Stuttgart built their three-lens camera using a new 3D printing technique. They say their new approach offers sub-micrometer accuracy that makes it possible to 3D print optical lens systems with two or more lenses for the first time. Their resulting multi-lens system opens up the possibility of correcting for aberration (where a lens cannot bring all wavelengths of color to the same focal plane), which could enable higher image quality from smaller devices. more
Labels:
FutureWatch,
Hack,
miscellaneous,
optics,
product,
spycam
Thursday, June 23, 2016
Mark Zuckerberg Tapes Over His Laptop Camera - You can do better!
Mark Zuckerberg is one of the most powerful men in the world...
On Tuesday, observers were reminded that Mr. Zuckerberg, 32, is not just a normal guy... his laptop camera and microphone jack appeared to be covered with tape...
The taped-over camera... usually a signal that someone is concerned... about hackers’ gaining access to his or her devices by using remote-access trojans — a process called “ratting.” (Remote access is not limited to ratters: According to a cache of National Security Agency documents leaked by Edward J. Snowden, at least two government-designed programs were devised to take over computer cameras and microphones.)
Security experts supported the taping, for a few good reasons... more
---
Murray Associates provided our clients with a more elegant solution—a year ago.
(free)
Spybuster Tip #812
Protect your privacy with just two disk magnets.
1. Affix one magnet to your laptop—adjacent to the camera lens.
2. Let the second magnet attach itself to the first one. It will orbit the first magnet.
3. Orbit the second magnet over the camera lens to eclipse the view.
4. Rotate it out of the way to use the camera.
Simple. Elegant. Effective.
Tape is tawdry.
You are now very cool! More cool than Zuck with his yuck tape.
On Tuesday, observers were reminded that Mr. Zuckerberg, 32, is not just a normal guy... his laptop camera and microphone jack appeared to be covered with tape...
The taped-over camera... usually a signal that someone is concerned... about hackers’ gaining access to his or her devices by using remote-access trojans — a process called “ratting.” (Remote access is not limited to ratters: According to a cache of National Security Agency documents leaked by Edward J. Snowden, at least two government-designed programs were devised to take over computer cameras and microphones.)
Security experts supported the taping, for a few good reasons... more
---
Murray Associates provided our clients with a more elegant solution—a year ago.
(free)
Spybuster Tip #812
Protect your privacy with just two disk magnets.
1. Affix one magnet to your laptop—adjacent to the camera lens.
2. Let the second magnet attach itself to the first one. It will orbit the first magnet.
3. Orbit the second magnet over the camera lens to eclipse the view.
4. Rotate it out of the way to use the camera.
Simple. Elegant. Effective.
Tape is tawdry.
You are now very cool! More cool than Zuck with his yuck tape.
Our ahead-of-the-curve mailing to our clients. Consider becoming one. |
The Great Seal Bug - Excellent Synopsis
In 1946, a group of Russian children from the Vladimir Lenin All-Union Pioneer Organization (sort of a Soviet scouting group) presented a carved wooden replica of the Great Seal of the United States to Averell Harriman, the U.S. Ambassador to the Soviet Union.
The gift, a gesture of friendship to the USSR's World War II ally, was hung in the ambassador’s official residence at Spaso House in Moscow. It stayed there on a wall in the study for seven years until, through accident and a ruse, the State Department discovered that the seal was more than a mere decoration.
It was a bug.
The Soviets had built a listening device—dubbed “The Thing” by the U.S. intelligence community—into the replica seal and had been eavesdropping on Harriman and his successors the whole time it was in the house. “It represented, for that day, a fantastically advanced bit of applied electronics,” wrote George Kennan, the ambassador at the time the device was found. “I have the impression that with its discovery the whole art of intergovernmental eavesdropping was raised to a new technological level.” more
The full story.
Click to enlarge |
It was a bug.
The Soviets had built a listening device—dubbed “The Thing” by the U.S. intelligence community—into the replica seal and had been eavesdropping on Harriman and his successors the whole time it was in the house. “It represented, for that day, a fantastically advanced bit of applied electronics,” wrote George Kennan, the ambassador at the time the device was found. “I have the impression that with its discovery the whole art of intergovernmental eavesdropping was raised to a new technological level.” more
The full story.
Godless Android Malware - Secretly Roots Phone, Installs Programs
Android users beware: a new type of malware has been found in legitimate-looking apps that can “root” your phone and secretly install unwanted programs.
The malware, dubbed Godless, has been found lurking on app stores including Google Play, and it targets devices running Android 5.1 (Lollipop) and earlier, which accounts for more than 90 percent of Android devices, Trend Micro said Tuesday in a blog post.
Godless hides inside an app and uses exploits to try to root the OS on your phone. This basically creates admin access to a device, allowing unauthorized apps to be installed.
Godless contains various exploits to ensure it can root a device, and it can even install spyware, Trend Micro said...
Trend recommends you buy some mobile security software. more
My solution. ~Kevin
The malware, dubbed Godless, has been found lurking on app stores including Google Play, and it targets devices running Android 5.1 (Lollipop) and earlier, which accounts for more than 90 percent of Android devices, Trend Micro said Tuesday in a blog post.
Godless hides inside an app and uses exploits to try to root the OS on your phone. This basically creates admin access to a device, allowing unauthorized apps to be installed.
Godless contains various exploits to ensure it can root a device, and it can even install spyware, Trend Micro said...
Trend recommends you buy some mobile security software. more
My solution. ~Kevin
Wednesday, June 22, 2016
Security Director Alert: Check the Settings on your Video Teleconferencing Equipment
Closed-door meetings by Canada's Quebec Liberal Party were exposed to trivial eavesdropping thanks to flaws in its video conferencing software.
The flaws, found and reported by a resident white hat researcher, are being fixed.
The researcher speaking on the condition of anonymity told local tabloid Le Journal de Montreal (French) he accessed the video streams using a vulnerability and the default password which was in use.
They were able to gain on-demand access to two meeting rooms in Quebec and Montreal, and supplied screen captures as evidence of the exploit.
"It was just too easy," the researcher told the paper. "It is as if they had stuck their PIN on their credit card."
Party communications director Maxime Roy says nothing relating to national security was discussed at the meetings... "We are working with our supplier." more
Need help?
Call me.
The flaws, found and reported by a resident white hat researcher, are being fixed.
The researcher speaking on the condition of anonymity told local tabloid Le Journal de Montreal (French) he accessed the video streams using a vulnerability and the default password which was in use.
They were able to gain on-demand access to two meeting rooms in Quebec and Montreal, and supplied screen captures as evidence of the exploit.
"It was just too easy," the researcher told the paper. "It is as if they had stuck their PIN on their credit card."
Party communications director Maxime Roy says nothing relating to national security was discussed at the meetings... "We are working with our supplier." more
Need help?
Call me.
Seek Thermal CompactPRO — Possible TSCM Tool Coming Soon
Seek Thermal has announced the first thermal imager for smartphones with 76,800 temperature pixels.
The new CompactPRO is said to deliver the high-quality thermal image resolution and the enhanced software features professionals demand, including:
I plan on testing this and will report in a future post. ~Kevin
The new CompactPRO is said to deliver the high-quality thermal image resolution and the enhanced software features professionals demand, including:
- 320 x 240 thermal sensor
- Wide 32-degree field of view
- Minimum focusable distance of 15cm
- Emissivity control
- Thermal level and span
- 9 color palettes
I plan on testing this and will report in a future post. ~Kevin
Snooping on Mobile Phones: Prevalence and Trends
Abstract: Personal mobile devices keep private information which people other than the owner may try to access.
Thus far, it has been unclear how common it is for people to snoop on one another’s devices. Through an anonymity-preserving survey experiment, we quantify the pervasiveness of snooping attacks, defined as "looking through someone else’s phone without their permission."
We estimated the 1-year prevalence to be 31% in an online participant pool. Weighted to the U.S. population, the data indicates that 1 in 5 adults snooped on at least one other person’s phone, just in the year before the survey was conducted.
We found snooping attacks to be especially prevalent among young people, and among those who are themselves smartphone users. In a follow-up study, we found that, among smartphone users, depth of adoption, like age, also predicts the probability of engaging in snooping attacks.
In particular, the more people use their devices for personal purposes, the more likely they are to snoop on others, possibly because they become aware of the sensitive information that is kept, and how to access it. These findings suggest that, all else remaining equal, the prevalence of snooping attacks may grow, as more people adopt smartphones, and motivate further effort into improving defenses. more
Thus far, it has been unclear how common it is for people to snoop on one another’s devices. Through an anonymity-preserving survey experiment, we quantify the pervasiveness of snooping attacks, defined as "looking through someone else’s phone without their permission."
We estimated the 1-year prevalence to be 31% in an online participant pool. Weighted to the U.S. population, the data indicates that 1 in 5 adults snooped on at least one other person’s phone, just in the year before the survey was conducted.
We found snooping attacks to be especially prevalent among young people, and among those who are themselves smartphone users. In a follow-up study, we found that, among smartphone users, depth of adoption, like age, also predicts the probability of engaging in snooping attacks.
In particular, the more people use their devices for personal purposes, the more likely they are to snoop on others, possibly because they become aware of the sensitive information that is kept, and how to access it. These findings suggest that, all else remaining equal, the prevalence of snooping attacks may grow, as more people adopt smartphones, and motivate further effort into improving defenses. more
A Technology that lets Companies Eavesdrop on Mobile Calls Made on their Premises.
Ever sought a bit of privacy by stepping away from your desk to make a personal call on your cell phone?
Soon, that may not be enough to prevent the boss from listening in -- at least not in Russia.
A Moscow security firm has developed technology that lets companies eavesdrop on mobile calls made on their premises. InfoWatch says the product is legal in Russia and that it’s scouting for other markets where customers -- banks, government agencies, or anyone else trying prevent leaks of confidential information -- would be allowed to use it.
“These technologies have been used by secret services or the military in certain countries,” said Natalya Kaspersky, chief executive officer of InfoWatch. “Our breakthrough is in applying them for corporate security.”The product expands an employer’s arsenal for fighting industrial espionage but is also likely to further fuel the global debate about data privacy. more
"Emergency! Everybody to get from street!"
Soon, that may not be enough to prevent the boss from listening in -- at least not in Russia.
A Moscow security firm has developed technology that lets companies eavesdrop on mobile calls made on their premises. InfoWatch says the product is legal in Russia and that it’s scouting for other markets where customers -- banks, government agencies, or anyone else trying prevent leaks of confidential information -- would be allowed to use it.
“These technologies have been used by secret services or the military in certain countries,” said Natalya Kaspersky, chief executive officer of InfoWatch. “Our breakthrough is in applying them for corporate security.”The product expands an employer’s arsenal for fighting industrial espionage but is also likely to further fuel the global debate about data privacy. more
"Emergency! Everybody to get from street!"
Monday, June 20, 2016
Cadillac CT6: A Luxury $53,000-plus 360º Surveillance Camera
Integrated into the front grille of the Cadillac CT6 is a surveillance
camera that the driver can secretly activate.
There's one on the rear trunk lid, too.
If the alarm system is triggered, these two cameras activate, and two others on the door-mounted rearview mirrors do as well.
Footage is stored on a removable SD card in the trunk. more
There's one on the rear trunk lid, too.
If the alarm system is triggered, these two cameras activate, and two others on the door-mounted rearview mirrors do as well.
Footage is stored on a removable SD card in the trunk. more
Amateur Skygazers Have Already Found the New Spy Satellite
Last week, the U.S. National Reconnaissance Office launched NROL-37, carrying its latest spy satellite into geosynchronous orbit via Delta IV-Heavy rocket. But it only took amateur space enthusiasts a few days to locate the mysterious new craft in the skies near Malaysia, over the Strait of Malacca.
While the contents and capabilities of the NROL-37 mission's payload are classified (the satellite is innocuously labeled US-268), its need to hitch a ride on the world's biggest rocket strongly suggests it is the seventh member of the Mentor/Orion family, an extra-large class of signals intelligence (SIGINT) satellites which help provide eavesdropping capability to US intelligence agencies.
Their large size also makes Mentor satellites the easiest to find and photograph. In a blog post, Dr. Marco Langbroek details how he and two other amateur skygazers found the Mentor-7 satellite near 104 E longitude over the course of a few days using standard photographic equipment. (You can always spot a geosynchronous satellite by taking long exposures of the sky at night and noting which “stars” aren’t moving.) more
While the contents and capabilities of the NROL-37 mission's payload are classified (the satellite is innocuously labeled US-268), its need to hitch a ride on the world's biggest rocket strongly suggests it is the seventh member of the Mentor/Orion family, an extra-large class of signals intelligence (SIGINT) satellites which help provide eavesdropping capability to US intelligence agencies.
Their large size also makes Mentor satellites the easiest to find and photograph. In a blog post, Dr. Marco Langbroek details how he and two other amateur skygazers found the Mentor-7 satellite near 104 E longitude over the course of a few days using standard photographic equipment. (You can always spot a geosynchronous satellite by taking long exposures of the sky at night and noting which “stars” aren’t moving.) more
Eavesdropping History: Wiretapping Observations in the 1890's
via Futility Closet...
In 1890, as the telephone’s influence spread across the United
States, Judge Robert S. Taylor of Fort Wayne, Ind., told an audience of
inventors that the telephone had introduced an “epoch of neighborship
without propinquity.” Scientific American called it “nothing less than a new organization of society.” The New York Times
reported that two Providence men “were recently experimenting with a
telephone, the wire of which was stretched over the roofs of innumerable
buildings, and was estimated to be fully four miles in length”:
Click to enlarge.(sic) |
They relate that on the first evening of their telephonic dissipation, they heard men and women singing songs and eloquent clergymen preaching ponderous sermons, and that they detected several persons in the act of practising (sic) on brass instruments. This sort of thing was repeated every evening, while on Sunday morning a perfect deluge of partially conglomerated sermons rolled in upon them. … The remarks of thousands of midnight cats were borne to their listening ears; the confidential conversations of hundreds of husbands and wives were whispered through the treacherous telephone. … The two astonished telephone experimenters learned enough of the secrets of the leading families of Providence to render it a hazardous matter for any resident of that city to hereafter accept a nomination for any office.In 1897 one London writer wrote, “We shall soon be nothing but transparent heaps of jelly to each other.” (From Carolyn Marvin, When Old Technologies Were New, 1988.)
Security Director Alert: Check Your Alarm Systems - Especially at Executive Residences
Dec. 31, 2016 is the proposed date for all 2G cell towers to discontinue service.
2G networks are on their way out the door, as AT&T and Verizon announced plans to discontinue services. This change brings with it the end of many older security system models whose radios will need to be updated or replaced to be compliant with 3G and 4G requirements.
If the alarm systems at your executives' residences, or remote locations, have not been updated yet... do it now.
~Kevin
Replacement 3G & 4G cellular alarm dialers.
2G networks are on their way out the door, as AT&T and Verizon announced plans to discontinue services. This change brings with it the end of many older security system models whose radios will need to be updated or replaced to be compliant with 3G and 4G requirements.
If the alarm systems at your executives' residences, or remote locations, have not been updated yet... do it now.
~Kevin
Replacement 3G & 4G cellular alarm dialers.
Spycam, Blackmail and a former Waffle House CEO (surprise ending)
Mye Brindle, a housekeeper for Joe Rogers, former CEO of the Waffle House restaurant chain, was indicted on Friday, for allegedly trying to extort millions of dollars from her boss.
Her lawyers, John Butters and David Cohen, were charged as well. According to the Associated Press, all three were indicted for secretly videotaping Brindle and Rogers having sex in Rogers’ home, and then trying to blackmail him with the recording...
Records indicated that the video, made with a spy camera Brindle received from a private investigator, did not show that Brindle did anything against her will.
Secretly recording someone in their bedroom is considered eavesdropping, which is a felony in Georgia.
Brindle, Butters, and Cohen are all charged with conspiracy to commit extortion, conspiracy to commit unlawful eavesdropping, and eavesdropping, each facing a sentence of up to five years of incarceration. more
Her lawyers, John Butters and David Cohen, were charged as well. According to the Associated Press, all three were indicted for secretly videotaping Brindle and Rogers having sex in Rogers’ home, and then trying to blackmail him with the recording...
Records indicated that the video, made with a spy camera Brindle received from a private investigator, did not show that Brindle did anything against her will.
Secretly recording someone in their bedroom is considered eavesdropping, which is a felony in Georgia.
Brindle, Butters, and Cohen are all charged with conspiracy to commit extortion, conspiracy to commit unlawful eavesdropping, and eavesdropping, each facing a sentence of up to five years of incarceration. more
Tuesday, June 14, 2016
Active Shooter: This 5-Minute Video Could Save Your Life
Run. Hide. Fight.
More Tips
Former Secret Service agent warns: You are the soft targets | Fox News Video
Follow the general "if you see something, say something".
Reminder of what you should do to be "situationally aware":
• Report suspicious activity to your local law enforcement agency.
• If you think there's an imminent threat use 911, otherwise call law enforcement on their local lines.
• Threats to the President or Vice President should go to the Secret Service first if there's time.
• Describe, to the best of your ability, specifically what you heard or observed, including:
- Who or what you saw;
- When you saw it;
- Where it occurred; and
- Why you believe it's suspicious.
It is better to report and be wrong than to not report and have a potentially serious incident occur. Let Law Enforcement (LE) be the deciding factor.
Make sure you ALWAYS look for a second exit when entering a building. This is not just in case of terrorism, robbery, etc., but in case there's a fire.
Resource materials for security directors:
1. IF YOU SEE SOMETHING, SAY SOMETHING. Department of Homeland Security
2. Active Shooter Guide - FEMA
3. Operational Templates and Guidance for EMS Mass Incident Deployment
4. The First Responder Guidance for Improving Survivability in Improvised Explosive Device and/or Active Shooter Incidents (DHS)
5. Mass Casualty Management Systems – World Health Organization
6. Active Shooter Study: Quick Reference Guide (FBI)
More Tips
Former Secret Service agent warns: You are the soft targets | Fox News Video
Follow the general "if you see something, say something".
Reminder of what you should do to be "situationally aware":
• Report suspicious activity to your local law enforcement agency.
• If you think there's an imminent threat use 911, otherwise call law enforcement on their local lines.
• Threats to the President or Vice President should go to the Secret Service first if there's time.
• Describe, to the best of your ability, specifically what you heard or observed, including:
- Who or what you saw;
- When you saw it;
- Where it occurred; and
- Why you believe it's suspicious.
It is better to report and be wrong than to not report and have a potentially serious incident occur. Let Law Enforcement (LE) be the deciding factor.
Make sure you ALWAYS look for a second exit when entering a building. This is not just in case of terrorism, robbery, etc., but in case there's a fire.
Resource materials for security directors:
1. IF YOU SEE SOMETHING, SAY SOMETHING. Department of Homeland Security
2. Active Shooter Guide - FEMA
3. Operational Templates and Guidance for EMS Mass Incident Deployment
4. The First Responder Guidance for Improving Survivability in Improvised Explosive Device and/or Active Shooter Incidents (DHS)
5. Mass Casualty Management Systems – World Health Organization
6. Active Shooter Study: Quick Reference Guide (FBI)
Tuesday, June 7, 2016
Video Voyeur Spycam Incidents Still Running at High Levels
AR - Police in Greenwood, AR arrested a man on Sunday after he was accused of recording women in a restaurant bathroom, says a 5 News Online report. Authorities were notified after a 10-year-old girl found a hidden cell phone that had been recording video in the women’s bathroom at El Palenque. more
AR - A Lowell man pleaded not guilty Monday to charges accusing him of secretly recording in a men's bathroom. more
DE - Police in Milltown, Delaware, are investigating a hidden camera found in the women’s bathroom of Moe’s Southwest Grill that contained video clips of over 100 women and even an little girl. The bathroom camera was discovered after a restaurant employee overheard a man discussing the camera. The camera was found fastened to a garbage can in the women’s restroom. Along with the camera a power source and a memory card was discovered. more
FL - Authorities found cameras disguised as wall-mounted coat hooks in at least three public bathrooms in and around the Florida Keys, according to a new report. Over the last week the hidden devices were discovered in the women’s room of a Circle K outlet, the girls’ room in a park at Anne’s Beach, and the women’s room at Harry Harris Park, police said this week. more
FL - Authorities arrested David Newell, 55, after a female friend of the jail informant told officials she had rented a room from Newell but moved out after she said she found cameras within the walls of the room. Authorities obtained a search warrant Thursday morning for Newell's Southport home, where they found camera wires in the walls and a camera in Newell's closet. Investigators say they also found a large, underground room in his backyard. more
OH - He'll be back in court next Tuesday. Bond for 65-year-old Jerry Rowe is being kept at $20,000. Rowe was arrested last week after cameras were found installed in the bathrooms of five women at the Steeplechase apartments where Rowe was a maintenance worker. According to the sheriff's office, one of the cameras captured Rowe installing it. more
AR - A Lowell man pleaded not guilty Monday to charges accusing him of secretly recording in a men's bathroom. more
DE - Police in Milltown, Delaware, are investigating a hidden camera found in the women’s bathroom of Moe’s Southwest Grill that contained video clips of over 100 women and even an little girl. The bathroom camera was discovered after a restaurant employee overheard a man discussing the camera. The camera was found fastened to a garbage can in the women’s restroom. Along with the camera a power source and a memory card was discovered. more
FL - Authorities found cameras disguised as wall-mounted coat hooks in at least three public bathrooms in and around the Florida Keys, according to a new report. Over the last week the hidden devices were discovered in the women’s room of a Circle K outlet, the girls’ room in a park at Anne’s Beach, and the women’s room at Harry Harris Park, police said this week. more
FL - Authorities arrested David Newell, 55, after a female friend of the jail informant told officials she had rented a room from Newell but moved out after she said she found cameras within the walls of the room. Authorities obtained a search warrant Thursday morning for Newell's Southport home, where they found camera wires in the walls and a camera in Newell's closet. Investigators say they also found a large, underground room in his backyard. more
OH - He'll be back in court next Tuesday. Bond for 65-year-old Jerry Rowe is being kept at $20,000. Rowe was arrested last week after cameras were found installed in the bathrooms of five women at the Steeplechase apartments where Rowe was a maintenance worker. According to the sheriff's office, one of the cameras captured Rowe installing it. more
Until Your Offices Look Like This, Keep Your TSCM Inspections Current
Dutch firm MVRDV recently completed an unusual project in Hong Kong that involved the gutting of an existing factory interior and its replacement with all-glass office spaces. Featuring glass walls, glass floors, and glass tables, 133 Wai Yip Street is conceived as a new working space for the business with nothing to hide.
While glass architecture is not too unusual in itself, the 13-floor 133 Wai Yip Street building goes to remarkable lengths in the pursuit of transparency...
In MVRDV's model office (Arch-Innovativ was also involved in the project), music booms out of glass-encased speakers and computers rest on glass computer stands. Glass elevators also move through glass elevator shafts, and even the emergency fire-stairs are encased in (fire-retardant) glass.
"We are moving into a transparent society, businesses are becoming more open with the public, and people care more about what goes on behind closed doors," reckons MVRDV co-founder Winy Maas. "In that way, a clear workspace leaves nothing questionable, nothing hidden; it generates trust. But also it is an opportunity for the building to become a reminder of the industrial history of the neighborhood, monumentalized in a casing of glass." more
Click to enlarge. |
In MVRDV's model office (Arch-Innovativ was also involved in the project), music booms out of glass-encased speakers and computers rest on glass computer stands. Glass elevators also move through glass elevator shafts, and even the emergency fire-stairs are encased in (fire-retardant) glass.
"We are moving into a transparent society, businesses are becoming more open with the public, and people care more about what goes on behind closed doors," reckons MVRDV co-founder Winy Maas. "In that way, a clear workspace leaves nothing questionable, nothing hidden; it generates trust. But also it is an opportunity for the building to become a reminder of the industrial history of the neighborhood, monumentalized in a casing of glass." more
Monday, June 6, 2016
Spybuster Tip # 845: How to Give Google Amnesia
Did you know, you can tell Google to forget everything you said to it, searched on it, and watched on YouTube?
Visit your Web and Activity Page.
~Kevin
Visit your Web and Activity Page.
- Look for the three dots in the upper right corner. Click on them.
- Then, click on Delete Web & App Activity.
- Click Advanced.
- Click Select Date.
~Kevin
Subscribe to:
Posts (Atom)