Tag Archives: Surveillance

Workplace surveillance, from Russia with love

By | July 2, 2020

(Part 3 of a series on post-covid remote working. Part 2 here) Ok, so you’ve decided to install some workplace surveillance software, despite all the good reasons why you shouldn’t. Do you know exactly what you’re letting yourself in for? A basic question: Who, exactly, are these companies? Let’s take a look at one: StaffCop — the dude with… Read More »

Employee snooping is big business. Expect it to get bigger

By | July 1, 2020

I wrote previously about how snooping on employees is going to become the norm as managers scramble to deal with a workforce that is reluctant — or unable — to return to the workplace. Enabling this will be a host of tools available for companies to do this. It’ll be impossible for a lot of bosses to resist.… Read More »

True Video Lies

By | December 12, 2011

This is a longer version of a piece I recorded for the BBC World Service. The other day my wife lost her phone out shopping. We narrowed it down to either the supermarket or the taxi. So we took her shopping receipt to the supermarket and asked to see their CCTV to confirm she still had the phone… Read More »

Carrier IQ’s Opt-Out Data Collection Patent

By | December 4, 2011

ZDNet writes here about an Carrier IQ patent that outlines keylogging and ability to target individual devices . Which is interesting. But Carrier IQ owns a dozen patents, including this one, which to me is much more interesting. This patent indicates what Carrier IQ software could do—not what it does—but it is revealing nonetheless: A communication device and… Read More »

Thwarting the VoIP Eavesdroppers

By | September 18, 2006

Interesting piece in Intelligence Online (subscription only) which mentions the growth of both software to intercept VoIP traffic, and services to thwart it. Companies mentioned: Amteus [company website] which “has developed secure software for Voice over IP (VoIP) communications but also for e-mail and file swaps.” Amteus basically works by establishing a peer to peer connection and encrypts… Read More »