Exploding USB drives!
If you didn't know this before, don't plug an unknown USB drive into your computer... ever! Threats hidden in a USB drive can include malware, fried computers, and now explosives. "Flash drive" takes on a new meaning...
If you didn't know this before, don't plug an unknown USB drive into your computer... ever! Threats hidden in a USB drive can include malware, fried computers, and now explosives. "Flash drive" takes on a new meaning...
Loss of control of confidential information is a big deal. It can happen in many ways, deliberate espionage using wiretapping, bugging, and cyber breaches are a few methods that are commonly recognized, but there can be many more serious vulnerabilities. Learn how TSCM helps to protect confidential information.
When you first heard of the detection of the spy balloon, did you think “I’m glad this doesn’t affect my security department…”? If so, you may be mistaken. There is clearly a “domain awareness gap” in information security. It is the role of TSCM, Technical Surveillance Countermeasures, to help fill that gap. Click to read more on how TSCM looks carefully and meticulously at the gaps in information security that exist between physical, cyber, and other security areas.
Espionage news continues! Here are a few interesting articles worth checking out- Appliances may be listening - Banker concerns - High tech scare in Paris - and Spying cows!
Hidden cameras in the workplace are a serious concern. Here are a few tips as well as two reports of recent camera incidents in Georgia.
A man employed as a cleaner in Israeli Defence Minister Benny Gantz's home was sentenced to three years' prison for attempting to spy for Iran-linked hackers, the justice ministry said Tuesday.
Another episode of "Thinking of Eavesdropping? -- Don't Do It!" Throughout the TSCM industry, reports of eavesdropping devices being discovered are often found to have been placed by executives or other trusted individuals who feared that they may be fired or passed over for a promotion. They typically want to know what is going on behind the closed doors of a meeting they were not invited to. This case appears to fall into this category.
Another episode of “Thinking of Eavesdropping? Don’t Do It!”
PIERRE, S.D. (KELO) — The South Dakota Supreme Court says an invasion of privacy claim shouldn’t have been dismissed in favor of the defendants involving recordings that a wife secretly made to use against her husband in a divorce case.
Justice Janine Kern wrote the unanimous decision in Gantvoort v. Ranschau that the state’s high court released Thursday.
Doug Gantvoort sued his former wife, Mary Ranschau, and her attorney, David Strait, after Mary hid a recording device in the office that Gantvoort used at their Clear Lake business and where he sometimes spent nights.
From the court details:
Doug Gantvoort (Doug) sued his former wife, Mary Ranschau (Mary), and her attorney, David Strait (Strait), after Mary placed a hidden recording device in Doug’s office during their tumultuous divorce. Strait accepted fifty-one recordings that Mary made of Doug, saved them onto his computers, and attempted […]
“How to damage your career in one easy lesson.”
For those thinking of eavesdropping… best advice: Don’t Do It!
Country singer Laine Hardy was arrested Friday on a charge of eavesdropping. Hardy, who won Season 17 of “American Idol” in 2019, turned himself in to the Louisiana State University police after his ex-girlfriend found a recording device planted in her dorm room, according to Baton Rouge ABC affiliate WBRZ TV.
A warrant was filed for the 21-year-old musician after the victim found a recording device under her bed at Azalea Hall back in February. She told police the device first […]
If your customers or your employees use a gym, locker room, tanning bed, at your facility, what steps have you taken to ensure that privacy? Tanning salons in Plymouth, Michigan, are finding out the hard way that not taking preventative measures may have severe repercussions.
The defendants electronically spied on pro-democracy activists. Posing as an art dealer interested in purchasing the artwork of the dissident artist, they secretly installed surveillance cameras and GPS devices at the dissident’s workplace and in his car which were monitored in the PRC. [Click to read more]
Keeping loyalty among employees can be a difficult challenge, but may also be critical to survival of your business as well as stopping leaks, spying, and other forms of corporate espionage. Often requests for our corporate TSCM service come when a well placed employee in a tech position has left the company. Even those without any sort of grudge may still have access to confidential information. Those who may fit the “disgruntled” category may pose even greater threats.
A recent ZDNet article suggests that tech workers are more inclined to leave their jobs than those in other industries.
“As many as two-thirds of IT workers are open to or are already actively seeking new job opportunities, a global analysis of 18,000 employees indicates, putting CIOs in a precarious position as tech talent shortages bite.
A workforce survey conducted by analyst […]
Finally - a new update for the Exec Security News. More audio surveillance research from Ben Gurion University. Student caught spying, coach caught spying, and victims catch up with the spy.
Microphones come in all shapes and sizes. Some may be very small and used in covert applications. Others may just take on unique designs. This mic clearly adds the humorous effect, but it does go to show that microphones can be designed in any shape or size.
Where the wild spys are... Eavesdropping can be a concern for all areas, corporate espionage, sports, and celebrities. Your office may be a target, of course, but recent news also includes concerns for Peyton Manning as well as Britney Spears.
Insider threats are one of the most significant security concerns for all businesses. Many companies do not recognize the dangers that may exist within their own staff. This can quickly become apparent when an employee with a grudge is terminated. This employee was with the company for just 6 months, but was able to cause over $100,000 in damage within two days of her termination.
Researchers at Ben Gurion University have demonstrated a new class of TEMPEST attack for intercepting confidential information. Their technique involves recovering sound by analyzing optical emanations from a device’s power indicator LED, specifically in the circuits providing power to various speaker systems. Could your conversations be vulnerable?
Interview with Jonna Mendez, former CIA Chief of Disguise from Wired Magazine. Being a spy has always been difficult. During the Cold War, being a spy in Moscow was especially hard...