Sunday, May 31, 2009
IPhone, WinMo phones not quite as secure, says the study.
Its results may surprise some. It blasts Apple's iPhone with an overall score of 1 out of 4. Apple's worst performance came in the device category in which it earned a zero. Ms. Lopez notes that the underlying OS X build is easily compromised, that the system lacks over the air security updates, and that its encryption options are lacking.
Networking was Apple's strongest category. The reason why it performed well, according to Ms. Lopez, was that the iPhone "uses the same active directory based on authentication methods as Windows Mobile." Microsoft earned a lower mark -- 2/4 -- on devices as its encryption was lacking, despite having over-the-air updates.
Sales leader RIM, though, took the cake, earning a perfect mark. States Ms. Lopez, "RIM offers strong security protection across the device, transmission and the network domains through tight control of the device, its software and its application control policies. While other vendors have stepped up security efforts in the past year, RIM offers the most robust security solution."
Saturday, May 30, 2009
NPR.org, May 29, 2009 · Cyber-espionage — or an all-out attack on the nation's computer infrastructure — could help even the odds between a technology-reliant U.S. military and a savvy adversary with little more than a hacker's basic tools, computer security experts say.
China and Russia are among nations that have active programs to target U.S.-based networks — not only government systems, but also those of private contractors serving the military, says Alan Paller, the director of research for the SANS Institute, which specializes in information security and training.
"China's getting a lot of attention right now because their technique is to get in and steal everything and then have lots of people sort through it to see what's important," Paller says.
"Russia has a much more selective approach," he says. "They figure out what they want and make a surgical strike. China's method makes a lot more noise, whereas Russia's is stealthier."
The motivations for these attacks are as old as espionage itself, says Paller: getting information on a potential enemy and feeding him disinformation.
Apparently, one's "age" in sentencing criteria for criminal espionage cases?
A case that surprised many with allegations of espionage and even talk of the death penalty ended Friday with an 85-year-old New Jersey man hobbling out of the federal district courthouse in Manhattan, avoiding prison but fined $50,000.
With harsh words for both the man, Ben-Ami Kadish, and the government, the judge, William H. Pauley III, said prison would “serve no purpose” for a man so old and infirm, but made clear that he had lingering questions about the government’s approach to the case.
Mr. Kadish, who lives with his wife of 57 years in a retirement community in Monroe Township, N.J., said in court that he leaked classified United States military documents to an Israeli agent in the early 1980s.
The FBI is investigating a computer intrusion at a large Texas power company that crippled the firm’s energy forecast system for a day in March, costing it over $26,000.
Early Thursday morning FBI agents raided the home of a former employee of Dallas-based Energy Future Holdings — the corporate parent of three large Texas electric companies, including Luminent, which has over 18,300 megawatts of generation in Texas, and operates the Comanche Peak nuclear power plant.
The ex-employee, Dong Chul Shin, was fired from the company March 3 for performance reasons, and escorted off the premises, according to court records. But the company failed to immediately shut off his VPN access. That afternoon, someone using Shin’s account began logging onto the corporate network, e-mailing out proprietary data to a personal Yahoo account linked to Shin, and modifying and deleting files, according to a search warrant affidavit by Dallas FBI agent Robert Smith.
Friday, May 29, 2009
Reuters says senior bank managers were among those under surveillance. Deutsche Bank has so far not commented on the report. Also on Wednesday,the German business daily Handelsblatt reported that Deutsche Bank had suspended the security chief of its German operations. Rafael S., a former officer with the German army, had been responsible for managing daily security. His tasks included gathering and assessing "relevant security information."
The research is based on data in an ongoing study by Tiversa, whose patent-pending technology monitors roughly 450 million users issuing more than 1.5 billion searches a day. The files analyzed included only those identified on behalf of Tiversa's existing customer base during the 12 month period. It's also important to note that the referenced files are business documents only (.doc, .xls, .pdf, .pst, etc). Music, software and movie files (.avi, .mov, .wma, .mpeg4, .mp3, etc) were not included in the study. This new data clearly demonstrates that P2P file-sharing risk is not effectively being addressed by the security protocols of Fortune 500 companies and government agencies, as these organizations commonly have exposure across the Extended Enterprise. Tiversa's findings also hint at the enormity of the issue at hand.
Thursday, May 28, 2009
Muskegon County Circuit Judge James M. Graves Jr. last week ordered Christopher Allen Slocum to jail for 45 days and probation for 18 months. Slocum pleaded no contest earlier to surveilling an unclothed person, a felony.
Police said Slocum had a camera hidden in the ceiling above the bathtub in his home at 3009 Glendale, connected to his computer. Police said he used it to take pictures of another man and woman who lived in the home with Slocum and his wife.
Forty-two-year-old Felicitos Gonzales of Stamford had also been accused of using a video camera to peep beneath women's skirts while they waited for trains.
Gonzales, who was sentenced Tuesday, was charged last November with voyeurism after a woman found a camera phone in a women's bathroom stall at the Stamford train station.
Police say additional videos and photographs were found on his home computer after his arrest.
His lawyer says Gonzales, who entered the United States illegally, likely will serve part of his sentence before being deported.
The jockeying between CIA Director Leon Panetta and National Intelligence Director Dennis Blair centers on Blair’s effort to choose his own representatives at U.S. embassies instead of relying only on CIA station chiefs. Current and former U.S. officials described the dispute on the condition of anonymity, because of the sensitivity of intelligence issues.
Blair’s office was created after the Sept. 11, 2001, terrorist attacks to better coordinate intelligence gathering and make sure critical information isn’t overlooked. But former and current CIA officials warn that his plan could do just the opposite — creating competing chains of command inside U.S. embassies and potentially fouling up intelligence operations. They also worry it could complicate the delicate relationships between U.S. and foreign intelligence services, and leave ambassadors confused about where to turn for intelligence advice.
Wednesday, May 27, 2009
"You can sit out there for four days, and nothing might happen," Paul Ciolino, a private investigator, told the Chicago Sun-Times. "If I have someone out there at $120 an hour for 14 hours a day and nothing happens, that gets expensive. But if the GPS says the car is going to a location every Thursday at 2, now you can go take a look."
Global positioning systems
now cost less than $1,000 for the cheaper models. One big advantage in divorce cases is that someone who owns a vehicle can conceal a GPS device in the glove compartment or other hiding place legally.
The jury handed down the verdict on Thursday after deliberating two days at the end of a three-week trial against L-3 Communications Corp. -- the sixth-largest defense company in the United States -- and its subsidiary, L-3 Communications Integrated Systems Inc.
"It was a really significant victory for the firm and the client in an unaddressed area of intellectual property law," said Audra A. Dial, a partner at Kilpatrick Stockton in Atlanta and a member of Lockheed's legal team.
"Trade secrets protection for information that is disclosed to the U.S. government really hasn't been addressed in many issues. It's pretty groundbreaking," she said. L-3 Comm, Dial added, was "taking information they had received for U.S. government purposes, from the U.S. government, and attempting to exploit it for their financial gain in a commercial program that had nothing to do with the U.S. government."
There was no immediate comment by the Lebanese army about the report, which comes during a tense run-up to parliamentary elections next month.
More than 20 suspects have now been charged, some of them in their absence.
The latest to be charged are named as Ahmed Shibli, Jeryis Farah, and Jean Farah, described as a fugitive.
They have been charged with monitoring civilian and military installations and providing information to Israel about the movements of political figures. Lebanon is at a state of war with its southern neighbour Israel.
Convicted spies face a possible life prison term with hard labour or the death penalty if found guilty of contributing to Lebanese loss of life.
Tuesday, May 26, 2009
LONDON – An internal military memo published today confirmed that computer disks lost at a British Royal Air Force base contained sensitive files on the private lives of senior officers, including answers to vetting questions about drug abuse, extramarital affairs and the use of prostitutes.
The memo was released to Britain's Guardian newspaper under freedom of information laws following the loss of data disks in September,
At the time of the theft from RAF Innsworth, about 113 miles west of London, Britain's defence ministry said only that personal data such as bank details and addresses could have been lost.
But the memo confirms that the data included details of security vetting, potentially involving information on criminal convictions, debts, medical conditions and sexual activity.
"This data provides an excellent target list for foreign intelligence services, investigative journalists and blackmailers," the memo stated.
Lighter Spy Camcorder
Color Video Camcorder
One press to switch ON and One press to record video
Fast response time and Simple control
Dimension: 5.3 x 3.7 x 1.2 cm Specifications:
Color Video Resolution: 640 x 480 pixel
FPS: 16 frames per second
Video file format: AVI
Color Video and Audio
Built-in 2GB Memory
Monday, May 25, 2009
Civil servants are compiling dossiers on opponents of Heathrow Airport expansion and handing them over to police, it emerged yesterday.
Communications staff at the Department for Transport are gathering data on legitimate objectors to the £9billion third runway and offering the information to Scotland Yard.
DfT officials monitored anyone speaking out against the planned third runway during the run-up to January's narrow Commons approval of the scheme.
Potentially the names of tens of thousands of innocent people from websites, press releases, news articles and public consultations were trawled over by bureaucrats, who then briefed detectives.
Remotes to go with your car are so incredibly common that no one would notice anything odd about this keychain. It’d just look like your average keychain unless someone actually bothered to inspect it closely. Odds are, no one is all that observant, nor do they have any need to be. Well if you’re just dying to catch someone doing something shameful, this keychain can help you catch them in the act.
It can take both video, audio and pictures, all depending on what you need at that particular moment. They’ll never know that you just captured proof of them up to no good until it’s too late. That is unless you’re entirely too obvious by the way you’re holding the keys. Asking them to speak into the keychain might be a touch too obvious. It has a rechargeable Li-on battery and 2GB of built-in memory.
Friday, May 22, 2009
The U.S. military is putting together a suite of hacking tools that could one day make breaking into networks as easy for the average grunt as kicking down a door.
That’s the word from Aviation Week, which snuck an unusual peek inside a “U.S. cyberwarfare attack laboratory.” There, researchers are building a “device” that would “weaponiz[e] cyberattack for the non-cyberspecialist, military user.” In recent years, Defense Department officials have thumped their chests, hard, about how good the Pentagon is at hacking enemy networks. But discussing specific online attacks — ordinarily, that’s done mostly inside of secure facilities. A 2008 Danger Room post on an unclassified Air Force research project to give cyberwarriors “full control” of “any and all” computers set of a frenzy inside the service. Generals were pelted with questions about how such supposedly-sensitive information was allowed to escape into the public sphere. Since then, there have been increased calls within military circles to show off at least some of what the armed forces’ network attackers can do. It’s an effective way of detering potential foes online, the logic goes.
Officials in Beirut say they struck a strategic blow against Israel with the recent arrests of 15 people who they contend were gathering intelligence on Hezbollah positions, leaders' movements and infrastructure targets. Iranian-backed Hezbollah militants and Israeli forces fought an inconclusive war in 2006 along the Lebanese-Israeli border and both sides have since been preparing for the possibility of another.
Although Israel and its Arab neighbors have for years spied on each other, the recent announcements have highlighted the secret war of espionage and the depth of the infiltration. Lebanese officials say the spies arrested there included a math teacher and housewife, and that they were equipped with sophisticated electronics.
The U.S. Marshals confirmed it disconnected from the Justice Department's computers as a protective measure after being hit by the virus; an FBI official said only that that agency was experiencing similar issues and was working on the problem.
"We too are evaluating a network issue on our external, unclassified network that's affecting several government agencies," said FBI spokesman Mike Kortan. He did not elaborate or identify the other agencies.
Marshals spokeswoman Nikki Credic said the agency's computer problem began Thursday morning. The FBI began experiencing similar problems earlier.
Wednesday, May 20, 2009
Security experts say it's happening often thanks to technology readily available on the Internet.
Just think how many times you reach for your cell phone every day. What if someone was watching every text, every e-mail and every word?
"I don't think so," said Kirk Anthony, who should know.
Anthony is a private investigator in Genesee County and he says there's a growing list of online companies selling Spyware for cell phones.
"It's available to anybody," Anthony said. The companies market their products as ways to "catch a cheating spouse," "protect your children," or even see what your co-workers are saying behind your back.
"You can watch their e-mails," Anthony said. "You can see their text messages going back and forth. And in some cases, you can even listen to their conversations."
Tuesday, May 19, 2009
May 19 (Bloomberg) -- Germany is increasingly the target of foreign spies -- particularly from Russia and China -- seeking advanced technology and scientific know-how, the Interior Ministry said.
While spies, often under cover of diplomats or journalists, continue to collect information on politics and weapons, those from less developed countries seek technological expertise to avoid research-and-development costs and, in some cases, license fees, the ministry said in an annual report.
“For some intelligence services, espionage targets in the areas of economy, science and technology have played an increasingly large role,” the ministry said.
Germany, Europe’s largest economy, offers a wealth of desirable information because of its central role in the European Union and the North Atlantic Treaty Organization, the ministry said. Countries in the Middle East, Far East and North Africa have spies who are active in Germany, it said.
If you tend to wear shirts on a regular basis with highly plain black buttons, then you could have a little fun and wear this spy cam. Of course for those of you that don’t have a shirt filled with black buttons, you’d have to go out and purchase one. The spy cam just attaches to your shirt and you can then begin taking pictures of deviant activities. It’s unlikely that anyone would ever be able to spot the camera on you.
You put the ring on and then to activate the camera, you just place the ring near it. Then when you’re not using it, you can just casually wear the ring. Of course, the ring might look a little odd on women and they don’t list the size. So there could be issues there. The video resolution is 608 x 488 pixels and the image resolution is 1200 x 1600 pixels. It has 4GB of built-in memory, audio and a rechargeable Li-on battery.
For old-fashioned detectives, the problem was always acquiring information. For the cybersleuth, hunting evidence in the data tangle of the Internet, the problem is different.
“The holy grail is how can you distinguish between information which is garbage and information which is valuable?” said Rafal Rohozinski, a University of Cambridge-trained social scientist involved in computer security issues. Beginning eight years ago he co-founded two groups, Information Warfare Monitor and Citizen Lab, which both have headquarters at the University of Toronto, with Ronald Deibert, a University of Toronto political scientist. The groups pursue that grail and strive to put investigative tools normally reserved for law enforcement agencies and computer security investigators at the service of groups that do not have such resources.
“We thought that civil society groups lacked an intelligence capacity,” Dr. Deibert said.
Sunday, May 17, 2009
The captured espionage equipment on display at Lebanese police headquarters on Monday was hardly the stuff of James Bond's Q lab — just a small collection of computers, passports and electronic gear that would have looked at home in an Internet café. But then a Lebanese security agent, masked to hide his identity from the pack of journalists invited to view the spy trove, pulled away the top of a bright orange watercooler to reveal a hidden disc-shaped device, which officials explained had been used to transmit video surveillance to Israel of secret locations linked to Hizballah.
The Shi'ite militant organization suffered a blow last year with the assassination in Damascus of its security chief, Imad Mughniyah — wanted by the U.S. for his alleged involvement in a number of terrorist attacks, including the 1983 bombings of the U.S. embassy and a Marine headquarters in Beirut. Although Israel officially denied involvement in the hit, the Mossad was credited with authorship both by Hizballah and the Israeli public and media.
In a recently released survey, AirTight Networks has exposed the wireless security vulnerabilities in the financial districts of New York, Chicago, Boston, Wilmington (DE), Philadelphia, San Francisco and London.
Saturday, May 16, 2009
Homeland Security Information Network suffers intrusions
The Homeland Security Department’s platform for sharing sensitive but unclassified data with state and local authorities was hacked recently, a DHS official has confirmed.
The intrusion into the Homeland Security Information Network (HSIN) was confirmed to Federal Computer Week by Harry McDavid, the chief information officer for DHS’ Office of Operations Coordination and Planning. McDavid said the U.S. Computer Emergency Readiness Team reported an intrusion into the system in late March. The initial hack was brief and limited, and it was followed by a more extensive hack in early April, McDavid said.
The hacker or hackers gained access to the data by getting into the HSIN account of a federal employee or contractor, McDavid said. The bulk of the data obtained was federal, but some state information was also accessed, he added, and the organizations that owned the data and Congress were notified of the intrusion.
Thursday, May 14, 2009
The two met in a private parking lot to discuss murdering Carlton's ex-wife.
"He expressed to the undercover deputy that he was in a custody battle with his ex-wife and wanted her dead," said Twis Lizasuain, a spokeswoman for the Osceola County Sheriff’s Office.
Undercover Officer: "How soon do you need it done?" Carlton: "Preferably before the 14th."
"She cooperated with us. We asked her to provide us several photos that could be Photoshopped. During the course of the investigation, she was moved to another location just for safety purposes,” Lizasuain said.
Undercover Officer: "It was perfect. You couldn't ask for it any better man. She was done."
PARAMUS, N.J., May 13 /PRNewswire/ -- David A. Goldenberg is charged with corporate espionage for intercepting thousands of proprietary e-mails from his company's chief competitor for nearly a year while working as a vice president for Richardson, TX, based AMX Corporation, a subsidiary of Duchossis Industries.
Goldenberg, 48, of Oceanside, NY, was the vice president of AMX Corporation, a global audio/video manufacturer, when he was arrested in March of 2008. Following a six week investigation, he was charged with Unlawful Access of a Computer System / Network- 3rd Degree, Unlawful Access of a Computer Data / Theft of Data- 2nd Degree and Conducting an Illegal Wiretap- 3rd Degree by members of the Paramus Police Department (a member of the Computer Crimes Task Force) in New Jersey and was released on $50,000 bail.
Wednesday, May 13, 2009
WASHINGTON (AFP) — A Pentagon official with "top secret" security clearance has been charged with conspiracy to pass classified information to an agent of China, the US Justice Department said Wednesday.
A criminal complaint said that retired air force Lieutenant Colonel James Wilbur Fondren, a deputy director of the US Pacific Command's Washington Liaison Office, "unlawfully and knowingly conspired" to communicate secrets.
"The allegations in this case are troubling -- providing classified information to a foreign agent of the People's Republic of China is a real and serious threat to our national security," said Dana Boente, acting US attorney for the Eastern District of Virginia.
"The US government places considerable trust in those given access to classified information, and we are committed to prosecuting those who abuse that trust," he said.
The complaint said that Fondren, 62, start providing business consulting advice to a Taiwan-born friend called Tai Shen Kuo around February 1998, about two years after he retired from the US Air Force.
Competitors to British companies are receiving help from foreign intelligence services to hack into corporate databases to steal new product plans and win business, a former director of the Centre for the Protection of National Infrastructure (CPNI) says. Former CPNI director Steve Cummings, now a special advisor on security and privacy for the Deloittes management consultancy, said corporate espionage was on the rise, aided and abetted by foreign state intelligence services. Deloittes is currently advising a client which believes its "very expensive R&D" was stolen by foreign agents, he said. Cummings added that the nature of the internet made it hard to identify the actual perpetrators, but it looks like they are getting help from state intelligence agencies, if indeed the agencies are not acting directly, he said. Corporate espionage is not new, he said. The director general of MI5 wrote a letter to 300 leading UK firms to warn of the threat in November 2007. But it is now a "hot button".
Former CPNI director Steve Cummings, now a special advisor on security and privacy for the Deloittes management consultancy, said corporate espionage was on the rise, aided and abetted by foreign state intelligence services.
Deloittes is currently advising a client which believes its "very expensive R&D" was stolen by foreign agents, he said.
Cummings added that the nature of the internet made it hard to identify the actual perpetrators, but it looks like they are getting help from state intelligence agencies, if indeed the agencies are not acting directly, he said. Corporate espionage is not new, he said. The director general of MI5 wrote a letter to 300 leading UK firms to warn of the threat in November 2007. But it is now a "hot button".
Drug smugglers who attempted to import cocaine with a street value of £14m were caught on camera throughout their elaborate scheme, a court heard.
The five men are charged with conspiracy to import cocaine and to supply amphetamines.
Phillip Grange, of Nottingham, Peter Hannigan, of Kendal, and Simon Finlay, Darren Morris and Mark Neville, all from Preston, deny the charges.
They appeared at Manchester Crown Court at the start of the six-week trial.
The court heard that the smuggling of the Class A drug, which had been under police surveillance between Britain and Germany, was finally stopped by customs officers in Harwich, Essex, in May last year.
Andrew Thomas, prosecuting, told the jury that 105kg (230lbs) of high purity cocaine was discovered in the back of a removals van.
The court reasoned that it's okay for cops to spy on citizens like this because "GPS tracking does not involve a search or seizure." The ACLU scoffed at this fantasy, saying it's "a gross violation of one's privacy, and makes the Fourth Amendment a sad clown."
What's next? Secretly embedding a chip in each one of us, giving the government the ability to track all of our movements in real time? Goodbye, privacy. Either that, or perhaps some privacy-minded judge in a higher court will rule this travesty unconstitutional.
Tuesday, May 12, 2009
HACKENSACK, N.J. - A former corporate sales manager has pleaded guilty to felony wiretapping for secretly listening in to a northern New Jersey company's internal conference calls.
Forty-eight-year-old David Goldenberg of Oceanside, N.Y., entered the plea Monday in a deal with Bergen County prosecutors, who had charged him with five counts of wiretapping and data theft.
He was also accused of intercepting e-mails between employees and marketing contractors of Rockleigh, N.J.-based Crestron Electronics in 2007 and 2008.
Crestron officials estimate they lost more than $10 million as a result.
Goldenberg, who was employed by a Texas-based company at the time of the crime, faces up to five years in prison.
Monday, May 11, 2009
According to the published budget summary (.pdf), the program “supports the FBI’s electronic surveillance (ELSUR), intelligence collection and evidence gathering capabilities, as well as those of the greater Intelligence Community.” An FBI spokesman told ABC News, which first reported the information, that the program’s name, Going Dark, “does not refer to a specific capability, but is a program name for the part of the FBI, Operational Technology Division’s (OTD) lawful interception program which is shared with other law enforcement agencies.” He added that “The term applies to the research and development of new tools, technical support and training initiatives.”
The report, called The Electronic Police State, assesses the status of governmental surveillance in 52 nations around the globe for 2008.
The document was released Cryptohippie, Inc., which was set up in 2007 through the acquisition of several little-known but highly regarded providers of privacy technologies.
Not surprisingly, China and North Korea ranked No. 1 and No. 2, with Belarus and Russia following up. But the United Kingdom ranked fifth followed by the United States. "Most of us are aware that our governments monitor nearly every form of electronic communication. We are also aware of private companies doing the same. This strikes most of us as slightly troubling, but very few of us say or do much about it. There are two primary reasons for this," the report said.
"We really don't see how it is going to hurt us. Mass surveillance is certainly a new, odd, and perhaps an ominous thing, but we just don't see a complete picture or a smoking gun," the report continued. Also, "We are constantly surrounded with messages that say, 'Only crazy people complain about the government.'"
The hackers said they'd accessed 8 million patient records and 35 million prescriptions collected by the state's Prescription Monitoring Program. A state official told the paper that the data had been backed up and the files had been secured. State officials had learned on April 30 that the breach had occurred, the paper said, quoting the Website wikileaks.org. The ransom deadline passed on Thursday, the paper reported.
Which means that any information gained by sticking a secret GPS-tracking device on someone's car will only yield information that could have been gleaned through normal visual surveillance.
Some might wonder, normal visual surveillance by whom? R2D2? Spiderman? The decision stemmed from a case against Michael Sveum, a Madison resident who was accused of stalking. In his case, police got a warrant to slip a GPS on his car.
Sveum argued that this contravened his Fourth Amendment rights, which protect him against unreasonable search and seizure. His lawyers said that he was followed out of the public view, in intimate places such as his garage.
The court begged to differ, declaring that an officer could have used his eyes to see when Sveum entered and left his garage.
Sunday, May 10, 2009
Hackers have broken into the air traffic control mission-support systems of the U.S. Federal Aviation Administration several times in recent years, according to an Inspector General report sent to the FAA this week.
In February, hackers compromised an FAA public-facing computer and used it to gain access to personally identifiable information, such as Social Security numbers, on 48,000 current and former FAA employees, the report said.
Last year, hackers took control of FAA critical network servers and could have shut them down, which would have seriously disrupted the agency's mission-support network, the report said. Hackers took over FAA computers in Alaska, becoming "insiders," according to the report dated Monday. Then, taking advantage of interconnected networks, hackers later stole an administrator's password in Oklahoma, installed "malicious codes" with the stolen password and compromised the FAA domain controller in the Western Pacific Region, giving them the access to more than 40,000 FAA user IDs, passwords, and other data used to control a portion of the mission-support network, the report said.
The Necktie Spy Camera is the ideal accessory for your latest spy mission, you are bound to go undetected with this covert necktie, apart from the fact that everyone will realise you don’t normally wear one.
No software to install or setup, no instructions necessary. Just take it out of the package, plug it into a USB port on your computer using the integrated USB cable, and the Clickfree™ Traveler will do the rest.
Backup multiple computers with one Clickfree™ Traveler! The Clickfree Traveler offers incremental backup; upon first connection it will automatically find all of the user data files and copy them to the hard drive. Each time after that, it will only back up the new files or the ones that have changed.
While the software's default settings will probably be sufficient for most users, it is user-modifiable, providing full control over the backup settings. Even after the settings have been changed, the backup will still run without any user interaction.
Picky parents are installing hidden cameras and ordering psychological testing to ensure they find suitable nannies.
Private investigator Danny Toreson said his company Paragon had installed two or three hidden cameras to spy on nannies in the past year, but suspected DIY versions were much more common.
Nanny agencies said an increasing number of families were using corporate-style personality testing on job applicants.
But agencies said dodgy nannies were rare and clients were sometimes to blame when things went wrong.
Toreson set up one hidden camera for the parents of two pre-schoolers concerned about their alcohol disappearing when the nanny was there.
"As soon as the parents left, she was straight into the whiskey," said Toreson. The investigators confronted the young woman, who admitted an alcohol problem and resigned.