Saturday, November 29, 2008

X-ray Vision Camera Lens


Xray vision is now a reality! This specially-designed X-ray filter turns an ordinary video camera into a super-stealthy X-ray vision camera. It sees right through clothes, dark windows and sunglasses as if they weren't even there!

This technology has been adapted and marketed to make real xray cameras, x-ray vision, and x-ray infrared pass filters. Unlike the Xray glasses you probably saw advertised in the back of comic books when you were a kid, this technology really does see through many types of clothing. The filter is ideal for law enforcement officers, and security and surveillance personnel.

The theory behind how it works is really simple. Many types of clothing allow light and infrared light to pass through the fabric. This light is reflected back through the clothing, off the skin, to our naked eyes. What we normally see is both the reflected normal light mixed with the Infrared light. The lens filters the normal light out, leaving only the Infrared light and some other ambient light waves. The result...the clothing (and many other materials) become as clear as glass.

YIKES! better get out the Reynolds Wrap and wrap up!

More...

Wednesday, November 26, 2008

Nowell Releases Counter-Espionage Security Software To Defeat Insider Espionage and Identity Theft


Shalom is a security solution that prevents Insider Threats, Internal Fraud and Data Leakage by identifying suspicious and potentially risky behavior inside the business computing environment. It works by detecting and authenticating suspicious insiders exhibiting anomalous behavior via artificial intelligence.

Suspicious behavior is the key indicator of insider threats, internal fraud, and data leakage. Shalom identifies suspicious behavior and quickly reports, then questions the suspicious user for authentication.

If the suspect fails the authentication, this indicates an impostor, so Shalom denies network access to the intruder immediately. On the other hand, if the user passes, Shalom grants them access, but still reports the suspicious activity.

Shalom also generates detailed reports for information security administrators to review later. Reports can be used to resolve security incidents and audit information systems. With Shalom, suspicious internals are identified and intruders denied access. Via Shalom, insider threats, internal fraud and identity theft is better prevented.


More...

Thursday, November 20, 2008

Encrypted Business Hard Drives


Lenovo has introduced their ThinkPad USB Portable Secure Hard Drive nicknamed "The Vault", to give us a new and secure way to protect data. Allowing users to to type in their passcode to access their data, this secure hard drive uses 128-bit advanced encryption. The Vault USB Portable Secure Hard Drive features full-disk encryption for up to ten unique user IDs and one administrator. Lenovo will offer the ThinkPad USB Portable Secure Hard Drives in 160GB and 320GB capacity starting in mid-November for $179 and $219 respectively. Less than an inch thick and smaller than a 3 x 5 index card.

"Guard Your Secrets Because They Are Eagerly Sought".

Wednesday, November 19, 2008

Mind Molester - Electronic Harassment Device



The "Mind Molester" is an instrument of creative electronic harassment. The manufacturer Shomer-Tec, touts it as "an electronic audio device that can drive your victims nuts trying to figure out what it is and where it's at". You can drive somebody crazy in their own house or disrupt an entire office. It produces a very short but powerful 90dB 4.5 KHz sound burst. It features completely random intervals between activations; they'll vary from 4 to 25 minutes, making them non-predictable and even more maddening! Due to the duration, frequency, and sound characteristics, it's a very difficult, time-consuming, and frustrating task to locate the unit. And even if found, they'll have no idea what it is.

Definitely a nasty little device to be on the lookout for!

Monday, November 17, 2008

C-Watch. Bluetooth enabled cell phone watch

Dual Sim Card Support. Carry two cellular phone numbers on your watch. Blue tooth Enabled for headsets, remotes, and data transfer.1.3 MP Digital Camera,Handwriting Functionality, MP3 Player Video Recorder Audio / Video Player Organizer, File Manager Shortcut Keys and Quick Links,Integrated stylus,Added Accessories,Data connect via USB, Micro SD, or Blue tooth. 250Kb Base storage on watch, Micro SD Card Slot, 1GB Micro SD Card Included.

Dick Tracy would be impressed! More here...

TrackingTheWorld Designs G.P.S Letter Logger


When housed in a standard number 10 business envelope, the G.P.S. Letter Logger flows through mail sorting and delivery systems as unnoticed as any typical piece of mail, all the while gathering and reporting important logistical information that allows the Postal Service to analyze the efficiency of its systems. “If the G.P.S. Letter Logger records extended down time in a particular location, that lets the inspector know that there is a potential problem.

The driving forces behind G.P.S. Letter Logger are the combined functions of a powerful and highly efficient microprocessor developed by Texas Instruments and a low-power consumption uBlox ANTARIS 4 GPS module. “The minimal power requirements of both of these components were key to the successful implementation of the G.P.S. Letter Logger.

Merely a quarter of an inch thick, and with the surface area of a tri-folded sheet of paper, the G.P.S. Letter Logger technologically exceeds the capabilities of a similar Siemens product in that the user can adjust the G.P.S. Letter Logger’s GPS reporting frequencies. “G.P.S. Letter Logger’s reporting is fully customizable. Users can choose to receive reports every 2, 5 or 10 minutes or select tilt mode which reports only when a tilting movement is detected.

G.P.S. Letter Logger will operate up to 20 hours in a pre-determined timed configuration or up to two weeks in tilt mode using a slim 1100mAh battery.

More...

Friday, November 14, 2008

Private eyes committed for trial



A trio accused of defrauding a Sunshine Coast woman out of money to conduct a bug sweep of her house have been committed for trial at a later date in the Maroochydore Magistrates court.

It is alleged that the two female private investigators and a son of one of them used the fact that the 55-year-old woman believed her house was bugged to convince her to pay $85 per hour for the bug sweep by producing a fake listening device to confirm her suspicions.

Noosa Heads’ Kathleen Joan Kitchner, 53, and Lake Cooroibah’s Corinne Martell, 46, ran a private investigation business called Private Eyes 007. They have been charged with entering a home to commit an offence, and fraud by dishonestly obtaining a sum of money

Ms Martell was also charged with attempted fraud. Her son, Shane Martell of Ringtail Creek, was charged with entering the dwelling and fraud.

Police allege the 24-year-old climbed into the roof of the Highview Avenue home to produce the fake listening device.

More…

Saturday, November 8, 2008

Combating Corporate and Industrial Espionage

Corporate espionage or industrial espionage is the act of illegal intelligence collection from a corporation, small business entity, executives, etc. Illegal intelligence collection methods can range from computer hacking, theft, intimidation, personnel impersonations, and last but not least...Electronic Eavesdropping or "bugging".

What intelligence are they collecting?
  • Intellectual property Intel
  • Patents Pending Intel
  • Pricing structures Intel
  • Customer Intel
  • Research and development Intel
  • Market Intel, etc.

How much spying actually happens in the real world?

What is interesting to note is that Corporate, Economic & Industrial Espionage is a multi billion dollar underground industry involving manufacture, sales, installation and monitoring with illegal electronic surveillance devices. This is according to current government estimates and is actually the tip of the iceberg. Click here to review the 2002 Report to Congress on Economic & Industrial Espionage 2002 was the last year that the U.S.Government even attempted to put a number on the combined costs of foreign and domestic economic espionage, including the theft of intellectual property.

"Calculating US losses from the technology outflow is difficult. Private estimates put the combined costs of foreign and domestic economic espionage, including the theft of intellectual property, as high as $300 billion per year and rising" (page vii key findings, 2002 Report to Congress on Economic & Industrial Espionage).

"There is every indication that efforts to acquire US economic and industrial secrets will only intensify and become more sophisticated over the next few years. US research and development programs ensure that state-of-the-art technology will continue to originate in the United States, and the openness of US society will make that technology a ready target to foreign countries
and companies".

If you don't have a Technical Surveillance Countermeasures (TSCM) program in place, contact ComSec LLc in Virginia Beach, Virginia today at Ph: 757-615-7053 or Secure Ph/Fax: 866-535-0031, or visit us on the web @ www.ComSecLLc.com . Click on the Secure Contact Link for a quote on TSCM-Bug Sweep services for your executive office or facility using a telephone or computer away from your area of concern.

*Please "DO NOT" contact us from any suspect room, phone or computer*

Stay Tuned...