Monday, February 25, 2013

10 Spy Tricks: An Office Espionage Series

I spend a great deal of my time dealing with highly sensitive, highly confidential information. Over the years I have noticed that many of the institutions I have worked with have gone to great pains and considerable expense to make certain their computer systems have state of the art firewalls and "hacker-proof" encoding systems. Nonetheless, they continue to leak data like a sieve!

How can this be? Simple, they are guarding the air conditioner duct instead of the front door.

So, what do I know about it? My knowledge of the field is pretty backdoor in nature.

10 Spy Tricks: An Office Espionage Series

First of all, I work a lot with people who love nothing more than to stir up hate and discontent wherever they go. They will intentionally uncover and publish sensitive information. It is fun for them. In order to find out why they do these things I do a lot of debriefing with them when an incident occurs.

Second, I have two brothers who made carriers out of law enforcement. One of my brothers served many years as a state trooper and another as a sheriff's deputy. They were both extremely successful in the investigation facet of the job and I am about to tell you why. Then you can see if you are vulnerable to the same kind of attack.

The sources of data loss, in no particular order, are as follows.

1. Waste Archeology.
Simply speaking, someone who really wants to know your secrets will go through your trash. And guess what? It is completely legal. Buy a .00 shredder, and use it.

2. Taps.
Seriously, if you have a wireless system it is pretty simple to eaves drop via laptop from the coffee shop next door.

3. Pop-ins.
Be extremely wary of maintenance crews and repair staff you haven't called in. Check ID's. Also, be aware of someone who comes in asking a lot of questions. You may be surprised what the reception staff will tell someone who smiles and asks nicely.

4. Hacking in.
Do you know the easiest way to hack in to a secure system? Steal the password taped to the computer screen at Ed's work station. Trust me, I see it every day. You know what else? Most people use the same password for every system they need to access.

5. Cordless phones.
Remember most cordless phones and cells are basically fancy radios. If it puts out a signal, the signal can be picked up with a scanner.

6. Ticking bombs.
Answering machines, voice mail, fax machines anything that requires an access code can be beaten (remember the password taped to the computer?).

7. Starbucks.
Never discuss sensitive information in a public restaurant! If I wanted to know about a corporations business, I go to the snack bar at lunch and read the paper over coffee. You won't believe the things you hear (if you're in education, teacher lounges are hair raising!).

8. Brain cramps.
Unlocked cabinets, offices, desks, paper work left out, answering stupid questions over the phone. Hello?

9. Traitors.
Face it, some folks will sell you out for the right price. The right price might be as simple as someone asking, "So, what confidential things are you working on these days?" You really wouldn't believe what people have told me in answer to that question. Keep sensitive information on a need to know basis.

10. Describing a spy.
The typical spy is a short, fat, tall, thin man, with curly, bald hair. She often wears provocatively conservative clothing and is liberally conservative. In other words, ANYBODY is the typical spy.

Now I will expound upon each section individually.

Part 1

One of the first areas I mentioned in breaches in security was "rifled" trash. I believe this to be foremost method of stealing confidential information. In reality it isn't even stealing. In California Versus Greenwood the Supreme Court held the Constitution does not prohibit warrant less search and seizure of garbage left for collection outside the curtilage (the enclosed area immediately surrounding a home or dwelling) of a home. This could include places of business.

Here are some pro-active steps you can take.

1. Don't transfer confidential documents to recycling vendors.

2. If you have a copier, install a shredder next to it.

3. Purchase a cross-cut shredder for extremely sensitive documents.

4. Destroy all waste paper.

5. Get shredders for each individual. People won't wait in line to use a bulk shredder.

6. DON'T KEEP CARDBOARD BOXES OF UNINVENTORIED OLD DOCUMENTS LYING AROUND.

Part II.

Remember, James Bond is not interested in your secrets.

That being said, competitors, disgruntled employees, ex-spouses and other wreakers of havoc are interested in your secrets.

There are many methods of "bugging" out there.

The five main categories are, in alphabetical order: Acoustic, Optical, RF, Tie-In, and Ultrasonic.

1. Acoustic - low tech glass to the wall, ventilation, electrical out-let, out side the window, stand by the door, close proximity listening.

2. Optical - high end and expensive.

3. RF - radio frequency and receiver devices.

4. Tie-in - hooking directly in to a phone line. The box is usually easily accessible on an exterior wall.

5. Ultrasonic - think transmitter, receiver but with audio pressure rather than radio waves.

The most prevalent and dangerous of this is alphabetically and most destructively listed first. Always be aware of your immediate surrounding when discussing confidential information.

Part III

Always check the identification of persons who pop in to do technical work around your office. This is especially true if you PERSONALLY have not called them for service. These folks are known as "spooks".

You see, "Spooking" is a hide in plain site method of gaining access to confidential information

It seems carrying a clipboard will gain a spook access to most places, even those with confidential data to protect.

But, there are other common tools the spook may carry to increase their appearance of authenticity: 2-way Radio, Maglight, Construction worker hard hat, and my personal favorite the attention tone cell phone. Now, this particular ruse means the spook has a partner but is anything more impressive than that tone from the "base office" checking the technicians' status?

However, the most powerful, by far, access granting technique (I mean this will get you in anywhere) is a set of Dickies. Yes, Dickies. The same things you wore for summer jobs in high school and college. They are a virtual cloak of invisibility in our culture.

Most common guises:

1. Telephone/communications technicians - (typically wearing blue/grey Dickies)

2. Computer service technicians - (polo shirt and tan Dickies pants)

3. Copy machine technicians - (polo shirt and blue Dickies pants)

4. Custodians - (typically anyone with a set of blue/grey Dickies is granted cart blanche access)

5. Messenger services - (typically wearing brown Dickies)

6. A/C heating technicians - (typically wearing blue-green Dickies)

The beauty of this type of "spooking" is nobody ever challenges these folks. And if some particularly diligent person does question them, the spook goes into his, "fine with me, but it will be at least four weeks until I can get back here. We're really backed up." That is usually enough to intimidate even the most on top of things staff member.

I don't usually recommend testing out these surveillance techniques, the power of the Tricky Dickie is not to be believed unless you actually see it in action. So, get your lazy brother-in-law a set of Dickies and send him through your office. You won't believe the results. Afterwards, get the lazy bum to do your yard work so you get your moneys worth from the Dickie investment.

Part IV

There are many ways of stealing computer files. As a matter of fact there is a whole niche market dedicated to nothing more than developing and distributing new types of spy ware. Then there is another niche market dedicated to selling protection against these pieces of malware. Folks, I talking millions of dollars each year, connected to these two enterprises. Would it surprise you to know that many of the same people writing the protection software also write the malware?

Any who, how to these insidious pieces of data stealing malware get into your systems? Simple, you or one of your associates, put them there.

I know what you're thinking, "Not me! I would never do such a self destructive thing. Neither would anyone I work with." And, at least intentionally, you're right. But, take look at the most common avenues of entry and think through your response again.

Most Common Sources of Spyware:
1. Screen savers
2. Emoticons
3. Clip Art
4. Spam
5. Email attachments
6. Unprotected web browsing (cookies)
7. Peer to Peer applications (mp3 files)
8. Shareware
9. Freeware
10. Involuntary Download (may present as a fictitious error you must click to correct)
So, have you EVER added any of this to your system, even to an email? I know me too.
Oh well, as MaElla (my grandmother) used to say, "Once bitten, twice shy."

What have we learned?

Basically, don't put anything unverified on your system, even if it is really, really cool.

Bye the way, does anyone know where MaElla got "Once bitten, twice shy"?

Part V

First and foremost, never use a cordless phone for anything other than the convenience of answering a call. Switch to a corded line for any specific communications.

Monitoring cordless and cellular phone calls has become a million dollar hobby in America. Some even sell their monitored conversations on line. Think ex-girlfriend sites.

Mobile phones are an even greater liability. Not only are means available to monitor the conversations, but it is not particularly difficult to track the location of the parties based on their signal. Now, that is scary.

This tracking will become even easier when newer 3G phones come online because their base stations are even closer together.

What can you do?
1. Use a regular line for increased security.
2. Dedicate a secure line in your office for sensitive communication. They are not cheap. Or-Com offers one that has fair reviews for about 0.00.
3. Use first names on non-secure lines.
4. Speak in general terms on non-secure lines.

If you think these precautions a completely paranoid, you may be right. On the other hand, browse Spy Emporium for an overview of just a few of the surveillance devices available.

Part VI.

If you work with confidential data, and you use any of the following pieces of technology, it is just a matter of time until your confidentiality is compromised.

1. Disposable roll fax machines.
Used rolls contain copies of every item the machine has received.

2. Unattended fax machines.
Fax machines left on are excellent sources for stealing confidential data. When I expect a fax, I alert the office staff to put it in a folder in my in-box.

3. Dictation machines.
If you use dictation machines and leave tapes on the secretaries' desk to be transcribed don't be shocked when a tape goes missing (Tell the truth, this has already happened hasn't it?).

5. Answering machines.
Most are accessible with a 3 or 4 digit code. Most people don't change the factory set "3, 4, and 5." These are easy to hack.

6. Cordless microphones.
Crystal clear signals for about 1,300 feet or a quarter mile.

Part VII.

One of the most popular and reliable methods for gathering information from an organization is to "scout the perimeter." Although, this is not as sexy as the "mission impossible" methods, it is very popular and very effective.

Here are your most frequent weak spots.

1. The company lunch room. Many people actually carry confidential files with them to review over lunch.
2. The neighborhood coffee klatch. This is true for the same reason as above.
3. The guy who is always at the newsstand when you pick up your paper. You know the one you discuss current office events with because he doesn't know the people anyway.
4. The chatty new friend your spouse just made. Think about this when discussing business with your spouse.
5. Any off-site meeting places. Luncheon rooms, county offices, etc.

Part VIII

Next to going through the trash, the most vulnerable area for exploitation is the human brain.
The major offenders:
1. Unsecured offices, cabinets, drawers and doors.
2. Files left on the desk over night.
3. Group passwords.
4. Company phone directories.
5. Desktop rolodexes.

Part IX

Another source of compromised confidential information is the office traitor. Most people have a price. The price may have been paid the last time they were insulted, degraded or unappreciated at the office. One the other hand, there may be an actual monetary price for which a trusted associate can be turned.

Here are some of the characteristics you may need to be on the look out for.

1. Those passed over for raises, passed over for promotion.
2. Those experiencing significant financial difficulty.
3. Those who gamble.
4. Those that employ recreational pharmaceuticals (including alcohol).
5. Those involved in labor and management disputes.
6. Those that seem to always be on the lookout for the next big deal.

Part X.

Basically, if you take a look at the qualifications for a field agent for the CIA you can build a fair profile of what an office spy may "look like."

1. A Bachelors Degree, rarely more.
2. Solid academic record, not outstanding.
3. Interest in inter-business and international affairs.
4. Solid interpersonal skills.
5. Solid communication skills.
6. Frequent traveler.
7. Interest in foreign languages.
8. Prior residence outside the area.
9. Possible prior military experience.
10. Experience in business and/or economics (but with deficit skills in their own finance management).
11. The person is usually between the ages of 21-35.
12. Previous work in law enforcement or corrections.
13. May be considered a loner, not a joiner.
14. No police record.
15. Hobbies include martial arts, scuba, hunting, proficiency with firearms, chess, math, avid reader, may write prolifically or play a musical instrument, etc.
16. The person may be interested in training manuals and field guides.

In other words, just about anybody who would make a good employee. The key is to look for unusual groupings of these skills. Most people will meet 3 or 4 of the criteria. Those who meet 6 or more should be considered possible candidates.

This section completes a ten part series concerning confidentiality and security.

10 Spy Tricks: An Office Espionage Series
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Sunday, February 17, 2013

Fun Office Gift Exchange Games

There are dozens of fun office gift exchange games people can play during the Christmas season. Officemates might have a "secret Santa" gift exchange or a popular "white elephant" gift exchange. All are popular and always fun, provided the rules are clear and everyone understands them.

One of the most popular office games involving Christmas gifts is the "white elephant" gift exchange. The rules can vary depending on the office and participants, but generally it works something like this. Each person participating purchases a gift not to exceed a certain dollar amount (determined in advance and might range from to , again depending on the group). The object here is a fun gift, so anything particularly practical is not welcome. You're looking for unusual and interesting, perhaps funny, and something other people will want.

Everyone who's participating in the exchange gets a number (the number should be the same as the number of presents). The numbers should be they drawn out of a hat or something else (perhaps a Santa hat, in recognition of the season?). So, the person who draws number "1" goes first and picks a present. They open it and keep it. The second person can either pick a different present or they can "steal" the first present. They can't open a present until they are sure they are keeping their choice and not picking the first gift. This continues until everyone has a present. Any present that's been opened can be subject to stealing, but a gift can only be stolen three times.

Fun Office Gift Exchange Games

At the end of the game, the person who was the first to open a present can steal a gift if they choose, since they didn't have an opportunity earlier.

In this game there's always one gift that everyone wants and will steal over and over again. What makes it fun is trying to figure out who is going to get the most coveted gift. In some cases, people can end up with the gift they brought.

Originally the "white elephant" gift exchange was a way for people to "regift" or give someone a gift they themselves received and don't want. For a fun twist, you could ask people to bring something from their home like that, or you can require they purchase something (with the aforementioned limit on spending).

There are many varieties of the Secret Santa game, which is so popular in offices, but one option that's fun involves putting a dollar limit on the purchase and having participants actually make "Santa lists". Here's how it works: Those participating create a little list for "Santa". There should also be a dollar limit placed on this gift exchange, so if that is , then people should only list items on their Santa list that can be purchased for or less.

Everyone who is participating draws a list out of a hat, or some other object, and sets about shopping for that person. They know who they are shopping for, but the recipient doesn't. On exchange day, the Secret Santas must deliver the gifts to their officemates' desks without being seen. Those participating can decide if they want people to sign the cards attached to the gifts, or if the secret should stay a secret. If they choose the latter, gift giving can be interesting, since it's anonymous, but many people choose to have cards signed so in the end, people who to thank for their gifts.

Fun Office Gift Exchange Games
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Alice Lestari is a free writer for games and office activities. For more information about office games activities, please visit here http://gadgetandgame.blogspot.com

Saturday, February 9, 2013

US Post Office Change of Address - Change Your Address With the Post Office in 2 Minutes

A US Post Office change of address is an important thing to take care of before you move.  It helps to ensure that you will not miss any important bills, checks, statements, or other important correspondence.  It also can help protect your credit rating and prevent the opportunity for identity theft.  If the Postal Service does not know that you have moved, they will continue delivering mail to your old address where it may accumulate in your mailbox and could even end up in the wrong hands.

At one time it was a hassle to submit a US Post Office change of address form.  You often had to go to your local office, wait in line to make sure you had the right form, fill it out by hand, and turn it in.  This process could easily take 30 minutes or more of your valuable time.  But today you can complete this task much more easily and conveniently.  You can submit your change of address form online in as little as 2 minutes!  There is no need to leave the comfort of your home.

A Home Office

Several sites have partnered with the Postal Service to make changing your address quick and easy. All you have to do is fill out a simple one page online form. It asks for the same information as the Postal form. You then verify the information, click submit, and the job is done. The Postal Service will send you confirmation of your change of address by email, and by regular mail at both your old and new addresses.

US Post Office Change of Address - Change Your Address With the Post Office in 2 Minutes
US Post Office Change of Address - Change Your Address With the Post Office in 2 Minutes

So, why wait in line when you can easily submit your US Post Office change of address [http://PostOfficeChangeOfAddress.info] online? The best site I have seen to do this is http://www.OnlineChangeOfAddress.com

Wednesday, February 6, 2013

Free Templates - Create Outlines Using Microsoft Office Templates

Are you looking for an easy way to publish information? If so, using free templates is a good option to explore. Many people do not realize just how simple it is to use the power of Microsoft Office templates to create a publishable document quickly or just to begin and create outline. If you are considering publishing information, here are a few things that you might need to know:

From Agendas to Time Sheets, you can create impressive brochures, newsletters, journals, banners, even resumes using Microsoft office templates. Business cards, calendars, invoices and presentations are all available for you to turn into publications.

If you're still in the planning stage of your publication however, it's a good idea to use software to create your outline, such as Microsoft Word. Why? Because you can see your work at a glance, move text around quite quickly, and therefore organise your publication with less hassle.

Free Templates - Create Outlines Using Microsoft Office Templates

Simply open a Microsoft document, go to the View menu at the top, and click on Outline. In this View a new toolbar appears. If you're not used to working in this way, open a non-important document and play around with its features at first. You will see headings and styles are displayed, and you can add sub-headings and sub-sub-headings as required.

When you come to the real document, simply insert your body text under the relevant headings.

The best way to learn how to use free templates is to try them. They can make your life a whole lot easier. How come? Because the ground work has already been done for you. All that's left for you to do is to fill in the blanks!

Free Templates - Create Outlines Using Microsoft Office Templates
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

I'd like to invite you to sample a free book report template that I've created from my site eBookPresenter.com. In fact, feel free to download three! Each book report template comes with a full page cover, chapter headings, table of contents, graphics, automatic page numbering, headers and footers. You can create pdf files from them, at no extra cost to you. What's more, the templates are accompanied by a 61-page guide 'How to Make Money with eBooks - The Truth'. Click on eBookPresenter's free templates to download your set.

Hilary Keaton is the founder of eBookPresenter.com, the eBook cover & layout templates site. If you'd like to try 3 templates for free and see how easy it is to create an eBook, visit http://www.eBookPresenter.com Includes free guide 'How to Make Money with eBooks - The Truth'.

Sunday, February 3, 2013

Writing a Letter for The College Admissions Office

When actively seeking information from colleges, you will need to write a letter to the college admissions office. Since you are going to be seeking information from many different colleges, you do not want to write one individual letter for each college. This can be very time-consuming and tedious work. You will want to create one letter or template that can be individualized for each college. Make one generic letter and then print it however many times you need to and send it to whatever colleges you are interested in.

Your letter should be addressed to the college admissions office. You should address the dean of admissions and tell them you are very interested in their college and you are seriously considering enrolling. Give them one good reason why you are considering going to college there.

All you need is just a basic letter. An example of one can be found below.

Writing a Letter for The College Admissions Office

The name and address of the college you want to apply to, as well as the name of the dean of admissions at the top of the letter goes here.

Dear ABC college...

I am a senior at XYZ high school in city, state. I would like to obtain some information on different colleges that I may choose to attend after graduation. Because ABC college offers electrical engineering, I am considering enrolling at your school because I am interested in the subject.

Please send me any and all available information about your college. Please send me information about admission requirements, courses, financial aid, and what housing options are available near campus. Please also include anything else you would like me to know about ABC college. The information you send can help me learn more about your college and making an informed decision about my future. I look forward to hearing from you.

Sincerely,

John Q. student

Feel free to use any variation of this letter you like. There is no set template and it can be used in whatever way you see fit, as it is just an example. The goal is to show you that typing up a letter to obtain information about whatever college or university you are interested in can be done very quickly. You will need to address each letter individually, as well as personalize the letter with whatever school you are applying. The goal here is to have a template to make it very fast and efficient.

Writing a Letter for The College Admissions Office
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Darius has been writing online now for a while and has many different interests. You can check out his websites at Nankang Tires and http://www.nankangtires.net