The AR5001D from AOR is the most versatile
Communications Receiver ever, since the release of a
legendary AR5000 receiver! With ultra-wide frequency
coverage and a host of operating features hatched by an
advanced digital signal processing technology, you’ll be
on top of the monitoring action with the AR5001D.
AR 5001D Presentation
Purchase AR5001D
PJL 30th July 2010
Friday, July 30, 2010
WHAT THE HELL IS WRONG WITH COPS! Police Push Disabled. (moxnews.com)
Looks like the police department has a new candidate for the arrogant cop poster . I think we should honor and respect cops but when I see things like this ...
PJL 30th July 2010
PJL 30th July 2010
Thursday, July 29, 2010
This is the Summer of Spies
The summer of 2010 will be remembered as the hottest on record. It might also surpass previous records as a silly season for federal government spending.
But there is another accolade in the offing -- the summer of spies. At home, our spy chief, Richard Fadden, popped up on TV to warn about agents of influence at their insidious work in provincial cabinets and B.C. municipal politics. The United States and Russia swapped a bag of spies, with the U.S. ridding itself of 10 not-very-successful Russian agents and springing some valuable pros from Russian jails in return. more
By Wesley Wark, Special to the Sun
vancouversun.com
PJL July 2010
But there is another accolade in the offing -- the summer of spies. At home, our spy chief, Richard Fadden, popped up on TV to warn about agents of influence at their insidious work in provincial cabinets and B.C. municipal politics. The United States and Russia swapped a bag of spies, with the U.S. ridding itself of 10 not-very-successful Russian agents and springing some valuable pros from Russian jails in return. more
By Wesley Wark, Special to the Sun
vancouversun.com
PJL July 2010
Wednesday, July 28, 2010
2010 Data Breach Report From Verizon Business (projo.com)
The 2010 Verizon Data Breach Investigations Report, based on a first-of-its kind collaboration with the U.S. Secret Service, has found that breaches of electronic records last year involved more insider threats, greater use of social engineering and the continued strong involvement of organized criminal groups. more
2010 Data Breach Report From Verizon Business
By Verizon Business
PJL 28th July 2010
2010 Data Breach Report From Verizon Business
By Verizon Business
PJL 28th July 2010
Tuesday, July 27, 2010
Investigation Continues Into War Memorial Damage – Rhodes NSW
Police have released CCTV images as they continue the investigation into the desecration of a war memorial at Rhodes. more
PJL 27th July 2010
PJL 27th July 2010
Monday, July 26, 2010
Radio Receiver Modifications
Lynch Investigations & Countermeasures Pty Ltd continues to use radio technology for its technical investigation work. We also keep abreast of the latest radio receiver modifications.
Onboard circuit changes or component additions can allow a radio receiver to perform additional functions.
Removing a resistor from a circuit can unblock cell phone frequencies, for monitoring use in some countries still using analogue cell phone communications.
Moving a resistor on a radio receiver onboard circuit, can change frequency bandwidth output of a radio receiver. Frequency display bandwidth is analysed using Software Defined Radio (SDR) as spectrum analysers connected to radio receivers.
Simple modifications can be completed by technically skilled persons that may not necessarily be radio engineers.
The mods dk web site is where you can learn about radio receiver modifications. There is a forum for discussion about matters of interest as well as radio receiver modifications document downloads, radio receiver manuals and picture downloads.
It's free to create an account with the mods dk web site. A user is also able to download one free radio receiver modification, every 24 hours or pay a small fee for access to all available radio receiver modification downloads.
The mods dk web site is an interesting resource where we have gained much knowledge to make low cost modifications to our high tech radio receiver equipment.
Please visit the web site link below to this helpful information for radio users.
mods dk
PJL 26th July 2010
Onboard circuit changes or component additions can allow a radio receiver to perform additional functions.
Removing a resistor from a circuit can unblock cell phone frequencies, for monitoring use in some countries still using analogue cell phone communications.
Moving a resistor on a radio receiver onboard circuit, can change frequency bandwidth output of a radio receiver. Frequency display bandwidth is analysed using Software Defined Radio (SDR) as spectrum analysers connected to radio receivers.
Simple modifications can be completed by technically skilled persons that may not necessarily be radio engineers.
The mods dk web site is where you can learn about radio receiver modifications. There is a forum for discussion about matters of interest as well as radio receiver modifications document downloads, radio receiver manuals and picture downloads.
It's free to create an account with the mods dk web site. A user is also able to download one free radio receiver modification, every 24 hours or pay a small fee for access to all available radio receiver modification downloads.
The mods dk web site is an interesting resource where we have gained much knowledge to make low cost modifications to our high tech radio receiver equipment.
Please visit the web site link below to this helpful information for radio users.
mods dk
PJL 26th July 2010
Sunday, July 25, 2010
Get Away Driver Pulls a Gun on K-Mart Loss Prevention Officer
Puyallup WA July 25 2010 Police are looking for a woman who tried to steal over $1,000 worth of items from the K-Mart on River Road and her getaway driver, who pulled a gun on a security guard as he tried to stop her. more
Private Officer News Network
PJL 25th July 2010
Private Officer News Network
PJL 25th July 2010
AOR Dealers - Lynch Investigations & Countermeasures Pty Ltd
A range of AOR products has been added to the PJL Online Store for the business Lynch Investigations & Countermeasures Pty Ltd.
Over the next few days the AOR accessories products will be added to the PJL Online Store to complete the full range of products offered by PJL Online Store for AOR.
Lynch Investigations & Countermeasures Pty Ltd just recently became AOR dealers for Australia.
If any customer is interested in a product from the PJL Online Store and would like further information, please email to peterlynch@pjlinvestigations.com.au or call Peter Lynch on +61417260650.
There may be an opportunity for us to offer you a better price on a product sale.
At the moment with the Australian dollar being volatile, a couple of cents change in the dollar can mean an increase or decrease in a product price day to day.
We will endeavor to give customers the best opportunity to purchase from us by negotiating on our best possible price where we are able to.
Please visit the AOR Radio and AOR Antenna category web page links below.
AOR Radios
AOR Antennas
PJL 25th July 2010
Over the next few days the AOR accessories products will be added to the PJL Online Store to complete the full range of products offered by PJL Online Store for AOR.
Lynch Investigations & Countermeasures Pty Ltd just recently became AOR dealers for Australia.
If any customer is interested in a product from the PJL Online Store and would like further information, please email to peterlynch@pjlinvestigations.com.au or call Peter Lynch on +61417260650.
There may be an opportunity for us to offer you a better price on a product sale.
At the moment with the Australian dollar being volatile, a couple of cents change in the dollar can mean an increase or decrease in a product price day to day.
We will endeavor to give customers the best opportunity to purchase from us by negotiating on our best possible price where we are able to.
Please visit the AOR Radio and AOR Antenna category web page links below.
AOR Radios
AOR Antennas
PJL 25th July 2010
Friday, July 23, 2010
Michigan Couple Charged With Selling GM Secrets to Chinese (abcnews.go.com)
In the latest in a flurry of industrial espionage cases, a Michigan couple has been accused of stealing $40 million worth of trade secrets from General Motors and selling them to a Chinese car maker. more
PJL 23rd July 2010
PJL 23rd July 2010
Police Arrest Head of Kosovo Central Bank (AP)
PRISTINA, Kosovo — Police in Kosovo arrested the head of the country's central bank and raided his home and office Friday, the latest in a series of investigations targeting alleged corruption in the Balkan nation. more
PJL 23rd July 2010
PJL 23rd July 2010
Thursday, July 22, 2010
Five Men Arrested Over Lurnea death – Strike Force Whiley (police.nsw.gov.au)
Detectives from the State Crime Command’s Homicide Squad, Liverpool Local Area Command and South West Metropolitan Region have this morning arrested five men over the murder of a 25-year-old man at Lurnea earlier this month. more
PJL 22nd July 2010
PJL 22nd July 2010
Wednesday, July 21, 2010
Spectrum Analysis Using Software Defined Radio (SDR)
If you were ever curious about our ability to analyse your environment for electronic eavesdropping, please have a look at some of the equipment we use.
Software Defined Radio (SDR) is state of art technology for spectrum analysis of the technological environment in this digital era.
Anybody trying to snuggle an electronic bug alongside of a transmitting FM station, should think twice if Lynch Investigations & Countermeasures Pty Ltd provides electronic bug sweep & physical inspection services for the client.
Lynch Investigations & Countermeasures Pty Ltd - TSCM Debugging Investigation Services
PJL 21st July 2010
Software Defined Radio (SDR) is state of art technology for spectrum analysis of the technological environment in this digital era.
Anybody trying to snuggle an electronic bug alongside of a transmitting FM station, should think twice if Lynch Investigations & Countermeasures Pty Ltd provides electronic bug sweep & physical inspection services for the client.
Lynch Investigations & Countermeasures Pty Ltd - TSCM Debugging Investigation Services
PJL 21st July 2010
Tuesday, July 20, 2010
Rio Arrests Not Well Thought Through by China (cnbc.com)
The arrest of Rio Tinto employees on charges of industrial espionage by China was not well thought through. Patti Wald-Meyer, Shanghai correspondent for the Financial Times & Fraser Howie, author of "Privatizing China" explain why to CNBC's Amanda Drury.
Lynch Investigations & Countermeasures Pty Ltd - TSCM Debugging Investigation Services
PJL 20th July 2010
Lynch Investigations & Countermeasures Pty Ltd - TSCM Debugging Investigation Services
PJL 20th July 2010
Pakistanis Among 20 Held In Uganda Terror Investigation (gulfnews.com)
As investigators in Uganda said they believed the attacks, which killed 76 people, were the work of suicide bombers, the cross-border police agency Interpol, released the photos of two suspects. more
PJL 20th July 2010
PJL 20th July 2010
Sunday, July 18, 2010
Reverse Telephone Search
Once again a new Australian reverse telephone search tool is available online. This reverse telephone search tool is not like many others that we have had to subscribe to in the past that have had high costs. It is free to use.
This reverse telephone search tool is particularly useful in locating people for collection purposes. It is also useful for finding missing family, friends or business contacts etc...
I have noticed with this reverse telephone search tool, a person running a search can search on a street in a suburb or a surname in a suburb or town. You just need to use the first few appropriate letters in the surname, to get to the right results page for your surname search.
Any way, I hope you get some helpful use out of the reverse telephone search tool.
Australian Reverse Telephone Search
PJL 18th July 2010
This reverse telephone search tool is particularly useful in locating people for collection purposes. It is also useful for finding missing family, friends or business contacts etc...
I have noticed with this reverse telephone search tool, a person running a search can search on a street in a suburb or a surname in a suburb or town. You just need to use the first few appropriate letters in the surname, to get to the right results page for your surname search.
Any way, I hope you get some helpful use out of the reverse telephone search tool.
Australian Reverse Telephone Search
PJL 18th July 2010
Friday, July 16, 2010
Information Technology Risk Management In Enterprise Environments
At times some very interesting free download ebooks come into my email inbox. I have one today that I would like to share with you. It's a book about Information Technology Risk Management In Enterprise Environments by Jake Kouns & Daniel Minoli.
The book is a 2010 publication. A Review of Industry Practices and a Practical Guide to Risk Management Teams.
It's well worth downloading to read the first chapter and to use as a reference as needed. Here is the web site link below, to the free download.
Information Technology Risk Management In Enterprise Environments
PJL 16th July 2010
The book is a 2010 publication. A Review of Industry Practices and a Practical Guide to Risk Management Teams.
It's well worth downloading to read the first chapter and to use as a reference as needed. Here is the web site link below, to the free download.
Information Technology Risk Management In Enterprise Environments
PJL 16th July 2010
Thursday, July 15, 2010
Covert Listening Device
Often contacts will ask us what a covert listening device looks like. It is a difficult question to answer when there are so many ways a covert listening device can be secreted into a building, motor vehicle or on the body of a person.
This short video below shows the construction and concealment methods of a covert listening device. Please take a few minutes to see how easy it is to build a covert listening device and how simple it is to secret the covert listening device into the target environment. more
PJL 15th July 2010
This short video below shows the construction and concealment methods of a covert listening device. Please take a few minutes to see how easy it is to build a covert listening device and how simple it is to secret the covert listening device into the target environment. more
PJL 15th July 2010
Wednesday, July 14, 2010
The 12th Russian Spy Worked at Microsoft (gizmodo.com)
Tuesday, July 13, 2010
Airport Janitor Allegedly Peeped On Women (abclocal.go.com)
It happened on one of the busiest days of the week at Ontario International Airport, in a place where women and girls expect privacy.
Airport police allege they discovered a cell phone set up inside a tissue dispenser in a stall to take pictures.
It was traced to Steve Aragon, a 40-year-old janitor from Chino Hills. more
PJL 13th July 2010
Airport police allege they discovered a cell phone set up inside a tissue dispenser in a stall to take pictures.
It was traced to Steve Aragon, a 40-year-old janitor from Chino Hills. more
PJL 13th July 2010
Monday, July 12, 2010
Spying At Work – Espionage, Who, How, Why, How To Stop It
When our staff is with clients at their business location, there are many occasions when a staff member of the client's business, will be identified arriving at the workplace after hours and rummaging through their colleague's office unlocked drawers & unlocked filing cabinets.
If a computer is left turned on with email programs open, a business colleague or unsupervised contractor can read or copy confidential information and pass that information on to competitors or anyone with a commercial interest.
A few tips that we would like to assure your business is aware of, are to log off computers when unattended and reduce the computer screen saver time to a minimum of 1 minute. On resume password protect the computer to disallow access to confidential computer information through spying at work.
Locating cross shredders to executive office areas is also necessary even if your business is using secure document handling services and a secure document bin.
Many people have access to confidential documentation through secure document handling services, where there are no confidentiality agreements or security in place. Paper recycling factories are one that comes to mind, where confidential documentation is exposed insecurely.
It is good practice to ensure that office drawers and filing cabinets are locked always and a secure key system is in place for those drawers and filing cabinets.
The You Tube video below provides some additional information about Industrial Espionage.
Take a minute to watch the Industrial Espionage video. It will help you to make some further informed business decisions about your businesses risk management.
Lynch Investigations & Countermeasures Pty Ltd TSCM Debugging Investigation Services
PJL 12th July 2010
If a computer is left turned on with email programs open, a business colleague or unsupervised contractor can read or copy confidential information and pass that information on to competitors or anyone with a commercial interest.
A few tips that we would like to assure your business is aware of, are to log off computers when unattended and reduce the computer screen saver time to a minimum of 1 minute. On resume password protect the computer to disallow access to confidential computer information through spying at work.
Locating cross shredders to executive office areas is also necessary even if your business is using secure document handling services and a secure document bin.
Many people have access to confidential documentation through secure document handling services, where there are no confidentiality agreements or security in place. Paper recycling factories are one that comes to mind, where confidential documentation is exposed insecurely.
It is good practice to ensure that office drawers and filing cabinets are locked always and a secure key system is in place for those drawers and filing cabinets.
The You Tube video below provides some additional information about Industrial Espionage.
Take a minute to watch the Industrial Espionage video. It will help you to make some further informed business decisions about your businesses risk management.
Lynch Investigations & Countermeasures Pty Ltd TSCM Debugging Investigation Services
PJL 12th July 2010
Friday, July 9, 2010
Spies Swapped In Vienna Are Flown To Russia & The US (bbc.co.uk)
Ten people who spied for Moscow in the US have arrived in Russia after being deported as part of the biggest spy swap since the Cold War. more
PJL 9th July 2010
PJL 9th July 2010
Google Street View Accused Of Congress Snooping (bbc.co.uk)
Google's popular Street View project may have collected personal information of members of Congress, including some involved in national security issues. more
PJL 10th July 2010
PJL 10th July 2010
Thursday, July 8, 2010
Workplace Snooping & Data Theft On The Rise
Thirty-five percent of companies believe that their organisation's sensitive information has been given to competitors, according to a new survey.
Cyber-Ark Software's "Trust, Security and Passwords" global survey also found that 37 percent of IT professionals surveyed cited former employees as the mostly likely source of this loss. more
PJL 8th July 2010
Cyber-Ark Software's "Trust, Security and Passwords" global survey also found that 37 percent of IT professionals surveyed cited former employees as the mostly likely source of this loss. more
PJL 8th July 2010
Tuesday, July 6, 2010
Walterman Implement Owner Faces Federal Charges
After an almost five-year investigation, federal authorities have charged a former Dike tractor and combine dealer and some of his employees in connection with fraudulent financing schemes. more
PJL 6th July 2010
PJL 6th July 2010
Monday, July 5, 2010
Is Someone Spying On Your Cell Phone Calls?
How suspicious spouses, protective parents, and concerned companies are turning to cheap and hard-to-detect commerical spyware apps to monitor your mobile communications. more
PJL 5th July 2010
PJL 5th July 2010
Sunday, July 4, 2010
Thursday, July 1, 2010
Subscribe to:
Posts (Atom)