Five People Charged in HP Spying Case

As expected, California Attorney General Bill Locker has filed charges against former Hewlett-Packard executives, data providers and outside investigators that were involved in the HP spying scandal. From Forbes.com — Attorney General Bill Lockyer accused two ousted HP insiders – chairwoman Patricia Dunn and chief ethics officer Kevin Hunsaker – and three outside investigators – […]

Read More… from Five People Charged in HP Spying Case

Congressional Hearing on Phone Record Pretexting – September 29

On September 29, 2006 a US House Congressional Subcommittee on Oversight and Investigations will hold a hearing on “Internet Data Brokers and Pretexting: Who Has Access to Your Private Records?” The hearing is scheduled to begin @ 10 AM EST. You will be able to watch the hearing through a live web cast and get […]

Read More… from Congressional Hearing on Phone Record Pretexting – September 29

The Life of a Private Investigator

The Marin Independent Journal has published a professional article on the life and career of local private investigator, Richard Schmidt. From the article — RICHARD SCHMIDT may not have Tom Selleck’s red Ferrari or moused chest hair, but this San Rafael private investigator can actually lay claim to tailing cheating spouses, locating missing relatives and […]

Read More… from The Life of a Private Investigator

Spy in the Sky

Wired.com is reporting on a little-known spy agency called the National Geospatial-Intelligence Agency that studies satellite imagery for use in dealing with national security issues, government intelligence and natural disasters. Some privacy advocates are worried about the amount and level of information being collected on everyday citizens by the NGA, but the positives appear to […]

Read More… from Spy in the Sky

How the National Security Agency Does Social Network Analysis

Slate.com has a short and interesting article regarding the use of data mining and social network analysis by the National Security Agency in its efforts to hunt down terrorists and terrorist cells. Social network analysis is used by the NSA as an effective way to establish links between known and potential terrorists. From the article […]

Read More… from How the National Security Agency Does Social Network Analysis