Category Archives: Privacy

“With new technology, you can watch everyone in your home, from the nanny to the pet sitter. But should you?”

” You have two choices: You can bury your head in the sand and hope for the best, or be proactive and get yourself some eyes on the scene. ” – Perry Myers, President of the U-Spy.

A thought provoking piece written by Jennifer Graham from deseret news discussing personal surveillance in your home. Perry Myers, president of U-Spy, was asked to speak on the topic as well! Give it a read, you don’t want to miss out!

https://www.deseretnews.com/article/900060170/with-new-technology-you-can-watch-everyone-in-your-home-from-the-nanny-to-the-pet-sitter-but-should-you-alarm-clock-a-necktie-sunglasses-emoji-security-spy-recordings.html

 

 

What Counter Surveillance device should I choose??

There are many types of Counter Surveillance devices on the market and it might be difficult to choose which unit will work for you. Please see the video below explaining the different types of Counter Surveillance devices and what they are used for. Hopefully this will help you choose what device or devices will work for your specific situation!

For more videos please visit our YouTube channel.

How to tell if you are being bugged

rfld-wireless-camera-detector-5.gif

There are a lot of different recording devices available for consumer purchase these days. Hidden Surveillance cameras can range in looks from your everyday household objects like a clock radios all the way to objects that are not so covert.

Continue reading

Child Pornography Investigation Stems from Alert Customer

Tanning salon owner Joseph Layland was a friend to many of his customers until  charged with using a hidden camera to record customers in the Malden, Missouri tanning spot. Formerly “DJ’s Tan and Tone” has closed while the owner waits for trial in jail and police investigate.

Local TV site KFVS reported that police officials seized approximately 500 DVDs and videos, 18-hours of surveillance footage, and two computer hard drives as evidence in what is likely to be the Show Me State’s largest pornography crime. Continue reading

Chicago’s Highway Surveillance System

The Chicago Police Department, and retiring Mayor Daley, want to take Chicago’s surveillance system to the highway. The ambitious plan, announced earlier this year, is to install some 200 cameras along interstate highways between Chicago and Mexico. The camera’s function is to take pictures of license plates and cross-reference them to known images of smuggler, drug traffickers, and gun runners. Continue reading

Hidden Camera Exposes Illegal Dentists

Going to the dentist isn’t something that we usually scrutinize to ensure our chosen practitioner has the necessary schooling and degrees that prove he’s a dentist. Usually, we opt for doctors or dentists who are recommended by our social circle, or, more likely, the ones covered by an insurance plan. Usually, the expectation is that they’re qualified; after all, masquerading as a dentist wouldn’t be the easiest scam to perpetrate.

In San Antonio, WOAI-TV News 4 recently published a news story by Jaie Avila using a hidden camera that might be surprising… Continue reading

Radio Frequency Identification

Radio-frequency identification (RFID) is the use of an object (called an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio fequencies.

RFID is utilized for open-road tolling, making payments using mobile phones,

The US government utilizes RFID for traffic management, and companies use the technology to keep track of expensive equipment, essentially initiating a surveillance program for inventory.  RFID’s future is currently not known due to privacy regulations that may keep many of the applications from moving forward.

A Westport, CT company–SecureRF–is currently examining applications to use RFID chips to keep track of children via student ID cards using radio frequencies much similar to GPS (although very different technologies).

Continue reading

Video Voyeur Captures Himself On Camera…

A 54-year-old Marion County, Florida man was arrested after a tip led authorities to a hidden camera containing over 300 images of people using his bathroom, officials claimed on Monday.

Edward John Phillips, age 54, of Reddick, FL, faces two counts of voyeurism using a video camera; one of the counts is juvenile voyeurism due to images that depict a person under the age of sixteen. Police claim that Phillips used a video game camera that is designed to take pictures when movement is detected. The camera was hidden inside a bathroom closet facing the toilet. Continue reading

Copyright Office Unleashes iPhone; Legalizes Jailbreaking

The U.S. Copyright Office announced that jailbreaking (software modifications that liberate iPhones and other handsets to run applications from sources other than those approved by the phone maker) the iPhone, and basically any Apple O/S, is legal. The decision stems from a request by the Electronic Frontier Foundation (EFF) and the new ruling rewrites the Digital Millennium Copyright Act (DMCA). Continue reading

Hotels Top Identity Theft List

Identity theft is the new watchword; hackers, thieves and criminals are continually discovering new methods to twist technology in an effort to steal personal information. Social media networks, cell phones, discarded utility bills and outright theft of personal property are all means employed by thieves to hijack your personal information.

Trustwave, a security and compliance company, provides security information services and end-to-end solutions for businesses in an effort to protect confidential information systems. A recent report shows that hotels are now the top source for credit card data theft, surpassing restaurants for the top spot; nearly 40% of all personal data in 2009 came from hotels/motels compared to just 13% of thefts from restaurants.

Hackers target hotel/motel booking and reservation centers due to the high-number of credit card numbers these entities keep “on-file.” Like the Internet, once a credit card is in the system, it’s available. A successful hacker can steal thousands of credit card numbers and, in essence, thousands–or millions–of dollars. Credit card numbers are used for numerous hotel services, such as bars, beaches, golf courses, swimming pools, gift shops, spas, and other recreational areas; however, they’re all processed through one main database.

Since hotels use proprietary systems, they’re easy for hackers to exploit: a computer system at one hotel is similar, if not exactly the same, as the computer system at a competing hotel.

The other unavoidable fact of hotels and motels are the number of employees who have access to the computer system and your personal data. According to an ABC News Report; “You have so many different employees going through the system that it allows them to either skim cards or put in malware that lets the bad guys hack into the system.”

In June 2010, Destination Hotels & Resorts had its computer system hacked and the credit card data of more than 700 guests from across the country was stolen; in January, Wyndham reported that their computer systems were breached and hackers accessed information from 31 hotels between November 2009 and January 2o1o. They never reported how many cards were compromised.

Credit card companies usually don’t require consumers to pay for unauthorized charges, but credit card users must report the theft in a timely manner to ensure their identity remains safe; the best method to is to check statements regularly and keep tabs on credit reports.