About Exec Security

.

Spying by US allies on each other is common and expected, Obama suggests

By The Associated Press 
on July 01, 2013 at 10:20 PM, updated July 01, 2013 at 10:33 PM

WASHINGTON — President Barack Obama brushed aside sharp European criticism on Monday, suggesting that all nations spy on each other as the French and Germans expressed outrage over alleged U.S. eavesdropping on European Union diplomats.

Obama, in an African news conference with Tanzanian President Jakaya Kikwete, said the U.S. would provide allies with information about new reports that the National Security Agency had bugged EU offices in Washington, New York and Brussels. But he also suggested such activity by governments would hardly be unusual.

“We should stipulate that every intelligence service — not just ours, but every European intelligence service, every Asian intelligence service, wherever there’s an intelligence service — here’s one thing that they’re going to be doing: They’re going to be trying to understand the world better, and what’s going on in world […]

2016-12-16T20:24:02-05:00July 2nd, 2013|

Cat Bandit Smuggles Cellphones into Russian Prison

By Matt Peckham @mattpeckham  TIME News Feed

How far would you go to smuggle a clutch of cellphones into a prison? Strap them with packing tape to a cat, then let the poor unwitting feline sneak over a prison fence to deliver the contraband goods?
Cat Smuggler

Guards at a prison in northern Russia noticed just such a feline perched on a fence, reports the Moscow Times. Upon closer inspection, they discovered the cat had several cellphones and chargers secured by tape encircling its abdomen. The cat was caught last Friday attempting to bypass a security perimeter around Russia’s Penal Colony No. 1, a prison located near the Republic of Komi’s capital city, Syktyvkar.

“Two packages were taped to the animal’s back,” said the Republic of Komi’s penitentiary service in a statement. “When the packages were unwrapped, guards found objects prohibited in the penitentiary facility — two […]

2016-12-16T20:24:03-05:00June 22nd, 2013|

New weapon in the terror tool kit? Encryption software blocks eavesdropping

By Shaun Waterman  The Washington Times

 A cheap new encryption technology for mobile phones completely blocks eavesdropping, even from warrant-wielding law enforcement agents – raising fears the technology could fall into the hands of terrorists or criminals.

The software poses a growing problem that U.S. law enforcement agencies call “going dark” – the spread of communications technologies that cannot be intercepted even with a warrant because agencies lack the technical capabilities.

But experts say the feds’ proposed solution to get around the blackout – by legally mandating the insertion of “back doors” into such software to allow eavesdropping – creates an opening which could be exploited by hackers, online criminals or cyberspies.

The issue is not unique to the United States. Intelligence and counter-terrorism officials in the United Kingdom are concerned about the new mobile phone application, called Seecrypt, according the London Mail on Sunday.

The app provides individual users with military […]

2016-12-16T20:24:03-05:00May 23rd, 2013|

Your Business Is Never Too Small For A Cyber Attack

Forbes.com  This article is by George Westerman, a research scientist in the MIT Sloan School of Management’s Center for Digital Business. He is co-author of IT Risk: Turning Business Threats Into Competitive Advantage.  [Read Original Article]

A few years ago I was working with a small consulting firm, and one of our up and coming salespeople left for a competitor. No big deal. It happens. But several months later, the management team noticed a disturbing trend. The company kept losing bids for new business to this very same competitor. It had happened four times in a row when finally we realized that we’d forgotten to turn off the former employee’s network access. He had been logging into our network, stealing our information, and then undercutting us. 

As cybercrime reporting goes, this may be small potatoes.  But it wasn’t small to this company. It illustrates a […]

2016-12-16T20:24:03-05:00May 15th, 2013|

The Cat Who Couldn’t Spy: A CIA Fail

 News.Discovery.com   MAY 10, 2013
The CIA once recruited a feline agent to spy on enemies, according to a new book that sheds light on the elite cat and its abysmal failure during “Operation Acoustic Kitty.”

Emily Anthes, author of the new book “Frankenstein’s Cat”, told Discovery News that felines weren’t the only non-human field agents.

There were “cyborg insects as well as cyborg rats (called ratbots),” she said, adding that “there’s a long history of using dogs in military and police operations” with some of the dogs “outfitted with cameras and other sophisticated technological equipment.”

The U.S. military has also tried to use implants to control shark movements. Cat

Operation Acoustic Kitty, however, is one of the more memorable attempts to turn an animal into a spy. It took place in the 1960s.

“In an hour-long procedure, a veterinary surgeon transformed the furry feline into an […]

2013-05-13T21:27:11-04:00May 13th, 2013|

Protecting the Traveling Exec

Good advice from John Negus, VP of International Protection Group (www.IPGcompany.com) headquartered in NYC.

How to Protect the Traveling Exec- Seven tips for keeping your head honchos secure on the road

BY JOHN NEGUS   

In the world of private security, many have misconceived notions when it comes to traveling with an executive. As long as the travel is within the area you are licensed, you may be able to follow the same guidelines for day-to-day operations; however, traveling across state lines or overseas presents its own level of planning and coordination. John Negus

When an executive informs a protection specialist that they need to travel with them, some get lost in the glamour of the lifestyle. A common misconception is that when the client travels — especially for leisure — that the protector […]

2016-12-16T20:24:03-05:00March 12th, 2013|

White House announces new strategy to fight theft of intellectual property

from the Verge

Effort will include diplomatic, law enforcement pressure
By T.C. Sottek on 

The White House has just announced a new strategy to combat the theft of US trade secrets, created in coordination with several US agencies including the Departments of Defense, Homeland Security, Justice, and State. The strategy, detailed in a 141-page document, focuses on 5 action items, including diplomatic efforts, cooperation with private industry to promote best practices in security, enhanced law enforcement operations and legislation, and public outreach. The White House says that “the Administration will continue to act vigorously to combat the theft of American trade secrets that could be used by foreign companies or foreign governments to gain an unfair commercial advantage.”

Today’s announcement follows a spate of admissions by US companies that hackers had infiltrated their systems in recent months, sometimes employing elaborate and sophisticated attacks over […]

2013-02-21T09:25:47-05:00February 21st, 2013|

Port terminal operator APM eavesdropped on workers, union alleges

The union behind the recent L.A. and Long Beach port strike accuses APM Terminals of conducting ‘secret surveillance’ for months to gain an edge in labor negotiations. APM says it’s investigating the matter.

December 18, 2012|By Michael Welles Shapiro

APM Terminals has been accused by a California dockworkers union of eavesdropping on workers to gain an edge in contract negotiations.

The complaint, filed with the National Labor Relations Board by International Longshore and Warehouse Union Local 63, said APM “conducted secret surveillance, eavesdropping and snooping and listening in on confidential communications between and among union representatives, shop stewards and members concerning ongoing contract negotiations, bargaining strategies and labor-management issues.”

The complaint was filed Nov. 14, about two weeks before the union’s clerical workers went on an eight-day strike that shut down most of the cargo terminals at the ports of Los Angeles and Long Beach, the busiest seaport complex in the country. In […]

2013-01-03T00:26:20-05:00January 3rd, 2013|

How the biz world took a page from the CIA

December 20, 2012: 11:13 AM ET; from CNN Money
By Omar Akhtar, reporter

Companies use a variety of methods to stay one step ahead of their rivals. Competitive intelligence is one of the fastest growing ways to pull this off.

FORTUNE — Corporate espionage may be illegal, but companies can still keep tabs on the competition. Some large corporations around the globe spend more than $2 million a year hiring outside firms or staffing internal departments to track and analyze the actions and strategies of their competitors. These companies pull this off with the help of public resources and investigative research, a practice collectively known as competitive intelligence (CI).

“Competitive intelligence is gathering information, which is analyzed to the point where you can make a decision,” says Leonard Fuld, president of competitive intelligence and research firm Fuld & Company. This includes […]

2016-12-16T20:24:04-05:00January 2nd, 2013|

Beverly Hills Billionaire Eavesdropping Case Back in News

(CNS)  Posted  Tuesday, October 16, 2012– 5:11 PM

The son of a late billionaire testified today that he did not know until May 2007 that his father’s then-wife allegedly hired disgraced private eye Anthony Pellicano to wiretap telephone lines in the couple’s Beverly Hills residence nearly a decade earlier.

Richard W. Colburn told a Los Angeles Superior Court jury that he was unaware that someone had been listening to what he thought were private conversations when someone emailed him a story from The New York Times about Pellicano’s eavesdropping victims. Jacqueline Colburn allegedly sought Pellicano’s help in getting an edge in her divorce proceedings against Richard D. Colburn, according to the story.

“I felt violated,” he said. “I think over time I came to accept what had happened, but it still didn’t change the fact that what happened […]

2016-12-16T20:24:04-05:00October 20th, 2012|

Private investigator admits to bugging from 75 to 100 vehicles.

Vehicles are vulnerable to audio interception and should be inspected regularly. In this case, a private investigator claims to have bugged 75 to 100 cars.

Lawyer pleads not guilty to bugging car

Justin Berton, San Francisco Chronicle, September 25, 2012 
[Read Original Article] 

(09-25) 13:49 PDT OAKLAND — A divorce attorney pleaded not guilty Tuesday to charges that she hired a private investigator, who was a central character in Contra Costa County’s “dirty DUI” scandal, to illegally install listening devices inside the car of a client’s ex-husband.

Mary Nolan, 60, appeared in Oakland federal court, where she also pleaded innocent to four counts of tax evasion. She faces up to 15 years in prison and $750,000 in fines if convicted on all counts.

Nolan was first linked to disgraced private investigator Christopher Butler,50, in 2010, after two men told The Chronicle that she used their drunken driving arrests against them in divorce and […]

2016-12-16T20:24:05-05:00September 29th, 2012|

House Panel to Question Chinese Telecom Firms About Corporate Espionage

Wall Street Journal (09/07/12) Gorman, Siobhan

The U.S. House Intelligence Committee is expecting to hold public hearings next week in which it will question executives of Chinese telecom firms Huawei Technologies Co. and ZTE Corp. about concerns over corporate espionage, the companies’ ties with the Chinese military and government, and their dealings with Iran. The hearings are part of a year-old probe into the companies by the committee, which has prompted several sharply worded warnings and statements by Huawei alleging it is being discriminated against and protesting its innocence of any wrong doing. ZTE has already announced that it will take part in the hearings and plans to send Senior Vice President Zhu Jinyun. Huawei, however, has said that its participation in the hearings will be conditional on the committee making “appropriate arrangements,” though it has not indicated what arrangements those might be. Both companies have been attempting to further expand […]

2012-09-11T00:07:10-04:00September 11th, 2012|

Colorado contractor settles federal corporate-espionage allegations

From the Denver Business Journal, 9/4/2012

https://www.bizjournals.com/denver/news/2012/09/04/colorado-contractor-settles-federal.html?s=print

Colorado contractor settles federal corporate-espionage allegations

 by Greg Avery, Reporter Denver Business Journal

Paragon Dynamics Inc., an Aurora defense contractor, is paying $1.15 million to settle allegations it stole bid information from Raytheon Corp. about spy agency projects over which the companies competed in 2009.

John Walsh, U.S. attorney for the District of Colorado, announced the out-of-court settlement between Paragon and the federal National Reconnaissance Office on Tuesday. The NRO commissions spy satellites and other technology for U.S. intelligence agencies.

Paragon did not admit legal liability in the settlement agreement but acknowledged that an unidentified Paragon employee obtained Raytheon information.

Around July 31, 2009, an unidentified senior software director for Paragon used computer access to Raytheon’s systems in Aurora to obtain Raytheon’s bids for two NRO projects — code named Antietam and Savannah — plus other information, the settlement agreement says.

Security cameras caught the employee faxing some of the […]

2016-12-16T20:24:05-05:00September 11th, 2012|

Woman gets 4 years for stealing Motorola secrets

 Bloomburg Business Week, By Jason Keyser on August 29, 2012

CHICAGO (AP) — A federal judge sentenced a Chinese-born American Wednesday to four years in prison for stealing millions of dollars in trade secrets from Motorola, describing her as a soft-spoken, unassuming woman who carried out a “very purposeful raid” on the company in the dead of night.

In a barely audible voice and heavily accented English, 41-year-old Hanjuan Jin told the judge she was “so sorry for what happened” and pleaded for a second chance. Her lawyers had argued that she took the files merely to refresh her knowledge after a long absence from work and was not spying for China. They appealed for leniency and asked that Jin receive probation, in part because of her poor health.

But U.S. District Judge Ruben Castillo said it was important to send a message that would deter others with access to trade secrets from siphoning […]

2016-12-16T20:24:05-05:00August 31st, 2012|

Accidental espionage

 from SC Magazine, UK, Secure Business Intelligence;    August 15, 2012

Corporate espionage is a term that conjures up a world of high-tech gadgets, intelligence agents in trench coats and organised criminal gangs.

This is a world far removed from everyday life at the office – or is it? Companies today are spending an estimated £65 billion dealing with an on-going war against malicious outsiders, intent on accessing their information.

However, corporate espionage covers a broad range of activity, not all of it obviously criminal or malicious and there are many kinds of information and many ways of obtaining it. With money and attention being directed at shoring up IT systems, companies often ignore the risk presented by paper and can lose sight of the serious threat posed, often without intention, by their employees.

A recent Iron Mountain study revealed that office workers often form […]

2016-12-16T20:24:05-05:00August 19th, 2012|

When does social media become a security concern?

This article from Business Week reveals some of the problems that arose when a CEO’s family members posted detailed information regarding the family’s and parents’ activities and schedules. It highlights the fact that security concerns affect all aspects of life- home and office.

The Very Real Perils of Rich Kids on Social Networks  
By  on August 10, 2012, Business Week 
Zachary Dell, the teenage son of PC magnate Michael Dell, earned his 15 minutes of Internet fame this week. He appeared on a Tumblr site called the Rich Kids of Instragram in a photo posted by his older sister Alexa. There Zachary sat on the family jet, devouring a Ritz-worthy buffet on his way to Fiji. 

Anyone with a bit of curiosity could see that Alexa had posted the picture on Instagram and pointed to it via her Twitter account. On that same Twitter […]

2016-12-16T20:24:05-05:00August 15th, 2012|

State police: No evidence of Saints wiretap

“No evidence was found…” if you have suspicions of eavesdropping it is important to act immediately and know who to call for support.  “Evidence” can disappear quickly leaving you with nothing more than suspicions.  -cp

NEW ORLEANS — Louisiana State Police investigators have found no evidence that the Saints or general manager Mickey Loomis rigged Superdome wiring so opposing coaches’ radio communications could be intercepted.

“This has been an intensive investigation, and after numerous interviews we have determined that there is no evidence that state laws have been violated,” State Police Col. Mike Edmonson said Monday after meeting with Saints owner Tom Benson in New Orleans to brief him on the status of the probe.

State police investigators have been working in conjunction with the FBI since the eavesdropping allegations surfaced in news reports in April.

“We found no corroborating evidence that Mickey Loomis or anybody in the Saints was engaged in wiretapping or […]

2016-12-16T20:24:05-05:00August 14th, 2012|

How to Thwart Entrepreneurial Espionage

New businesses especially need to pay attention to keeping their proprietary information safe.  In this article, Susan Shreter gives information security tips for those starting out in a new venture. If you are planning any new business moves- whether starting a new business, adding a new product line, acquiring another company, you need to be sure that your discussions, your planning meetings, and your offices are protected from espionage. A professional TSCM sweep would be a good place to start.  -cp

By   Published August 13, 2012  FOXBusiness

Is there such a thing as entrepreneurial espionage? Entrepreneurs who believe that their “great ideas” have been stolen by ruthless competitors, opportunistic web surfers, shady consultants, and dishonorable prospective investors, would say, “Yes! There are people out there who will take advantage of all too trusting entrepreneurs.”

When entrepreneurs ask me about the risks associated with sharing their business plans with complete strangers, […]

2016-12-16T20:24:05-05:00August 14th, 2012|
Go to Top