Hidden camera in a bathroom forces plane to make emergency landing

By Jeff Black,  NBC News

An American Airlines flight from San Francisco to New York was forced to make an emergency landing in Kansas City on Sunday afternoon because an electronic device thought potentially to be a bomb was found on board, authorities said.

Upon landing, the plane carrying 215 passengers and nine crew members was moved to a remote area of the airport where the jet was evacuated and searched, officials said.

The device found on the JFK-bound 767 was initially described to NBC News by a senior law enforcement official as a “flash drive.”

Later, senior government officials said the device was taped to part of the bathroom.

An preliminary inspection of the device showed it was actually a camera disguised as a flash drive, the officials said.

Security officials, including the FBI in Kansas City, were working to determine who the device belongs to.

No injuries related […]

2016-12-16T20:23:55-05:00January 6th, 2014|

Surveillance Countermeasures also means you should be aware of your surroundings, you never know who might be listening…

Man Sits Behind Ex-CIA Director On The Train, Eavesdrops, And Live-Tweets His Conversation,
by Brian Jones, Business Insider

Former Director of the CIA and head of the National Security Agency Michael Hayden had his cover blown on the Acela train by  Tom Matzzie, a political strategist who used to run the D.C. branch of MoveOn.org, according to Dylan Matthews at The Washington Post

According to Matzzie, Hayden was on a call with reporters and was speaking under the condition of anonymity, intending to be cited only as “a former senior administration official.”

Matzzie didn’t just recognize him, he live-tweeted the conversation, and made some great quips about when he was going to get rendered for live-tweeting the private conversations of a man who was among the most powerful on the planet. 

In subsequent tweets, Matzzie said he was working […]

2016-12-16T20:23:55-05:00December 30th, 2013|

Eavesdropping device installed in vehicle; Dubai man fined and sent to jail for spying on ex-wife

Ex-husband used tracking devices on woman’s car to eavesdrop and find out her whereabouts

By Eman Al Baik  Published Thursday, December 26, 2013

Dubai Courts found an ex-husband guilty of spying by fixing a listening and tracking device in his divorced wife’s car and sentenced him to six months in jail and ordered him to pay Dh10,000 for invading the woman’s private life.

The Court also ordered the information solution company to pay Dh100,000 fine and another Dh100,000 to be paid by its manager for selling and offering the spying device without obtaining the necessary permissions from Telecom Regulatory Authority.

Consultant Ismail Ali Madani, Head of Funds Prosecution who investigated the case said that in 2009 the victim had bought a car from her husband with whom she had trade deals. In 2010, her husband asked her to get the car’s windows tinted from a specific outlet. […]

2013-12-26T00:12:27-05:00December 26th, 2013|

Jury had peek into phone hacker’s routine; News of the World trial

 Phone-hacking jury given peek into Glenn Mulcaire’s working routine

 Trial of Rebekah Brooks and Andy Coulson shown whiteboards and handwritten notes collected from hacker’s office and shed

Nick Davies theguardian.com

 The working life of a phone hacker was exposed in the Old Bailey on Thursday, including a note to be wary of a particularly tricky Vodafone employee and a suggestion that the News of the World’s deputy editor had been a target of his own paper’s eavesdropping.

 The jury in the phone-hacking trial was shown eight of Glenn Mulcaire’s whiteboards – covered in handwritten notes and diagrams about his work – found by police in an office and a garden shed belonging to the News of the World’s specialist hacker.

 One board carried a list headed “Networking”, which included the names of Rebekah Wade (as Rebekah Brooks was then) and Greg Miskiw, the former assistant editor of the News […]

2016-12-16T20:23:55-05:00December 18th, 2013|

Corporate Spies, Social Media, and BYOD

Corporate Spies Love Social Media, By Stephanie Blanchard, Digital Editor Mobile Enterprise

No one appreciates a fair-weather friend, the kind that is only around when something is in it for them, and quick to disappear when help is needed. But fake friends are even worse, the social profiles of people who simply do not exist in the real world. However, such profiles serve as bait, whether to collect information, or send out malware, or believe it or not, corporate espionage.
 
But are companies paying attention? After all, these are just social sites, right? And someone else’s problem. Think again. Spear phising is one way in to the network, and it’s possible every day.
 
One completely bogus profile on Linkedin, for example, identified by Websense Security Labs, had 400 connections. Yet it exists only to harvest intelligence, and in this particular case, lure viewers to a dating site. The consequences can […]

2016-12-16T20:23:55-05:00December 17th, 2013|

Tech execs urge Obama to limit NSA spying on their users

Washington Bureau, Dec 17, 2013

The nation’s top technology executives gave President Barack Obama an earful about the National Security Agency’s spying on their users at a White House meeting Tuesday.

The president met with 15 tech executives, including Apple CEO Tim Cook, FacebookChief Operating Officer Sheryl Sandbergand Google Executive Chairman Eric Schmidt.

Apple CEO Tim Cook

Obama talked to the executives about his administration’s work to fix HealthCare.gov, the federal insurance exchange, and announced he’s hired former Microsoft Office Division President Kurt DelBene to lead this effort. The president also encouraged the executives to share their ideas on how to improve the federal government’s procurement and use of information technology.

But NSA spying was clearly the most important topic for the tech executives.

They left the White House without talking to reporters, but they did issue the following joint statement: “We appreciated the opportunity to share directly with the president our principles on government surveillance that we released last […]

2016-12-16T20:23:55-05:00December 17th, 2013|

Butt-dialing cautions…

It’s probably happened to everyone, accidentally dialing the last number dialed or a speed dial from your cell phone, or receiving such a call from someone you recently spoke with and being able to listen to the other party riding in their car, listening to the radio, carrying on with their life unknowing that you are listening. Although fairly common, this can create serious security concerns.  I was in a security meeting at one organization with department heads and the Secret Service discussing the arrival of the President of the United States to an ongoing conference. An assistant of the person next to me came up to her and explained that she just received a voice message on her phone that was a recording of the entire conversation at our meeting.  She was a victim of butt-dialing. The last call the department head had made was to the assistant, […]

2016-12-16T20:23:55-05:00December 13th, 2013|

Technology lets peeping Toms take spying to new level [and not just peeping Toms: anyone who wants to spy]

Most news articles focus on voyeurism, but of course, it’s not just peeping Toms to worry about. It could be an employee looking for an edge up, a jealous executive, any adversary planning an attack or disruption. Anyone who wants to take advantage of another’s situation has high tech spy technology available on line, literally at their fingertips. Micro video recorders, audio eavesdropping, tracking devices, all available for a few dollars from on line sources.  
TIP: If you see a device you are not sure of, one tell tale sign could be if the device has a USB port on it. A key fob, calculator, even sun glasses, if they have a connection plug for a computer it could be suspicious. On more advanced devices you may not see such connections, though. The more common covert video and audio recorders have a USB port for both […]

2016-12-16T20:23:56-05:00November 30th, 2013|

Executive bad habits endanger corporate security

PC World

By Dave Jeffers, IDG Creative Lab

…According to ThreatTrack Security, top executives play a major, unintentional role in helping hackers breach their companies’ defenses. ThreatTrack recently reported the results of a survey of 200 United States-based corporate malware analysts. “Among the issues that malware analysts face: more than half said they’ve had to remove malware from the device of a member of senior leadership because the executive clicked on a malicious link in a phishing e-mail, while nearly 40% had to remove malware after a senior executive visited an infected pornographic website.”

The survey was conducted last month by Opinion Matters on behalf of ThreatTrack Security.

The numbers are striking enough to make you wonder about the average intelligence of our country’s highest-paid employees. A full 56 percent of those surveyed reported that they had removed a […]

2016-12-16T20:23:56-05:00November 28th, 2013|

Report from Milipol 2013, Paris, France

Entrance to Milipol, Parc des Exposition, Paris, France Entrance to Milipol, Parc des Exposition, Paris, France

Milipol is an advanced expo for military, police, and security held every two years in Paris, France, and alternate years in Qatar. Encompassing arms, ammunition, protective equipment, electronics, optics, IT, uniforms, mobility and more for government, military and public security applications protecting the world’s people and property, Milipol Paris has become the premier expo of the latest technologies and defense capabilities. This year’s show expected over 27,000 visitors.

RF Jamming Vehicle RF Jamming Vehicle

Armored communications vehicle. Armored communications vehicle.

While much of the expo was dedicated to military and police, many of the products on display would be of interest to anyone involved […]

2016-12-16T20:23:56-05:00November 27th, 2013|

Milipol Paris: 18th Worldwide exhibition of internal state security. Nov 19-22, 2013

Milipol is a top level international expo for police and security. It is held every two years in Paris, and now also on alternate years in Qatar.  It provides an opportunity to view some of the latest equipment available in fields of security,  executive protection, and police.  We will be attending Milipol this year, and hope to be able to supply some interesting reports when we return.

Of particular interest for the field of TSCM, is that along with the latest countermeasures gear being exhibited, there will also be displays of spying and eavesdropping equipment from manufacturers from all over Europe and Asia, including Russia, Israel, China, and probably any other place you can think of. Many of these countries who profess to be “shocked, shocked I tell you” that the NSA may have been listening to them, have been supplying the most advanced eavesdropping equipment and promoting industrial espionage against […]

2016-12-16T20:23:56-05:00November 13th, 2013|

Insider threats- the dangers within

We’ve come across a number of articles recently highlighting the spy threats that come from within a company’s own employees, a few of these are referenced below. As with all security, some of the biggest threats come from within your own walls.  This is particularly worth noting when it comes corporate espionage. About 90 percent of all eavesdropping devices and threats we have discovered were placed by current or former employees or others who had free access to the target areas. In espionage cases, there may be nothing obvious missing to alert you to the incident. By the time the loss of information is recognized it may be too late, the damage may be done. 

::::::::::::::::::::::::::::::::::::::::::

Digital security website Dark Reading reports:

Generation Y Users Say They Will Break Corporate BYOD Rules

Majority of users ages 21 to 32 say they would flout company policies restricting the […]

2016-12-16T20:23:57-05:00November 9th, 2013|

Spy shoes to drones: How U.S. surveillance changed

An article in USA Today reviews the history of spy-dom with an interactive graphic reviewing some devices and techniques from the 1940’s through 2013.  An important point to remember when considering all forms of technology today, is that the advancements have a cumulative effect, especially when it comes to spying. Techniques from the 1700’s, 1800’s, and 1900’s are still valid in 2013. Just because new technology has emerged does not mean that old technology or techniques have disappeared.  We now have Kindles and iPads, Youtube and podcasts, yet books, radio, and TV are still with us and very significant.  With much of today’s spying taking place in the cyber world, it’s important to remember that the old techniques have not gone away. Hidden microphones, transmitters, covert video, even putting your ear up to an air vent to hear voices from another room are still active valid eavesdropping threats […]

2016-12-16T20:23:57-05:00November 8th, 2013|

Spy: The Secret World of Espionage – exhibit opens at the Ronald Reagan Library in Simi Valley

The exhibition is on display at the Ronald Reagan Presidential Library in Simi Valley. It was put together through a collaboration between the CIA, FBI, the National Reconnaissance Office and the Foreign Excellent Trenchcoat Society, a Florida-based non-profit operated by author and collector Keith Melton.   www.reaganfoundation.org

Article By Gregory J. Wilcox, Los Angeles Daily News

The current flap about the NSA spying on U.S. allies and enemies alike shouldn’t be a big surprise to those familiar with the history of spycraft.

Governments have secretly been listening to and watching each other for decades and now an exhibit opening Wednesday at the Ronald Reagan Presidential Library in Simi Valley exposes the tricks of the spy trade.

Visitors to “SPY: The Secret World of Espionage,” will get a look at many devices and documents that had been kept secret for years. It’s the West Coast premiere of the traveling show so there […]

2013-10-31T20:15:51-04:00October 31st, 2013|

Confronting the Insider Threat

This article from this month’s Security Management magazine (ASIS publication) provides a lot of insight into understanding how people inside your organization could be motivated to betray you. The writer delves into areas such as personality traits, background checks, risk assessment and dealing with terminations.

Confronting the Insider Threat
By Laura Spadanuta

Edward Snowden, who has leaked classified information about intelligence collection activities of the National Security Agency (NSA), reportedly told the South China Morning Post that he sought a job as a contractor at government consulting firm Booz Allen Hamilton with a goal: to collect proof about the NSA’s domestic surveillance programs and alert the public to the programs. However, Snowden is not the typical insider threat. Most insiders who later betray their employer’s trust don’t start out with that intent. The change from benign employee to malicious insider can be spurred by anything from home-life stress […]

2016-12-16T20:23:58-05:00October 20th, 2013|

North Korea’s Overseas Restaurants Used for Espionage and Gaining Hard Currency

Travelling on business? Be careful not only of what you eat, but better be wary where you eat as well. “Another mission of the restaurants is to spy on …travelers who frequent the restaurants. Defectors say waitresses at the eateries are trained in intelligence gathering with an emphasis on prying corporate secrets from business travelers.”

BY: Bill Gertz,  Washington Free Beacon

North Korea’s global network of state-run restaurants, most in China, are dens of espionage and sites of operations involving tens of thousands of overseas North Koreans who send the regime in Pyongyang more than $100 million in hard currency annually, according to U.S. and western intelligence officials.

In Asia alone, the U.S. government has identified 60 restaurants ranging from Nepal to Cambodia to Dandong, China – located along the Yalu River separating China from North Korea.

North Korean […]

2013-10-19T19:31:18-04:00October 19th, 2013|

Hidden cameras keep on rolling

Discovery of hidden cameras continue to make the news. Here are a few of the latest. While the news media reports on the more sleazy discoveries, they are also popular devices for corporate spies. Most covert video cameras will also record audio making them even more dangerous as eavesdropping devices.  Corporate discoveries rarely make the news as they are often dealt with in-house to avoid bad public relations.

1. Police investigating hidden camera at Waukesha swim school

TMJ4 report by Michele Fiore Oct. 4, 2013 – UPDATED: Oct. 4, 2013

WAUKESHA – A part-time swim instructor is accused of setting up a hidden camera and capturing images of his teenage coworkers in a changing room.

34-year-old Michael Coyle appeared in Waukesha County Intake Court Friday in an orange jail jumpsuit. His mother looked on, taking notes, as the attorneys in the room spoke. Coyle did not […]
2016-12-16T20:23:58-05:00October 14th, 2013|

Corporate espionage- not new. Lack of awareness- also not new.

Having been working in the security field for over thirty five years, and in the surveillance countermeasures field for more than half of that, I’ve come to accept the need for protecting information as a given.  I’m always surprised when people I would have expected to be knowledgeable demonstrate their ignorance in such matters.

In this video from 2010, experienced newscaster Bob Schiefer shows that he was clueless about the world of corporate spying. Unfortunately, I think he represents the majority of CEO’s and corporate executives out there.  They need to understand the dangers their businesses face and how significant the threat against their proprietary information is.  

I just ordered Eamon Javers’ book, Broker, Trader, Lawyer, Spy from Amazon and have not read it yet. Judging by the reviews it may be good reading for anyone dealing with corporate information.

 Broker, Trader, Lawyer, Spy (on Amazon)

 

-Charles […]

2016-12-16T20:23:58-05:00October 5th, 2013|
Go to Top