>From - Sat Mar 02 00:57:16 2024
Received: by 10.36.135.4 with SMTP id i4mr8874863nzd.1164053375132;
Mon, 20 Nov 2006 12:09:35 -0800 (PST)
Return-Path: <kon..._at_phreaker.net>
Received: from smtp-out.hotpop.com (smtp-out.hotpop.com [38.113.3.61])
by mx.google.com with ESMTP id h49si2433677nzf.2006.11.20.12.09.34;
Mon, 20 Nov 2006 12:09:35 -0800 (PST)
Received-SPF: neutral (google.com: 38.113.3.61 is neither permitted nor denied by best guess record for domain of kon..._at_phreaker.net)
Received: from phreaker.net (kubrick.hotpop.com [38.113.3.105])
by smtp-out.hotpop.com (Postfix) with SMTP id 1D8F5626B78C
for <TSCM-..._at_googlegroups.com>; Mon, 20 Nov 2006 20:09:26 +0000 (UTC)
Received: from router_4.phreaker.net (niagara-cuda1-24-52-121-144.kntnny.adelphia.net [24.52.121.144])
by smtp-1.hotpop.com (Postfix) with ESMTP id 1BEC914829A
for <TSCM-..._at_googlegroups.com>; Mon, 20 Nov 2006 20:09:24 +0000 (UTC)
Message-Id: <7.0.1.0.2.20061120150807.05df1248_at_macronet.net>
X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0
Date: Mon, 20 Nov 2006 15:09:29 -0500
To: TSCM-L2006_at_googlegroups.com
From: kondrak <kon..._at_phreaker.net>
Subject: Fwd: [ISN] Bosses get into 007 gadgets
Mime-Version: 1.0
Content-Type: multipart/alternative;
boundary="=====================_60049734==.ALT"
X-HotPOP: -----------------------------------------------
Sent By HotPOP.com FREE Email
Get your FREE POP email at www.HotPOP.com
-----------------------------------------------
--=====================_60049734==.ALT
Content-Type: text/plain; charset="us-ascii"; format=flowed
Thought you folks would enjoy this.
>http://news.com.com/Bosses+get+into+007+gadgets/2100-1029_3-6136615.html
>
>By Steve Ranger
>Special to CNET News.com
>November 17, 2006
>
>It's not just James Bond who gets to play with all the cool gadgets.
>More and more business executives are investing in secret agent-style
>hardware to make sure their top-secret company plans stay under wraps.
>
>Bug-detectors disguised as fountain pens, keyboards that can secretly
>record everything typed on them, and clock radios with hidden
>cameras--devices once only of interest to spies--are now being bought by
>company chiefs who fear they are being spied on.
>
>"The majority of the customers are buying countersurveillance
>equipment," said Julia Adams, director of surveillance gadget store
>Spymaster. "The majority are concerned with what is being leaked. They
>want to make sure they aren't being bugged and that the competition
>isn't listening."
>
>Some executives carry pocket-size bug detectors when they are in
>meetings, on their own premises or elsewhere, that vibrate if they pick
>up on eavesdropping equipment.
>
>Adams said that people usually pay the Spymaster store a visit because
>they have a feeling that something is not quite right and, as she points
>out, "more often than not that feeling is correct." Once they have
>equipped themselves with countersurveillance gadgets, executives often
>come back and stock up on surveillance devices, so that they can then
>find out which staff member in their office has been leaking
>information.
>
>Business chiefs may well be right to watch their backs. According to a
>survey of 2,000 office workers commissioned by Samsung Electronics, 57
>percent of respondents said they have found and read confidential
>information on a printer, and 21 percent admit to having read
>confidential information on a colleague's monitor.
>
>And it's not just staff leaking company secrets to rivals that bosses
>have to watch out for. With the Cold War long over, corporate espionage
>has been heating up.
>
>According to MI5, as the U.K.'s national security service is commonly
>known, foreign intelligence services are now targeting commercial
>enterprises "far more than in the past," in an attempt to get their
>hands on communications technologies, IT, lasers, optics and
>electronics, to name just a few targets.
>
>At least 20 foreign intelligence services are operating to some degree
>against U.K. interests, MI5 warns, trying to get secrets from people by
>exploiting technology such as communications and computer systems. This
>means as well as buying countersurveillance gadgets to protect
>themselves, companies need to make sure their computer systems aren't
>coming under attack.
>
>MI5 has a list with IT security advice on its Web site. It warns that
>electronic attacks may come from a range of sources: criminals, foreign
>intelligence services, lone hackers or terrorists. Companies should
>conduct a risk assessment to establish whether they are at particular
>risk of an electronic attack, it warns. Indeed, its sister agency, MI6,
>recently advertised for techies to help keep its own networks secure.
>
>Other recommendations include:
>
>* Buy IT gear from reputable manufacturers and suppliers.
>
>* Ensure that software is as up-to-date as possible. Consider checking
> for patches and updates at least weekly.
>
>* Ensure that Internet-connected computers are equipped with antivirus
> software.
>
>* Always ensure that your information is regularly backed-up.
>
>* Try to ensure that those who maintain, operate and guard your systems
> are reliable and honest.
>
>* Seek regular security advice from system and service providers and
> make sure you act upon it. Pre-empt attacks instead of waiting for
> them.
>
>* If there are particular categories of material you wish to protect,
> you could consider encryption.
>
>* Take basic security precautions in order to prevent software or other
> information from falling into the wrong hands. Implement a program of
> security awareness among your staff. Train them not to leave sensitive
> material lying around and to operate a clear-desk policy.
>
>* Invest in security cabinets and fit locking doors.
>
>* Ensure the proper destruction of confidential material.
>
>Steve Ranger reported for Silicon.com from London.
--=====================_60049734==.ALT
Content-Type: text/html; charset="us-ascii"
<html>
<body>
<font size=3>Thought you folks would enjoy this.<br><br>
<br><br>
<blockquote type=cite class=cite cite="">
<a href="
http://news.com.com/Bosses+get+into+007+gadgets/2100-1029_3-6136615.html" eudora="autourl">
http://news.com.com/Bosses+get+into+007+gadgets/2100-1029_3-6136615.html</a>
<br><br>
By Steve Ranger<br>
Special to CNET News.com<br>
November 17, 2006<br><br>
It's not just James Bond who gets to play with all the cool gadgets.
<br>
More and more business executives are investing in secret agent-style
<br>
hardware to make sure their top-secret company plans stay under
wraps.<br><br>
Bug-detectors disguised as fountain pens, keyboards that can secretly
<br>
record everything typed on them, and clock radios with hidden <br>
cameras--devices once only of interest to spies--are now being bought by
<br>
company chiefs who fear they are being spied on.<br><br>
"The majority of the customers are buying countersurveillance <br>
equipment," said Julia Adams, director of surveillance gadget store
<br>
Spymaster. "The majority are concerned with what is being leaked.
They <br>
want to make sure they aren't being bugged and that the competition <br>
isn't listening."<br><br>
Some executives carry pocket-size bug detectors when they are in <br>
meetings, on their own premises or elsewhere, that vibrate if they pick
<br>
up on eavesdropping equipment.<br><br>
Adams said that people usually pay the Spymaster store a visit because
<br>
they have a feeling that something is not quite right and, as she points
<br>
out, "more often than not that feeling is correct." Once they
have <br>
equipped themselves with countersurveillance gadgets, executives often
<br>
come back and stock up on surveillance devices, so that they can then
<br>
find out which staff member in their office has been leaking <br>
information.<br><br>
Business chiefs may well be right to watch their backs. According to a
<br>
survey of 2,000 office workers commissioned by Samsung Electronics, 57
<br>
percent of respondents said they have found and read confidential <br>
information on a printer, and 21 percent admit to having read <br>
confidential information on a colleague's monitor.<br><br>
And it's not just staff leaking company secrets to rivals that bosses
<br>
have to watch out for. With the Cold War long over, corporate espionage
<br>
has been heating up.<br><br>
According to MI5, as the U.K.'s national security service is commonly
<br>
known, foreign intelligence services are now targeting commercial <br>
enterprises "far more than in the past," in an attempt to get
their <br>
hands on communications technologies, IT, lasers, optics and <br>
electronics, to name just a few targets.<br><br>
At least 20 foreign intelligence services are operating to some degree
<br>
against U.K. interests, MI5 warns, trying to get secrets from people by
<br>
exploiting technology such as communications and computer systems. This
<br>
means as well as buying countersurveillance gadgets to protect <br>
themselves, companies need to make sure their computer systems aren't
<br>
coming under attack.<br><br>
MI5 has a list with IT security advice on its Web site. It warns that
<br>
electronic attacks may come from a range of sources: criminals, foreign
<br>
intelligence services, lone hackers or terrorists. Companies should <br>
conduct a risk assessment to establish whether they are at particular
<br>
risk of an electronic attack, it warns. Indeed, its sister agency, MI6,
<br>
recently advertised for techies to help keep its own networks
secure.<br><br>
Other recommendations include:<br><br>
* Buy IT gear from reputable manufacturers and suppliers.<br><br>
* Ensure that software is as up-to-date as possible. Consider checking
<br>
for patches and updates at least weekly.<br><br>
* Ensure that Internet-connected computers are equipped with antivirus
<br>
software.<br><br>
* Always ensure that your information is regularly backed-up.<br><br>
* Try to ensure that those who maintain, operate and guard your systems
<br>
are reliable and honest.<br><br>
* Seek regular security advice from system and service providers and
<br>
make sure you act upon it. Pre-empt attacks instead of waiting for
<br>
them.<br><br>
* If there are particular categories of material you wish to protect,
<br>
you could consider encryption.<br><br>
* Take basic security precautions in order to prevent software or other
<br>
information from falling into the wrong hands. Implement a program
of <br>
security awareness among your staff. Train them not to leave
sensitive <br>
material lying around and to operate a clear-desk policy.<br><br>
* Invest in security cabinets and fit locking doors.<br><br>
* Ensure the proper destruction of confidential material.<br><br>
Steve Ranger reported for Silicon.com from
London.</font></blockquote></body>
</html>
--=====================_60049734==.ALT--
Received on Sat Mar 02 2024 - 00:57:16 CST