News sent out via mailchimp.

Spy Shop owner busted- for producing illegal parking permits and identity theft.

Spy shops, in general, are difficult to trust, they often claim to offer “counter-spy” equipment for protecting your privacy, but will just as easily sell you the very devices you were afraid of in the first place. This one, the Queens Spy Shop in New York, seemed to be involved in a number of suspicious activities. Feds intercepted 1,000 fake Department of Transportation parking permits, officials said. (Don’t be fooled by their claims, the countermeasures equipment sold at spy shops is usually little more than toys and cannot be used for serious sweeps. Also interesting to note, is the Feds found eavesdropping equipment here, but it was not illegal to possess, so they are not being charged with that. Somebody is buying their products. Hope they don’t show up in your office, or hire a professional TSCM team to make sure they don’t.) 

The Daily News

The feds have uncovered something […]

2013-12-20T21:30:10-05:00December 20th, 2013|

Jury had peek into phone hacker’s routine; News of the World trial

 Phone-hacking jury given peek into Glenn Mulcaire’s working routine

 Trial of Rebekah Brooks and Andy Coulson shown whiteboards and handwritten notes collected from hacker’s office and shed

Nick Davies theguardian.com

 The working life of a phone hacker was exposed in the Old Bailey on Thursday, including a note to be wary of a particularly tricky Vodafone employee and a suggestion that the News of the World’s deputy editor had been a target of his own paper’s eavesdropping.

 The jury in the phone-hacking trial was shown eight of Glenn Mulcaire’s whiteboards – covered in handwritten notes and diagrams about his work – found by police in an office and a garden shed belonging to the News of the World’s specialist hacker.

 One board carried a list headed “Networking”, which included the names of Rebekah Wade (as Rebekah Brooks was then) and Greg Miskiw, the former assistant editor of the News […]

2016-12-16T20:23:55-05:00December 18th, 2013|

Phone hacking of UK Charity- PBX phone systems have many vulnerabilities

Phone system hacking has been going on for decades and is still a big problem. We have been called to help solve many cases in recent years. Make sure your telecom provider is aware of the security vulnerabilities of your systems and how they can protect against hacking. Particularly vulnerable are auto-attendant features, call forwarding, DISA (Direct Inward System Access), and voicemail notification features. If you see calls on your phone bill to odd international locations, costing extra large amounts, or at odd times such as nights or weekends, it could be an indication of your system having been hacked.

Phone hackers leave RABI with £2k bill

Philip Case  Tuesday 03 December 2013 [Farmers Weekly]
Criminals have hacked into the telephone system of farming charity the RABI and spent nearly £2,000 calling premium-rate numbers.

Telephones at the RABI’s head office in […]

2013-12-17T23:20:45-05:00December 17th, 2013|

Corporate Spies, Social Media, and BYOD

Corporate Spies Love Social Media, By Stephanie Blanchard, Digital Editor Mobile Enterprise

No one appreciates a fair-weather friend, the kind that is only around when something is in it for them, and quick to disappear when help is needed. But fake friends are even worse, the social profiles of people who simply do not exist in the real world. However, such profiles serve as bait, whether to collect information, or send out malware, or believe it or not, corporate espionage.
 
But are companies paying attention? After all, these are just social sites, right? And someone else’s problem. Think again. Spear phising is one way in to the network, and it’s possible every day.
 
One completely bogus profile on Linkedin, for example, identified by Websense Security Labs, had 400 connections. Yet it exists only to harvest intelligence, and in this particular case, lure viewers to a dating site. The consequences can […]

2016-12-16T20:23:55-05:00December 17th, 2013|

Tech execs urge Obama to limit NSA spying on their users

Washington Bureau, Dec 17, 2013

The nation’s top technology executives gave President Barack Obama an earful about the National Security Agency’s spying on their users at a White House meeting Tuesday.

The president met with 15 tech executives, including Apple CEO Tim Cook, FacebookChief Operating Officer Sheryl Sandbergand Google Executive Chairman Eric Schmidt.

Apple CEO Tim Cook

Obama talked to the executives about his administration’s work to fix HealthCare.gov, the federal insurance exchange, and announced he’s hired former Microsoft Office Division President Kurt DelBene to lead this effort. The president also encouraged the executives to share their ideas on how to improve the federal government’s procurement and use of information technology.

But NSA spying was clearly the most important topic for the tech executives.

They left the White House without talking to reporters, but they did issue the following joint statement: “We appreciated the opportunity to share directly with the president our principles on government surveillance that we released last […]

2016-12-16T20:23:55-05:00December 17th, 2013|

Butt-dialing cautions…

It’s probably happened to everyone, accidentally dialing the last number dialed or a speed dial from your cell phone, or receiving such a call from someone you recently spoke with and being able to listen to the other party riding in their car, listening to the radio, carrying on with their life unknowing that you are listening. Although fairly common, this can create serious security concerns.  I was in a security meeting at one organization with department heads and the Secret Service discussing the arrival of the President of the United States to an ongoing conference. An assistant of the person next to me came up to her and explained that she just received a voice message on her phone that was a recording of the entire conversation at our meeting.  She was a victim of butt-dialing. The last call the department head had made was to the assistant, […]

2016-12-16T20:23:55-05:00December 13th, 2013|

Speaking of recording… some caution about recording staff meetings.

Should You Secretly Tape Your Meetings with Employees? By Christina Stoneburner, Fox Rothschild Attorneys,

 

Although every situation is different, I would think twice before secretly taping employee meetings. 
With more employees  having smartphones that can record high quality digital recordings, I have been asked more and more frequently by supervisors whether they should protect themselves and record disciplinary meetings with employees just “so the record is clear.”  

Recording seems like a good idea, because supervisors tell me, they believe employees are already taping them.  Just look for example about the case my partner, Richard, blogged about a “Federal Jury Slams Black Owner for Calling Black Employee the “N Word.” Later CNN released the actual tapes in that case (which contain explict — although bleeped – slurs) and they are remarkably clear.  I guess gone are the days of hidden tape recorders where the audio sounds like a bag of potato chips was being opened and […]

2016-12-16T20:23:56-05:00December 13th, 2013|

LA hoaxer arrested on eavesdropping charges- not for making prank calls, but for recording them.

Man Nabbed Over Prank Calls to Pro Coaches, By Matt Cantor,  Newser Staff

 (NEWSER) – Famous last words: “I’m like the world’s most safe criminal.” A Los Angeles man has been arrested after allegedly making prank calls to at least a dozen NFL, NBA, and college football coaches offering them new jobs. Kenneth Tarr, 32, allegedly called the likes of ex-Tampa Bay Buccaneers and Indianapolis Colts coach Tony Dungy, offering him a head coach position at the University of Southern California, NBC News reports. Others targets included Minnesota Vikings head coach Leslie Frazier, University of Hawaii head coach Norm Chow, and Cincinnati Bengals offensive coordinator Jay Gruden.

Tarr was arrested yesterday on suspicion of eavesdropping after he allegedly recorded the calls; recording without consent is illegal in California. He seems quite open about the pranks, having apparently written to Deadspin boasting of them. “I’m amazed that they’re returning any of these calls,” he […]

2016-12-16T20:23:56-05:00December 13th, 2013|

Video surveillance of hacker/activist Aaron Swartz released.

The video can be viewed at the website links below.

WIRED, BY KEVIN POULSEN 12.04.13

The door to the network closet pops open and a slender figure enters, a bicycle helmet hanging at his side. He sheds his backpack and pulls out a cardboard box containing a small hard drive, then kneels out of frame. After about five minutes, he stands, turns off the lights and furtively exits the closet.

This scene, captured by a video camera hidden in a wiring closet at MIT, was the beginning of a probe that led to federal charges against the late coder and activist Aaron Swartz. The video, along with dozens of other documents related to the case, has been released to the public for the first time through my Freedom of Information Act lawsuit against the U.S. Secret Service.

The video was made in January 2011, near the end of a months-long cat-and-mouse game between MIT personnel […]

2016-12-16T20:23:56-05:00December 5th, 2013|

World news- Australia: Chinese’s scientist absence exposed alleged spying activities at CSIRO

The Commonwealth Scientific and Industrial Research Organisation(CSIRO) is Australia’s national science agency.  

The Sidney Morning Herald, 12/5/2013
A CSIRO scientist’s failure to show up for work led Australia’s top scientific organisation to uncover a suspected spy in its ranks.

The Chinese scientist at the centre of an industrial espionage probe had missed three days of work last week, prompting CSIRO management to ask police to visit his suburban Melbourne residence to check on his welfare.

But by the time the officers arrived, the scientist was nowhere to be seen.

Fairfax Media understands he had left the country days earlier, possibly returning to China.

However, he had left CSIRO computer equipment in his home. The equipment is now being examined by federal police and intelligence officials.

It is believed CSIRO databases had been accessed from the computer equipment and confidential information may have been used in an unauthorised fashion.

Neither the Australian Federal Police […]

2016-12-16T20:23:56-05:00December 5th, 2013|

Types of people behind today’s corporate security threats

An article on ZDNet provides a good summary of who might be attacking your network, along with tips for fighting back.
Problems could easily come from any of the following:digital user+password1

Employees 
IT workers 
CEOs and small business owners 

State-sponsored actors 
Corporate espionage 
Wannabes and thrill seekers 
Software developers 

[Full Article] Field guide: Types of people behind today’s corporate security threats

…For an example of how serious corporate espionage can be, one need look no further than Nortel, the former telecommunications giant that declared bankruptcy in 2009. In 2012, The Wall Street Journal reported that hackers, who appeared to be working in China, used stolen passwords from Nortel executives to “downloaded technical papers, research-and-development reports, business plans, employee emails and other documents.” Brian Shields, a former 19-year Nortel employee and systems […]

2016-12-16T20:23:56-05:00December 2nd, 2013|

The importance of a trade secret (vs. filing for a patent), from Coca-Cola to the telephone.

There is a big difference between filing for a patent for your idea, and establishing it as a trade secret.  

A patent, by it’s very nature, requires that you reveal details about how it works, what it is, what it does. This information must be revealed in order to gain a patent. A definition of a patent would be a set of exclusive rights granted… to an inventor or their assignee for a limited period of time, in exchange for the public disclosure of the invention. (The telephone- often considered the most valuable patent.)

A trade secret, on the other hand, is exactly that- a secret. No one but you should know what it is, or how it works.  It is required to be kept secret, private, and confidential. It must be protected, otherwise it cannot be considered a trade secret. (The formula for Coca-Cola- the most famous trade secret.)

Here are some other significant points- a patent […]

2016-12-16T20:23:56-05:00December 1st, 2013|

Technology lets peeping Toms take spying to new level [and not just peeping Toms: anyone who wants to spy]

Most news articles focus on voyeurism, but of course, it’s not just peeping Toms to worry about. It could be an employee looking for an edge up, a jealous executive, any adversary planning an attack or disruption. Anyone who wants to take advantage of another’s situation has high tech spy technology available on line, literally at their fingertips. Micro video recorders, audio eavesdropping, tracking devices, all available for a few dollars from on line sources.  
TIP: If you see a device you are not sure of, one tell tale sign could be if the device has a USB port on it. A key fob, calculator, even sun glasses, if they have a connection plug for a computer it could be suspicious. On more advanced devices you may not see such connections, though. The more common covert video and audio recorders have a USB port for both […]

2016-12-16T20:23:56-05:00November 30th, 2013|

European Commission Takes Aim at Industrial Espionage, Proposes Trade Secrets Law Harmonization

Author: James Rundle

The European Commission (EC) has proposed new rules on the protection of so-called trade secrets, seeking to harmonize the definition and enforcement of guidelines among its member states, in a move that could have ramifications for the financial technology industry.

The new rules, says the EC, will make it easier for companies to defend themselves against misappropriation of their trade secrets in national courts, to seek injunctions against products using their property, and to seek damages for theft and misuse. Under the terms of the proposal, the “trade secrets” phrase encompasses both technical and commercial endeavors designed to provide business and commercial advantages to firms in both the short and the long term.

“Cybercrime and industrial espionage are unfortunately part of the reality that businesses in Europe face every day,” says Michel Barnier, commissioner for internal market and services at the EC. “We have to make sure our […]

2013-11-29T23:35:10-05:00November 29th, 2013|

Ralph Nader: Corporate espionage undermines democracy

Reuters

By Ralph Nader

Nov 27 (Reuters) – It’s not just the NSA that has been caught spying on Americans. Some of our nation’s largest corporations have been conducting espionage as well, against civic groups.

For these big companies with pliable ethics, if they don’t win political conflicts with campaign donations or lobbying power, then they play dirty. Very dirty.

That’s the lesson of a new report on corporate espionage against nonprofit organizations, by my colleagues at Essential Information. The title of the report is Spooky Business, and it is apt.

Spooky Business is like a Canterbury Tales of corporate snoopery. The spy narratives in the report are lurid and gripping. Hiring investigators to pose as volunteers and journalists. Hacking. Wiretapping. Information warfare. Physical intrusion. Investigating the private lives of nonprofit leaders. Dumpster diving using an active duty police officer to gain access to trash receptacles. Electronic surveillance. On […]

2016-12-16T20:23:56-05:00November 28th, 2013|

it was ‘easy to listen to voicemails’, hacking trial hears

“She [Brooks] said that it was so easy to do and she couldn’t believe that famous people who have all these advisers did not know they needed to change their pin code to make their voicemail secure”.

Lisa O’Carroll and Caroline Davies
theguardian.com, 

Eimear Cook, the ex-wife of golfing star Colin Montgomerie was accused of repeatedly lying under oath about a lunch with Rebekah Brooks in which she claimed the former News International chief excutive had told her how easy it was to hack phones.

 In a tense and prolonged exchange at the Old Bailey on Monday, counsel for Brooks said Cook had fabricated parts of her witness statement to the police, including a claim that the former publishing boss had told her about an assault on her ex-husband Ross Kemp.

 Brooks’ counsel Jonathan Laidlaw, QC, asked her had she done […]

2013-11-28T08:50:20-05:00November 28th, 2013|

Executive bad habits endanger corporate security

PC World

By Dave Jeffers, IDG Creative Lab

…According to ThreatTrack Security, top executives play a major, unintentional role in helping hackers breach their companies’ defenses. ThreatTrack recently reported the results of a survey of 200 United States-based corporate malware analysts. “Among the issues that malware analysts face: more than half said they’ve had to remove malware from the device of a member of senior leadership because the executive clicked on a malicious link in a phishing e-mail, while nearly 40% had to remove malware after a senior executive visited an infected pornographic website.”

The survey was conducted last month by Opinion Matters on behalf of ThreatTrack Security.

The numbers are striking enough to make you wonder about the average intelligence of our country’s highest-paid employees. A full 56 percent of those surveyed reported that they had removed a […]

2016-12-16T20:23:56-05:00November 28th, 2013|

Report from Milipol 2013, Paris, France

Entrance to Milipol, Parc des Exposition, Paris, France Entrance to Milipol, Parc des Exposition, Paris, France

Milipol is an advanced expo for military, police, and security held every two years in Paris, France, and alternate years in Qatar. Encompassing arms, ammunition, protective equipment, electronics, optics, IT, uniforms, mobility and more for government, military and public security applications protecting the world’s people and property, Milipol Paris has become the premier expo of the latest technologies and defense capabilities. This year’s show expected over 27,000 visitors.

RF Jamming Vehicle RF Jamming Vehicle

Armored communications vehicle. Armored communications vehicle.

While much of the expo was dedicated to military and police, many of the products on display would be of interest to anyone involved […]

2016-12-16T20:23:56-05:00November 27th, 2013|
Go to Top