News sent out via mailchimp.

Canadian DND now says no listening devices were found at Nortel building

No bugs found in former Nortel building, Defence officials now say
Ottawa Citizen, October 1, 2013 by David Pugliese

OTTAWA — The Conservative government says Defence officials have assured it that no listening devices have been found at the former Nortel campus, contradicting previous security concerns raised by both former Nortel and government intelligence employees.

Former Nortel employees have contacted the Citizen to say that the listening devices were found when Department of National Defence officials did their initial security sweeps of the facility, purchased for DND’s new home.

DND documents also indicate that concerns about the security surrounding the former Nortel campus were raised last year within the department. A briefing document for then-Defence minister Peter MacKay warned that the public announcement that the DND was moving into the complex before it could be properly secured created a major problem.

“This not only raises the level of difficulty of verifying appropriate security […]

2013-10-02T20:11:21-04:00October 2nd, 2013|

Canadian Department of National Defense finds listening devices prior to moving in to former Nortel offices.

Former Nortel offices had listening devices discovered as the Department of National Defense was preparing to move in.

Ottawa Citizen, BY DAVID PUGLIESE, September 30, 2013

OTTAWA — Workers preparing the former Nortel complex as the new home for the Department of National Defence have discovered electronic eavesdropping devices, prompting new fears about the security of the facility.

It’s not clear whether the devices were recently planted or left over from an industrial espionage operation when Nortel occupied the complex.

Asked for details about the listening devices and whether they were still functioning, the DND responded with a statement to the Citizen that it takes security at its installations seriously.

“The Department of National Defence and Canadian Armed Forces cannot provide any information regarding specific measures and tests undertaken to secure a location or facility for reasons of national security,” noted an email from DND spokeswoman Carole Brown. “The DND/CAF must maintain a safe […]

2016-12-16T20:23:58-05:00October 1st, 2013|

Ultimo bra tycoon Michelle Mone’s firm accused of bugging potted plant.

Once again, we find surveillance threats coming from within a company’s perimeters. Potted plants need to be checked carefully during any office sweep. They make an easy hiding place for eavesdropping devices. In this case, from Scotland, it was the chairman who actually approved the bugging.

Ultimo bra tycoon Michelle Mone’s firm accused of bugging pot plant in office of former director

By Sally Hind, DailyRecord.co.uk 9/24/2013

THE 35-year-old operations director claims he found a recording device in a plant pot containing artificial flowers at the headquarters in East Kilbride. 

A FORMER director of Michelle Mone’s bra firm yesterday told how he was horrified to discover his plant pot had been bugged after a row with the tycoon.  Scott Kilday described how he found a “covert recording device” wrapped around an artificial flower as he debated resigning from Michelle’s lingerie firm in the wake of her bitter […]

2016-12-16T20:23:58-05:00September 28th, 2013|

New Research Reveals Top Tactics Behind Today’s Cyber Attacks: Beware of Trust

IBM Security Intelligence Blog

Announcing the IBM X-Force 2013 Mid-Year Trend and Risk Report

For over 15 years, IBM X-Force has been tracking trends and emerging threats. Today we released the2013 mid-year trend and risk report which highlights some of our key findings.

While vulnerability statistics, attack trends, and data breaches are all covered in detail, one of the more interesting points of discussion is a look at the psychology and social engineering around how these attacks are implemented. We explore how attackers have learned to capitalize and take advantage of the human factor in trust relationships.

Attackers are optimizing tactics

Attackers are optimizing their operations around many key initiatives which include a path of least resistance to reach the largest number of potential targets for the minimal amount of exploit effort.

For example, attackers are optimizing:

  • The exploitation of trust via social media.
  • Coordinated operations leaking user data as well as exploiting weak entry points […]
2016-12-16T20:23:58-05:00September 25th, 2013|

London banks attacked by KVM keyboard/video/mouse remote interception.

Two London banks have been attacked by similar means. A KVM switch had been installed into their computer network that allowed remote control of computers via a 3G router.  A Santander Bank branch in Southeast London and a Barclays branch in North London were both hit by these attempts. 

Barclays Bank computer theft: Eight held over £1.3m haul

Eight men have been arrested in connection with a £1.3m theft by a gang who took control of a Barclays Bank computer. The money was transferred from the branch in Swiss Cottage in north London in April, a Met Police spokesman said. Searches are being carried out at addresses across London where property including cash, jewellery, drugs and credit cards has been seized. The raid is being linked to an attempt to steal from Santander last week.

Four men have appeared in court charged with attempting to take control of computers at a Santander […]

2016-12-16T20:23:58-05:00September 24th, 2013|

Espionage history: Stasi museum in Berlin, fascinating photos

The Stasi was an Eastern Germany version of the KGB, established by the Soviets in 1952. Just like the KGB, the Stasi was mostly busy looking for enemies of the people, employing round-the-clock surveillance, and eavesdropping on German citizens. After the fall of the Berlin Wall, people assaulted the Stasi headquarters, dissolved the organization, opened its archives to the public, and created a museum in the main building.

Stasi Museum 

On the evening of January 15th in 1990 demonstrators took possession of the headquarters of the Ministry for State Security (MfS) in Berlin-Lichtenberg. The Berliner Bürgerkomitee (Berlin Committee of Citizens) started here the closure and disorganisation of the MfS. One week later the Zentrale Runde Tisch (The Central Round Table) decided that a memorial place and research centre should be established in the former House No. 1 in the Stasi-Headquarters.
The new government of the GDR, formed after the elections on March 18th in […]

2016-12-16T20:23:59-05:00September 24th, 2013|

New technology provides new tools, new threats

by Charles Patterson, Surveillance Countermeasures and Information Security Specialist

Two new tech items in are in the news and expected to hit the market soon. As we watch such new products emerge we should be reminded of the need to be aware of surveillance threats that appear alongside new technical advancements and modern conveniences.

First of note, Samsung has introduced their new Android powered, smartwatch, Galaxy Gear. Along with many other features the watch includes the ability to record both video and audio, making it a convenient surveillance device.

Samsung Galaxy Gear smart watch

 

Sony has also unveiled a somewhat unique product with the QX10 and QX100, two “lens style” cameras offering high quality optics in a small packages that interface with smart phones or tablets for control and viewing. The devices are small, with all of the camera electronics is inside the lens housing. […]

2016-12-16T20:23:59-05:00September 6th, 2013|

Germany: Government and business team up against espionage

from DW.DE Aug. 28, 2013

Faced with increasing rates of espionage attempts directed at companies, German government and business leaders have agreed on hammering out a joint protection strategy. Raising awareness is the first objective.

The German government and business organizations agreed on Wednesday that domestic companies needed stronger protection from espionage and cyber crime. They signed a declaration on hammering out a joint defense strategy and pooling resources for the most efficient infrastructure to ward off risks.

German Interior Minister Hans-Peter Friedrich said it was of pivotal importance to raise awareness for the threats particularly among small and medium-sized companies across the nation which tended to ignore or underestimate the scope of the problem.

“Spying attacks on companies can potentially lead to a painful drop in competitiveness and market distortions,” Friedrich said in a statement. “And it is bound to result in the loss of jobs, so we have to […]

2013-09-02T20:13:35-04:00September 2nd, 2013|

Times are changing- this ain’t your father’s spy world.

Spy Kids: A sci-fi visionary on why the children of tomorrow are the NSA’s biggest nightmare.

The following article by Charles Stross, a Hugo Award-winning science-fiction writer, is an interesting read. We all know that technology is changing faster than we can digest it. What does this mean for our children? And more pointedly, what does it mean for the future world of espionage,  privacy, and information security.  While I may not entirely share the author’s view of the future, it is clear that many old and current rules will not apply.  It is worth paying attention, especially when considering new threats and new adversaries as they come of age. The author focuses on the challenge spy agencies will face in dealing with new recruits, but it is worth considering as well, the challenges to information security that new technology and the users of […]

2016-12-16T20:23:59-05:00September 1st, 2013|

Can’t believe it’s not bugger, er Bulger… supposed FBI wiretap equipment on ebay.

Problem with the auction, it is just parts from an old NEC phone system that happens to have the words “Bulger phone switch” written on the side. The claim is that it came from surplus FBI parts although they deny it. $3500 is bit steep for busted phone parts.

‘Bulger wiretap’ electronics on eBay

From the Boston Herald, by Laurel Sweet

A Connecticut history buff is selling a pile of electronic stuff on eBay that he claims was the surveillance equipment used “to tap phone conversations” and gather evidence against convicted mob killer James “Whitey” Bulger while he was on the lam — and which was later salvaged from a scrap heap — but the FBI says it’s not what it is purported to be.

Available on eBay for $3500, sold by universityarchives02

John Reznikoff of Westport is asking nearly $4,000 for […]

2016-12-16T20:24:01-05:00August 24th, 2013|

Idaho hospital CEO accused of recording phone calls, stalking. IT department employees also accused of assisting.

from KTVB.com Boise, ID

BOISE, Idaho — The leader of the public hospital in Blackfoot, ID has pleaded guilty to second-degree stalking in the wake of an investigation by the Idaho Attorney General.
Bingham Memorial Hospital Chief Executive Officer Louis Kraml entered the plea Friday in 7th District Court.
He was indicted last month along with three other hospital staff for recording telephone calls made by and to former hospital director Robert Rosin and staff. The wiretapping allegedly occurred between June 2009 and August 2010.
In a plea agreement, Kraml pleaded guilty to misdemeanor stalking and was sentenced to 30 days in jail. But the judge suspended the sentence and withheld judgment in the case.
The Attorney General has issued a warrant for the arrest of Jack York, one of three information technology employees accused of helping Kraml.

also from am-news.com:

Kraml was indicted […]

2013-08-18T23:51:26-04:00August 18th, 2013|

Guarding against industrial espionage at the Outdoor Retailer’s Expo

Tools for covert audio and video interception are available everywhere. Manufacturers need to pay attention, not just at trade shows, but in the design office, in the conference room, anywhere their new designs are stored or revealed. We regularly sweep offices and boardrooms to help insure that no eavesdropping or electronic surveillance is taking place. Performing TSCM sweeps also helps establish trade secret status for the information discussed or shared in those locations. Theft of trade secrets is a much more serious, prosecutable offense than just loss of general information. ~Charles

Fox13 News, Salt Lake City
 July 31, 2013, by 

SALT LAKE CITY — The Outdoor Retailer’s Summer Market has brought thousands of people to Utah to showcase innovative new designs and technology in outdoor merchandise.

But exhibitors are also trying to guard against counterfeiters, thieves and industrial espionage at this expo, to […]

2016-12-16T20:24:01-05:00August 11th, 2013|

Hackers Hack into Toyota Prius

Motor Trend

Christian Seabaugh, Associate Online Editor July 25, 2013 

Like it or not, more and more computers are making their way into our cars. Depending on what car you drive, a computer could control everything from your infotainment system, your throttle, and even your steering. An alarmist new Forbes story shows what could happen if someone hacked into your car and took control while you were driving. 

The video starts off with a noble purpose: to show that with cars increasingly reliant on computers, they become more vulnerable to hackers (we assume Forbes means 4ChanAnonymous, and North Korea). In this case, the two hackers, Charlie Miller and Chris Valasek, are most certainly not North Korea. They’re two middle-aged web security engineers who have modified a 2010 Ford Escape and 2010 Toyota Prius to be hackable, with the help of a Defense Advanced Research Projects Agency (DARPA) grant that has […]

2016-12-16T20:24:01-05:00August 6th, 2013|

Cameras May Open Up the Board Room to Hackers

With all telecom and conferencing equipment, a key element is to understand all of the features of your systems, and make sure you have control over those features and disable any that pose threats or vulnerabilities. 

From New York Times, Business Day Technology  By NICOLE PERLROTH, January 22, 2012

SAN FRANCISCO — One afternoon this month, a hacker took a tour of a dozen conference rooms around the globe via equipment that most every company has in those rooms; videoconferencing equipment.

With the move of a mouse, he steered a camera around each room, occasionally zooming in with such precision that he could discern grooves in the wood and paint flecks on the wall. In one room, he zoomed out through a window, across a parking lot and into shrubbery some 50 yards away where a small animal could be seen burrowing underneath […]

2016-12-16T20:24:01-05:00August 2nd, 2013|

Former President George H.W. Bush shaved head to show solidarity for the son of a Secret Service agent with Leukemia.

The nation’s 41st president shaved all his hair as a show of solidarity with Patrick, the son of one of the members of Bush’s security detail, who lost his hair as part of his cancer treatments.

The boy, named Patrick, is the son of one of the members of Bush’s security detail. He had lost most of his hair due to his cancer treatments, a Bush spokesman said.

Bush, 89, got the idea to shave his head to show his support after he noticed that several members of his Secret Service detail, known as the Bush Protective Division, had also shaved their heads in solidarity with Patrick.

Patrick’s prognosis is good, but his treatment and illness carry a special place in the former president’s heart as his daughter Robin died of the same blood disease when she was three.

A website has been created to help support Patrick and his […]

2016-12-16T20:24:01-05:00July 24th, 2013|

Chinese Wind Company Charged With Corporate Espionage

From IEEE Spectrum Eliza Strickland, Jul 2 2013

The Chinese wind power company Sinovel will be keeping its legal team busy. In addition to the intellectual property charges against the company in Chinese courts, which Spectrum covered last year, the company now faces criminal charges of corporate espionage brought by the U.S. Justice Department. 

In the new charges, prosecutors allege that Sinovel stole trade secrets from the Massachusetts-based company AMSC (formerly American Superconductor Corp.), which sells software and systems to control wind turbines. According to the indictment, AMSC’s alleged losses exceed $800 million.  

The prosecution is part of efforts undertaken by the Justice Department’s IP Task Force, which was recently created to “safeguard the nation’s economic security against those who seek to profit illegally from American creativity, innovation and hard work.”

The various cases against Sinovel have attracted widespread attention, as theWall Street Journal notes:

U.S. Secretary of State John Kerry, while in his capacity […]

2016-12-16T20:24:01-05:00July 21st, 2013|

Pirelli chairman sentenced to jail for industrial espionage and phone taps

Pirelli chairman Marco Tronchetti Provera has been sentenced to jail for twenty months.

The Financial Times reports that a Milan court found him guilty, but suspended his jail sentence, in an industrial espionage case involving Telecom Italia.

Provera, who denies the charges, was also ordered to pay € 900 000, ”I will appeal, [I am] convinced that the truth will emerge,” he said in a statement.

According to FT the trial was linked to a broader case of suspected industrial espionage and phone-tapping that led to the arrests in 2006 of 20 people, including Giuliano Tavaroli, a former head of security at Telecom Italia and Pirelli.

They were accused of operating a spy network that collected private information about many prominent Italians, including two prime ministers, Silvio Berlusconi and Romano Prodi. (GMM-Apex)

Marco Tronchetti Provera with Paul Hembery

[Read more]

2013-07-21T16:50:15-04:00July 21st, 2013|

Iranian MP Ali Motahari says his offices were wiretapped and illegally videotaped.

7/13/2013 Payvand Iran News

Ali Motahari, Iranian MP

Iranian conservative MP Ali Motahari says his offices were wiretapped and illegally videotaped. 

Motahari said in a statement that surveillance equipment was accidentally discovered in the air conditioning ductwork, and his own video surveillance shows that up to nine intruders had entered the premises at night.

—————-

This news report points to the need for multiple levels of security.  Motahari’s security video recordings revealed intruders who were planting their own video surveillance devices.  If you suspect possible intrusion to your premises, even if nothing was taken, ESPECIALLY if nothing was taken, it could have been an attempt at planting bugs or eavesdropping equipment and may require a proper TSCM inspection to maintain security.

2016-12-16T20:24:01-05:00July 21st, 2013|
Go to Top