Sunday, June 27, 2010

Private Snoops Use Law-Enforcement Technology To Bug Meetings, Spy on Spouses and Steal Company Secrets

First-Ever Online Counter-Surveillance Seminar Series Explains How To Safeguard Your Personal And Business Privacy

"you could be victimized by the same technology used by law enforcement and secret agents"

Clay Center, NE (PRWEB) June 28, 2010 -- Spying conjures up images of sexy secret agents like James Bond executing daring undercover maneuvers in distant lands. But spying is not just for real (or fictional) spies anymore. And whether you run a large business or a small family household, you could be victimized by the very same surveillance technology that is used by law enforcement to catch the bad guys or by real spies to steal business and government secrets.

An astounding array of sophisticated espionage gear is now marketed to the general public as if it were just another consumer electronics product. These small, powerful devices include room bugs, telephone taps, vehicle trackers, keyloggers, hidden cameras, and spy software that can be installed on your computer, cell phone or PDA. “A downturn in the global economy creates more adversarial situations including job insecurity, financial difficulties, divorces or business partnership dissolutions,” says countersurveillance expert, Norbert Zaenglein, “and these are precisely the type of situations where individuals will resort to any means, including spying, in order to gain private insights, useful evidence or competitive advantages.”

Electronic spying is among a growing list of security concerns that have evolved in step with our data-driven society. Intentional spying and unintentional data leakage raise substantial privacy concerns and create significant liability issues for business professionals including doctors, lawyers and business executives. Personal computers, laptops, office copiers and digital storage media, for example, often retain confidential client, patient or business information which, upon the disposition of the asset, is transferred to complete strangers. Even secured WiFi access points are not impervious to attack by a determined hacker. “Business owners and managers have no concept of just how much of their information is at risk or has already fallen into the hands of strangers”, Zaenglein warned. But it is not just businesses that are at risk. Home computers and laptops can retain not only complete documents but also a history of Internet activity, chat transcripts and text messages. Even using the browser’s history deletion feature does little to prevent subsequent recovery of Internet activity.

Embassy employees, government officials and military personnel undergo special training to protect sensitive and restricted information. Even though civilians now face similar threats, there has not, until now, been a convenient civilian counterpart of the TSCM awareness training given to public-sector employees.

TSCM 101 (Technical Surveillance Counter Measures) is practical new online course developed by Norbert Zaenglein, author of the Covert Bug Book. The two-month Internet-based program prepares business executives, attorneys, elected officials, government employees, corporate security staff and private citizens to better understand modern privacy threats and develop effective countermeasures that will establish a robust privacy profile be it at home or at the office. "TSCM 101 can be taken from anywhere in the world." said program developer, Norbert Zaenglein. "There are no travel costs or days away from the office and that makes this indispensable security course not only practical, but also convenient and affordable."

The first TSCM 101 program will run from August 4th – September 29, 2010. Class meets online every Wednesday from 2:00 pm – 3:00 pm Central US Time Zone. Individuals interested in attending may visit or email

See Also:

[Via Legal / Law]

tadalafil without prescription | online pharmacy without prescription

No comments: