Wednesday, June 30, 2010

Achilles 3 Fatal Business Mistakes - Identity Theft Expert Speaker John Sileo

During a recent 60 Minutes interview, John Sileo was asked off camera to name the Achilles’ heel of an entire country’s data security perspective; what exactly were the country’s greatest weaknesses. Read more and watch the You Tube videos to learn more.





Think Like A Spy


PJL 30th June 2010

Tuesday, June 29, 2010

High Tech Espionage Helped Alleged Russian Spies (foxnews.com)

High-tech espionage is alive and well.

According to documents released Monday in the case of 11 Russians accused of spying in the U.S., cold-war era spying is dead. The modern spy is a Jason-Bourne style stealth agent who relies on tech to uncover secrets. more


PJL 29th June 2010

Monday, June 28, 2010

Russian Secret Agents Arrested In US

Ten alleged secret agents of the Russian government living in "deep-cover" in the United States and engaged in Cold War-style espionage have been arrested in a coordinated operation by the FBI. more













PJL 28th June 2010

Surveillance Positions

Lynch Investigations & Countermeasures Pty Ltd invites any Licenced Private Inquiry Agents who hold a Master Licence in NSW and VIC Licenced Investigators who hold a Private Security Business Licence in VIC, to forward on their businesses details and licences for subcontract surveillance investigation work in the Melbourne, Albury/Wodonga, Wagga Wagga, Goulburn, Canberra, Sydney & South Coast NSW areas Bega, Merimbula & Eden.

Please email your details to our administration contact via the email address admin@pjlinvestigations.com.au

We will acknowledge receiving your information and call you for further discussion where telephone contact and address details are provided.

Thank you

Kind regards,

Administration

Lynch Investigations & Countermeasures Pty Ltd






 Albury/Wodonga - Tumbi Umbi - Wagga Wagga  
Melbourne - Canberra - Sydney - South Coast NSW

Lynch Investigations & Countermeasures Pty Ltd

Sunday, June 27, 2010

Agent Zigzag

Edward Arnold 'Eddie' Chapman (16 November 1914 Burnopfield, County Durham - 11 December 1997) was a pre-war criminal and wartime spy. During the Second World War he was recruited by Nazi Germany as a spy, but turned and became a British double agent code named 'Zigzag'. He had a number of aliases known by the British police, amongst them Edward Edwards, Arnold Thompson, and Edward Simpson. His German codename was Fritz or later its diminutive Fritzchen. (wikipedia.org)  more





Agent Zigzag Extract Read Chapter 1

Agent Zigzag NEW By Ben Macintyre Purchase Online Now


















PJL 27th June 2010

US Nails Chinese CEO (globaltimes.cn)

The proud Harvard graduate was once a respected CEO of one of China's top 10 independent electronic component distributors in Shenzhen, Guangdong Province.

Now Wu Zhenzhou sits in a 6-square-meter cell in a US detention center facing a possible 20-year sentence for conspiracy to violate US export laws and illegally exporting electronic equipment from the US to China between 2004 and 2007. He will be sentenced August 17. more




 
 
 
 
 
 
 
 
 
 
 
 
 
By Song Shengxia
 
PJL 27th June 2010

Friday, June 25, 2010

Man Dies After Being Stunned By A Taser (torontosun.com)

COLLINGWOOD, Ont. - Ontario's Special Investigations Unit has been called in after a man died after police shot him with a Taser at a group home Thursday afternoon. more














PJL 25th June 2010

Thursday, June 24, 2010

AOR Dealers

Lynch Investigations & Countermeasures Pty Ltd is proud to announce that the business has become the only AOR dealer in Australia. AOR are manufacturers of radio receivers and accessory equipment.

The original name AOR came from the founder of AOR whose radio call sign was associated with the abbreviated name Authority On Radio (AOR).

We can be contacted at any time for a quote on any of the AOR products range. The AOR products range can be viewed by visiting the web site link below.

AOR




















PJL 24th June 2010

Wednesday, June 23, 2010

ProDiscover Computer Forensics Software

We have found ProDiscover Basic to be a very good option to learn basic computer forensics imaging and examining without outlaying costs on computer forensics software to learn computer forensics.

ProDiscover Basic is a complete Graphical User Interface (GUI) based computer forensics software package. ProDiscover Basic is a free download and able to be used as freeware software.

It includes the ability to image, preserve, analyse and report on evidence found on a computer disk drive.

After becoming competent and familiar with the ProDiscover Basic computer forensics software program, you may consider purchasing ProDiscover Forensics, ProDiscover Incident Response, ProDiscover Investigator or ProDiscover for Windows with additional features, such as registry viewer, event log viewer, internet history browser or access to the Host Protected Area (HPA) of a disk.

A ProDiscover Manual is available via the ProDiscover web site. We also have a ProDiscover Basic Tutorial available that we can send to you.

Please just email to peterlynch@pjlinvestigations.com.au and ask for the ProDiscover Basic Tutorial and we will dispatch the ProDiscover Basic Tutorial to you promptly.

ProDiscover Basic utilises the same court accepted capability to image computer disk drives, create hash signatures for authenticity verification, perform comprehensive analysis, and create comprehensive reports as the rest of the ProDiscover family.

For access to the ProDiscover Basic download, please follow the web site link below.

ProDiscover Basic Download




















PJL 23rd June 2010

Tuesday, June 22, 2010

Google's Street View Faces Multi State US Probe (bbc.co.uk)

US state Connecticut will lead a multi-state investigation into Google's collection of wi-fi data.
It is the latest in a series of global investigations aimed at the firm.

Google has admitted that its Street View cars "accidentally" collected data from unsecured wi-fi networks in 30 countries because of some rogue code in the software used by the servicemore




 
 
 
 
 
 
PJL 22nd June 2010

Spies Are Everywhere: Germany Accuses Russia Of Espionage (rt.com)

Russia and China are the leaders in spying on German technology and pose a threat to the country, said Interior Minister Thomas de Maiziere presenting an annual report by Germany's internal security agency.

The 300-page report by the Office for the Protection of the Constitution – Germany’s domestic intelligence agency – was presented on Monday by its head Heinz Fromm along with Maiziere, Deutsche Welle (DW) writes. more


 
 
 
 
 
 
 
 
 
 
 
 
PJL 22nd June 2010

Monday, June 21, 2010

Sarkozy & The Secret Tapes More Twists In Loreal Scandal (independant.co.uk)


France's convoluted L'Oréal family fraud scandal became even more convoluted and even more gripping yesterday. Tapes of bugged conversations involving the L'Oréal owner, Liliane Bettencourt, 87, implied that President Nicolas Sarkozy had meddled in legal proceedings in which a society photographer is accused of defrauding France's richest woman of almost a billion euros. more



















PJL 21st June 2010

MNG-300 Skeller

The MNG-300 Skeller generates white acoustic noise in the speech frequency range of 250-4500 Hertz. Sound interference is put onto the recording and makes its quality worse. Due to a uniform distribution of white noise along the whole sound range, clearance of the obtained recording is impossible. The unit should be placed near the designated person to be protected. A digital-analog synthesizer is used to produce the noise. more




MNG-300 Skeller

PJL 20th June 2010

Saturday, June 19, 2010

When Women Cheat - What Four Guys Learned From Infidelity (asylum.com)

From a statistical standpoint, men are more likely than women to step out on their relationships. However, at least in terms of marital infidelity, the spread between the genders is smaller than you might think: 22 percent of guys cheat compared with 14 percent of ladies. more 






 
 
 
 
 
 
 
 
 

Infidelity Investigations
 
 
PJL 19th June 2010

Interview With The Border Mail Newspaper In Albury/Wodonga

On Monday the 21st of June 2010 Lynch Investigations & Countermeasures Pty Ltd will be in interview with The Border Mail newspaper about the Private Investigation Industry.

Lynch Investigations & Countermeasures Pty Ltd will be discussing its businesses experience in the industry over the last 7 years.

Lynch Investigations & Countermeasures Pty Ltd will be providing information about the industry and following up with the public with further information about Lynch Investigations & Countermeasures business services.

After the interview with The Border Mail newspaper, Lynch Investigations & Countermeasures Pty Ltd will post the newspaper interview information to this online blog with permission of The Border Mail newspaper.


















Lynch Investigations & Countermeasures Pty Ltd


PJL 19th June 2010

Man Accused Of Tapping Women In Bathroom

MOBILE, Alabama (WALA) - Shocking allegations against the tourism director for the Eastern Shore Chamber of Commerce. Police say Justin Hasting set up a hidden camera in a public restroom and video taped women. more



PJL 19th June 2010

Thursday, June 17, 2010

SpyCop Upgrades To SpyReveal For Spyware Detect & Destroy

One of the best programs on the World Wide Web for protection against Spyware, Keyloggers, Viruses, Trojans & Bots is SpyReveal that was recently named SpyCop.

SpyReveal is at a one time fee of $49.95c USD. Don't miss out on this one off fee including upgrades for online protection that will detect and destroy Spyware, Keyloggers, Viruses, Trojans & Bots.

Please visit the web site link below where you can view more information about SpyReveal and purchase online.

SpyReveal


PJL 17th June 2010

Wednesday, June 16, 2010

Postal Worker Found Dead In Trash Was Slain (sfgate.com)

The mystery surrounding the case of a lifelong post office employee who vanished at work and turned up dead at a dump hours later deepened Tuesday when Hayward police said she had been slain. more





 
 
 
 
 
 
 
 
PJL 16th June 2010

Tuesday, June 15, 2010

Defeat Those Listening Devices Using The Portable Noise Generator


On many occasions we visit a client's premises to assist with the detection of listening devices. Often a client will have a small office or living area that can be protected by a Portable Noise Generator - PNG 200.

The Portable Noise Generator is designed as a portable noise generating unit that can be used in a variety of ways for voice band noise masking.

The noise generated by the Portable Noise Generator masks voice audio from listening devices. The Portable Noise Generator is designed to reduce the effectiveness of eavesdropping devices such as microphones and tape recorders.

With Technical Surveillance Counter-Measure services being ideal to secure a meeting room, boardroom or CEO's office, it is still as important to have longer term plans on confidentiality of those high risk communication areas.

Multiple Portable Noise Generator units can be set up in concert to provide voice band noise masking of larger areas in any environment.

The Portable Noise Generator can be mounted to smooth surfaces using suction cups or simply placed in an area that potential eavesdropping devices may be present.

The Portable Noise Generator is robust counter surveillance equipment and is our businesses personal choice for protection of those areas that needs a portable solution for eavesdropping risk management.

The equipment runs from two 9 volt batteries as well as 120- 240 volts AC power. The Portable Noise Generator is small enough to be carried in a jacket or coat pocket and used for personal protection while you are on the move. The Portable Noise Generator can be packed into a suitcase or travel bag for use in a business traveller's office environment.

With such flexibility in portable eavesdropping protection, the Portable Noise Generator is our recommended choice of equipment for customers and clients with on the move confidentiality demands.




















PNG-200 Advantages


  • Optimized voiceband noise masking for acoustic interference against listening devices. (Acoustic noise is tailored to voice frequencies).
  • Mounts easily to windows using suction cup (included) to defeat the high tech laser threats.
  • Mounts easily to walls for protection against listening devices that rely on acoustic leakage (ie. contact mics, spike mics, human ear).
  • Portable: Can be carried easily in coat pocket. Multiple units fit easily in a briefcase.
  • Stylish anodized aluminum construction designed for ruggedness and portability


Specifications:

  • Size: 5.38x3.38x1.25 inches (13.6x8.59x3.18 mm)
  • Weight: 12 oz. (340.2 g)
  • Audio Frequency Range: 300Hz - 3KHz
  • Output Sound Level: MAX 92 dB @ 4 ft.
  • Power: two 9 volt alkaline batteries or AC transformer (120 or 240 VAC)
  • Battery Life: typically 7 hrs. at 1/2 level; 2 hrs. at full level.
  • Includes: Carrying case, AC transformer, and suction cup window/wall mounting kit.

Portable Noise Generator PNG 2000


PJL 15th June 2010

Monday, June 14, 2010

CIA Studied Why People Steal Secrets (washingtonpost.com)

Officials and others pondering why U.S. Army intelligence analyst Bradley Manning allegedly leaked reams of classified documents to Wikileaks need look no further than a 20-year-old CIA study on moles. more









 
 
 
 
 
 
 
PJL 14th June 2010

Sunday, June 13, 2010

Google Maps for Mobile

Google Maps for Mobile is a useful investigative tool for those investigators in the field on a regular basis.

Google Maps for Mobile is compatible with Blackberry, iPhone & Nokia S60 cell phones etc...

If you are in the field and needing traffic views Google Maps on your mobile provides real time traffic view.

You can view street level imagery with the street view feature. Satellite view allows viewing the landscape. This is a useful tool for surveillance planning and operations.

Google Maps for Mobile shows a user's location. We found this feature to be accurate within 5 metres of a person's location.

There are many features including business listings, navigation, biking directions, transit directions and even the buzz feature to allow you to find out what is happening nearby.

View more information via the web site link below and download your free Google Maps for Mobile program to your compatible mobile cell phone.





Google Maps for Mobile

PJL 14th June 2010

Saturday, June 12, 2010

Govt Wants ISPs To Record Browsing History (zdnet.com.au)

Companies who provide customers with a connection to the internet may soon have to retain subscriber's private web browsing history for law enforcement to examine when requested, a move which has been widely criticised by industry insiders.  

By Ben Grubb, ZDNet.com.au

The Attorney-General's Department yesterday confirmed to ZDNet Australia that it had been in discussions with industry on implementing a data retention regime in Australia. Such a regime would require companies providing internet access to log and retain customer's private web browsing history for a certain period of time for law enforcement to access when needed.

Currently, companies that provide customers with a connection to the internet don't retain or log subscriber's private web browsing history unless they are given an interception warrant by law enforcement, usually approved by a judge. It is only then that companies can legally begin tapping a customer's internet connection.

In March 2006, the European Union formally adopted its data retention directive (PDF), a directive which the Australian Government said it wished to use as an example if it implemented such a regime.

"The Attorney-General's Department has been looking at the European Directive on Data Retention, to consider whether such a regime is appropriate within Australia's law enforcement and security context," a statement from the Attorney-General's Department to ZDNet Australia said yesterday. "It has consulted broadly with the telecommunications industry."

The EU regime requires that the communications providers from certain EU member states retain necessary data as specified in the Directive for a period of between six and 24 months.

One internet service provider (ISP) source told ZDNet Australia that the Australian regime, if implemented, could go as far as recording each URL a customer visited and all emails.

That source said such a regime "would be scary and very expensive".

Another industry source said Australians should "be very f***ing afraid".

They said the regime being considered by the Australian Government could see data held for much longer than EU Directive time of 24 months — it would be more like five or ten years.

"They seem quite intent [on implementing the regime] and they keep throwing up the words 'terrorism' and 'paedophiles'," the source said. "We're talking browsing history and emails, way beyond what I would consider to be normal SMS, retaining full browsing history and everything."

Internet Industry Association (IIA) chief executive officer (CEO) Peter Coroneos also confirmed that the industry was having discussions with the Attorney-General's Department.

"There has been some preliminary discussions with the Attorney-General's Department about a proposal for a data retention regime in Australia, but I think those discussions are at a very early stage," Coroneos said. He said the IIA hadn't "seen any firm proposals yet from the government".

"It's more along the lines of [the Attorney-General's Department asking] 'What do you see the issues of being if we were to move to a position similar to the EU'," he said.

"But as I say, there wouldn't be any intention, I wouldn't think, to move to any policy position on this unless there was a full public debate about the proposal."

If the idea were to move to a more "serious proposal", Coroneos said the IIA's view would be "to engage not only with the industry but also the community in a proper discussion".

Electronic Frontier Australia (EFA) chair Colin Jacobs said the regime was "a step too far".

"At some point data retention laws can be reasonable, but highly-personal information such as browsing history is a step too far," Jacobs said. "You can't treat everybody like a criminal. That would be like tapping people's phones before they are suspected of doing any crime."

He added that browser history could reveal all sorts of personal information. "And furthermore, the way the internet works, it's a huge amount of data to be kept and it requires some snooping on the part of the ISPs into which [web] pages people are looking at."

In February, the senate passed a Bill allowing ISP's to intercept traffic as part of "network protection activities". According to an ISP source, it's likely another Bill would be required for a data retention regime to be implemented.

"It is likely that new legislation will be required to put any [data retention] obligations in place," the source said. "It seems to be early days yet, and we have an election looming, which means there will be some time required to get any new law in place."

PJL 12th June 2010
                                                                                         

Friday, June 11, 2010

I Spy With My Liiiiittle Eye: When Does Research End and Industrial Espionage Begin? (law.com)

There's a fine line between spying on the competition and researching the competition. Going to a trade show or posing as a customer is one thing. Stealing product information like Julia Roberts or Clive Owen in the movie Duplicity is something else entirely. more
















PJL 11th June 2010

Thursday, June 10, 2010

Creepy" Crime: Trying to Put Spying Eye on Ex (nbcdfw.com)

A man broke into a Carrollton home on Tuesday and tried to secretly install hidden cameras to spy on his former wife and her current boyfriend, police said. more 


 
 
 
 
 
 
 
 
 
 
PJL 10th June 2010

Tuesday, June 8, 2010

Seasonal Flu Vaccine Remains Suspended For Young Children Without Risk Factors

After consideration of the results to date of a comprehensive investigation into the safety of the seasonal flu vaccine for young children, I have advised, that as a precaution, the suspension of seasonal flu vaccination should continue for healthy children under five years of age. more















PJL 8th June 2010

Monday, June 7, 2010

Unemployment Benefits Fraud Soars In 2009 (nbc26.com)

Fraud in Wisconsin's unemployment insurance program has more than tripled over the past two years to $17.7 million in 2009, according to state figures. more

















PJL 7th June 2010

Australia Police Probe Google's Street View Service (bloomberg.com)

Australian police are probing Google Inc.’s Street View mapping service for possible breaches of data-security laws, two weeks after the nation’s communications minister criticized the company’s methods. more










PJL 7th June 2010

Sunday, June 6, 2010

Security Guard Killed In Sydney CBD Ambush (abc.net.au)

A security guard has died after being shot when four masked men ambushed an armoured van in Sydney's CBD this morning. more























PJL 6th June 2010

Saturday, June 5, 2010

Crypto Anywhere

Crypto Anywhere is secure email on the move! Crypto Anywhere is small enough to fit on a single floppy or USB key chain drive and is very easy to use.

Don't have a computer yourself but want to protect your web based e-mail at your local internet cafe? Crypto Anywhere is for you! If you suspect your employer is reading your private email, put an end to that.

If you run Crypto Anywhere from a floppy disk or USB drive, you can encrypt your email without even installing software on your workstation.

With Crypto Anywhere you can send and receive secure mail to and from anyone with an email account - the recipients do not have to be "crypto savvy" or even have Crypto Anywhere themselves. more


PJL 5th June 2010

Friday, June 4, 2010

10 Bizarre But True Ways Your Home Is Susceptible To Hackers (foxnews.com)

Reality is scarier than fiction -- especially when it comes to what hackers can do. In many bizarre-but-true ways, your home is wide open to hacker attacks. Right now.

While you're reading this, a criminal could be logging in to your router and using it as a porn server. He could be using a Bluetooth "sniper rifle" (like the one shown below) to tap into your phone while you chat by the window. He could even physically steal your printer and capture from its circuitry the financial records you printed last week.

Here are 10 scary -- and real -- home-security threats hackers may try, and how to block them -- if you can. more













By John Brandon | Published June 03, 2010 | FOXNews.com

PJL 4th June 2010

Thursday, June 3, 2010

Undercover Census Fraud Investigation

One of the worst frauds known to business is time fraud. Watch the undercover census fraud investigation video for an example of time fraud.

If you need real time monitoring of employees or contractors, contact Lynch Investigations & Countermeasures Pty Ltd.  A strategic control plan in dealing with fraud & corruption can be put in place for your business.



Strategic Control Plan In Dealing With Fraud & Corruption

PJL 3rd June 2010

Investigation Into Serious Assault (gladstoneobserver.com.au)

Julie-Anne Scott | 4th June 2010 | The Observer

GLADSTONE Police are asking the community for assistance to help identify a man wanted in regard to a serious assault.

Investigations are continuing into the assault which occurred about 3.45am on Sunday, September 27, 2009.

A man was assaulted by two men, who were not wearing any shirts, at the intersection of Goondoon and Yarroon streets, Gladstone.

As a result of this assault the victim suffered significant facial injuries.

Police are seeking information to help identify the person pictured as they believe he may have information about the offence.

The man is described as Caucasian in appearance, about 178cm tall with brown receding hair and a long brown goatee.

The second man involved is described as Caucasian in appearance, about 180cm tall, very fair, solid build and with long, ear-length curly brown hair.

If anyone can identify these men please contact Gladstone CIB on 4971 3244.

HAVE YOU SEEN THIS MAN?




















PJL 3rd June 2010

Wednesday, June 2, 2010

Protect 1210

The countersurveillance indicator Protect 1210 has been designed for solving the following tasks:
  • Searching for active radio transmitting surveillance devices (or RF bugging devices) in premises, vehicles and items.
  • Discovering the improper use of mobile phones and other communication equipment for picking up conversations. The information in this case can be transmitted to another phone or recorded onto an answering machine.
  • Detection of harmful emissions from GSM-jammers or mini recorder suppressors.
  • Detection of harmful emissions from microwave ovens, communication antennas and other electronic appliances.
Protect 1210


PJL 2nd June 2010

Tuesday, June 1, 2010

Certificate III in Investigative Services

Anyone interested in completing the Certificate III in Investigative Services should consider contacting Tactical Training who offers the course fulltime or by distance self paced study.

Certificate III in Investigative Services is offered by Tactical Training at reasonable pricing. Tactical Training is 2 Time National ASIAL Award Winner for Training Excellence.

Contact Renae on telephone number 08 83311620 for further information or view the web site link below.

You can complete registration & payment for the Certificate III in Investigative Services Course online.

Certificate III in Investigative Services

Tactical Training


PJL 1st June 2010