TSCM and Penetration Testing
TSCM is closely related to cyber security and penetration testing, but often bridges other aspects of security as well.
TSCM is closely related to cyber security and penetration testing, but often bridges other aspects of security as well.
Pen Testing is a valuable part of security tests and is conducted by many corporations on a regular basis. Two pen-testers who worked for Coalfire Labs, a security firm based in Colorado, had been arrested after entering an Iowa county courthouse in September, 2019. The charges against the testers were finally dropped after more than five months.
Are IoT devices vulnerable to laser modulation? Destin from YouTube channel Smarter Every Day took up the task of meeting with researcher Ben Cyr, then going to Best Buy and obtaining and setting up a number of smart home devices (locks, garage door opener, thermostat). They then put them to the test with modulated laser beams.
The "Spy Van" of former Israeli Intelligence Officer, Tal Dilian, which came to light when he granted an interview to Forbes magazine has now caused a stir in Cyprus, where Dilian resides. The authorities there did not like the idea of someone offering such spying capabilities on their island.
Everyone has at least some fear or concern that their cell phone may be vulnerable to some form of hacking or cyber attack.
This past week, a number of people (168,149 to be exact) surely thought that may have been the case when odd text messages -from them- […]
The FBI has produced a video series as well as provided other tools and resources in an initiative called "Protected Voices". The initiative focuses on information security concerns that should be addressed by political campaigns, companies, and individuals. Even though the emphasis is on protecting the election process, much of the information applies to all types of information and cyber security threats faced by companies today.
Sounding much like a John le Carré novel, the COO of Credit Suisse resigns after a failed spy operation on a former execuitve, and the contractor who hired the spies commits suicide.
Neil Gerrard, the global co-chair of Dechert’s lucrative white-collar crime practice, claims that corporate investigators from Diligence International have committed various torts connected to the alleged spying, including trespass and misuse of private information. He is reportedly seeking £100,000 in damages.
In the Conversations in Close Protection podcast by Chuck Randolph and Chris Story, they recently interviewed Bob Nichols, head of NSA-Global Security Consultants, and discussed his incredible experience during the 2008 terrorist attacks in Mumbai, India. Bob and his security team were out to dinner but quickly found themselves in the middle of the terrorist attack. His story of how his team reacted and helped lead a number of other guests to safety is worth listening to by everyone in the security and protection fields.
Cameras and surveillance devices end up in the darndest places.
A spy camera was found in a meeting room in the National Palace, President López Obrador revealed Thursday morning.
During a daily news briefing Lopez Obrador said the device had been found in a meeting room in the National Palace, his headquarters.
“A few days ago, in one […]
A revealing look at a former Israeli Intelligence officer and multi-millionaire spy-tech dealer. Head of company Intellexa, makers of WiSpear, long-range wifi interception software, Tal Dilian opens up to show off his $9mil surveillance van and discuss the spy-tech industry for Forbes magazine.
Recent incidents serve as a warning- recording devices are easily secreted in a variety of places and can be very difficult to find. All someone needs is access to the target location. This could include employees, executives, cleaners, contractors, former employees who may still have access, or even the public at large...
USB sticks are a major insider threat concern, but usually for either copying and stealing confidential files or possibly installing malware onto a computer or network. This case involves a USB stick designed deliberately to destroy computers. A former student of College of St. Rose in Albany, NY purchased a "USB Killer" thumb drive. It is a device adapted to convert USB voltage to higher levels and feed it back into the computer thereby destroying at least the USB port and possibly much more.
Colombia’s prosecutor general has launched an investigation into the possible eavesdropping of the Constitutional Court that complained about possible bugs and wiretaps earlier this week. Colombia’s constitutional court said on Sunday it had been meeting in Club Nogal outside its normal offices citing suspicions that the court’s own offices are bugged and phone lines are being intercepted.
Details have emerged of a recent eavesdropping and bugging operation at a West Palm Beach law firm that reveal classic eavesdropping techniques. Looking at the details, we find some things they did right, and some things they could have handled better.
Trains, planes, buses, restaurants, or just on the street- keep your conversations private! Lessons learned...
Unknown to many is that office phone systems have a similar "feature" to the notorious Apple FaceTime bug. "Auto-answer" features can allow incoming calls to any extension to be automatically answered and microphones turned on without the target user taking any action, leaving the phone on hook, and not even knowing it had happened.
While trying to grab some last minute Christmas gifts I couldn't help but notice a large display of eavesdropping devices at throw-away prices. Be on the look out as such covert devices become more and more popular. They may start showing up in your office.