News sent out via mailchimp.

A case of mud, money and corporate intrigue

Employee ethics can be quite flexible. This can lead them to make devastating decisions, offering to sell out their employer for the right price. Many times they do not even realize they have crossed the line into serious criminal espionage activity. Having regular TSCM sweeps done helps to establish that your information is proprietary and confidential. A benefit to having such programs in place is that employees begin to realize that the information they have access to is protected and confidentiality should not be taken lightly.

A case of mud, money and corporate intrigue

By Loren Steffy | Tuesday, September 25, 2012  Houston Chronicle

It’s a story of international intrigue and secret blueprints, with allegations of corporate spies and clandestine document drops at a kitchen table.

While it has all the makings of the next “Mission Impossible” movie, it doesn’t involve any thing as glamorous as microchips or the access codes […]

2016-12-16T20:24:05-05:00October 5th, 2012|

Private investigator admits to bugging from 75 to 100 vehicles.

Vehicles are vulnerable to audio interception and should be inspected regularly. In this case, a private investigator claims to have bugged 75 to 100 cars.

Lawyer pleads not guilty to bugging car

Justin Berton, San Francisco Chronicle, September 25, 2012 
[Read Original Article] 

(09-25) 13:49 PDT OAKLAND — A divorce attorney pleaded not guilty Tuesday to charges that she hired a private investigator, who was a central character in Contra Costa County’s “dirty DUI” scandal, to illegally install listening devices inside the car of a client’s ex-husband.

Mary Nolan, 60, appeared in Oakland federal court, where she also pleaded innocent to four counts of tax evasion. She faces up to 15 years in prison and $750,000 in fines if convicted on all counts.

Nolan was first linked to disgraced private investigator Christopher Butler,50, in 2010, after two men told The Chronicle that she used their drunken driving arrests against them in divorce and […]

2016-12-16T20:24:05-05:00September 29th, 2012|

House Panel to Question Chinese Telecom Firms About Corporate Espionage

Wall Street Journal (09/07/12) Gorman, Siobhan

The U.S. House Intelligence Committee is expecting to hold public hearings next week in which it will question executives of Chinese telecom firms Huawei Technologies Co. and ZTE Corp. about concerns over corporate espionage, the companies’ ties with the Chinese military and government, and their dealings with Iran. The hearings are part of a year-old probe into the companies by the committee, which has prompted several sharply worded warnings and statements by Huawei alleging it is being discriminated against and protesting its innocence of any wrong doing. ZTE has already announced that it will take part in the hearings and plans to send Senior Vice President Zhu Jinyun. Huawei, however, has said that its participation in the hearings will be conditional on the committee making “appropriate arrangements,” though it has not indicated what arrangements those might be. Both companies have been attempting to further expand […]

2012-09-11T00:07:10-04:00September 11th, 2012|

Colorado contractor settles federal corporate-espionage allegations

From the Denver Business Journal, 9/4/2012

https://www.bizjournals.com/denver/news/2012/09/04/colorado-contractor-settles-federal.html?s=print

Colorado contractor settles federal corporate-espionage allegations

 by Greg Avery, Reporter Denver Business Journal

Paragon Dynamics Inc., an Aurora defense contractor, is paying $1.15 million to settle allegations it stole bid information from Raytheon Corp. about spy agency projects over which the companies competed in 2009.

John Walsh, U.S. attorney for the District of Colorado, announced the out-of-court settlement between Paragon and the federal National Reconnaissance Office on Tuesday. The NRO commissions spy satellites and other technology for U.S. intelligence agencies.

Paragon did not admit legal liability in the settlement agreement but acknowledged that an unidentified Paragon employee obtained Raytheon information.

Around July 31, 2009, an unidentified senior software director for Paragon used computer access to Raytheon’s systems in Aurora to obtain Raytheon’s bids for two NRO projects — code named Antietam and Savannah — plus other information, the settlement agreement says.

Security cameras caught the employee faxing some of the […]

2016-12-16T20:24:05-05:00September 11th, 2012|

Woman gets 4 years for stealing Motorola secrets

 Bloomburg Business Week, By Jason Keyser on August 29, 2012

CHICAGO (AP) — A federal judge sentenced a Chinese-born American Wednesday to four years in prison for stealing millions of dollars in trade secrets from Motorola, describing her as a soft-spoken, unassuming woman who carried out a “very purposeful raid” on the company in the dead of night.

In a barely audible voice and heavily accented English, 41-year-old Hanjuan Jin told the judge she was “so sorry for what happened” and pleaded for a second chance. Her lawyers had argued that she took the files merely to refresh her knowledge after a long absence from work and was not spying for China. They appealed for leniency and asked that Jin receive probation, in part because of her poor health.

But U.S. District Judge Ruben Castillo said it was important to send a message that would deter others with access to trade secrets from siphoning […]

2016-12-16T20:24:05-05:00August 31st, 2012|

Accidental espionage

 from SC Magazine, UK, Secure Business Intelligence;    August 15, 2012

Corporate espionage is a term that conjures up a world of high-tech gadgets, intelligence agents in trench coats and organised criminal gangs.

This is a world far removed from everyday life at the office – or is it? Companies today are spending an estimated £65 billion dealing with an on-going war against malicious outsiders, intent on accessing their information.

However, corporate espionage covers a broad range of activity, not all of it obviously criminal or malicious and there are many kinds of information and many ways of obtaining it. With money and attention being directed at shoring up IT systems, companies often ignore the risk presented by paper and can lose sight of the serious threat posed, often without intention, by their employees.

A recent Iron Mountain study revealed that office workers often form […]

2016-12-16T20:24:05-05:00August 19th, 2012|

International voicemail hackers attack random US phone systems

Along with eavesdropping and theft of information, your voicemail system is also vulnerable for financial exploitation. In the past decade, there have been numerous occurances of voicemail systems being hacked for financial gain.  In many of these incidents the technique used was trying to force voicemail systems to place international calls to the Philippines, Cuba, or other countries.  The number being dialed is similar in concept to the 900 numbers popular in the US, where the owner of the number will receive payment for every call that comes in.  The calls are typically answered by another answering system that just tries to keep the automated call connected as long as possible. Since these are international calls, the owner of the phone system under attack will end up with a very large bill from their long distance carrier. 

International Phone Hacking

The hacker makes […]

2016-12-16T20:24:05-05:00August 17th, 2012|

When does social media become a security concern?

This article from Business Week reveals some of the problems that arose when a CEO’s family members posted detailed information regarding the family’s and parents’ activities and schedules. It highlights the fact that security concerns affect all aspects of life- home and office.

The Very Real Perils of Rich Kids on Social Networks  
By  on August 10, 2012, Business Week 
Zachary Dell, the teenage son of PC magnate Michael Dell, earned his 15 minutes of Internet fame this week. He appeared on a Tumblr site called the Rich Kids of Instragram in a photo posted by his older sister Alexa. There Zachary sat on the family jet, devouring a Ritz-worthy buffet on his way to Fiji. 

Anyone with a bit of curiosity could see that Alexa had posted the picture on Instagram and pointed to it via her Twitter account. On that same Twitter […]

2016-12-16T20:24:05-05:00August 15th, 2012|

State police: No evidence of Saints wiretap

“No evidence was found…” if you have suspicions of eavesdropping it is important to act immediately and know who to call for support.  “Evidence” can disappear quickly leaving you with nothing more than suspicions.  -cp

NEW ORLEANS — Louisiana State Police investigators have found no evidence that the Saints or general manager Mickey Loomis rigged Superdome wiring so opposing coaches’ radio communications could be intercepted.

“This has been an intensive investigation, and after numerous interviews we have determined that there is no evidence that state laws have been violated,” State Police Col. Mike Edmonson said Monday after meeting with Saints owner Tom Benson in New Orleans to brief him on the status of the probe.

State police investigators have been working in conjunction with the FBI since the eavesdropping allegations surfaced in news reports in April.

“We found no corroborating evidence that Mickey Loomis or anybody in the Saints was engaged in wiretapping or […]

2016-12-16T20:24:05-05:00August 14th, 2012|

How to Thwart Entrepreneurial Espionage

New businesses especially need to pay attention to keeping their proprietary information safe.  In this article, Susan Shreter gives information security tips for those starting out in a new venture. If you are planning any new business moves- whether starting a new business, adding a new product line, acquiring another company, you need to be sure that your discussions, your planning meetings, and your offices are protected from espionage. A professional TSCM sweep would be a good place to start.  -cp

By   Published August 13, 2012  FOXBusiness

Is there such a thing as entrepreneurial espionage? Entrepreneurs who believe that their “great ideas” have been stolen by ruthless competitors, opportunistic web surfers, shady consultants, and dishonorable prospective investors, would say, “Yes! There are people out there who will take advantage of all too trusting entrepreneurs.”

When entrepreneurs ask me about the risks associated with sharing their business plans with complete strangers, […]

2016-12-16T20:24:05-05:00August 14th, 2012|

Kremlin Wiretaps Dissident Blogger — Who Tweets and Posts Video of the Bug

from Wired.com,  August 8, 2012, By Robert Beckhusen

Alexei Navalny showed up to work in Moscow on Monday to discover he was being bugged. He called the police, like many perhaps would, but not before tweeting photos and video of himself and his colleagues taking the Kremlin’s monitoring devices apart.

It’s not hard to figure out why Navalny was bugged. He’s one of Russia’s most influential anti-corruption bloggers and is at the center of a protest movement aimed at toppling the regime of President Vladimir Putin. Since late July, the 36-year-old lawyer has faced possible arrest, trial and up to 10 years in prisonfor charges Putin’s prosecutors claim stem from an embezzlement scheme, but which Navalny and his supporters claim is an attempt to silence him.

The discovery began when Navalny’s colleagues at the watchdog group Anti-Corruption Fund had just returned from vacation, and “just […]

2016-12-16T20:24:05-05:00August 9th, 2012|

Former Intel worker gets 3 years for industrial espionage – Hudson, Massachusetts

Thursday August 9, 2012

BOSTON (AP) – A former Intel Corp. worker in Massachusetts has been sentenced to three years in federal prison for stealing hundreds of millions of dollars’ worth of computer chip manufacturing and design secrets while working for a rival company.

Biswamohan Pani was also sentenced Wednesday in Boston to two years of probation and fined $17, 500. He pleaded guilty in April to five counts of wire fraud.

Prosecutors say the 36-year-old Pani downloaded secret documents from Intel in May and 2008, shortly after he announced he was leaving his job in Hudson, Mass.

Santa Clara, Calif.-based Intel valued those documents at between $200 million and $400 million. The company detected and reported the theft.

Intel rival Advanced Micro Devices Inc. hired Pani and cooperated with investigators. The Sunnyvale, Calif. company did not know of Pani’s scheme.

 

[Read Original Article]

2012-08-09T21:21:51-04:00August 9th, 2012|

Finding spyware on smart phones, review from Defcon

In this article from Forbes.com, the writer discusses a Defcon presentation by Michael Robinson. He tested a number of common “spy” apps and reveals many ways they can be detected. 

[Read Original Article]

Espionage software isn’t just for Chinese intelligence agents and Eastern European identity theft rings. A miniature spyware industry also serves jealous spouses, worried parents, even overbearing bosses. Luckily for the targets of those small-time spies, however, it turns out that consumer-grade snoopware is much, much shoddier than the professional variety.

In a talk at the Defcon hacker conference this weekend, forensics expert and former Pentagon contractor Michael Robinson plans to give a talk on how to detect a range of commercial spyware, programs like MobileSpy and FlexiSpy that offer to let users manually install invisible software on targets’ phones to track their location, read their text messages and listen in on their calls, […]

2016-12-16T20:24:05-05:00August 9th, 2012|

Why corporate India is hiring detectives

These spies may not wear long black overcoats, black hats and black leather shoes, but at a time when corporates are consistently in a battle for one-upmanship, detectives give companies that extra edge they need to stay ahead. 

The rising trend can be judged by the sheer growth in the number of detectives that the country has right now. From around 500 investigators 10 years back, the number has swollen to 15,000 today, says Kunwar Vikram Singh, chairman of Lancers Network, a risk consulting corporation. And while detectives have helped the companies with information they need for their strategies and survival, this practice has not gone down well with the ethics brigade.

V.M. Pundit, chief executive officer of Multidimensional Management Consultants, a security and investigation company, says these days most companies are allotting sizeable budgets for ‘security purposes’, which include strengthening internal data security measures as well as keeping an eye on […]

2016-12-16T20:24:06-05:00August 6th, 2012|

Sniffing out RF at the Olympics

pic.twitter.com/h9L2RYWc 

https://www.theverge.com/2012/8/2/3215016/wi-fi-police-london-olympics

Apparently they were searching the airwaves for unauthorized wifi hotspots, or perhaps other wireless network problems. Similar steps can be taken for office environments. If someone set up a rogue access point in your office, that could open your network to intruders and a number of associated problems. Electronic systems are available that can monitor wifi as well as cellular signals in an office or building and locate and identify any unauthorized signals. Check with us if you need more information.

2012-08-02T23:51:04-04:00August 2nd, 2012|

Espionage for Everyone: Dead Drop — There’s an app for that

iOS spy game now available
Spying is still a popular pastime. 

PRESS RELEASE
Aug. 1, 2012, 12:15 p.m. EDT
Live-Action Mobile Spy Game Introduces New Social Gameplay for Consumers, New Revenue Opportunities for Brands and Local Businesses

 SAN FRANCISCO, CA, Aug 01, 2012 (MARKETWIRE via COMTEX) — From Flemming to Le Carre, it’s hard not to love a good spy novel or film, and gamers now have the opportunity to inhabit that world of daring international espionage, outsmarting friends, family, and coworkers, through the new iOS game Dead Drop. Dead Drop launches today as the first live-action, spy-themed social game to bring mobile gaming into the real world, introducing an entirely new social gaming experience. The goal of Dead Drop is simple: be the last man standing — that is, eliminate all other players while avoiding elimination yourself. Dead Drop takes place within […]

2012-08-01T20:42:29-04:00August 1st, 2012|

Threat of foreign eavesdropping devices

Eavesdropping devices and bugs on sale in Japan.

High tech electronic eavesdropping devices are sold openly in many foreign countries. They are easily obtained by anyone traveling on business or on vacation. These devices pictured were on sale in a small shop in Japan. Most of them are illegal to sell or use in the U.S.

If you have business associates traveling overseas, whether competitors or within your own company, they could bring back devices that could seriously hurt your business.  Transmitters could be hidden within gifts or ordinary devices.  

We have the electronic tools and techniques that can locate such devices, even when they are hidden or sealed inside other objects.

 

 

2016-12-16T20:24:06-05:00July 29th, 2012|
Go to Top