This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

James Bond redux: profile update for the modern spy

Anything that mentions James Bond and I'm there... ?


Really interesting article in E&T about online social media spies and the tactics they use.


It's prompted me to just remind everyone in our community to report any suspicious behaviour from other community members and to be mindful of the amount of personal information you may be accidentally giving away.


Remember to visit and update your privacy settings regularly to ensure you're not giving away any personal information that you don't wish to and again, report any community member whose behaviour you're finding a little odd by visiting their profile and clicking on 'report'
Parents
  • OMS:


    ....I overheard a couple of people on a train north of Warrington discussing a security upgrade project at Sellafield - aspects of which I knew to be at least restricted information. With a name written on the flyleaf of a notebook and an unremoved flight tag on another's laptop bag it took me about 10 minutes to get a photo, a name and a reasonably good profile of the individuals from social media.

     



    I can't remember what the course was about (it was probably something to do with data protection or suchlike and it was years ago now) but I remember a tutor telling us about how he was able to steal a competitors client after overhearing a converstation on the train between two of their employees. They were discussing the issues they were having with the client so he swooped in (with this inside knowledge) and was able to convince the client that he was the one to fulfil their wishes. Something I always bear in mind when having sensitive conversations in public spaces and sometimes even in my own back garden...
Reply
  • OMS:


    ....I overheard a couple of people on a train north of Warrington discussing a security upgrade project at Sellafield - aspects of which I knew to be at least restricted information. With a name written on the flyleaf of a notebook and an unremoved flight tag on another's laptop bag it took me about 10 minutes to get a photo, a name and a reasonably good profile of the individuals from social media.

     



    I can't remember what the course was about (it was probably something to do with data protection or suchlike and it was years ago now) but I remember a tutor telling us about how he was able to steal a competitors client after overhearing a converstation on the train between two of their employees. They were discussing the issues they were having with the client so he swooped in (with this inside knowledge) and was able to convince the client that he was the one to fulfil their wishes. Something I always bear in mind when having sensitive conversations in public spaces and sometimes even in my own back garden...
Children
No Data