Monthly Archives: January 2014

Spy on your partner using GPS? In the U.S.A. it’s legal

1407-GPSThe increasingly widespread use of GPS tracking devices has made them very popular also in the field of espionage and personal investigations. In fact, while until a few years ago the use of satellite tracking systems were almost exclusively reserved to government agencies and the military, the reduction of costs related to the accessibility of this technology has made them very popular for private or investigative use.

This dissemination, which can be seen as invasive of our privacy, in many cases it’s perfectly legal. A few days ago, the New Jersey court has in fact rejected the lawsuit filed by a husband to his wife, who in 2012 had spied on him.
The woman had placed a tiny GPS locator in the car dashboard of Mr. Kenneth Villanova, which for more than a month didn’t notice that his movements were followed step by step and recorded by his wife.

Once you discover the locator, Kenneth sued his wife. Unfortunately for him, the court has just ruled that the surveillance operation against him doesn’t violate any law, since the GPS device was used to reconstruct the movements in public places, so it’s not considered illegal.
In fact, there is no evidence that, in the 40 days before that Kenneth discovered the locator, the same has detected a shift of the person under observation in a private place.
The case is intended to make law in the U.S., and has been accepted in an extremely favorable by private investigators, who see given the opportunity to stalk the object of their research, as long as the GPS tracking doesn’t interfere with the privacy.

On the other hand, the defenders of privacy rights say that even if the device was used to follow Kenneth in public places, the citizen has the right to choose to don’t communicate to the other their position at any time, even if he’s in a visible place.
The debate rages between those who argue that there are cases, such as the protection of children, in which the right to privacy may be less, and who is convinced that it’s an absolute value at any time.

Bothered by her boss. She cannot sue him because she’s an intern

lavoromobbing
In times of shortage of work, are not rare the entrepreneurs who take advantage from the sad situation of many young people by underpaying them or making them work without a contract and without any right. This condition embittered employees and above all makes them more permissive and slaves in front of rude and sometimes illegal behaviors that very often seem real bullying.

In New York, for example, be an intern involves not only the difficulties of working for a very small fee, or often even zero: young workers without an employment contract aren’t protected against abuse in the workplace. A judge in Manhattan – as reported by Bloomberg Businessweek – has determined that Lihuan Wang, 26 years old, a former intern in the office of Phoenix Satellite Television, cannot sue her boss for sexual harassment because she isn’t a regular employee hired by the company.

The girl, originally from China, began an intern at the New York office in 2010, when she was 22 years old, and claims that her boss has repeatedly harassed her by touching her buttocks and trying to kiss her. But the law states: “New York City’s Human Rights Law’s protection of employees does not extend to unpaid interns”.

Such attitudes are unfortunately very common and have no geographical limits. In this sense, we can refer to the self defense, the only tool that you can use in case of workplace bullying, to gather evidences that allow you to report the attackers. In fact, the cases of abuse very often required evidences to determine the perpetration of the attitudes reported. Therefore, the use of hidden micro bugs or micro cameras are of great importance to protect themselves and get justice.

Video surveillance helps companies

Video-Sorveglianza-2
In the companies, each year, are discovered about 6 million thieves, without mention the cases who are without guilties. In times of crisis, as in recent years, also increased thefts. From some researches carried out in England, 78% of the losses of stock (or inventory shortages) comes from dishonesty employees.
The most sought-after goods are obviously the ones more expensive, but also those in common use that can be more easily sold.
The safety systems, in the retail field, are increased of 65% over the last 12 months.
It’s fully integrated systems, which in addition to the cameras, are equipped with 24-24h monitoring also through smatphone, tablets and PCs, access control through biometric locks, access control systems with burglar alarms and tag details.

Video surveillance is, therefore, necessary not only against external theft, but also against theft by unfaithful employees. As we have seen other times, there isn’t a “modus operandi” that uniquely distinguishes the thieves, so you can monitor a company internally only with a good integrated control system.
There are those who merely use business tools for personal purposes, but also those who steal, who makes real sabotage or vandalism, who sell data, informations and trade secrets to competitors or aiding and abetting acts of unfair competition.
In this regard, it’s also essential a physical analysis of the “context”, ie, the organization of spaces until set policies and control procedures that govern the life of the company and its employees. This can be done with the help of specialized companies in the field.

To these prevention and deterrence systems, it also adds the usefulness of the surveillance studies about customers and purchases. In fact, the same recognition technologies allow you to track real identikit of customers and categorize them by type. So, video surveillance, isn’t only an effective method to protect themselves from theft and damages, but it’s also an excellent tool for evaluating and screening the market.

The company must have always very clear ideas about how it wants to manage its own security, and the technology must serve its needs of protection. So the company has to rely on professionals in the security and surveillance field, avoiding waste of time and money with mediocre systems that not only are inefficient, but also make real damages to the company. In conclusion, the safety is a choice and at the same time a liability at the base of corporate policies .

The betrayal takes place during lunchtime

pranzotradimento
From always we try to find the time when there are most likely to betrayal. If the television stereotypes have accustomed us to think of the betrayal as a typically nocturnal activity, recent researches have shown that the best moment is the lunch break. The time favorite would be right in between 12.30 and 14.30 for six out of ten unfaithfuls.

The reason? It’s difficult to be discovered in that time frame; it’s permissible don’t respond to calls and text messages during lunch, then the unfaithful has more plausible excuses.
Also we must added the fact that the betrayer back home after several hours, because he returns first into the office, and this allows him to get back on track, deleting all the tracks with more calm. So he finds the right concentration and detachment.
From here we could also endorse the argument that the career people cheat more. Longer justified time outside, they meet more people, more lunch breaks and thus more opportunities.

It’s last days news that an english employee has seen arrive in the restaurant near the bank where he work, his wife, during the lunch break. The woman, after greeted cordially her husband, she sat with him. The man hasn’t had time to warn the usual lunch break companion (and after lunch) and her arrival has caused the unspeakable.
In fact, the surprise visit wasn’t random. The woman had installed on the husband’s mobile phone an Endoacustica Europe spy software. With this tool, she had heard, in environmental mode, what did her husband, what he said during and after the lunch break. Also she had monitored for several weeks the telephone traffic of her husband: calls and text messages left little to the imagination.
These are the cases in which technology provides overwhelming evidences and put their backs to the wall traitors.