Sports: Ex-Patriots hinted that the locker room may be bugged – says Tony Dungy


On Thursday’s “Dan Patrick Show,” Tony Dungy — a regular on the program — casually threw out a very disconcerting bit of information about the Patriots’ intelligence gathering procedures. He made a point to say that this kind of stuff — which essentially amounts to spying — is not confined to New England. He’s just “heard” that it might definitively occur within the walls of Gillette Stadium.

Dan Patrick: “Did you think that your locker rooms were being spied on?”

Tony Dungy: “We had a few ex-Patriots that said, ‘You better be careful what you do in the locker room and what you say,’ and that kind of thing.[Read more of this post]

Read full story

Japan: Government taking steps to fight industrial espionage

The Yomiuri Shimbun

The National Police Agency will soon team up with the Economy, Trade and Industry Ministry to fight industrial espionage.

Joint measures will include visits by police officers to about 10,000 domestic corporations with cutting-edge technology to give them advice, according to NPA sources.

Under the plan, which will be implemented as early as this autumn, companies with state-of-the art technology will also be provided with the latest information about how industrial spying is conducted, according to the NPA sources.… [Read more of this post]

Read full story

FBI offers video with insight into economic espionage

The FBI has recently produced a video called “The Company Man: Protecting America’s Secrets” that illustrates how a US company was targeted by foreign agents and how the company worked with the FBI to set up a sting operation to catch the perpetrators.

“Economic espionage is a problem that costs the American economy billions of dollars annually and puts our national security at risk. To raise awareness of the issue, the FBI and the National Counterintelligence and Security Center have launched a nationwide campaign and released a short film aimed at educating anyone with a trade secret about the threat and how they can help mitigate it.”

The full Company Man video is about 36 minutes long, but the FBI also have other related videos that are worth looking into, including interviews with corporate attorneys, security directors, and FBI agents discussing the threat of corporate espionage.… [Read more of this post]

Read full story
silhouette on phone

SC Mayor arrested on wiretap charges- when computer hacking is not enough…

Mayor Rodney Turner of Lyman, South Carolina was arrested along with an associate on computer hacking and wiretap charges. It is important to recognize that while cyber crime receives the majority of attention these days, oral communication is still very much at risk and needs protection. None of the reports we read gave any indication of the wiretapping techniques used but they do refer to interception of oral communications. We will be following this story to see if there is any indication of how wiretapping of the town hall was accomplished.[Read more of this post]

Read full story

Louisiana: bugged picture frame eavesdrops on office conversations.

Detention center secretary, trying to be a whistle blower,  secretly recorded her supervisor’s conversations by placing a recording device behind a picture frame in his office. Regardless of intentions, the article indicates how easy it is to eavesdrop by hiding a recording device in an office or conference room. 

The Advocate, 7/30/2015

The Louisiana Supreme Court will decide who will preside over a criminal case against a Florida Parishes Juvenile Detention Center secretary, accused of illegally recording her supervisor’s conversations, now that a judge has recused himself and all of his colleagues in the judicial district.… [Read more of this post]

Read full story

Windows 10 security concern. Windows 10 wants to share your WiFi key through “WiFi Sense”

An article in The Register explains that a new Windows 10 feature could be opening up your wifi for others to use without your knowledge.

A Windows 10 feature, Wi-Fi Sense, smells like a security risk: it can share access to Wi-Fi networks with the user’s contacts.

Those contacts include their (neeHotmail) contacts, Skype contacts and, with an opt-in, their Facebook friends. There is method in the Microsoft madness – it saves having to shout across the office or house “what’s the Wi-Fi password?” – but ease of use has to be teamed with security.… [Read more of this post]

Read full story

Charges stand against woman who bugged diaper bag.

The CIA is known to have used fake poop for passing information, I don’t think I ever heard of them bugging a diaper bag, though.

The Ogden, Utah, Standard Examiner reports that slipping a recorder into a child’s diaper bag was not a good idea for Teri Anne Smith.

FARMINGTON — A judge ruled that even though a woman claimed she only wanted to record conversations between her ex-husband and children, the electronic eavesdropping charges against her will stand.

For more than an hour Thursday, 2nd District Judge Robert Dale heard arguments by defense attorney Rebecca Skordas and Deputy Davis County Attorney Richard Larsen about whether the charges against Teri Anne Smith are valid.… [Read more of this post]

Read full story

Eavesdropping via a “pocket dial” ruled ok.

A case reported on last year here, where a woman received a butt-dial call from her boss and recorded the ensuing conversation, has the appeals court now ruling in favor of the one who did the eavesdropping- they found the person who made the accidental call should have been more responsible.  [Read more below]

In the course of our work, we have often received calls from security directors believing one of their meeting rooms was bugged. They suspect this because someone received a voicemail that contained a recording of a confidential meeting. [Read more of this post]

Read full story

Voicemail as a cyber attack vector

Modern phone systems, both VOIP and premise based PBX, can offer voicemail to email conversion, so that when a message is left in your voicemail box, the system will send you an email with the message recording as an attachment for you to click on to hear. That now becomes one more way for cyber hackers to lure victims into clicking on fake link containing malware.

Security researcher Graham Cluely discusses this and other recent attack methods in a article at

MiniDionis: Where a Voicemail Can Lead to a Malware Attack

For just over a week, government departments, research institutes and other high-value targets have been on the sharp end of a sophisticated attack, where fake voicemails are being used to create a diversion while malware infects computer systems.… [Read more of this post]

Read full story

German officials use disposable phones over eavesdropping fears

from Deutsche Welle

Advice worth considering for any confidential assignments, especially overseas.

German officials are now using disposable mobile phones when they travel overseas, ‘Der Spiegel’ magazine has reported. The move comes following concerns about eavesdropping foreigners.

The so-called “burner” phones have been used not only in countries such as Russia and China, which continue to be at loggerheads with the West over a number of issues, including the Ukraine conflict – but also during visits to close allies such as the Britain and the United States, “Der Spiegel” news magazine reported on Saturday.… [Read more of this post]

Read full story