A number of suspicious women in the Gulf state of Qatar are spying on their husbands by using readily available hi-tech devices.
The women are trapping their husbands by handing spy devices, like miniature cameras fitted in pens and cigarette lighters, as gifts, The Peninsula newspaper reported.
Some wives who are not able to make their husbands accept such gifts slyly place the devices in their cars, the report said.
The paper said that it interviewed “a number of women who said their friends or colleagues admitted to spying or having spied on their husbands as they suspected they were cheating on them.” (more) (eBay Spy Central) (sing-a-long)
One cannot overstate the importance of Thursday night’s Delta 4-Heavy launch from Cape Canaveral to national security, a mission by the massive rocket that will deploy “the largest satellite in the world” to hear the whispers of evil…
The clandestine payload going up this time, known only by its launch identification number of
NROL-32, is widely believed to be an essential eavesdropping spacecraft that requires the powerful lift provided by the Delta 4-Heavy to reach its listening post…
…this new spacecraft supposedly will unfurl an extremely lightweight but
gigantically huge umbrella-like antenna to overhear enemy communications and aid U.S. intelligence.
(
more)
via windowsitpro.com
Q. I’m a boss who tricked my workers into adding me as Xbox Live friends. How can I spy on them when they’re “working” from home to make sure they’re not playing Xbox?
A. One of the great features of the Xbox and its online service is the integration with the xbox.com website. It lets you easily see all your Xbox friends. It can be abused by mean bosses to quickly, in table form, see the last time the friends were on XBOX and what they were doing.
Just perform the following:
Go to www.xbox.com and select “Sign In” in the top right of the xbox.com site.
• Sign in with the Live ID associated with your XBox Live ID.
• Click on your own profile.
• Select View All Friends under Friends.
You can see who’s online, who’s offline, when they were last online, and what everyone is or was doing. (more)
Here at Kevin’s Security Scrapbook I have been watching the development of drones for years. These are my two personal favorites: Do It Yourself Sky Spies – The Draganflyer and
“MAV” The Scariest SiFi Movie You’ll See this Year.
If you followed the Scrapbook, you already knew where this is going.
Time for an official FutureWatch prediction… Private Investigators will start selling off all the old TSCM gadgets they bought which never turned a profit to invest in a drone. Although the applications will be limited (by practicality and law), drones will offer solutions to previously unsolvable problems.
Early adopters will easily recoup their investments and turn a profit via rental of the drone for special assignments, and/or selling the photos/video at a premium price. In fact, having a drone should bring in previously unattainable assignments.
P.S.
This is a window of opportunity. It may take up to ten years for new laws (and FAA regulations) protecting public safety and privacy to catch up.
…via The Wall Street Journal…
Personal drones aren’t yet plying U.S. flyways. But an arms race is building among people looking to track celebrities, unfaithful lovers or even wildlife. Some organizations would like them for emergency operations in areas hit by natural disasters. Several efforts to develop personal drones are scheduled for completion in the next year.
“If the Israelis can use them to find terrorists, certainly a husband is going to be able to track a wife who goes out at 11 o’clock at night and follow her,” said New York divorce lawyer Raoul Felder. (more)
|
The AR.Drone, an iPhone-controlled helicopter powered by four separate blades |
Can’t wait?
Check out what’s available now!
A.R. Drone (specs) (video)
AERYON Labs (specs) (video)
And many more.
I give spy coins to my clients.It is a reminder that information loss is mostly a people problem, not an electronic problem. Filing cabinets of information can walk out the door in pocket change!
Careless people often blab information, forget to secure it, toss it in the garbage can, or otherwise lose it—hundreds of laptops are lost every day. People also steal it when they become greedy, spiteful, conned, blackmailed, or caught up in a “cause.”
Investigating an information loss, however, begins with an electronic surveillance detection audit.
Here’s why…
• Serious espionage will include electronic surveillance.
• The possibility must be resolved before accusing people.
• Bugging is the easiest spy technique to discover.
• Electronic surveillance evidence helps prove your case.
Best advice… Conduct audits on a regular basis. Uncover signs of espionage during the intelligence collection stage, before your information can be abused. (more)
A client reports back…
“I think of all of the trinket type things we’ve accumulated over the years, the spy coin is *by far* the coolest, and is made even cooler with the background story provided on the chip!!
I took mine with me to the FBI building today and had the guards there X-ray it along-side of a normal quarter to see if its secret contents could be seen on an “airport quality” X ray machine. They printed out a copy of the scan image, I’ve attached it to this email for your amusement as well.
Several agents commented on how well it was made, and how hard it would be to detect such a thing.“