Ultimo bra tycoon Michelle Mone’s firm accused of bugging potted plant.

Once again, we find surveillance threats coming from within a company’s perimeters. Potted plants need to be checked carefully during any office sweep. They make an easy hiding place for eavesdropping devices. In this case, from Scotland, it was the chairman who actually approved the bugging.

Ultimo bra tycoon Michelle Mone’s firm accused of bugging pot plant in office of former director

By Sally Hind, DailyRecord.co.uk 9/24/2013

THE 35-year-old operations director claims he found a recording device in a plant pot containing artificial flowers at the headquarters in East Kilbride. 

A FORMER director of Michelle Mone’s bra firm yesterday told how he was horrified to discover his plant pot had been bugged after a row with the tycoon.  Scott Kilday described how he found a “covert recording device” wrapped around an artificial flower as he debated resigning from Michelle’s lingerie firm in the wake of her bitter […]

2016-12-16T20:23:58-05:00September 28th, 2013|

New technology provides new tools, new threats

by Charles Patterson, Surveillance Countermeasures and Information Security Specialist

Two new tech items in are in the news and expected to hit the market soon. As we watch such new products emerge we should be reminded of the need to be aware of surveillance threats that appear alongside new technical advancements and modern conveniences.

First of note, Samsung has introduced their new Android powered, smartwatch, Galaxy Gear. Along with many other features the watch includes the ability to record both video and audio, making it a convenient surveillance device.

Samsung Galaxy Gear smart watch

 

Sony has also unveiled a somewhat unique product with the QX10 and QX100, two “lens style” cameras offering high quality optics in a small packages that interface with smart phones or tablets for control and viewing. The devices are small, with all of the camera electronics is inside the lens housing. […]

2016-12-16T20:23:59-05:00September 6th, 2013|

Times are changing- this ain’t your father’s spy world.

Spy Kids: A sci-fi visionary on why the children of tomorrow are the NSA’s biggest nightmare.

The following article by Charles Stross, a Hugo Award-winning science-fiction writer, is an interesting read. We all know that technology is changing faster than we can digest it. What does this mean for our children? And more pointedly, what does it mean for the future world of espionage,  privacy, and information security.  While I may not entirely share the author’s view of the future, it is clear that many old and current rules will not apply.  It is worth paying attention, especially when considering new threats and new adversaries as they come of age. The author focuses on the challenge spy agencies will face in dealing with new recruits, but it is worth considering as well, the challenges to information security that new technology and the users of […]

2016-12-16T20:23:59-05:00September 1st, 2013|

Travel Tips: be wary of free cell phone charging stations.

This was reported a while back, but I was reminded of it while planning for an overseas trip. Airports, convention centers, and many other locations offer free charging stations for attendees or visitors to be able to get an extra boost of power for their cell phones. They typically will have USB cables attached or built in USB ports where users can plug their own cables in.

The other side of that cable could be connected a device or computer designed to download data, contacts, and images from the cell phone. This can be done to some degree even if the lock screen is still on.  It was proved in concept at the DefCon hacker convention in 2011 when researchers from Aries Security set up charging kiosks specifically designed to warn users of the risk. The kiosks did not steal any information, but when an active device was plugged […]

2016-12-16T20:24:02-05:00July 16th, 2013|

The confessions of Enron executive, Andy Fastow

Understanding what makes people commit criminal acts is one of the first steps in improving security.  This is true for physical security and information security as well as financial matters. Employees as well as executives do not always understand where to draw the line. 

The convicted former Enron CFO is now admitting his sins to audiences — but also claiming that what other companies are doing today is “10 times worse” than what Enron did.

from CNN Money, By Peter Elkind, editor-at-large July 1, 2013

“Ladies and gentlemen, Mr. Andrew Fastow!”
He was an improbable Las Vegas headliner, taking the stage before a packed convention hall of 2,500 fraud examiners.

For former Enron CFO Andy Fastow, who spent more than five years in federal prison for his crimes, last week’s appearance before the Association of Certified Fraud Examiners was his most public step in an uphill redemptive journey — to explain how […]

2016-12-16T20:24:02-05:00July 14th, 2013|

Iron Mountain And Shred-It Pay $1.1 Million in Lawsuit Over Failure To Properly Shred Sensitive Government Documents

 Honesty is the best policy. Major document shredding firms were misrepresenting their capabilities in order to win contracts.

Articles from KNOE.com, the Boston Globe and Boston Business Journal

PHILADELPHIA, July 9, 2013 /PRNewswire/ — Two of the biggest document-shredding companies in America, Iron Mountain Corporation (“Iron Mountain”, NYSE “IRM”) and Shred-It USA (“Shred-It”), have agreed to pay a total of $1.1 million to settle a lawsuit alleging that they defrauded the government by failing to shred sensitive documents as required by their contracts with the United States government.

The settlement follows a multi-year investigation by the United States Department of Justice triggered by a lawsuit filed by Pennsylvania resident Douglas Knisely, owner of a family-operated document-shredding business.

A third Defendant, Cintas Corporation (“Cintas”, NASDAQ “CTAS”), a multi-billion company based in Cincinnati, Ohio, continues to contest allegations that it defrauded the federal government by failing to properly shred sensitive documents.

The qui tam lawsuit filed in federal district court in Philadelphia in 2010 by Mr. Knisely alleged […]

2016-12-16T20:24:02-05:00July 13th, 2013|

Espionage? Moi?

Excerpts from Foreign Policy magazine
BY ADAM RAWNSLEY | JULY 1, 2013

Sure, Paris is a hypocrite when it comes to spying. But it isn’t alone.

 If you buy the latest reporting out of Europe, France is outraged, simply outraged, at news that the National Security Agency has been eavesdropping on the European Union through its mission in New York and embassy in Washington. French political parties are now rumbling about offering asylum to Edward Snowden, the former NSA contractor at the center of the leaks. The French government is demanding answers from the United States about its snooping. Monsieur Le Président himself, François Hollande, is calling for an end to the spying.

 All of which is pretty hilarious, given France’s penchant for stealing American defense technology, bugging American business executives and generally annoying U.S. counterintelligence officials. If you’ve been paying attention, you know that France is a proficient, notorious and unrepentant economic spy. “In economics, […]

2016-12-16T20:24:02-05:00July 5th, 2013|

Hidden microphone discovered inside Ecuadorian embassy

Here is one reason regularly scheduled sweeps of offices are important…

Daily Mail
By HARRIET ARKELL PUBLISHED: 11:19 EST, 3 July 2013 | UPDATED: 11:19 EST, 3 July 2013

A hidden microphone has been found inside the Ecuadorian embassy in London where WikiLeaks founder Julian Assange has been living for the past year, the country’s foreign minister has said.

Ricardo Patino said the microphone was found inside the office of the Ecuadorian ambassador to the UK, Ana Alban, in Knightsbridge in central London.

The foreign minister did not say who was believed to be responsible, and the embassy made no comment today – Mr Assange’s 42nd birthday.

Mr Patino said the device was discovered during a brief visit he made to London last month when he met Assange and held talks with British Foreign Secretary William Hague.

‘We regret to inform you that in our embassy in London we have found a hidden microphone,’ Mr Patino […]

2016-12-16T20:24:02-05:00July 3rd, 2013|

Risky Business of Travel

ASIS Security Management magazine has a recent article regarding the security aspects of business travel. The article offers information security advice highlighting some of the concerns addressed by the security department at industrial supply company W.W. Grainger, offering advice to their employees who travel internationally. Even though they are not in research and development or other high-tech field, they recognize the value in their confidential information. They did not mention eavesdropping countermeasures, but that is also a key element in information security plans, often overlooked by security departments. 

By Ann Longmore-Etheridge  [Full article available here]

… W. W. Grainger is a Fortune 500 industrial-supply company based in Lake Forest, Illinois, with offices in Central and South America, China, Canada, India, Japan, and Puerto Rico. Grainger has about 21,000 employees, out of which about 1,500 may travel internationally on business in a given year. Keith Blakemore, CPP, its director […]

2016-12-16T20:24:03-05:00June 9th, 2013|

New weapon in the terror tool kit? Encryption software blocks eavesdropping

By Shaun Waterman  The Washington Times

 A cheap new encryption technology for mobile phones completely blocks eavesdropping, even from warrant-wielding law enforcement agents – raising fears the technology could fall into the hands of terrorists or criminals.

The software poses a growing problem that U.S. law enforcement agencies call “going dark” – the spread of communications technologies that cannot be intercepted even with a warrant because agencies lack the technical capabilities.

But experts say the feds’ proposed solution to get around the blackout – by legally mandating the insertion of “back doors” into such software to allow eavesdropping – creates an opening which could be exploited by hackers, online criminals or cyberspies.

The issue is not unique to the United States. Intelligence and counter-terrorism officials in the United Kingdom are concerned about the new mobile phone application, called Seecrypt, according the London Mail on Sunday.

The app provides individual users with military […]

2016-12-16T20:24:03-05:00May 23rd, 2013|

Hacking Humans, Corporate Espionage and the Spies Among Us

This article is from Cari Guittard from Huffington Post who recently interviewed Ira Winkler, President of Secure Mentem and the Internet Security Advisors Group (ISAG) regarding changes in corporate espionage and some simple countermeasures. Ira Winkler is an expert in computer security and penetration testing. His responses point to the need to pay attention to many overlooked internal threats. Full article can be read [here]

Ira points out that internal threats from employees are often overshadowed by the well publicized concerns over cyber warfare. It’s important to recognize that along with hacking and computer threats, the information leaked through other forms of electronic eavesdropping can be equally devastating to a corporation.  

Hacking Humans, Corporate Espionage and the Spies Among Us

By Cari E. Guittard, Principal, Global Engagement Partners; Professor of Global Management, Hult International Business School

I reconnected with Ira after his remarks at the SC eSymposium to get his take on […]

2016-12-16T20:24:03-05:00May 18th, 2013|

The Cat Who Couldn’t Spy: A CIA Fail

 News.Discovery.com   MAY 10, 2013
The CIA once recruited a feline agent to spy on enemies, according to a new book that sheds light on the elite cat and its abysmal failure during “Operation Acoustic Kitty.”

Emily Anthes, author of the new book “Frankenstein’s Cat”, told Discovery News that felines weren’t the only non-human field agents.

There were “cyborg insects as well as cyborg rats (called ratbots),” she said, adding that “there’s a long history of using dogs in military and police operations” with some of the dogs “outfitted with cameras and other sophisticated technological equipment.”

The U.S. military has also tried to use implants to control shark movements. Cat

Operation Acoustic Kitty, however, is one of the more memorable attempts to turn an animal into a spy. It took place in the 1960s.

“In an hour-long procedure, a veterinary surgeon transformed the furry feline into an […]

2013-05-13T21:27:11-04:00May 13th, 2013|

Top Senate Republican Asks Feds to Investigate Possible Illegal Wiretap

Editor’s comment: interesting to note, that in the story below, Mitch McConnell’s name is tied to this incident, but the alleged slanderous statements that were intercepted were made by someone else, not McConnell.  Politics aside,  if a meeting or board room is bugged, or if conversations are intercepted, this demonstrates that the PR problems created can easily affect much more than just the lone person who made the intercepted statements. Keep your meetings secure through professional technical countermeasures!

The Weekly Standard

10:39 AM, APR 9, 2013 • BY DANIEL HALPER

The top Republican in the Senate, Mitch McConnell, is asking the feds to investigate whether a closed campaign meeting was illegally wiretapped by his political opponents. The issue arises after the liberal outlet Mother Jones published “A recording of a private meeting between the Senate GOP leader and campaign aides.”

In a statement to the press, McConnell’s campaign manager, Jesse Benton, says the feds are getting […]

2016-12-16T20:24:03-05:00April 10th, 2013|

Protecting the Traveling Exec

Good advice from John Negus, VP of International Protection Group (www.IPGcompany.com) headquartered in NYC.

How to Protect the Traveling Exec- Seven tips for keeping your head honchos secure on the road

BY JOHN NEGUS   

In the world of private security, many have misconceived notions when it comes to traveling with an executive. As long as the travel is within the area you are licensed, you may be able to follow the same guidelines for day-to-day operations; however, traveling across state lines or overseas presents its own level of planning and coordination. John Negus

When an executive informs a protection specialist that they need to travel with them, some get lost in the glamour of the lifestyle. A common misconception is that when the client travels — especially for leisure — that the protector […]

2016-12-16T20:24:03-05:00March 12th, 2013|

China Wire-tapping Wars: The World of Official Espionage

From China Digital Times 

Wire-tapping Wars: The World of Official Espionage

 Before the Southern Weekly crisis broke out last month, one of the paper’s sister publications, the magazine, published a scathing exposé on the secret world of spying and backstabbing endemic throughout Chinese officialdom. Aside from revelations about Bo Xilai bugging calls with president Hu Jintao, there has been little available information about  inside the Party.

The December article narrates the adventures of Qi Hong, an ex-wire-tapping detective who was so busy debugging the offices of various Chinese officials, he once dismantled 40 hidden wires and cameras in a single week.

The piece is no longer available from Southern People Weekly online.
CDT’s Mengyu Dong has translated the entire article below:

Wire-tapping with Chinese Characteristics

Qi Hong grabbed a handrail on a crowded Beijing subway, exposing a deep scar. Others on […]

2016-12-16T20:24:04-05:00February 19th, 2013|

How the biz world took a page from the CIA

December 20, 2012: 11:13 AM ET; from CNN Money
By Omar Akhtar, reporter

Companies use a variety of methods to stay one step ahead of their rivals. Competitive intelligence is one of the fastest growing ways to pull this off.

FORTUNE — Corporate espionage may be illegal, but companies can still keep tabs on the competition. Some large corporations around the globe spend more than $2 million a year hiring outside firms or staffing internal departments to track and analyze the actions and strategies of their competitors. These companies pull this off with the help of public resources and investigative research, a practice collectively known as competitive intelligence (CI).

“Competitive intelligence is gathering information, which is analyzed to the point where you can make a decision,” says Leonard Fuld, president of competitive intelligence and research firm Fuld & Company. This includes […]

2016-12-16T20:24:04-05:00January 2nd, 2013|

Vulnerability on VOIP phone systems.

by Charles Patterson
Patterson Communications, Inc.
www.execsecurity.com 

VOIP vulnerability and disaster recovery

 We’ve had a busy schedule here in the New York area since Hurricane Sandy hit. A few of our clients lost their entire offices due to flooding from the Hudson River and had to relocate. We have been spending many hours helping some of them get their phone systems situated and back on line.

Flood waters

 One of our clients’ entire office (60 employees) was under four feet of water and they quickly had to relocate to a temporary facility a few miles away. To keep their business operational they signed up with a VOIP hosted phone provider who was able to give them phone service at their new office in a very short period of time. This was great for their quick recovery from the disaster. In helping them set up their new phones, though, […]

2016-12-16T20:24:04-05:00December 11th, 2012|

Industrial espionage: is it tax deductible?

 British tribunal sees spying as a normal business expense…

Industrial espionage: It’s tax deductible

By  | October 16, 2012, 3:48 AM PDT  
How do you soften the blow when you’ve had to pay a $100 million fine for spying on your business rival?
You deduct it from taxes.

That’s what British Formula 1 race car team McLaren is doing with a penalty it paid for secretly photocopying technical designs belonging to Italian rival Ferrari.

A British tax tribunal has even approved the maneuver. It agreed with McLaren that “spying on rivals is a normal business expense,” as BBC Radio 4 presenter John Humphrys phrased it on a recent news program (you can listen here until the link expires).

The fine was levied by Fomula 1’s French ruling body, the Federation Internationale de l’Automobile, and not via civil action.

Pssst! If you snap the […]

2016-12-16T20:24:04-05:00October 20th, 2012|
Go to Top