News sent out via mailchimp.

Canada kicks out spies, sending them where? Mostly to the US…

Spying is a two way street. An article in OurWindsor.ca reveals that during the past decade, Canada has given the boot to 21 spies, 5 of them returned to the US.

From 2004 to 2014 Ottawa sent back to the U.S. five of a total of 21 of those barred from Canada “on security grounds for engaging in an act of espionage that is against Canada or that is contrary to Canada’s interests,” according to a document produced by Canada Border Services Agency.

It’s not clear whether the espionage was by foreign government agents or whether it was industrial espionage — that is, spying to obtain state secrets or spying that targeted intellectual property or corporate secrets.

A document released under the Access to Information law shows the suspected spies were permanent residents or foreign nationals deemed inadmissible on security grounds, but does not break down […]

2016-12-16T20:23:41-05:00March 8th, 2015|

Ponemon Institute study: Low tech information theft successful nine times out of ten

“Factors that made a noticeable difference in the amount of information collected were clean desk policies, standardized document shredding policies, suspicious reporting processes, and mandatory training and awareness.”

By Maria Korolov, CSO online

Researchers were able to get sensitive corporate information just by looking around corporate offices in 88 percent of attempts, according to a new study.

Michigan based Ponemon Institute sent researchers to 43 offices belonging to seven large corporations who had previously agreed to participate in benchmarking research. The researchers had valid identification as temporary employees, and management knew they were coming — though the office staff did not.

The researchers spent up to two hours in each office, wandering around, taking pictures of computer screens, and picking up documents marked “confidential” and putting them in their bags — all deliberately within full view of the regular employees.

In the vast majority of the cases, the regular office staff did not […]

2016-12-16T20:23:41-05:00March 2nd, 2015|

The ‘Real-Life Q’

Gizmodo has an interesting interview with Ralph Osterhout, a man who builds spy gadgets for a living, interview by Sean Hollister.

As a boy, Osterhout was so enamored with Ian Fleming’s Bond novels that he decided to become a spy himself. He trained himself to shoot, drive, fight, even build his own weapons and gadgets. He studied the Bond films and, at the age of 22, built his own miniature submarine like the ones in the Bond classic Thunderball. He started a company building high-tech dive gear, and traveled around Europe to visit the exotic Bond locales he’d read about. “I stayed at the same hotels, went to the same restaurants and villages, smoked John Player No. 10 cigarettes,” he once told Wired.

That’s roughly when the US government came calling. They needed Bond-grade gear for their elite Navy SEAL divers. Soon, […]

2016-12-16T20:23:41-05:00February 22nd, 2015|

In a ‘nation of eavesdroppers’, everyone can hear you!

If it’s trending in Britain, you can be sure it’s happening all over. British telecom company O2 surveyed 2000 people about casual eavesdropping. If you don’t have a “Cone of Silence”, you may need to heed their warning.

Here are some of the results from O2‘s survey:

  • Over 80 per cent of Brits admit to eavesdropping on other people’s phone conversations while on a train or platform
  • Nearly 9 in 10 think that people have no reservations while talking on the phone in public
  • 60 per cent of Brits think people would benefit from some kind of etiquette guide when it comes to talking on the phone whilst using public transport
  • O2 has produced the very first public transport mobile phone etiquette guide to help Brits use their phone considerately

Maxwell Smart’s Cone of Silence

 

84 per cent of people admitted to listening in […]

2016-12-16T20:23:41-05:00February 16th, 2015|

Dating apps pose corporate security risk, says IBM

Reporting by Bill Rigby, ReutersThe millions of people using dating apps on company smartphones could be exposing themselves and their employers to hacking, spying and theft, according to a study by International Business Machines Corp.

IBM security researchers said 26 of 41 dating apps they analyzed on Google Inc’s Android mobile platform had medium or high severity vulnerabilities, in a report published on Wednesday.

IBM did not name the vulnerable apps but said it had alerted the app publishers to problems.

Dating apps have become hugely popular in the past few years due to their instant messaging, photo and geolocation services. About 31 million Americans have used a dating site or app, according to a 2013 Pew Research Center study.

IBM found employees used vulnerable dating apps in nearly 50 percent of the companies sampled for its research. Using the same phone for work and […]

2016-12-16T20:23:41-05:00February 14th, 2015|

LA Confidential; West Hollywood council deputy suspended in eavesdropping case

We’re not sure how this eavesdropping was accomplished, whether through a bugging device or perhaps just through the phone. Phone call recording is often a built in feature for phone systems, but can also be performed through the use of external devices. Phone technicians could have access to the recordings. Even digital phones and VOIP phones can be recorded easily. It could be legal in many locations, if the person doing the recording is part of the conversation. What happens with the content of recordings, on the other hand, could be illegal and can often lead to detrimental results. Wayward employees or staff often think they acting righteously as whistle blowers when committing eavesdropping, but they could be breaking the law and end up in prison.

By Hailey Branson-Potts, LA Times;

A West Hollywood City Council aide has been suspended and is being investigated by sheriff’s detectives on charges of eavesdropping on […]

2016-12-16T20:23:42-05:00February 14th, 2015|

Locations revisited- record of frequent locations stored on iPhone

Last September we mentioned how the Location Reporting services built into your smart phone was keeping track of where you’ve been, using an opt-in Google service.  Mike Leclair, of Sumuri, creators of Mac and PC forensics software, while investigating his iPhone, came across a “Frequent Locations” option buried withing iOS privacy settings. Here is some of his report from the Sumuri blog: Surviving Digital Forensics

Mike Leclair, 1/28/2015;

iOS has a built in feature that, as far as I can tell, is working like GPS locator.  I have been testing this and so far all the dates, times and map locations that my iPhone is collecting are accurate.  This feature is on by default and all you need is access […]

2016-12-16T20:23:42-05:00February 11th, 2015|

Wearable Tech Alert: Store and forward 60 seconds of audio from your wrist- anytime, anyplace

From smart TV’s to Amazon Echo, new devices all around us are listening. A new tech item scheduled for shipping this month promises to bring personal eavesdropping and BYOD threats to a new level.

The Kapture device, funded by Kickstarter, is a wearable device that constantly records all audio in it’s vicinity.  It is designed to be worn on the wrist, with a clip-on option, a little like a cross between a Fitbit and Apple Watch. It is constantly recording, but remembers only the last 60 seconds.

At any moment, if you feel that something you just heard is worth saving- just tap the unit and it will send that 60 second audio clip to your phone via bluetooth. You can use their smartphone app to record longer segments. Their web site also explains, “The Kapture wristband allows for about 25 audio klips to be saved locally. Once your phone is back […]

2016-12-16T20:23:42-05:00February 9th, 2015|

TV vs Reality: former intelligence officers discuss new NBC spy show “Allegiance”

NBC’s new spy drama “Allegiance” was previewed at the International Spy Museum in Washington, DC, along with a panel discussion with former intelligence officers including Vince Houghton, historian and curator at the Spy Museum, CIA analyst Mark Stout, and former KGB General Oleg Kalugin. Their comments offer some insight into the real world of spying.

10 Things We Learned Watching Allegiance at The International Spy Museum,
By Nancy Dunham, February 7, 201, pastemagazine.com

If you watched the premiere of Allegiance, NBC’s new spy drama, on Thursday night, you likely wonder what the creators can possibly do to top it. Modern day sex, lies and videotape—not to mention some pretty gnarly torture and a spy-within-a-spy plots—kept us on the edge of our seats when we previewed it at the International Spy Museum in Washington, D.C.

Still, questions arise as to whether or not the show, which centers on a 40-something Brooklyn couple (she’s Russian-born, […]

2016-12-16T20:23:42-05:00February 9th, 2015|

Hacked phone systems lead to credit card fraud

Phone system and voicemail hacking have been going on ever since they were invented it seems. Recent attacks, though, show a new level of complexity and severity.

THEN

In the 80’s hackers would get hold of DISA numbers (Direct Inward System Access- numbers that were often used to allow remote workers make long distance calls on a company’s phone account). These numbers allowed the hackers to route their dial-up modems through toll free numbers that passed the call through the company PBX phone system. The hacker could then access long distance electronic bulletin board numbers and not worry about the cost.   (Long distance calls were a bit more expensive back then, and no Internet as we know it today.)

In the 90’s, voicemail systems became much more affordable and the varieties of hacks grew. A hacker from the Philippines calling himself “the sniper” became well known in certain telecom circles hacking numerous US based PBXs, forcing the systems […]

2016-12-16T20:23:42-05:00February 6th, 2015|

Spy cam found in corporate restroom.

When inspecting or sweeping corporate offices, it is good to pay attention to restrooms that the executives may use. While trade secrets may not be discussed there, tremendous embarrassment could occur if improper images were distributed. It is also good for staff to be aware of such threats and take them seriously. In this instance the camera was reported by the building maintenance supervisor.

From nypost.com

A Chelsea building that hosts high-end brands and services, including fashion shoots, had a hidden pinhole camera in its unisex bathroom, sources said. A Johnson & Johnson employee discovered the creepy spy cam on the 16th floor of the Starrett-Lehigh building on West 26th Street Jan. 15, and the company immediately reported it to police, a spokeswoman said.

The device was hidden above a light switch in the bathroom next to offices that include Ralph Lauren and Haynes Roberts, whose interior-design projects focus on mansions […]

2016-12-16T20:23:42-05:00January 28th, 2015|

FBI busts alleged Russian spy ring in New York City

They “tried to recruit U.S. citizens as intelligence sources in New York… Their targets included people working for ‘major companies’ and ‘young women with ties to a major university located in New York,’ according to authorities.”
New York (CNN) The men would sometimes say they needed to meet to exchange tickets, but they never seemed to end up actually attending or discussing a sporting event or a concert. They once talked about going to a movie. But that was it.
The reason for the puzzling behavior, according to a federal complaint unsealed Monday, is that the men were Russian spies exchanging intelligence information in New York City. They used tickets and other everyday objects — like […]
2016-12-16T20:23:42-05:00January 28th, 2015|

Panama: ex-president at center of wiretap probe

From McClatchyDC by T. Johnson

— When the United States rejected former Panamanian President Ricardo Martinelli’s request for spying equipment to eavesdrop, U.S. diplomats feared, on his political enemies, the former supermarket baron turned to another source: Israel.

Now scores of Panama’s political and social elite are learning that the eavesdropping program that Martinelli’s security team set in place sprawled into the most private aspects of their lives – including their bedrooms. Rather than national security, what appears to have driven the wiretapping was a surfeit of the seven deadly sins, particularly greed, pride, lust and envy.

Nearly every day, targets of the wiretapping march to the prosecutors’ office to see what their dossiers contain, often emerging in distress. Martinelli, who left office in July, is facing a rising tide of outrage not only over the wiretapping, but also over reports of vast corruption. His personal secretary has left […]

2016-12-16T20:23:42-05:00January 28th, 2015|

Un-social engineering: David Cameron gets spoofed by drunk hoax caller.

Do you have good procedures in place for handling executives’ phone calls? How easy would it be for someone to get their messages or phone calls put through to your principals, or to be given private numbers? And if they did get through, is there a method for verification and follow up? In this report a hoaxer got through to Prime Minister David Cameron by claiming to be the head of GCHQ. This caller apparently was just having fun, but it doesn’t take much effort to think of malicious deeds that could result from such attempts, especially in the world of corporate espionage and executive protection.

Reuters 1/26/2015:

British Prime Minister David Cameron said on Monday security would be reviewed, but no harm had been done, after an apparently drunk hoaxer claiming to be the director of Britain’s eavesdropping agency was put though to his mobile phone.

Cameron had been walking near his home in central […]

2016-12-16T20:23:42-05:00January 27th, 2015|

UK: Mirror Group Newspapers payout more compensation for their phone hacking escapades.

If you haven’t learned yet, you need to make your password difficult to guess!  1234, 1111, and 0000 will not cut it. Hacking lawsuits against first The News of the World, and then the Daily Mirror and associated publications have made voicemail hacking a well known concept. Mirror Group Newspapers, MGN, is said to have over £8 million set aside to help pay the lawsuits against them. The hacking appears to have been possible because the victims used simple passwords. 

from BBC News, 22 Jan 2015

Singer Cilla Black is among celebrities to have settled phone-hacking claims for “substantial” damages, the High Court has been told. Her son Robert Willis, actor Darren Day, EastEnders star Jessie Wallace and singer Peter Andre also settled claims, all against Mirror Group Newspapers. Their barrister David Sherborne said their privacy was “grossly violated” by the newspapers, “solely for profit”.  MGN counsel Matthew Nicklin […]

2016-12-16T20:23:42-05:00January 23rd, 2015|

P.I.s accused of using GPS tracking get restraining order but keep their licenses.

GPS tracking devices are readily obtainable. The legality of their use on unauthorized vehicles is questionable at best. The story below highlights that such devices can pose a significant threat to privacy and security. 

Orange County Register: Two private investigators accused of illegally tracking and harassing a pair of Costa Mesa councilmen have been ordered to stay away from the politicians, but a judge on Thursday declined to immediately approve a state request to take away their work and weapons permits.

Orange County Superior Court Judge Elizabeth Macias issued a restraining order against Christopher Joseph Lanzillo on Thursday, several weeks after a similar order was issued against Scott Alan Impola.

As part of the order, Lanzillo and Impola must stay away from Costa Mesa Mayor Steven Mensinger and Mayor Pro Tem Jim Righeimer – whom the two men are accused of targeting prior to a recent election – and to […]

2016-12-16T20:23:42-05:00January 20th, 2015|

Stolen surveillance system exposes drug dealing thieves.

DOERUN, GA (WALB) – Images from a stolen surveillance system helped investigators arrest a suspected drug dealer. Colquitt County Sheriff’s Investigators made three arrests stemming from a burglary and drug deal connection.

A Colquitt County farmer went online to see if he could find his stolen video surveillance system. He not only found his system but he also helped the Sheriff’s office arrest a drug dealer they had been investigating.

Drug dealers caught on camera they stole.

Hundreds of images showing illegal drug activity inside a Doerun home were sent to the Google account of a chicken farmer in Colquitt County.

Investigators say the Wi-Fi camera motion detection system was one of several electronic items Mark Harrell stole from the farm Wednesday morning.

“A computer and surveillance camera was stolen,” said Lt. Shawn Bostick.

Investigators believe Harrell traded in or sold the electronic items to his drug dealer, Ricky […]

2017-02-12T21:28:49-05:00January 19th, 2015|

UK: Former deputy prime minister finds car was bugged.

John Prescott seems to be taking this find in stride, but it could be a sign of something more sinister going on. Vehicle TSCM sweeps are an important part of regular security precautions.

The former Deputy Prime Minister discovered the device hidden in his car when he took it to a garage because it had problems starting. John Prescott has turned detective after finding his Jaguar had been bugged.

John Prescott with tracker found in his car.

Mechanics found a tracker concealed under the driver’s seat that was hooked up to the car battery, draining its power.

The sophisticated device uses mobile phone technology and is capable of reporting the Jag’s movements at all times. It also has an inbuilt microphone enabling it to pick up conversations.

And the 6 inch-square black box is even capable of immobilizing the car if instructed to by mobile phone.

Lord […]

2015-01-18T19:03:53-05:00January 18th, 2015|
Go to Top