Articles written by Charles Patterson.

Who’s in your conference call?

Electronic communications has made meeting up with others via conference calls and web conferencing quite convenient and very commonplace today.  It is important, though, to be aware of the security concerns and vulnerabilities for all types of conference services.

During an inspection we performed at a financial services company we found that their brand new boardroom conferencing […]

2016-12-16T20:23:47-05:00October 13th, 2014|

Voicemail hacks still prevalent, causing fraudulent phone charges to small businesses.

There are a number of reasons to try to keep your voicemail secure. The most significant may be to prevent theft of information. Celebrities and politicians could be the most obvious targets, the escapades of reporters working for Rupert Murdoch’s News of the World are testament to this (see Hack Attack). Business leaders and decision […]

2014-09-02T12:41:54-04:00September 2nd, 2014|

Backdoors to stored phone recordings.

Listening-Recording-Device

“Calls may be monitored for quality assurance…” but also for other reasons such as legal documentation or emergency services and 911 calls. Call recordings can exist for a number of legitimate purposes, using a variety of means and equipment. Not many use actual tape anymore, it […]

2016-12-16T20:23:49-05:00May 29th, 2014|

Hotel eavesdropping fears and security tips.

TURKISH AK PARTY CHANGES HOTEL OVER WIRETAPPING FEARS

ANKARA — AK Party officials decided not to hold their biannual meeting at the Asya Termal, a hotel run by a Gülen Movement affiliate, over concerns that the venue may be bugged. The hotel in Ankara’s Kızılcahamam district was the traditional venue for the biannual consultation meetings […]

2016-12-16T20:23:50-05:00April 21st, 2014|

Corporate espionage- not new. Lack of awareness- also not new.

Having been working in the security field for over thirty five years, and in the surveillance countermeasures field for more than half of that, I’ve come to accept the need for protecting information as a given.  I’m always surprised when people I would have expected to be knowledgeable demonstrate their ignorance in such matters.

In this […]

2016-12-16T20:23:58-05:00October 5th, 2013|

The need for protecting confidential information.

The White House administration recently launched a strategy to mitigate the theft of U.S. trade secrets. (see:  www.whitehouse.gov/blog/2013/02/19/launch-administration-s-strategy-mitigate-theft-us-trade-secrets )

Part of the new White House strategy includes supporting ” industry-led efforts to develop best practices to protect trade secrets and encourage companies to share with each other best practices that can mitigate the risk of trade secret […]

2016-12-16T20:24:04-05:00February 23rd, 2013|

Corporate espionage: fascination with spying and spy technology

Interest and fascination with spying is ever present, especially in the corporate world. This can lead employees to cross boundaries and attempt illegal eavesdropping or theft of information for their own advancement or profit. 

The availability today of inexpensive electronic devices that can be used for covert surveillance can lead the less ethical among us to […]

2016-12-16T20:24:04-05:00January 27th, 2013|

Vulnerability on VOIP phone systems.

by Charles Patterson
Patterson Communications, Inc.
www.execsecurity.com 

VOIP vulnerability and disaster recovery

 We’ve had a busy schedule here in the New York area since Hurricane Sandy hit. A few of our clients lost their entire offices due to flooding from the Hudson River and had to relocate. We have been spending many hours helping some of them […]

2016-12-16T20:24:04-05:00December 11th, 2012|

International voicemail hackers attack random US phone systems

Along with eavesdropping and theft of information, your voicemail system is also vulnerable for financial exploitation. In the past decade, there have been numerous occurances of voicemail systems being hacked for financial gain.  In many of these incidents the technique used was trying to force voicemail systems to place international calls to the Philippines, Cuba, or […]

2016-12-16T20:24:05-05:00August 17th, 2012|

Threat of foreign eavesdropping devices

Eavesdropping devices and bugs on sale in Japan.

High tech electronic eavesdropping devices are sold openly in many foreign countries. They are easily obtained by anyone traveling on business or on vacation. These devices pictured were on sale in a small […]

2016-12-16T20:24:06-05:00July 29th, 2012|

Communications Security and Eavesdropping Countermeasures

Protection of information and communications is critical in today’s business world.  We will be updating our blog regularly with news, information, and advice to help you strengthen your information infrastructure. 
Please contact us directly if you have questions regarding your own privacy needs or specific situations.

Charles Patterson, President
Patterson Communications, Inc.
New York 

2016-12-16T20:24:06-05:00July 23rd, 2012|
Go to Top