News copied from other online sources.

Dating apps pose corporate security risk, says IBM

Reporting by Bill Rigby, ReutersThe millions of people using dating apps on company smartphones could be exposing themselves and their employers to hacking, spying and theft, according to a study by International Business Machines Corp.

IBM security researchers said 26 of 41 dating apps they analyzed on Google Inc’s Android mobile platform had medium […]

2016-12-16T20:23:41-05:00February 14th, 2015|

TV vs Reality: former intelligence officers discuss new NBC spy show “Allegiance”

NBC’s new spy drama “Allegiance” was previewed at the International Spy Museum in Washington, DC, along with a panel discussion with former intelligence officers including Vince Houghton, historian and curator at the Spy Museum, CIA analyst Mark Stout, and former KGB General Oleg Kalugin. Their comments offer some insight into the real world of spying.

10 […]

2016-12-16T20:23:42-05:00February 9th, 2015|

Spy cam found in corporate restroom.

When inspecting or sweeping corporate offices, it is good to pay attention to restrooms that the executives may use. While trade secrets may not be discussed there, tremendous embarrassment could occur if improper images were distributed. It is also good for staff to be aware of such threats and take them seriously. In this […]

2016-12-16T20:23:42-05:00January 28th, 2015|

Panama: ex-president at center of wiretap probe

From McClatchyDC by T. Johnson

— When the United States rejected former Panamanian President Ricardo Martinelli’s request for spying equipment to eavesdrop, U.S. diplomats feared, on his political enemies, the former supermarket baron turned to another source: Israel.

Now scores of Panama’s political and social elite are learning that the eavesdropping program that […]

2016-12-16T20:23:42-05:00January 28th, 2015|

P.I.s accused of using GPS tracking get restraining order but keep their licenses.

GPS tracking devices are readily obtainable. The legality of their use on unauthorized vehicles is questionable at best. The story below highlights that such devices can pose a significant threat to privacy and security. 

Orange County Register: Two private investigators accused of illegally tracking and harassing a pair of Costa Mesa councilmen have […]

2016-12-16T20:23:42-05:00January 20th, 2015|

Stolen surveillance system exposes drug dealing thieves.

DOERUN, GA (WALB) – Images from a stolen surveillance system helped investigators arrest a suspected drug dealer. Colquitt County Sheriff’s Investigators made three arrests stemming from a burglary and drug deal connection.

A Colquitt County farmer went online to see if he could find his stolen video surveillance system. He not only found his system but […]

2017-02-12T21:28:49-05:00January 19th, 2015|

UK: Former deputy prime minister finds car was bugged.

John Prescott seems to be taking this find in stride, but it could be a sign of something more sinister going on. Vehicle TSCM sweeps are an important part of regular security precautions.

The former Deputy Prime Minister discovered the device hidden in his car when he took it to a garage because it […]

2015-01-18T19:03:53-05:00January 18th, 2015|

Tech watch: Device uses lasers to map an entire room through a 1-inch gap

from DailyMail.co.uk Science and Tech

Looking through a keyhole could soon reveal far more than you imagine. Scientists have developed a device that could map an entire room simply by shining a laser through a 2cm gap. The system could be used in applications such as firefighting, battlefield surveillance and disaster recovery operations.

The technology […]

2016-12-16T20:23:43-05:00January 10th, 2015|

Morgan Stanley sacks employee who pilfered account data

...companies now no longer face just external threats. Employees may give in to threat or greed, and with their access to information, can cause a data breach without specialized knowledge or cyber security skills. Staff are often given far-reaching data access rights, but with this power, rouge employees can prove to be a serious risk to corporations. While the threat of insiders is unlikely to wane, companies can protect themselves more effectively by setting in place access restrictions to sensitive data and monitoring employee access to information caches.

2016-12-16T20:23:45-05:00January 7th, 2015|

Surveillance alert: Elf On A Shelf and a Santa Spy Cam

Ontario professor Laura Pinto thinks the popular “Elf on a Shelf”  toy is conditioning children for growing up in a surveillance state. Is that any different than Santa knowing when you are sleeping, when you’re awake, and if you’ve been naughty or nice?  It is apparently quite sinister.  

from the Inquisitr.com

Laura […]

2016-12-16T20:23:45-05:00December 17th, 2014|

NORAD tracking Santa for over 50 years

For almost 60 years, NORAD and its predecessor, the Continental Air Defense Command (CONAD) have tracked Santa’s flight.

The tradition began in 1955 after a Colorado Springs-based Sears Roebuck & Co. advertisement misprinted the telephone number for children to call Santa. Instead of reaching Santa, the phone number put kids through to the CONAD Commander-in-Chief’s operations […]

2016-12-16T20:23:45-05:00December 13th, 2014|

Future watch: iPhone with laser beams, 3D mapping, more…

Consumer technology eventually encroaches on ideas that were only dreamed of in the past. Developments come quickly these days, so it’s worthwhile to keep an eye on where things are going. An eavesdropping technique that has been difficult to deploy in the past, could also be built right into an iPhone if this reported patent […]

2016-12-16T20:23:46-05:00December 8th, 2014|
Go to Top