Tuesday, September 28, 2010

FBI Employees Caught Cheating Like College Students on an Exam

A Department of Justice Investigation has found widespread cheating among FBI employees on an important exam. more

gawker.com

PJL 28th September 2010

Wiretapping Facebook?

The Obama Administration aims to make it easier for the FBI to wiretap online communications, from social networking sites like Facebook to communications on BlackBerrys. The FBI claims their ability to track “bad guys” is increasingly moving away from the telephone and onto the internet. more

scpr.org












Chip Somodevilla/Getty Images

President Obama is considering extending wiretapping abilities to Facebook, Skype and even BlackBerry smartphones

PJL 28th September 2010

Monday, September 27, 2010

Spying at Work — Espionage, Who, How, Why, How To Stop It



PJL 27th September 2010

FBI Activists in Midwest as Domestic Surveillance Expands

Apparently last week’s unflattering report by the Justice Department’s Inspector General on the Federal Bureau of Investigation’s improper surveillance of nonviolent protesters during the past decade fell on deaf ears. more

informant.kalwnews.org












PJL 27th September 2010

ANC's Block Under Investigation

A key former Northern Cape official implicated in the buying of R112.2 million in equipment from city businessman Gaston Savoi has gone to ground following a Cape Times exposé of his involvement in the deals – which are under investigation by the Hawks. more









 
 
 
 
 
 
 
 
 
 
 
PJL 27th September 2010

How To Conduct Overseas Investigation Operation

1. I have in the course of my work conducted private investigation outside my country. In this article, I shall try to discuss a few pointers on how to run a successful overseas operation based on my experience and exposure in such assignments. more

emmettcarradine.coolblogz.com


PJL 26th September 2010

TrapCall

Always know who's calling.

TrapCall unmasks blocked and restricted calls, blacklists harassing callers, and can even record your incoming calls. There is no software to install, and it works on any mobile phone.

Watch this quick video to see how easy TrapCall really is!



PJL 26th September 2010

Saturday, September 25, 2010

FBI Joins Investigation Into MI6 Spy's Death

The bureau has employed face recognition technology at US airports in a bid to establish whether Gareth Williams travelled in and out of the US any stage with a couple answering the description of two people Scotland Yard have appealed to come forward in connection with his deathmore

telegraph.co.uk
















Mr Williams, a computing and maths prodigy whose funeral on Friday was attended by Sir John Sawers, the head of MI6, had made regular trips to the United States Photo: SWNS

PJL 25th September 2010

Missing Syrian Blogger Detained For Espionage

A missing 19-year-old Syrian blogger, Tal El- Melouhy, is being held in a prison near the capital Damascus on espionage charges, local media outlets reported Tuesday. more

monstersandcritics.com













PJL 25th September 2010

Audio & Video Recording Law Enforcement





PJL 25th September 2010

Greek Ferry Disaster Crash Scene Investigation Part 2



PJL 25th September 2010

10 Small Business SEO Tips

Being a small business means being in need of tight money management. For this reason, small budgeted means of marketing, such as website often becomes the first choice of marketing means.

Unfortunately, launching your website without having appropriate search engine optimization will just take your money straight into the garbage can.

Hence, here are few affordable tips of SEO that helps you ensuring your website marketing success: more




PJL 25th September 2010

Thursday, September 23, 2010

FBI Spied & Lied, Misled Justice Department on Improper Surveillance of Peace Groups

The Justice Department Inspector General (IG) discovered improper FBI spying investigations were frequently opened based upon “factually weak” justifications.

The FBI classified some investigations relating to nonviolent civil disobedience under its "Acts of Terrorism" classification.

People associated with advocacy groups were generally predicated on suspicion that the individual might potentially commit a crime. more







 
 
 
 
 
 
 
networkworld.com
 
PJL 23rd September 2010

Suspect Arrested After Four Month Investigation Into Internet Threats

The La Quinta Police Department, a contracted department through the Riverside County Sheriff’s Department out of their Indio station arrested a man for threats made through the internet to a female La Quinta High School student. more

examiner.com










Arrested for criminal threats via the internet

Photo by: Riverside County Sheriff's Department
 
PJL 23rd September 2010

TSCM & VoIP Vulnerabilities

There are a lot of businesses we service with our Technical Surveillance Counter-Measure (TSCM) services that could be taking advantage of there IP infrastructure and encrypting VoIP communications to secure VoIP telephone.

It is easy enough to inspect a VoIP telephone and to connect a Time Domain Reflectometer to a data cable to check for taps, bridges or splices along the cable, although to run these tests involves disconnecting any power source from the data cables so the Time Domain Reflectometer can be used to inject a signal into the data cable for further analysis.

It is practical to use an encrypted data transmission pathway for VoIP secure telephone communications.

With encrypted data transmissions, one doesn't need to continually check data cables that need power isolated in a Technical Surveillance Counter-Measures inspection.

There are some problems with VoIP latency and encrypted data transmission makes the latency period slightly longer for data transfer, although this is improving.

Here is an interesting article below relating to hacking IP voice & video in real time which shows you how easily the process is undertaken.

Regular TSCM servicing can't guarantee protection against real time hacking of the IP infrastructure; this is why encrypted data transmissions should be used.

PJL
=============================================

Corporate video conferences can still be easily hacked by insiders using a freeware tool that allows attackers to monitor calls in real-time and record them in files suitable for posting on YouTube. more



















PJL 23rd September 2010

Tuesday, September 21, 2010

Technical Surveillance Counter-Measures (TSCM) Quotation

Please find a web site link below that leads to our new Technical Surveillance Counter-Measures (TSCM) Quotation Information Worksheet. The form can be completed online or offline, what ever way you wish to use is fine with us.

By creating the Technical Surveillance Counter-Measures Information Worksheet, allows our business to give accurate quotes for a site inspection nominated by you for our Bug Sweeping (TSCM) services.

We look forward to hearing from you and responding to your service needs.

TSCM Quotation Information Worksheet



TSCM Bug Sweeps - Lynch Investigations & Countermeasures Pty Ltd

Thank you PJL 21st September 2010

Indictment of Private Investigators Hired by Oleg Deripaska's Aide to Spy on Michael Cherney

On Sunday, Tel Aviv Magistrates Court charged two private investigators, Rafael Pridan and Maxim Gurevich, with the illegal wiretapping of Businessman Michael Cherney. The two had been hired by an aide to Russian aluminum tycoon Oleg Deripaska, Cherney's ex-partner. more














prnewswire.com

PJL 21st September 2010

US Charges Two Over Nuclear Espionage

A US scientist and his wife have appeared in a US federal court over espionage charges, which include passing on secret information to Venezuela.

Nuclear physicist Pedro Leonardo Mascheroni and his wife, Marjorie Roxby Mascheroni, now face a total of 22 charges. If convicted, they could be sentenced to life in prison.

Both the defendants are US citizens, who once worked at Los Alamos National Laboratory in New Mexico.

The Federal Bureau of Investigation says it had the couple under surveillance for the past two years. more

presstv.ir



PJL 21st September 2010

MI5: Cyber Espionage On The Rise But Can Be Easily Beaten

MI5 says the Internet has made the threat of espionage by foreign countries higher than ever before, but insisted it is "relatively straightforward" to block attempts to steal data; MI5 has previously written to the bosses of big British companies to warn them of the threat online, particularly from hackers with links to the Chinese intelligence services. more

homelandsecuritynewswire.com















PJL 21st September 2010

Autopsy: Defected Russian Spy Chief Choked On Meat

A former top Russian spy who defected to the U.S. after running espionage operations from the United Nations choked to death on a piece of meat, a Florida medical examiner says.

Sergei Tretyakov, 53, also had a cancerous tumor in his colon when he died June 13, according to an autopsy report obtained by The Associated Press through a state open records request. Tretyakov's sudden death had led to some Internet speculation that he had been killed. more



















PJL 21st September 2010

The Security Risks & Ways to Decrease Vulnerabilities in a 802.11b Wireless Environment

This document explains topics relating to wireless networks. The main topics discussed include, what type of vulnerabilities exist today in 802.11 networks and ways that you can help prevent these vulnerabilities from happening. more



















PJL 21st September 2010

Sunday, September 19, 2010

Afghanistan Insurgents Killed While Placing An IED



PJL 19th September 2010

Missile Hit On A Moving Tank



PJL 19th September 2010

The Small Business Fraud Prevention Manual

The Small Business Fraud Prevention Manual


















ACFE

PJL 19th September 2010

Major Supply Group Of Cocaine Busted

The Rowan County Sheriff’s Office Special Investigations Unit began an investigation involving a group believed to be a major supplier of powder cocaine in western Rowan County. The investigation began in June and involved the use of surveillance and undercover detective purchases of cocaine. more
















foxcharlotte.com

PJL19th September 2010

Saturday, September 18, 2010

Federal Investigation Snares 7 With Ties To Drugs & Human Smuggling

Seven people are in federal custody after a two-year investigation allegedly tied them to a multimillion-dollar drug- and human-smuggling ring based in Whatcom County. more























PJL 18th September 2010

Large-Scale Search Planned For Missing Man



PJL 18th September 2010

Friday, September 17, 2010

Irish Republicans Used Cameras To Spy On MI5

British government officials in Northern Ireland have ordered 20 trees cut down outside a spying installation, after a number of surveillance cameras were discovered hidden among the tree branches. more









intelligencenews.wordpress.com

PJL 17th September 2010

Recording a Meeting

Do you have a right to protect yourself by recording meetings you attend?

Not according to the South Australian Supreme Court. It has just held that the Chairman of a meeting and the meeting itself can prohibit the use of recording devices at the meeting.

If the wannabe recorder indicates that he still intends to record the meeting, the Chairman can adjourn the meeting. more


 
 
 
 
 

claytonutz.com
 
PJL 17th September 2010

Wednesday, September 15, 2010

The Investigation of William Mandel by Sen. Joseph McCarthy



PJL 15th September 2010

Two Men Face Federal Charges In Armoured Car Robbery

Federal authorities charged two men Monday with taking $130,000 at gunpoint from an armored car courier last month.

Court documents allege that within hours of the Aug. 30 hold-up, Deangelo Colston and Gerald Jones, both 20, began spending handfuls of $20 bills on a car, clothing, tattoos and a trip to Worlds of Fun. more

kansascity.com

















(Photo credit flickr.com)

PJL 15th September 2010

Tuesday, September 14, 2010

Crime Scene Investigation & Forensic Anthropology



PJL 14th September 2010

Mixed Reactions To Civil Rights Photographer's FBI Ties

In many ways, civil rights photographer Ernest Withers would have been the perfect FBI informant, said leaders of the movement whom he photographed during quiet moments in their hotel rooms, at strategy meetings and in the midst of powerful street protests. more



















washingtonpost.com

PJL 14th September 2010

London Police Are Sued Over The News Of The World Phone Hacking Investigation

Three men who suspect their mobile phones were hacked by reporters at Rupert Murdoch's News of the World newspaper are suing U.K. police, alleging they didn’t properly investigate the case. more


 









bloomberg.com

PJL 14th September 2010

New Hampshire Police Bust Facebook Burglary Ring

Up until last week, the potential for place-based social networks enabling burglary had been (to the best of my knowledge) mostly hypothetical; while the possibility was recognized and much discussed, I hadn't seen any reports of burglars actually victimizing people after determining they were away from home by looking at their online profiles. more  















mediapost.com


PJL 14th September 2010

Monday, September 13, 2010

The Secrets of Countersurveillance

Almost any criminal act, from a purse-snatching to a terrorist bombing, involves some degree of pre-operational surveillance. In fact, one common denominator of all the different potential threats — whether from lone wolves, militant groups, common criminals or the mentally disturbed — is that those planning an operation all monitor their target in advance. more

















stratfor.com

PJL September 13th 2010

Fraud Squad Probes Perth Housing Scam

The Major Fraud Squad has been called in to investigate a scam after a Perth man's home was sold without his knowledge.
Roger Mildenhall was living overseas when he found out last week that his property in Karrinyup which, was worth almost $500,000, had been sold in June. more


 

 
 
 
 
 
 
Roger Mildenhall was living overseas when he found out that his property had been sold (7pm TV News WA)
 
abc.net.au
 
PJL 13th September 2010

Sunday, September 12, 2010

Wichita Prostitution Ring Linked To Massage Parlors

Ten people have been arrested and charged with participating in a prostitution network utilizing numerous massage parlors around Wichita, police officials said Friday. more























kansascity.com

PJL September 12th 2010

Greek Ferry Disaster Crash Scene Investigation Part 1



PJL 12th September 2010

Saturday, September 11, 2010

Police Find Meth Lab Searching For Stolen Xbox

It was just another ordinary September day in St. Augustine, Florida, until an unnamed 24-year-old man's Xbox was stolen. The investigation resulting from the theft led to the discovery of a methamphetamine lab next door. more














escapistmagazine.com

PJL 11th September 2010

Shooter Kills 2 Kraft Workers At North East Philadelphia Plant

A woman who had just been suspended from her job returned to the Kraft Foods baking plant in Northeast Philadelphia Thursday night and opened fire with a .357 Magnum handgun, killing two co-workers and wounding a third, police said. more



philly.com

PJL 11th September 2010

Friday, September 10, 2010

Update Regarding Police Officer Death Investigation



PJL 10th September 2010

Commissioner Pays Tribute To Fallen Officer



PJL 10th September 2010

Policeman Fatally Shot In Bankstown Siege



PJL 10th September 2010

Court Allows Warrantless Cell Location Tracking

The FBI and other police agencies don't need a search warrant to track the locations of Americans' cell phones, a federal appeals court ruled on Tuesday in a precedent-setting decision. more



















PJL 10th September 2010

Thursday, September 9, 2010

Laser Listener Used For Industrial Espionage

It's still very easy to get your hands on a laser listening device for industrial espionage purposes. Just follow the web site link below, where you are able to purchase a fully assembled laser listening device for $495.00 USD.

The assembled laser and receiver modules may be placed on video tripods and temporarily aligned for limited performance demonstration systems.

They may also be enclosed as shown in the instructions for use as a field worthy device with a potential range of up to 500 feet. May be used as a long range laser voice communicator with a range usable to 10 miles line of sight.

Low cost audio surveillance science project or useful device for listening to power line faults, over pressured pipes, etc.

amazing1.com

 Laser Listener


This product can be purchased and used for industrial espionage purposes.

We advise those that work near window areas to be aware of laser eavesdropping and to maintain that the windows in boardrooms, executive offices and any where that sensitive discussions take place, should have the blinds closed.

Those blinds should also be constructed of a dense material that is capable of protecting the audio from inside of the room to reduce vibration on the window areas that audio laser eavesdropping equipment may be pointed at.

Using a protection device like the Portable Noise Generator for protection against laser eavesdropping in those vulnerable window areas is another way to protect your sensitive audio information.

Portable Noise Generator




The PNG-200 is designed as a portable acoustic noise-generating unit that can be used in a variety of ways.

The noise generating circuitry has been optimized for voice band noise masking against listening devices and is designed to reduce the effectiveness of eavesdropping devices such as microphones and tape recorders.

When multiple units are used in concert, a complete environment masking system can be easily installed in any environment.

The PNG-200 can be mounted to smooth surfaces using suctions cups or simply placed in an area that potential eavesdropping devices may be present.

PNG-200 Advantages: Optimized voice band noise masking for acoustic interference against listening devices. (Acoustic noise is tailored to voice frequencies).

Mounts easily to windows using suction cup (included) to defeat the high tech laser threats.

Mounts easily to walls for protection against listening devices that rely on acoustic leakage (i.e. contact mics, spike mics, human ear).

Portable: Can be carried easily in coat pocket. Multiple units fit easily in a briefcase.

Stylish anodized aluminum construction designed for ruggedness and portability.


Specifications:

• Weight: 12 oz. (340.2 g)

• Audio Frequency Range: 300 Hz - 3 KHz

• Output Sound Level: MAX 92 dB @ 4 ft.

• Power: 2 x 9V alkaline batteries or AC transformer (120 or 240)

• Typical Battery Life:

• 7 hrs. at 1/2 level

• 2 hrs. at full level.


Includes:

• Carrying case

• AC transformer

• Suction cup window/wall mounting kit.

PJL 9th September 2010

NSW Police Code of Practice for CRIME (Custody, Rights, Investigation, Management and Evidence)

The Code of Practice for CRIME (Custody, Rights, Investigation, Management and Evidence) represents a major step towards improving the accountability of the NSW Police to the community it serves. more

NSW Police Code of Practice for CRIME (Custody, Rights, Investigation, Management and Evidence)



















PJL 9th September 2010

Tuesday, September 7, 2010

The Female Private Investigator



PJL 7th September 2010

Forensic Plan Guide By Gerald L. King

You might find this download below to be an interesting and valuable resource if you are interested in  Forensic Investigation.

Although I haven't read right through the Forensic Plan Guide completely, I have read enough to know it is worth reading and using as a resource at times for an investigation guide.

Forensic Plan Guide By Gerald L. King















Our first business card.

PJL 7th September 2010

Sunday, September 5, 2010

Forensic Protection - The Evidence Is In The Details

In the last 12 months we have been contacted 6 times regarding information about a business that examines & improves audio recordings to be used as evidence in court.

Today I had contact from the owner of the business Forensic Protection. The business owner wanted to let us know about the helpful services they are providing in examining & improving audio & video.

The business has a forensic lab that enhances video clips, audio files & still images. The team can dramatically improve video resolution and clarity, and they are extremely skilled at cleaning up audio recordings, even when the subjects have intentionally obscured their voices.

Their volume balancing and voice recognition filters raise the target voices so they become the dominant sounds.

With video, the team stabilizes shaky video, brightens dark scenes, corrects out of focus issues, increases detail, and extracts images that support the evidentiary narrative. Because they filter away unwanted noise, rather than "enhance" in new details, their work is much clearer and holds up under the toughest court challenges.

When a recording needs improvement, you can use the Forensic Protection web site to upload an exact copy to Forensic Protection servers and then receive the finished work in a few days, not weeks.

Why not keep this resource close by for those times when an audio or video recording needs closer examination.

Please visit the web site link below where you can view the Forensic Protection web site and learn more.

You can also find the Forensic Protection web site link in the Forensics category of our Investigative Resources web pages of the PJL web site. The lower web site link will take you to the Forensic Protection web site as well.

Forensic Protection

Forensics - Lynch Investigations & Countermeasures Pty Ltd









 
 
 
 
 
 
 
 
 
  
PJL 5th September 2010

TOP 10 ANTI-SCAM Unique Skill For Online Shopping

With the rapid development of e-commerce, the network scam become more and more rampant. According to the report of U.S. Federal Bureau of Investigation (FBI) , phishing caused losses from 265 million dollars in 2008 rose to 560 million dollars in 2009. Since 2004, we have been engaged in e-commerce 7 years, have done struggle with a variety of scams, accumulated rich experience in scam prevention. For the healthy development of e-commerce, to maintain the credibility of honest merchant, we conclude the following 10 unique anti-scam skill, let scams nowhere to hide.

1. Check Domain register information

As we know, great company always exist a long time, an old website is more secure than new. How can you tell a website is new or old? Click here you can get the site domain register information: http://whois.domaintools.com/, including register time, register name and business address. A scam will provide incomplete or false information and the site they register must be not long. Therefore, the longer the site was registered with more detailed register information, the higher credibility the site has.

2. Check whether they have business in authoritative third-party trading platform

In general, a good merchant will use authoritative third party trading platform selling products, this is a symbol of strength. Common third-party trading platform have Alibaba, eBay, Amazons, etc... These third-party trading platform are transparent and fair, especially the credibility of their evaluation system is perfect. You can obtain more objective information from them. For example, search business name Alibaba from Google, and you can confirm whether this site registered and its level.

3. Check whether they pass the third-party network security certification

McAfee and VeriSign are the world's most authoritative network security certification with strictly business identity confirm system, they frequently scan site, to ensure security of the site free of Trojan, viruses and other threats. Don't choose a site without such certification logo. (Note: Many sites, just hang a symbol, not been authenticated, you should be especially careful.)

4. Check whether exist price trap

Don't believe "sth falls into one's lap" , when meet a product incredible far below market price, they will produce the impulse to buy. Please remember high price doesn't necessarily lead to a high-quality product, as the same low price doesn’t means the high-quality too. Maybe the product is defective, imitate products or they will not delivery. Except an honest merchant may clearance, discount, offer coupons.

5. Check whether they support PayPal payment

PayPal is a payment that tend to protect buyer in trading. If a customer does not receive goods or received goods does not match with the description, he can initiate a dispute within 45 days and get full refund without any excuses. Moreover, the frequent complaints by customers, or fake and shoddy products will lead to his PayPal account frozen soon. Therefore, choose companies who support PayPal payment is more secure.

6. Check whether they support Business Bank Account payment

An excellent online shopping site, must have the local government legal business license, and they will have a business bank account. Otherwise, it is personal business. When you do a large wholesale business which involving in large order, please pay to the company bank account, in order to get better protection of the law.

7. Check whether they have customer interaction platform

Customer comments, views and experience of using the product is directly affect the next customer purchase product or not. An honest business, will allow customers to write product reviews, forum, blog and social networks (facebook, twitter, youtube) to express their views and opinions. But as a cheater, it would not provide the platform for you.

8. Check whether the site professional

Details determine success or failure, a professional B2C sites must pay much attention to details, including Help Before Ordering, Help After Ordering, Points, Coupons, Affiliate Program, Track Order, New Arrivals RSS and many other services, the site also provide detailed Company Info and a clear Return Policy. Scam will not waste time on these details.

9. Check whether they support face to face transactions

You can also entrust local friends or business partners, home delivery. If it doesn't support the transaction in person or not provide detailed address, it is certainly a cheater no doubt. When you want to make large wholesale business, be sure to use this way to avoid being cheated.

10. Practice is the sole criterion for testing truth

If all of above are not sufficient to judge whether it is a cheater or not, this is the last skill. You can place a small order in order to verify, you will get the result soon. Even if the deception, the loss is not big. In fact, the scams will ignore your small orders, they will directly refund or ask you to add more.

http://www.tomtop.com/blog/antiscam/



















PJL 5th September 2010

Saturday, September 4, 2010

NASA Selects Science Investigations for Solar Probe Plus

NASA has begun development of a mission to visit and study the sun closer than ever before. The unprecedented project, named Solar Probe Plus, is slated to launch no later than 2018. more




nasa.gov

PJL 4th August 2010

Bugging Devices Found In IMPD Deputy Chief's Office

Bugging devices were found in the office of Indianapolis Metropolitan Police Department Deputy Chief William Benjamin.

IMPD spokesman Lt. Jeff Duhamell confirmed that a bugging device was found in Benjamin's third-floor office in the City-County Building.

Police Chief Paul Ciesielski said in a prepared statement that he would open an internal investigation into who planted the bug. more

indystar.com


 
 
 
 
 
 
 
 
 
 
 
Bug Detection Services - Lynch Investigations & Countermeasures Pty Ltd
 
PJL September 4th 2010

Friday, September 3, 2010

Listening Device Detection - Keep You Secrets Safe

The news is full of stories of high profile information leaks. Whether it's gossip about an A-list celebrity, secrets from a company boardroom, or private memos from the office of a high ranking politician.

Information thieves are unscrupulous and will take whatever measures necessary to secure a story they can sell. There are plenty of people willing to pay too. Stolen secrets can be sold for big bucks to the media, competitors and conmen, all of whom will use them to make a small fortune.

The fact that acquiring this information is getting easier does not help matters. Electronic listening devices are more advanced, smaller, cheaper and easier to use than ever before. Micro cameras, audio recorders and GPS bugs are easily bought and within everyone's budget these days.

The variety and low cost of eavesdropping devices available also means they can be positioned in multiple locations to keep targets under almost permanent surveillance. So even if you think you have detected and disabled a bug, there may well be several more hidden around the area.

A standard telephone line can be tapped by a simple radio bugging device. These are probably one of the cheapest listening devices available and are used to pick up both sides of a telephone conversation in real time. Radio based listening devices can also be used to pick up conversations taking place in a room. The latest microphone technology and design gives these bugs a listening range of up to about 7 metres.

Most recently the biggest threat to privacy has been through the emergence of global system for mobile communications (GSM) devices. GSM devices take advantage of the global nature of the mobile telephone network to relay audio from a target's room to a phone anywhere in the world. As opposed to radio based devices, these bugs have greater flexibility as they can use a land-line, cellular or even Skype telephone connections.

More high-tech advances in electronic eavesdropping have been made with fibre optic microphones and laser microphone systems. The construction of fibre optic microphones and the way in which they operate using light makes them pretty much invisible to the human eye. A perfect choice for a eavesdroppers wanting to pick up high quality audio without detection.

Laser microphone systems are even harder to detect. They don't have to be deployed within the target area, but from a location within line of sight of the target. They use invisible laser technology to reflect and collect room audio as it resonates off hard surfaces in the room. These types of system are very expensive and are often made to resemble fairly innocent looking equipment as cameras or telescopes.

Unfortunately it's unusual to spot a bug until a leak has occurred. However, by taking sensible steps anyone who feels under threat can protect their private and confidential communications.

Adopting regular professional bug sweeps of properties, offices, boardrooms, vehicles and electronic communication devices where confidential or sensitive information is communicated is advisable.

During these bug sweeps, counter surveillance professionals carry out electronic and physical inspections of areas deemed to be under threat of listening devices. Once found they are removed and the area made safe.

By enlisting the regular help of bug sweeping professionals you are also securing your long term security as they keep themselves abreast of the many technical developments in electronic eavesdropping.

(ArticlesBase SC #3185528)

Author: Nicola Brown

Technical Surveillance Counter-Measures - Lynch Investigations & Countermeasures Pty Ltd



















PJL 3rd September 2010

Arson Investigator Charged With Arson

BRIDGEPORT CT - The city's top arson investigator has been arrested for allegedly hiring a man to torch her Mercedes for the insurance money.

Kimberly Biehn, 41, a veteran police detective who is also a member of the Police Department's Identification Unit, was arrested by Waterbury police and charged with conspiracy to commit first-degree arson, fraud and insurance fraud. more




 
 
 
 
 
 
 
 
 
 
 
privateofficerbreakingnews.blogspot.com
 
PJL 3rd September 2010

Thursday, September 2, 2010

U.K. Prime Minister's PR Guru Reportedly Linked To Royals' Phone Hacking

Coalition government risks being tainted by case involving Prince Charles, his sons.

Britain's government came under pressure Thursday amid allegations that a top prime ministerial aide was involved in illegally tapping cell phones of members of the royal family.
more














PJL 2nd September 2010

Wednesday, September 1, 2010

Weld Co. Man Jailed For Hiring PI To Track Estranged Wife

A local private investigator is under arrest, for what some say is simply doing his job. And a Weld County father is in jail, simply for hiring the investigator. more



PJL 1st September 2010

Chinese National Charged with Economic Espionage Against Agricultural Company

Chinese national Kexue Huang was arrested on charges of misappropriating and transporting trade secrets and property to the People’s Republic of China (PRC) while working as a research scientist at Dow AgroSciences LLC (Dow) in Indiana.

While employed at Dow, he then directed university researchers in the PRC to further develop the Dow trade secrets. He also allegedly applied for and obtained grant funding that was used to develop the stolen trade secrets.

preferredconsumer.com

PJL 1st September 2010