Thursday, October 7, 2010

Cryptome Hack Under Investigation

Whistleblowing site's founder claims attacker was retaliating against posting of sensitive documents.

Conflicting reports swirl continue to swirl around the identity of a hacker who broke into and defaced whistleblowing site Cryptome late last week. more


PJL 7th October 2010

Unclaimed Money & Superannuation Seeker

Another interesting online search is the unclaimed money and lost superannuation search using online tools that assist in tracking down your unclaimed money & superannuation funds.

There are businesses that specialise in searching for unclaimed money & lost superannuation for their clients and they mainly use the following web sites that I am going to show you.

If you are patient and have some online skills, you will certainly be in a good position to find your lost assets by processesing a claim for unclaimed money or lost superannuation.

There a few requirements when placing an application to claim your assets by providing identification. At some stage in the claiming process you may have to provide certified copies of a birth certificate, Medicare card, passport and even bank statements.

Please view the 2 web sites below from the text links that I recommend you should visit and commence searching for your unclaimed money and lost superannuation.

Super Seeker

Unclaimed Money

Thanks for coming back to our blog and reading our tips. Please feel free to contact me at any time if we can help you or your business with anything at all.

Lynch Investigations & Countermeasures Pty Ltd Contact Details














PJL 7th October 2010

The Growing Economic Espionage Risk Of Fibre Tapping

Corporate data centres, with their vast stores of business-sensitive information, present a tempting target for criminal groups.

Unfortunately for the would-be cyber crook, today’s enterprise security systems are so sophisticated that hacking into an enterprise datacentre is nigh on impossible.

But what if there were another way to get at this valuable data that circumvented most traditional security software? more

cicentre.net



 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
PJL 7th October 2010

U.S. Dept. of Defense Confirms NCIS Espionage Investigation Of Shell

On 19 June 2010 I received a strange email claiming that in 2006, U.S. authorities launched an investigation into alleged industrial espionage by Shell Oil.

Shell was implicated by their attorneys, the law firm of Vethan and Waldrop, and Matt Waldrop, principle partner of the law firm. Shell had been attempting to gain unlawful access to technical material that had been classified by the Navy Dept., Office of Naval Research in 2001. This material was the IP of a former employee. Shell was apparently trying to ‘muscle’ their way into gaining ownership of the IP material. This material was classified under DoE/DoD nuclear weapons classification authorities. more

royaldutchshellplc.com


















PJL 7th October 2010

Facebook & Twitter Used In Stock Fraud

Facebook and Twitter social networking sites were used to tout stocks in a classic "pump and dump" fraud of about $7 million that was uncovered during a cocaine-trafficking probe, U.S. prosecutors said on Tuesday.

Investigators discovered the fraud in a two-year probe of suspected trafficking by longshoremen and others of 1.3 tons of cocaine worth $34 million through the Port of New York and New Jersey officials said. more


PJL 7th October 2010

Espionage Theory In Raid

An overnight break-in in which burglars ransacked Aurora Energy's Hobart head office has puzzled police and company chiefs.

Only the second-floor commercial section of Aurora was targeted by the thieves, who cracked a secret safe and stole a small sum of cash. more


 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
PJL 7th October 2010