Australia's military is under siege from a rapidly increasing number of cyber attacks as alleged foreign spies try to break into the defence force's secure computer networks, a news report said Saturday.
The military's electronic espionage unit Defence Signals Directorate released figures to The Age newspaper showing the level of cyber attacks had soared from 200 a month last year to more than 700 a month this year. more
monstersandcritics.com
PJL 9th October 2010
Sunday, October 10, 2010
Saturday, October 9, 2010
Iran Acknowledges Espionage at Nuclear Facilities
Iran acknowledged Saturday that some personnel at the country’s nuclear facilities were lured by promises of money to pass secrets to the West but insisted increased security and worker privileges have put a stop to the spying. more
dailycaller.com
PJL 9th October 2010
dailycaller.com
PJL 9th October 2010
Learning Measure.com
Another training provider that is worth taking a look at for those that are interested in keeping their Engineering Courses for Continuing Education up to date is Learning Measure .com.
Those involved in Technical Surveillance Counter-Measure work combined with Electronic Security Consultancy, will find this training provider to be a valuable resource at $5 (US) per month or $60 (US) subscription fees annually.
LearningMeasure.com provides training and consulting services to businesses and individuals in several technical areas through their network of consultants.
PJL 9th October 2010
Those involved in Technical Surveillance Counter-Measure work combined with Electronic Security Consultancy, will find this training provider to be a valuable resource at $5 (US) per month or $60 (US) subscription fees annually.
LearningMeasure.com provides training and consulting services to businesses and individuals in several technical areas through their network of consultants.
PJL 9th October 2010
Friday, October 8, 2010
Thursday, October 7, 2010
Cryptome Hack Under Investigation
Whistleblowing site's founder claims attacker was retaliating against posting of sensitive documents.
Conflicting reports swirl continue to swirl around the identity of a hacker who broke into and defaced whistleblowing site Cryptome late last week. more
PJL 7th October 2010
Conflicting reports swirl continue to swirl around the identity of a hacker who broke into and defaced whistleblowing site Cryptome late last week. more
PJL 7th October 2010
Unclaimed Money & Superannuation Seeker
Another interesting online search is the unclaimed money and lost superannuation search using online tools that assist in tracking down your unclaimed money & superannuation funds.
There are businesses that specialise in searching for unclaimed money & lost superannuation for their clients and they mainly use the following web sites that I am going to show you.
If you are patient and have some online skills, you will certainly be in a good position to find your lost assets by processesing a claim for unclaimed money or lost superannuation.
There a few requirements when placing an application to claim your assets by providing identification. At some stage in the claiming process you may have to provide certified copies of a birth certificate, Medicare card, passport and even bank statements.
Please view the 2 web sites below from the text links that I recommend you should visit and commence searching for your unclaimed money and lost superannuation.
Super Seeker
Unclaimed Money
Thanks for coming back to our blog and reading our tips. Please feel free to contact me at any time if we can help you or your business with anything at all.
Lynch Investigations & Countermeasures Pty Ltd Contact Details
PJL 7th October 2010
There are businesses that specialise in searching for unclaimed money & lost superannuation for their clients and they mainly use the following web sites that I am going to show you.
If you are patient and have some online skills, you will certainly be in a good position to find your lost assets by processesing a claim for unclaimed money or lost superannuation.
There a few requirements when placing an application to claim your assets by providing identification. At some stage in the claiming process you may have to provide certified copies of a birth certificate, Medicare card, passport and even bank statements.
Please view the 2 web sites below from the text links that I recommend you should visit and commence searching for your unclaimed money and lost superannuation.
Super Seeker
Unclaimed Money
Thanks for coming back to our blog and reading our tips. Please feel free to contact me at any time if we can help you or your business with anything at all.
Lynch Investigations & Countermeasures Pty Ltd Contact Details
PJL 7th October 2010
The Growing Economic Espionage Risk Of Fibre Tapping
Corporate data centres, with their vast stores of business-sensitive information, present a tempting target for criminal groups.
Unfortunately for the would-be cyber crook, today’s enterprise security systems are so sophisticated that hacking into an enterprise datacentre is nigh on impossible.
But what if there were another way to get at this valuable data that circumvented most traditional security software? more
cicentre.net
PJL 7th October 2010
Unfortunately for the would-be cyber crook, today’s enterprise security systems are so sophisticated that hacking into an enterprise datacentre is nigh on impossible.
But what if there were another way to get at this valuable data that circumvented most traditional security software? more
cicentre.net
PJL 7th October 2010
U.S. Dept. of Defense Confirms NCIS Espionage Investigation Of Shell
On 19 June 2010 I received a strange email claiming that in 2006, U.S. authorities launched an investigation into alleged industrial espionage by Shell Oil.
Shell was implicated by their attorneys, the law firm of Vethan and Waldrop, and Matt Waldrop, principle partner of the law firm. Shell had been attempting to gain unlawful access to technical material that had been classified by the Navy Dept., Office of Naval Research in 2001. This material was the IP of a former employee. Shell was apparently trying to ‘muscle’ their way into gaining ownership of the IP material. This material was classified under DoE/DoD nuclear weapons classification authorities. more
royaldutchshellplc.com
PJL 7th October 2010
Shell was implicated by their attorneys, the law firm of Vethan and Waldrop, and Matt Waldrop, principle partner of the law firm. Shell had been attempting to gain unlawful access to technical material that had been classified by the Navy Dept., Office of Naval Research in 2001. This material was the IP of a former employee. Shell was apparently trying to ‘muscle’ their way into gaining ownership of the IP material. This material was classified under DoE/DoD nuclear weapons classification authorities. more
royaldutchshellplc.com
PJL 7th October 2010
Facebook & Twitter Used In Stock Fraud
Facebook and Twitter social networking sites were used to tout stocks in a classic "pump and dump" fraud of about $7 million that was uncovered during a cocaine-trafficking probe, U.S. prosecutors said on Tuesday.
Investigators discovered the fraud in a two-year probe of suspected trafficking by longshoremen and others of 1.3 tons of cocaine worth $34 million through the Port of New York and New Jersey officials said. more
PJL 7th October 2010
Investigators discovered the fraud in a two-year probe of suspected trafficking by longshoremen and others of 1.3 tons of cocaine worth $34 million through the Port of New York and New Jersey officials said. more
PJL 7th October 2010
Espionage Theory In Raid
An overnight break-in in which burglars ransacked Aurora Energy's Hobart head office has puzzled police and company chiefs.
Only the second-floor commercial section of Aurora was targeted by the thieves, who cracked a secret safe and stole a small sum of cash. more
PJL 7th October 2010
Only the second-floor commercial section of Aurora was targeted by the thieves, who cracked a secret safe and stole a small sum of cash. more
PJL 7th October 2010
Wednesday, October 6, 2010
ASTIC Signals Defenses®, LLC Will Be Exhibiting
ASTIC Signals Defenses will be demonstrating its patented SD Technology at Booth Number: 4306. SD Technology allows both government and commercial organizations to cost effectively convert conventional office space into US Department of Defense (DoD) grade secure work environments.
The demonstrations will include protection against both radio frequency and infrared/LASER attacks against your facilities. more
prnewswire.com
Signals Defenses
PJL 6th October 2010
The demonstrations will include protection against both radio frequency and infrared/LASER attacks against your facilities. more
prnewswire.com
Signals Defenses
PJL 6th October 2010
Tuesday, October 5, 2010
Cihaner Confesses To Wiretapping Prime Minister
Erzincan’s chief public prosecutor confessed to having wiretapped, albeit accidently, the prime minister on Saturday during the “32. Gün” (32nd Day) debate program aired by private TV station Kanal D. more
todayszaman.com
TSCM Bug Sweep Services - Lynch Investigations & Countermeasures Pty Ltd
PJL 5th October 2010
todayszaman.com
TSCM Bug Sweep Services - Lynch Investigations & Countermeasures Pty Ltd
PJL 5th October 2010
Die Hard - Mctiernan Gets One Year In Prison In Wiretapping Case
DIE HARD director JOHN MCTIERNAN has been sentenced to one year in prison for lying to authorities investigating Hollywood private detective ANTHONY PELLICANO.
The filmmaker initially pleaded guilty to lying to federal agents in 2006 about the investigation of Pellicano, who was convicted in 2008 of 76 wiretapping counts and sentenced to 15 years in prison. more
contactmusic.com
TSCM Bug Sweeping Services - Lynch Investigations & Countermeasures Pty Ltd
PJL 5th October 2010
The filmmaker initially pleaded guilty to lying to federal agents in 2006 about the investigation of Pellicano, who was convicted in 2008 of 76 wiretapping counts and sentenced to 15 years in prison. more
contactmusic.com
TSCM Bug Sweeping Services - Lynch Investigations & Countermeasures Pty Ltd
PJL 5th October 2010
Monday, October 4, 2010
Belanglo Body May Be Overseas Backpacker
DETECTIVES are preparing a worldwide search to identify the young woman whose skeletal remains were found in the Belanglo State Forest.
Investigators have been unable to find a match for the DNA sample that was extracted from the teeth and jaw area. Searches of the national missing persons archives have all been unsuccessful.
The Sunday Telegraph has been told the next phase of the investigation will involve Interpol. more
dailytelegraph.com
Grim task ... Police search the area were human bones were found in the Belanglo State Forest last month.. Pic: Peter Rae Source: The Sunday Telegraph
PJL 4th October 2010
Investigators have been unable to find a match for the DNA sample that was extracted from the teeth and jaw area. Searches of the national missing persons archives have all been unsuccessful.
The Sunday Telegraph has been told the next phase of the investigation will involve Interpol. more
dailytelegraph.com
Grim task ... Police search the area were human bones were found in the Belanglo State Forest last month.. Pic: Peter Rae Source: The Sunday Telegraph
PJL 4th October 2010
Sunday, October 3, 2010
Keady Back In Court On Wiretapping Allegations
Former Shirley Town Administrator Kyle Keady appeared yesterday in Ayer District Court for a pretrial hearing in regards to charges he illegally taped people in and around Shirley Town Hall. more
lowellsun.com
PJL 3rd October 2010
lowellsun.com
PJL 3rd October 2010
Former Spy Accused Of Espionage From Prison
An ex-CIA spy slipped messages to his son from prison through paper napkins wadded into balls, despite the best efforts of the intelligence agency to monitor his communications, government prosecutors said in a pretrial filing. more
cbsnews.com
PJL 3rd October 2010
cbsnews.com
PJL 3rd October 2010
Saturday, October 2, 2010
Newsletter September 2010
September 2010 has been a busy month. An interesting request this month was unclaimed money searches which we were successful in locating unclaimed money for various clients. Anybody in need of this service, please feel free to contact us at any time.
All we need to search for unclaimed money is a date of birth, old and current address information and a full name. We will also need proof of identity for the person we are searching for unclaimed money for.
We created a new web page for our web site that can be sent to clients who need an accurate quotation for a bug sweep (TSCM) service. Our new TSCM Quotation Information Worksheet is detailed and allows a client to input specific details about a site where an inspection is needed. Once the TSCM Quotation Information Worksheet is filled in by a client and returned to us, we will submit an accurate quotation to the client. Anybody needing the new TSCM Quotation Information Worksheet, should contact us so we can forward that on via email.
Lynch Investigations & Countermeasures Pty Ltd upgraded their TSCM equipment to compliment further assistance to corporate clients in need of electronic eavesdropping detection. We now sweep and office environment to 20 GHz with spectral analysis, including our thorough physical inspection and comprehensive risk management reporting. We have had the new equipment out on a few tasks this month and it is performing nicely.
We are also still handing surveillance work and inquiries for Family Law matters. With couples separating, surveillance remains demanding due to child custody concerns with court orders in place, allowing us to provide surveillance to ensure the conditions of those court orders are being complied with.
There are still those locating inquiries coming in with some clients needing searches completed to satisfy the court's requirements for substitute service. At times when warrants are in place and a change of name by deed poll has occurred, it is understandable why substitute service is necessary. Please get in contact with us about data searches for legal locating tasks as needed.
That rounds it up for this last month's brief overview and the first day of October 2010. We look forward to communicating with you all again at the end of this month or early next month in November 2010.
PJL 2nd October 2010
All we need to search for unclaimed money is a date of birth, old and current address information and a full name. We will also need proof of identity for the person we are searching for unclaimed money for.
We created a new web page for our web site that can be sent to clients who need an accurate quotation for a bug sweep (TSCM) service. Our new TSCM Quotation Information Worksheet is detailed and allows a client to input specific details about a site where an inspection is needed. Once the TSCM Quotation Information Worksheet is filled in by a client and returned to us, we will submit an accurate quotation to the client. Anybody needing the new TSCM Quotation Information Worksheet, should contact us so we can forward that on via email.
Lynch Investigations & Countermeasures Pty Ltd upgraded their TSCM equipment to compliment further assistance to corporate clients in need of electronic eavesdropping detection. We now sweep and office environment to 20 GHz with spectral analysis, including our thorough physical inspection and comprehensive risk management reporting. We have had the new equipment out on a few tasks this month and it is performing nicely.
We are also still handing surveillance work and inquiries for Family Law matters. With couples separating, surveillance remains demanding due to child custody concerns with court orders in place, allowing us to provide surveillance to ensure the conditions of those court orders are being complied with.
There are still those locating inquiries coming in with some clients needing searches completed to satisfy the court's requirements for substitute service. At times when warrants are in place and a change of name by deed poll has occurred, it is understandable why substitute service is necessary. Please get in contact with us about data searches for legal locating tasks as needed.
That rounds it up for this last month's brief overview and the first day of October 2010. We look forward to communicating with you all again at the end of this month or early next month in November 2010.
PJL 2nd October 2010
The Stuxnet Outbreak - A Worm In The Centrifuge
It sounds like the plot of an airport thriller or a James Bond film. A crack team of experts, assembled by a shadowy government agency, develops a cyber-weapon designed to shut down a rogue country’s nuclear programme.
The software uses previously unknown tricks to worm its way into industrial control systems undetected, searching for a particular configuration that matches its target—at which point it wreaks havoc by reprogramming the system, closing valves and shutting down pipelines. more
economist.com
Tim Marrs
PJL 2nd October 2010
The software uses previously unknown tricks to worm its way into industrial control systems undetected, searching for a particular configuration that matches its target—at which point it wreaks havoc by reprogramming the system, closing valves and shutting down pipelines. more
economist.com
Tim Marrs
PJL 2nd October 2010
Wiretapping The Internet
On Monday, The New York Times reported that President Obama will seek sweeping laws enabling law enforcement to more easily eavesdrop on the internet.
Technologies are changing, the administration argues, and modern digital systems aren't as easy to monitor as traditional telephones. more
schneier.com
PJL 2nd October 2010
Technologies are changing, the administration argues, and modern digital systems aren't as easy to monitor as traditional telephones. more
schneier.com
PJL 2nd October 2010
Friday, October 1, 2010
4 Tips For Improving Your SEO Copywriting
When Search Engine Optimization (SEO) is mentioned, a few obvious things immediately pop into your mind, such as: Google rankings, link building, and conversion rates. One element that is often forgotten is copywriting – when building an authoritative site, you will want to optimize your copywriting content. It is very effective in getting Google’s attention, but you should also optimize for your human readers as well.
Some writers write first and then optimize later, while others optimize as they go. Here are four SEO copywriting tips that have made many client websites successful.
1.Title – Use the keyword you are targeting in the title of your content. The closer to the beginning of the title the better, but the main key here is that they appear somewhere. It is recommended that the title and the title tag are variations of each other and never the same.
2.Meta Description – The meta description is the snippet that human readers see underneath your Google result, below the title. This description can determine whether a person clicks through or not. If your page, post, or article pops up for their query, the meta description with a properly placed keywords could seal the deal for a lucrative click through. Keep meta descriptions under 165 characters so the full description is visible in the search result.
3.Keyword Frequency (not to be confused with keyword density) – is the number of times your keywords appear on the page. Keyword density is the ratio of keywords to the rest of the words on the page. Use your keywords often, but only when appropriate. One of the many skills of an SEO copywriter is knowing HOW to write for keywords, while keeping a natural flow of language. If your keyword frequency is crossing the line into spam-hood, your keyword density will be ~ 5%. Don’t mindlessly repeat keywords just to optimize. This will only achieve the opposite results.
4.Page Links – Search engines always want to know who you are “connected to,” which pages, websites, and content you are associating yourself with. If you are fraternizing with a less than reputable website, Google will know. For SEO purposes, linking to other pages matters. So be careful who you link with.
These SEO copywriting tips are generally considered current best practices. Focus on balancing these rules with your content, and you will please both the search engine spiders and the humans that read it.
b2cmarketinginsider.com
Author: Ben Finklea, CEO of Volacci, a search marketing firm.
PJL 1st October 2010
Some writers write first and then optimize later, while others optimize as they go. Here are four SEO copywriting tips that have made many client websites successful.
1.Title – Use the keyword you are targeting in the title of your content. The closer to the beginning of the title the better, but the main key here is that they appear somewhere. It is recommended that the title and the title tag are variations of each other and never the same.
2.Meta Description – The meta description is the snippet that human readers see underneath your Google result, below the title. This description can determine whether a person clicks through or not. If your page, post, or article pops up for their query, the meta description with a properly placed keywords could seal the deal for a lucrative click through. Keep meta descriptions under 165 characters so the full description is visible in the search result.
3.Keyword Frequency (not to be confused with keyword density) – is the number of times your keywords appear on the page. Keyword density is the ratio of keywords to the rest of the words on the page. Use your keywords often, but only when appropriate. One of the many skills of an SEO copywriter is knowing HOW to write for keywords, while keeping a natural flow of language. If your keyword frequency is crossing the line into spam-hood, your keyword density will be ~ 5%. Don’t mindlessly repeat keywords just to optimize. This will only achieve the opposite results.
4.Page Links – Search engines always want to know who you are “connected to,” which pages, websites, and content you are associating yourself with. If you are fraternizing with a less than reputable website, Google will know. For SEO purposes, linking to other pages matters. So be careful who you link with.
These SEO copywriting tips are generally considered current best practices. Focus on balancing these rules with your content, and you will please both the search engine spiders and the humans that read it.
b2cmarketinginsider.com
Author: Ben Finklea, CEO of Volacci, a search marketing firm.
PJL 1st October 2010
Private Eye May Sue Fraser-Kirk
A private investigator has released a statement saying claims made about him during the Kristy Fraser-Kirk court case are "untrue" and "malicious". more
abc.net.au
PJL October 1st 2010
abc.net.au
PJL October 1st 2010
Museveni Passes Law On Telephone Tapping
President Yoweri Museveni has signed into law the Regulation of Interception of Communications Bill, 2010, giving powers to security officials to listen into private communication if they have sufficient reason to suspect the communication is in aid of criminal activity. more
monitor.co.ug
PJL 1st October 2010
monitor.co.ug
PJL 1st October 2010
Thursday, September 30, 2010
Tuesday, September 28, 2010
FBI Employees Caught Cheating Like College Students on an Exam
A Department of Justice Investigation has found widespread cheating among FBI employees on an important exam. more
gawker.com
PJL 28th September 2010
gawker.com
Wiretapping Facebook?
The Obama Administration aims to make it easier for the FBI to wiretap online communications, from social networking sites like Facebook to communications on BlackBerrys. The FBI claims their ability to track “bad guys” is increasingly moving away from the telephone and onto the internet. more
scpr.org
Chip Somodevilla/Getty Images
President Obama is considering extending wiretapping abilities to Facebook, Skype and even BlackBerry smartphones
PJL 28th September 2010
scpr.org
Chip Somodevilla/Getty Images
President Obama is considering extending wiretapping abilities to Facebook, Skype and even BlackBerry smartphones
PJL 28th September 2010
Monday, September 27, 2010
FBI Activists in Midwest as Domestic Surveillance Expands
Apparently last week’s unflattering report by the Justice Department’s Inspector General on the Federal Bureau of Investigation’s improper surveillance of nonviolent protesters during the past decade fell on deaf ears. more
informant.kalwnews.org
PJL 27th September 2010
informant.kalwnews.org
PJL 27th September 2010
ANC's Block Under Investigation
A key former Northern Cape official implicated in the buying of R112.2 million in equipment from city businessman Gaston Savoi has gone to ground following a Cape Times exposé of his involvement in the deals – which are under investigation by the Hawks. more
PJL 27th September 2010
PJL 27th September 2010
How To Conduct Overseas Investigation Operation
1. I have in the course of my work conducted private investigation outside my country. In this article, I shall try to discuss a few pointers on how to run a successful overseas operation based on my experience and exposure in such assignments. more
emmettcarradine.coolblogz.com
PJL 26th September 2010
emmettcarradine.coolblogz.com
PJL 26th September 2010
TrapCall
Always know who's calling.
TrapCall unmasks blocked and restricted calls, blacklists harassing callers, and can even record your incoming calls. There is no software to install, and it works on any mobile phone.
Watch this quick video to see how easy TrapCall really is!
PJL 26th September 2010
TrapCall unmasks blocked and restricted calls, blacklists harassing callers, and can even record your incoming calls. There is no software to install, and it works on any mobile phone.
Watch this quick video to see how easy TrapCall really is!
PJL 26th September 2010
Saturday, September 25, 2010
FBI Joins Investigation Into MI6 Spy's Death
The bureau has employed face recognition technology at US airports in a bid to establish whether Gareth Williams travelled in and out of the US any stage with a couple answering the description of two people Scotland Yard have appealed to come forward in connection with his death. more
telegraph.co.uk
Mr Williams, a computing and maths prodigy whose funeral on Friday was attended by Sir John Sawers, the head of MI6, had made regular trips to the United States Photo: SWNS
PJL 25th September 2010
telegraph.co.uk
Mr Williams, a computing and maths prodigy whose funeral on Friday was attended by Sir John Sawers, the head of MI6, had made regular trips to the United States Photo: SWNS
PJL 25th September 2010
Missing Syrian Blogger Detained For Espionage
A missing 19-year-old Syrian blogger, Tal El- Melouhy, is being held in a prison near the capital Damascus on espionage charges, local media outlets reported Tuesday. more
monstersandcritics.com
PJL 25th September 2010
monstersandcritics.com
PJL 25th September 2010
10 Small Business SEO Tips
Being a small business means being in need of tight money management. For this reason, small budgeted means of marketing, such as website often becomes the first choice of marketing means.
Unfortunately, launching your website without having appropriate search engine optimization will just take your money straight into the garbage can.
Hence, here are few affordable tips of SEO that helps you ensuring your website marketing success: more
PJL 25th September 2010
Unfortunately, launching your website without having appropriate search engine optimization will just take your money straight into the garbage can.
Hence, here are few affordable tips of SEO that helps you ensuring your website marketing success: more
PJL 25th September 2010
Thursday, September 23, 2010
FBI Spied & Lied, Misled Justice Department on Improper Surveillance of Peace Groups
The Justice Department Inspector General (IG) discovered improper FBI spying investigations were frequently opened based upon “factually weak” justifications.
The FBI classified some investigations relating to nonviolent civil disobedience under its "Acts of Terrorism" classification.
People associated with advocacy groups were generally predicated on suspicion that the individual might potentially commit a crime. more
networkworld.com
PJL 23rd September 2010
The FBI classified some investigations relating to nonviolent civil disobedience under its "Acts of Terrorism" classification.
People associated with advocacy groups were generally predicated on suspicion that the individual might potentially commit a crime. more
networkworld.com
PJL 23rd September 2010
Suspect Arrested After Four Month Investigation Into Internet Threats
The La Quinta Police Department, a contracted department through the Riverside County Sheriff’s Department out of their Indio station arrested a man for threats made through the internet to a female La Quinta High School student. more
examiner.com
Arrested for criminal threats via the internet
Photo by: Riverside County Sheriff's Department
PJL 23rd September 2010
examiner.com
Arrested for criminal threats via the internet
Photo by: Riverside County Sheriff's Department
PJL 23rd September 2010
TSCM & VoIP Vulnerabilities
There are a lot of businesses we service with our Technical Surveillance Counter-Measure (TSCM) services that could be taking advantage of there IP infrastructure and encrypting VoIP communications to secure VoIP telephone.
It is easy enough to inspect a VoIP telephone and to connect a Time Domain Reflectometer to a data cable to check for taps, bridges or splices along the cable, although to run these tests involves disconnecting any power source from the data cables so the Time Domain Reflectometer can be used to inject a signal into the data cable for further analysis.
It is practical to use an encrypted data transmission pathway for VoIP secure telephone communications.
With encrypted data transmissions, one doesn't need to continually check data cables that need power isolated in a Technical Surveillance Counter-Measures inspection.
There are some problems with VoIP latency and encrypted data transmission makes the latency period slightly longer for data transfer, although this is improving.
Here is an interesting article below relating to hacking IP voice & video in real time which shows you how easily the process is undertaken.
Regular TSCM servicing can't guarantee protection against real time hacking of the IP infrastructure; this is why encrypted data transmissions should be used.
PJL
=============================================
Corporate video conferences can still be easily hacked by insiders using a freeware tool that allows attackers to monitor calls in real-time and record them in files suitable for posting on YouTube. more
PJL 23rd September 2010
It is easy enough to inspect a VoIP telephone and to connect a Time Domain Reflectometer to a data cable to check for taps, bridges or splices along the cable, although to run these tests involves disconnecting any power source from the data cables so the Time Domain Reflectometer can be used to inject a signal into the data cable for further analysis.
It is practical to use an encrypted data transmission pathway for VoIP secure telephone communications.
With encrypted data transmissions, one doesn't need to continually check data cables that need power isolated in a Technical Surveillance Counter-Measures inspection.
There are some problems with VoIP latency and encrypted data transmission makes the latency period slightly longer for data transfer, although this is improving.
Here is an interesting article below relating to hacking IP voice & video in real time which shows you how easily the process is undertaken.
Regular TSCM servicing can't guarantee protection against real time hacking of the IP infrastructure; this is why encrypted data transmissions should be used.
PJL
=============================================
Corporate video conferences can still be easily hacked by insiders using a freeware tool that allows attackers to monitor calls in real-time and record them in files suitable for posting on YouTube. more
PJL 23rd September 2010
Tuesday, September 21, 2010
Technical Surveillance Counter-Measures (TSCM) Quotation
Please find a web site link below that leads to our new Technical Surveillance Counter-Measures (TSCM) Quotation Information Worksheet. The form can be completed online or offline, what ever way you wish to use is fine with us.
By creating the Technical Surveillance Counter-Measures Information Worksheet, allows our business to give accurate quotes for a site inspection nominated by you for our Bug Sweeping (TSCM) services.
We look forward to hearing from you and responding to your service needs.
TSCM Quotation Information Worksheet
Thank you PJL 21st September 2010
By creating the Technical Surveillance Counter-Measures Information Worksheet, allows our business to give accurate quotes for a site inspection nominated by you for our Bug Sweeping (TSCM) services.
We look forward to hearing from you and responding to your service needs.
TSCM Quotation Information Worksheet
TSCM Bug Sweeps - Lynch Investigations & Countermeasures Pty Ltd
Thank you PJL 21st September 2010
Indictment of Private Investigators Hired by Oleg Deripaska's Aide to Spy on Michael Cherney
On Sunday, Tel Aviv Magistrates Court charged two private investigators, Rafael Pridan and Maxim Gurevich, with the illegal wiretapping of Businessman Michael Cherney. The two had been hired by an aide to Russian aluminum tycoon Oleg Deripaska, Cherney's ex-partner. more
prnewswire.com
PJL 21st September 2010
prnewswire.com
PJL 21st September 2010
US Charges Two Over Nuclear Espionage
A US scientist and his wife have appeared in a US federal court over espionage charges, which include passing on secret information to Venezuela.
Nuclear physicist Pedro Leonardo Mascheroni and his wife, Marjorie Roxby Mascheroni, now face a total of 22 charges. If convicted, they could be sentenced to life in prison.
Both the defendants are US citizens, who once worked at Los Alamos National Laboratory in New Mexico.
The Federal Bureau of Investigation says it had the couple under surveillance for the past two years. more
presstv.ir
PJL 21st September 2010
Nuclear physicist Pedro Leonardo Mascheroni and his wife, Marjorie Roxby Mascheroni, now face a total of 22 charges. If convicted, they could be sentenced to life in prison.
Both the defendants are US citizens, who once worked at Los Alamos National Laboratory in New Mexico.
The Federal Bureau of Investigation says it had the couple under surveillance for the past two years. more
presstv.ir
PJL 21st September 2010
MI5: Cyber Espionage On The Rise But Can Be Easily Beaten
MI5 says the Internet has made the threat of espionage by foreign countries higher than ever before, but insisted it is "relatively straightforward" to block attempts to steal data; MI5 has previously written to the bosses of big British companies to warn them of the threat online, particularly from hackers with links to the Chinese intelligence services. more
homelandsecuritynewswire.com
PJL 21st September 2010
homelandsecuritynewswire.com
PJL 21st September 2010
Autopsy: Defected Russian Spy Chief Choked On Meat
A former top Russian spy who defected to the U.S. after running espionage operations from the United Nations choked to death on a piece of meat, a Florida medical examiner says.
Sergei Tretyakov, 53, also had a cancerous tumor in his colon when he died June 13, according to an autopsy report obtained by The Associated Press through a state open records request. Tretyakov's sudden death had led to some Internet speculation that he had been killed. more
PJL 21st September 2010
Sergei Tretyakov, 53, also had a cancerous tumor in his colon when he died June 13, according to an autopsy report obtained by The Associated Press through a state open records request. Tretyakov's sudden death had led to some Internet speculation that he had been killed. more
PJL 21st September 2010
The Security Risks & Ways to Decrease Vulnerabilities in a 802.11b Wireless Environment
This document explains topics relating to wireless networks. The main topics discussed include, what type of vulnerabilities exist today in 802.11 networks and ways that you can help prevent these vulnerabilities from happening. more
PJL 21st September 2010
PJL 21st September 2010
Sunday, September 19, 2010
Major Supply Group Of Cocaine Busted
The Rowan County Sheriff’s Office Special Investigations Unit began an investigation involving a group believed to be a major supplier of powder cocaine in western Rowan County. The investigation began in June and involved the use of surveillance and undercover detective purchases of cocaine. more
foxcharlotte.com
PJL19th September 2010
foxcharlotte.com
PJL19th September 2010
Saturday, September 18, 2010
Federal Investigation Snares 7 With Ties To Drugs & Human Smuggling
Seven people are in federal custody after a two-year investigation allegedly tied them to a multimillion-dollar drug- and human-smuggling ring based in Whatcom County. more
PJL 18th September 2010
PJL 18th September 2010
Friday, September 17, 2010
Irish Republicans Used Cameras To Spy On MI5
British government officials in Northern Ireland have ordered 20 trees cut down outside a spying installation, after a number of surveillance cameras were discovered hidden among the tree branches. more
intelligencenews.wordpress.com
PJL 17th September 2010
intelligencenews.wordpress.com
PJL 17th September 2010
Recording a Meeting
Do you have a right to protect yourself by recording meetings you attend?
Not according to the South Australian Supreme Court. It has just held that the Chairman of a meeting and the meeting itself can prohibit the use of recording devices at the meeting.
If the wannabe recorder indicates that he still intends to record the meeting, the Chairman can adjourn the meeting. more
claytonutz.com
PJL 17th September 2010
Not according to the South Australian Supreme Court. It has just held that the Chairman of a meeting and the meeting itself can prohibit the use of recording devices at the meeting.
If the wannabe recorder indicates that he still intends to record the meeting, the Chairman can adjourn the meeting. more
claytonutz.com
PJL 17th September 2010
Wednesday, September 15, 2010
Two Men Face Federal Charges In Armoured Car Robbery
Federal authorities charged two men Monday with taking $130,000 at gunpoint from an armored car courier last month.
Court documents allege that within hours of the Aug. 30 hold-up, Deangelo Colston and Gerald Jones, both 20, began spending handfuls of $20 bills on a car, clothing, tattoos and a trip to Worlds of Fun. more
kansascity.com
(Photo credit flickr.com)
PJL 15th September 2010
Court documents allege that within hours of the Aug. 30 hold-up, Deangelo Colston and Gerald Jones, both 20, began spending handfuls of $20 bills on a car, clothing, tattoos and a trip to Worlds of Fun. more
kansascity.com
(Photo credit flickr.com)
PJL 15th September 2010
Tuesday, September 14, 2010
Mixed Reactions To Civil Rights Photographer's FBI Ties
In many ways, civil rights photographer Ernest Withers would have been the perfect FBI informant, said leaders of the movement whom he photographed during quiet moments in their hotel rooms, at strategy meetings and in the midst of powerful street protests. more
washingtonpost.com
PJL 14th September 2010
washingtonpost.com
PJL 14th September 2010
London Police Are Sued Over The News Of The World Phone Hacking Investigation
Three men who suspect their mobile phones were hacked by reporters at Rupert Murdoch's News of the World newspaper are suing U.K. police, alleging they didn’t properly investigate the case. more
bloomberg.com
PJL 14th September 2010
bloomberg.com
PJL 14th September 2010
New Hampshire Police Bust Facebook Burglary Ring
Up until last week, the potential for place-based social networks enabling burglary had been (to the best of my knowledge) mostly hypothetical; while the possibility was recognized and much discussed, I hadn't seen any reports of burglars actually victimizing people after determining they were away from home by looking at their online profiles. more
mediapost.com
PJL 14th September 2010
mediapost.com
PJL 14th September 2010
Monday, September 13, 2010
The Secrets of Countersurveillance
Almost any criminal act, from a purse-snatching to a terrorist bombing, involves some degree of pre-operational surveillance. In fact, one common denominator of all the different potential threats — whether from lone wolves, militant groups, common criminals or the mentally disturbed — is that those planning an operation all monitor their target in advance. more
stratfor.com
PJL September 13th 2010
stratfor.com
PJL September 13th 2010
Fraud Squad Probes Perth Housing Scam
The Major Fraud Squad has been called in to investigate a scam after a Perth man's home was sold without his knowledge.
Roger Mildenhall was living overseas when he found out last week that his property in Karrinyup which, was worth almost $500,000, had been sold in June. more
Roger Mildenhall was living overseas when he found out that his property had been sold (7pm TV News WA)
abc.net.au
PJL 13th September 2010
Roger Mildenhall was living overseas when he found out last week that his property in Karrinyup which, was worth almost $500,000, had been sold in June. more
Roger Mildenhall was living overseas when he found out that his property had been sold (7pm TV News WA)
abc.net.au
PJL 13th September 2010
Sunday, September 12, 2010
Wichita Prostitution Ring Linked To Massage Parlors
Ten people have been arrested and charged with participating in a prostitution network utilizing numerous massage parlors around Wichita, police officials said Friday. more
kansascity.com
PJL September 12th 2010
kansascity.com
PJL September 12th 2010
Saturday, September 11, 2010
Police Find Meth Lab Searching For Stolen Xbox
It was just another ordinary September day in St. Augustine, Florida, until an unnamed 24-year-old man's Xbox was stolen. The investigation resulting from the theft led to the discovery of a methamphetamine lab next door. more
escapistmagazine.com
PJL 11th September 2010
escapistmagazine.com
PJL 11th September 2010
Shooter Kills 2 Kraft Workers At North East Philadelphia Plant
A woman who had just been suspended from her job returned to the Kraft Foods baking plant in Northeast Philadelphia Thursday night and opened fire with a .357 Magnum handgun, killing two co-workers and wounding a third, police said. more
philly.com
PJL 11th September 2010
philly.com
PJL 11th September 2010
Friday, September 10, 2010
Court Allows Warrantless Cell Location Tracking
The FBI and other police agencies don't need a search warrant to track the locations of Americans' cell phones, a federal appeals court ruled on Tuesday in a precedent-setting decision. more
PJL 10th September 2010
PJL 10th September 2010
Subscribe to:
Posts (Atom)