Archive for February, 2010

25 Feb
2010

code breaking and social espionage.

In the age of social networking, it’s easy to be a social spy. There are stalker feeds everywhere, letting you know the exact mood and location of your “friend” or…”target.” So how do we navigate our friendships via social networking? What are the new codes we have to live by in a technologically savvy world

15 Feb
2010

trust and distrust: the foundation of our lives.

Spy vs. Spy. Trust vs. Distrust. The only person a spy can trust is him/herself. However, I am inclined to

(the) eye on the fame game: countersurveillance and the online social climber.

(the) eye on the fame game: countersurveillance and the online social climber.

How can you spot online social climbers? Utilize your spy skills with some good old fashioned surveillance. Consider me your source in counterintelligence

how to survive when your cover is blown.

how to survive when your cover is blown.

Hollywood is filled with spies, confidence men (and women), liars, cheats, tricks, thieves, and beautiful people. WSo what happens when your cover is blown? If you’re smart and have done your homework you should be able to stay one step ahead. The best way to stay in control? Blow your own cover

code breaking and social espionage.

code breaking and social espionage.

In the age of social networking, it’s easy to be a social spy. There are stalker feeds everywhere, letting you know the exact mood and location of your “friend” or…”target.” So how do we navigate our friendships via social networking? What are the new codes we have to live by in a technologically savvy world

Follow Me!

Follow Me! Follow Me! Follow Me! Follow Me!