TSCM and Penetration Testing
TSCM is closely related to cyber security and penetration testing, but often bridges other aspects of security as well.
TSCM is closely related to cyber security and penetration testing, but often bridges other aspects of security as well.
Are IoT devices vulnerable to laser modulation? Destin from YouTube channel Smarter Every Day took up the task of meeting with researcher Ben Cyr, then going to Best Buy and obtaining and setting up a number of smart home devices (locks, garage door opener, thermostat). They then put them to the test with modulated laser beams.
The "Spy Van" of former Israeli Intelligence Officer, Tal Dilian, which came to light when he granted an interview to Forbes magazine has now caused a stir in Cyprus, where Dilian resides. The authorities there did not like the idea of someone offering such spying capabilities on their island.
The FBI has produced a video series as well as provided other tools and resources in an initiative called "Protected Voices". The initiative focuses on information security concerns that should be addressed by political campaigns, companies, and individuals. Even though the emphasis is on protecting the election process, much of the information applies to all types of information and cyber security threats faced by companies today.
Sounding much like a John le Carré novel, the COO of Credit Suisse resigns after a failed spy operation on a former execuitve, and the contractor who hired the spies commits suicide.
Neil Gerrard, the global co-chair of Dechert’s lucrative white-collar crime practice, claims that corporate investigators from Diligence International have committed various torts connected to the alleged spying, including trespass and misuse of private information. He is reportedly seeking £100,000 in damages.
In the Conversations in Close Protection podcast by Chuck Randolph and Chris Story, they recently interviewed Bob Nichols, head of NSA-Global Security Consultants, and discussed his incredible experience during the 2008 terrorist attacks in Mumbai, India. Bob and his security team were out to dinner but quickly found themselves in the middle of the terrorist attack. His story of how his team reacted and helped lead a number of other guests to safety is worth listening to by everyone in the security and protection fields.
Cameras and surveillance devices end up in the darndest places.
A spy camera was found in a meeting room in the National Palace, President López Obrador revealed Thursday morning.
During a daily news briefing Lopez Obrador said the device had been found in a meeting room in the National Palace, his headquarters.
“A few days ago, in one […]
A revealing look at a former Israeli Intelligence officer and multi-millionaire spy-tech dealer. Head of company Intellexa, makers of WiSpear, long-range wifi interception software, Tal Dilian opens up to show off his $9mil surveillance van and discuss the spy-tech industry for Forbes magazine.
Recent incidents serve as a warning- recording devices are easily secreted in a variety of places and can be very difficult to find. All someone needs is access to the target location. This could include employees, executives, cleaners, contractors, former employees who may still have access, or even the public at large...
USB sticks are a major insider threat concern, but usually for either copying and stealing confidential files or possibly installing malware onto a computer or network. This case involves a USB stick designed deliberately to destroy computers. A former student of College of St. Rose in Albany, NY purchased a "USB Killer" thumb drive. It is a device adapted to convert USB voltage to higher levels and feed it back into the computer thereby destroying at least the USB port and possibly much more.
Colombia’s prosecutor general has launched an investigation into the possible eavesdropping of the Constitutional Court that complained about possible bugs and wiretaps earlier this week. Colombia’s constitutional court said on Sunday it had been meeting in Club Nogal outside its normal offices citing suspicions that the court’s own offices are bugged and phone lines are being intercepted.
Details have emerged of a recent eavesdropping and bugging operation at a West Palm Beach law firm that reveal classic eavesdropping techniques. Looking at the details, we find some things they did right, and some things they could have handled better.
Trains, planes, buses, restaurants, or just on the street- keep your conversations private! Lessons learned...
Unknown to many is that office phone systems have a similar "feature" to the notorious Apple FaceTime bug. "Auto-answer" features can allow incoming calls to any extension to be automatically answered and microphones turned on without the target user taking any action, leaving the phone on hook, and not even knowing it had happened.
While trying to grab some last minute Christmas gifts I couldn't help but notice a large display of eavesdropping devices at throw-away prices. Be on the look out as such covert devices become more and more popular. They may start showing up in your office.
Looking for something to do in NY this holiday season? The KGB Spy Museum is opening in the Chelsea area of New York this December.
How valuable is conversation? Much of your day to day conversation may need to be kept confidential. Even if you know you are discussing critical, private matters, those around you may not have the same understanding. Eavesdropping resulted in $140,000 in fines for a Minnesota man who eavesdropped on his wife's conference calls.