Firesheep Makes Stealing Your Wi-Fi Secrets Easy
11/5/10 – UPDATE: 10 Ways to Protect Yourself from Firesheep Attacks (more)
By on 28/10/2010
11/5/10 – UPDATE: 10 Ways to Protect Yourself from Firesheep Attacks (more)
By on 28/10/2010
Careless people often blab information, forget to secure it, toss it in the garbage can, or otherwise lose it—hundreds of laptops are lost every day. People also steal it when they become greedy, spiteful, conned, blackmailed, or caught up in a “cause.”
Investigating an information loss, however, begins with an electronic surveillance detection audit.
Here’s why…
• Serious espionage will include electronic surveillance.
• The possibility must be resolved before accusing people.
• Bugging is the easiest spy technique to discover.
• Electronic surveillance evidence helps prove your case.
Best advice… Conduct audits on a regular basis. Uncover signs of espionage during the intelligence collection stage, before your information can be abused. (more)
Several agents commented on how well it was made, and how hard it would be to detect such a thing.“
By on 28/10/2010
“300” writer Michael Gordon has sold a spooky surveillance project to NBC. The idea was spawned by the controversial U.S electronic eavesdropping apparatus ECHELON, a program that supposedly captures virtually all data signals for analysis at a central hub in West Virginia.
These millions of video, audio and data files are then disseminated to various federal and local law enforcement agencies for further investigation.
Now here’s the twist from the show’s logline: “There is, however, less than 1% of the data that nobody wants to touch. These are the classified video files that seem to have captured the unexplainable.”
The show will center on a fictional team called G.H.O.S.T. (Global Hierarchical Observation Strategy Taskforce) whose assignment it is to investigate this paranormal data. (more)
By on 09/10/2010