Tuesday, June 26, 2007

Chicago Alderman's Father Released, Placed Under Electronic Surveillance

Chicago Alderman's Father Released, Placed Under Electronic Surveillance - Associated Content: "According to the article, Elias Munoz was operating a discount mall photo studio on the Southwest Side of Chicago, in a predominantly Hispanic neighborhood. This news comes after a federal raid in April after a years-long investigation into suspected criminal activity in producing illegal IDs, stolen Social Security numbers and fake drivers licenses that included other states such as Michigan, Wisconsin, New York and Iowa.

The judge entrusted to this case has set a bond of $50,000. Elias Munoz must wear an electronic surveillance device. He will be allowed to continue to operate his business but must travel only between his daughter's home where he will be required to stay and his shop. He will be allowed to attend his grandson's high school graduation."

Surveillance Video Released In Taser Death Case

KSBI-TV - Home - Surveillance Video Released In Taser Death Case: "We now know what happened in the moments leading up to a woman's death outside the City Rescue Mission. Thirty-five-year-old Malisha Thompson was staying at the Rescue Mission, said to be recovering from drug addiction. Thompson died, May 19, shortly after being tasered by police. On Thursday, Police released surveillance video from the incident.

Officers were responding to a possible drug deal taking place across from the City Rescue Mission. The officers began putting the numerous suspects on the ground.

Bill Citty, Oklahoma City Police Department Chief of Police, says, 'You'd like to think officers are out there and just prepared for everything, but believe me, officers get a shock at times as other people do.'"

Wednesday, June 20, 2007

Telephone Surveillance and Bugging - Is it Legal?

Investigation News - Telephone Surveillance and Bugging - Is it Legal? - PInow.com Investigator Directory: "Recording conversations or listening in to telephone conversations using wiretap is strictly controlled by laws. Understanding how these laws work protects everyone’s privacy and can help prevent needless lawsuits.

Telephone bugging, telephone surveillance, wiretapping: these are just a few names for what is essentially the same thing — listening into someone else’s conversation or recording it for later use. While there are many instances of people whose telephones are illegally tapped, placing a bug on a phone must be authorized by a search warrant or court order. While there are plenty of legitimate reasons to want to listen to someone’s telephone conversation, knowing what the laws are surrounding private conversations is important for anyone who wants to avoid messy lawsuit.

According to the Administrative Office of the United States Courts, 1,773 wiretap orders were issued by courts in 2005 alone. Obviously, it is much harder to get accurate statistics on illegal telephone surveillance, although it does occur."

What is telephone surveillance?

Computer Surveillance - What Does it Offer?

Investigation News - Computer Surveillance - What Does it Offer? - PInow.com Investigator Directory: "Computer monitoring software can uncover exactly what computer users are doing online. Anyone interested in installing this type of software, though, needs to select the program carefully.

According to a 2001 American Management Association survey, 77.7% of major U.S. companies used computer surveillance to check employee e-mail, Internet use, phone calls, computer use, and files. Some companies even used computer surveillance to videotape workers. The reason is not hard to see: According to IDC Research, 30 to 40% of Internet use during work hours is for personal use. Employers are concerned that they are losing worker productivity, thanks to employees who use work hours to surf the Internet and to send personal email. Employers are also concerned that workers who use company computers to commit fraud crimes, or use the system to send sexually explicit materials may embroil the company in a lawsuit.

It’s not just employers who are concerned, either. Parents and spouses are worried as well. According to a US Congressional Study submitted on June 8, 2000, more than 20% of children have been solicited for sex online. According to the 1999 Greenfield and Rivet Internet Use and Abuse Survey 1999, 57% of Internet users use their Internet connection to flirt. The high proliferation of online dating sites – some catering specifically to married people looking for “discreet” affairs – also gives many couples pause. Computer monitoring allows anyone who is worried about an unfaithful partner, an ineffective employee, or a child at risk to monitor computer use for signs of trouble."

What is computer surveillance?

Electronic Surveillance — How is it affecting your Life?

Investigation News - Electronic Surveillance — How is it affecting your Life? - PInow.com Investigator Directory: "Electronic surveillance in its many forms is everywhere today, potentially creating greater safety for the public and for companies. Knowing how and where to use this type of surveillance can help individuals and companies make the right security decisions.

While plenty of people are aware of the fact that there are video cameras monitoring them inside of stores and banks, few people give much thought to the role that electronic surveillance plays in everyday life. However, there’s no doubt that e-surveillance has proliferated in recent years, with the federal government making moves to monitor more correspondence and personal information exchange in the private sector, and more companies seeking added steps to protect against fraud and theft.

In 2003, Enron executives certainly had their lives affected by electronic surveillance. In that year, the U.S. Federal Energy Regulatory Commission posted e-mail from Enron on its website. Outside surveillance does not always have to be that dramatic, either. Every day, without realizing it, someone may be reading someone else’s personal e-mail, listening into a conversation, or reading correspondence meant for someone else’s eyes only."

What is e-surveillance?

Thursday, June 14, 2007

U.S. funding Mexico's wiretaps

Star-Telegram.com | 05/25/2007 | U.S. funding Mexico's wiretaps: "Mexico is expanding its ability to tap telephone calls and e-mail using money from the U.S. government, a move that underlines how the country's conservative government is increasingly willing to cooperate with U.S. on law enforcement.

The expansion comes as President Felipe Calderon is pushing to amend Mexico's constitution to allow officials to tap phones without a judge's approval in some cases.

Mexican authorities have been able to wiretap most telephone conversations and tap into e-mail for years, but the new $3 million Communications Intercept System being installed by Mexico's Federal Investigative Agency would expand its reach."

Video Surveillance Leader LenSec Awarded ''Axis Communications Government Market Partner of the Year'': Video Surveillance Innovator Continues to Lead

Video Surveillance Leader LenSec Awarded ''Axis Communications Government Market Partner of the Year'': Video Surveillance Innovator Continues to Lead in Applications for City, County, and School Security Cameras: "LenSec, the premier provider of IP-based video surveillance solutions to local government, today announced it has received the Axis Communications Government Market Partner of the Year Award for 2006. Axis Communications, the global leader in the network video market, recognized LenSec for their strength in providing solutions for security cameras to government entities across the United States, specifically city center surveillance cameras to local government.

HOUSTON (BusinessWire EON) May 23, 2007 -- The award was presented to LenSec on May 10, 2007 at the Axis Channel Convergence Conference in Fort Myers, Florida.

'The LenSec solution is an essential part of government security projects across the United States, and the company has proven its value with breakthrough video network distribution and solutions that meet the needs of local governments,' said Fredrik Nilsson, General Manager of Axis Communications."

Monday, June 11, 2007

Lasers for video surveillance

» Lasers for video surveillance | Emerging Technology Trends | ZDNet.com: "Researchers at the Oak Ridge National Laboratory (ORNL) have built a new optical surveillance based on lasers. Their Laser-Based Item Monitoring System (LBIMS) is designed to protect high-value items in high security environments. It’s also supposed to respect your privacy and be the equivalent of cameras with a 10,000-megapixel resolution. The LBIMS can be used in situations where conventional surveillance systems cannot be employed, such as areas where video surveillance has been specifically prohibited and areas where a RFID system could trigger an explosion. It should become commercially available this year."

Nanny 911: Top Warning Signs You Need Another Nanny Check - And An Investigator

Investigation News - Nanny 911: Top Warning Signs You Need Another Nanny Check - And An Investigator - PInow.com Investigator Directory: "Parents are increasingly worried about the caregivers who care for their children. While carefully pre-employment screening can help parents find qualified nannies and babysitters, parents need to remain vigilant even after hiring, as problems can occur at any time.

According to 2002 census studies, about 360,000 US children (or about 3.7%) were cared for by non-relatives in their own home. These child care workers included au pairs, babysitters, and nannies working in the child’s family home. Given that so many parents are allowing caregivers into their home - and trusting these individuals with the welfare of their children - it is not surprising that many parents worry about the care their children receive. High-profile cases of nannies and babysitters accused of abuse only heighten anxiety."

Before Hiring A Nanny

Are Employees Using These Sneaky Tactics to Defraud Your Business?

Investigation News - Are Employees Using These Sneaky Tactics to Defraud Your Business? - PInow.com Investigator Directory: "Employees embezzle many millions of dollars from their employees each year. All businesses need to be aware of the most common worker scams.

In 2004, Lucy Magda pleaded guilty to stealing more than $2.2 million from her previous employer, the St. Catharines Standard. The Burgoyne family, who owned the newspaper, was forced to sell the newspaper to Southam Newspapers in 1996, a move that some experts claim was brought about by Magda’s dishonesty. In 2006, a business manager of the N.C. Press Association pleaded guilty to embezzling $268,340 from his former employer. In 2006, an employee of Brock Cabinets was sentenced for five to seven years in prison after she was found guilty of embezzling $1.5 million from the company that hired her.

Findings from the University of Florida’s 2004 National Retail Security Survey suggest that theft by employees means more than $14.6 billion in annual losses, which means that employee embezzlement and dishonesty is the single most expensive type of fraud affecting businesses today. Yet, many businesses are blissfully unaware of the impact their employees have on their businesses. Lucy Magda was considered an ideal employee at the St. Catharines Standard – even though she stole from"

Are Employees Using These Sneaky Tactics to Defraud Your Business?