News copied from other online sources.

Jury had peek into phone hacker’s routine; News of the World trial

 Phone-hacking jury given peek into Glenn Mulcaire’s working routine

 Trial of Rebekah Brooks and Andy Coulson shown whiteboards and handwritten notes collected from hacker’s office and shed

Nick Davies theguardian.com

 The working life of a phone hacker was exposed in the Old Bailey on Thursday, including a note to be wary of a particularly tricky Vodafone employee and a suggestion that the News of the World’s deputy editor had been a target of his own paper’s eavesdropping.

 The jury in the phone-hacking trial was shown eight of Glenn Mulcaire’s whiteboards – covered in handwritten notes and diagrams about his work – found by police in an office and a garden shed belonging to the News of the World’s specialist hacker.

 One board carried a list headed “Networking”, which included the names of Rebekah Wade (as Rebekah Brooks was then) and Greg Miskiw, the former assistant editor of the News […]

2016-12-16T20:23:55-05:00December 18th, 2013|

Phone hacking of UK Charity- PBX phone systems have many vulnerabilities

Phone system hacking has been going on for decades and is still a big problem. We have been called to help solve many cases in recent years. Make sure your telecom provider is aware of the security vulnerabilities of your systems and how they can protect against hacking. Particularly vulnerable are auto-attendant features, call forwarding, DISA (Direct Inward System Access), and voicemail notification features. If you see calls on your phone bill to odd international locations, costing extra large amounts, or at odd times such as nights or weekends, it could be an indication of your system having been hacked.

Phone hackers leave RABI with £2k bill

Philip Case  Tuesday 03 December 2013 [Farmers Weekly]
Criminals have hacked into the telephone system of farming charity the RABI and spent nearly £2,000 calling premium-rate numbers.

Telephones at the RABI’s head office in […]

2013-12-17T23:20:45-05:00December 17th, 2013|

Corporate Spies, Social Media, and BYOD

Corporate Spies Love Social Media, By Stephanie Blanchard, Digital Editor Mobile Enterprise

No one appreciates a fair-weather friend, the kind that is only around when something is in it for them, and quick to disappear when help is needed. But fake friends are even worse, the social profiles of people who simply do not exist in the real world. However, such profiles serve as bait, whether to collect information, or send out malware, or believe it or not, corporate espionage.
 
But are companies paying attention? After all, these are just social sites, right? And someone else’s problem. Think again. Spear phising is one way in to the network, and it’s possible every day.
 
One completely bogus profile on Linkedin, for example, identified by Websense Security Labs, had 400 connections. Yet it exists only to harvest intelligence, and in this particular case, lure viewers to a dating site. The consequences can […]

2016-12-16T20:23:55-05:00December 17th, 2013|

Tech execs urge Obama to limit NSA spying on their users

Washington Bureau, Dec 17, 2013

The nation’s top technology executives gave President Barack Obama an earful about the National Security Agency’s spying on their users at a White House meeting Tuesday.

The president met with 15 tech executives, including Apple CEO Tim Cook, FacebookChief Operating Officer Sheryl Sandbergand Google Executive Chairman Eric Schmidt.

Apple CEO Tim Cook

Obama talked to the executives about his administration’s work to fix HealthCare.gov, the federal insurance exchange, and announced he’s hired former Microsoft Office Division President Kurt DelBene to lead this effort. The president also encouraged the executives to share their ideas on how to improve the federal government’s procurement and use of information technology.

But NSA spying was clearly the most important topic for the tech executives.

They left the White House without talking to reporters, but they did issue the following joint statement: “We appreciated the opportunity to share directly with the president our principles on government surveillance that we released last […]

2016-12-16T20:23:55-05:00December 17th, 2013|

Butt-dialing cautions…

It’s probably happened to everyone, accidentally dialing the last number dialed or a speed dial from your cell phone, or receiving such a call from someone you recently spoke with and being able to listen to the other party riding in their car, listening to the radio, carrying on with their life unknowing that you are listening. Although fairly common, this can create serious security concerns.  I was in a security meeting at one organization with department heads and the Secret Service discussing the arrival of the President of the United States to an ongoing conference. An assistant of the person next to me came up to her and explained that she just received a voice message on her phone that was a recording of the entire conversation at our meeting.  She was a victim of butt-dialing. The last call the department head had made was to the assistant, […]

2016-12-16T20:23:55-05:00December 13th, 2013|

Speaking of recording… some caution about recording staff meetings.

Should You Secretly Tape Your Meetings with Employees? By Christina Stoneburner, Fox Rothschild Attorneys,

 

Although every situation is different, I would think twice before secretly taping employee meetings. 
With more employees  having smartphones that can record high quality digital recordings, I have been asked more and more frequently by supervisors whether they should protect themselves and record disciplinary meetings with employees just “so the record is clear.”  

Recording seems like a good idea, because supervisors tell me, they believe employees are already taping them.  Just look for example about the case my partner, Richard, blogged about a “Federal Jury Slams Black Owner for Calling Black Employee the “N Word.” Later CNN released the actual tapes in that case (which contain explict — although bleeped – slurs) and they are remarkably clear.  I guess gone are the days of hidden tape recorders where the audio sounds like a bag of potato chips was being opened and […]

2016-12-16T20:23:56-05:00December 13th, 2013|

LA hoaxer arrested on eavesdropping charges- not for making prank calls, but for recording them.

Man Nabbed Over Prank Calls to Pro Coaches, By Matt Cantor,  Newser Staff

 (NEWSER) – Famous last words: “I’m like the world’s most safe criminal.” A Los Angeles man has been arrested after allegedly making prank calls to at least a dozen NFL, NBA, and college football coaches offering them new jobs. Kenneth Tarr, 32, allegedly called the likes of ex-Tampa Bay Buccaneers and Indianapolis Colts coach Tony Dungy, offering him a head coach position at the University of Southern California, NBC News reports. Others targets included Minnesota Vikings head coach Leslie Frazier, University of Hawaii head coach Norm Chow, and Cincinnati Bengals offensive coordinator Jay Gruden.

Tarr was arrested yesterday on suspicion of eavesdropping after he allegedly recorded the calls; recording without consent is illegal in California. He seems quite open about the pranks, having apparently written to Deadspin boasting of them. “I’m amazed that they’re returning any of these calls,” he […]

2016-12-16T20:23:56-05:00December 13th, 2013|

Hidden camera and remote controlled power outlets- but no espionage, just an advertising stunt.

Intel and The Monkeys chase power in hidden camera stunt

Intel has enlisted creative agency The Monkeys to conduct a hidden camera experiment which sees people chasing around remote controlled power outlets as they try to charge their devices.

The video ‘Chasing Charge’ to promote the new Core Processors has people chasing the power outlet at a cafe until it hides in a box which reveals the message “power keep running out on you?”

 

Intel’s Asia Pacific director brand strategy and integrated marketing Jayant Murty said in a statement: “In a world where people want to stay connected to the things they love without breaks or interruptions, they are increasingly seeking devices that have great performance and amazing battery life.

“Until recently consumers have had to choose between the two. But not with the latest core processors, that give you both in one package.”

2013-12-05T19:25:02-05:00December 5th, 2013|

Video surveillance of hacker/activist Aaron Swartz released.

The video can be viewed at the website links below.

WIRED, BY KEVIN POULSEN 12.04.13

The door to the network closet pops open and a slender figure enters, a bicycle helmet hanging at his side. He sheds his backpack and pulls out a cardboard box containing a small hard drive, then kneels out of frame. After about five minutes, he stands, turns off the lights and furtively exits the closet.

This scene, captured by a video camera hidden in a wiring closet at MIT, was the beginning of a probe that led to federal charges against the late coder and activist Aaron Swartz. The video, along with dozens of other documents related to the case, has been released to the public for the first time through my Freedom of Information Act lawsuit against the U.S. Secret Service.

The video was made in January 2011, near the end of a months-long cat-and-mouse game between MIT personnel […]

2016-12-16T20:23:56-05:00December 5th, 2013|

World news- Australia: Chinese’s scientist absence exposed alleged spying activities at CSIRO

The Commonwealth Scientific and Industrial Research Organisation(CSIRO) is Australia’s national science agency.  

The Sidney Morning Herald, 12/5/2013
A CSIRO scientist’s failure to show up for work led Australia’s top scientific organisation to uncover a suspected spy in its ranks.

The Chinese scientist at the centre of an industrial espionage probe had missed three days of work last week, prompting CSIRO management to ask police to visit his suburban Melbourne residence to check on his welfare.

But by the time the officers arrived, the scientist was nowhere to be seen.

Fairfax Media understands he had left the country days earlier, possibly returning to China.

However, he had left CSIRO computer equipment in his home. The equipment is now being examined by federal police and intelligence officials.

It is believed CSIRO databases had been accessed from the computer equipment and confidential information may have been used in an unauthorised fashion.

Neither the Australian Federal Police […]

2016-12-16T20:23:56-05:00December 5th, 2013|

Types of people behind today’s corporate security threats

An article on ZDNet provides a good summary of who might be attacking your network, along with tips for fighting back.
Problems could easily come from any of the following:digital user+password1

Employees 
IT workers 
CEOs and small business owners 

State-sponsored actors 
Corporate espionage 
Wannabes and thrill seekers 
Software developers 

[Full Article] Field guide: Types of people behind today’s corporate security threats

…For an example of how serious corporate espionage can be, one need look no further than Nortel, the former telecommunications giant that declared bankruptcy in 2009. In 2012, The Wall Street Journal reported that hackers, who appeared to be working in China, used stolen passwords from Nortel executives to “downloaded technical papers, research-and-development reports, business plans, employee emails and other documents.” Brian Shields, a former 19-year Nortel employee and systems […]

2016-12-16T20:23:56-05:00December 2nd, 2013|

The importance of a trade secret (vs. filing for a patent), from Coca-Cola to the telephone.

There is a big difference between filing for a patent for your idea, and establishing it as a trade secret.  

A patent, by it’s very nature, requires that you reveal details about how it works, what it is, what it does. This information must be revealed in order to gain a patent. A definition of a patent would be a set of exclusive rights granted… to an inventor or their assignee for a limited period of time, in exchange for the public disclosure of the invention. (The telephone- often considered the most valuable patent.)

A trade secret, on the other hand, is exactly that- a secret. No one but you should know what it is, or how it works.  It is required to be kept secret, private, and confidential. It must be protected, otherwise it cannot be considered a trade secret. (The formula for Coca-Cola- the most famous trade secret.)

Here are some other significant points- a patent […]

2016-12-16T20:23:56-05:00December 1st, 2013|

Technology lets peeping Toms take spying to new level [and not just peeping Toms: anyone who wants to spy]

Most news articles focus on voyeurism, but of course, it’s not just peeping Toms to worry about. It could be an employee looking for an edge up, a jealous executive, any adversary planning an attack or disruption. Anyone who wants to take advantage of another’s situation has high tech spy technology available on line, literally at their fingertips. Micro video recorders, audio eavesdropping, tracking devices, all available for a few dollars from on line sources.  
TIP: If you see a device you are not sure of, one tell tale sign could be if the device has a USB port on it. A key fob, calculator, even sun glasses, if they have a connection plug for a computer it could be suspicious. On more advanced devices you may not see such connections, though. The more common covert video and audio recorders have a USB port for both […]

2016-12-16T20:23:56-05:00November 30th, 2013|

it was ‘easy to listen to voicemails’, hacking trial hears

“She [Brooks] said that it was so easy to do and she couldn’t believe that famous people who have all these advisers did not know they needed to change their pin code to make their voicemail secure”.

Lisa O’Carroll and Caroline Davies
theguardian.com, 

Eimear Cook, the ex-wife of golfing star Colin Montgomerie was accused of repeatedly lying under oath about a lunch with Rebekah Brooks in which she claimed the former News International chief excutive had told her how easy it was to hack phones.

 In a tense and prolonged exchange at the Old Bailey on Monday, counsel for Brooks said Cook had fabricated parts of her witness statement to the police, including a claim that the former publishing boss had told her about an assault on her ex-husband Ross Kemp.

 Brooks’ counsel Jonathan Laidlaw, QC, asked her had she done […]

2013-11-28T08:50:20-05:00November 28th, 2013|

FBI warns of U.S. government breaches by Anonymous hackers

REUTERS

(Reuters) – Activist hackers linked to the collective known as Anonymous have secretly accessed U.S. government computers in multiple agencies and stolen sensitive information in a campaign that began almost a year ago, the FBI warned this week.

The hackers exploited a flaw in Adobe Systems Inc’s software to launch a rash of electronic break-ins that began last December, then left “back doors” to return to many of the machines as recently as last month, the Federal Bureau of Investigation said in a memo seen by Reuters.

The memo, distributed on Thursday, described the attacks as “a widespread problem that should be addressed.” It said the breach affected the U.S. Army, Department of Energy, Department of Health and Human Services, and perhaps many more agencies.

Investigators are still gathering information on the scope of the cyber campaign, which the authorities believe is continuing. The FBI document tells […]

2016-12-16T20:23:56-05:00November 15th, 2013|

More Kinds of Corporate Spies Target More Kinds of Trade Secrets

Voice of America, Jim Randle  November 05, 2013

Efforts to steal trade secrets from U.S. companies continue at a high level and are hitting new targets, in spite of major efforts to stop such industrial espionage. Losing trade secrets hurts the economy by discouraging investments in the research critical to growth.  Some new players are getting into the fray, and the attacks hit a huge variety of businesses from high tech to high fashion.  

Plans for a fighter jet are an obvious target for corporate and other kinds of spies, but experts say industrial espionage also has been aimed at high fashion designers and toymakers, innovative steel makers, food and beverage companies, clean energy research and wind turbine makers.  Corporate spies also are seeking information about the management practices that guide successful businesses.

Mandient corporate security expert Laura Galante says a growing number of companies think security breaches are becoming inevitable.

“2013 was […]

2016-12-16T20:23:56-05:00November 11th, 2013|

Insider threats- the dangers within

We’ve come across a number of articles recently highlighting the spy threats that come from within a company’s own employees, a few of these are referenced below. As with all security, some of the biggest threats come from within your own walls.  This is particularly worth noting when it comes corporate espionage. About 90 percent of all eavesdropping devices and threats we have discovered were placed by current or former employees or others who had free access to the target areas. In espionage cases, there may be nothing obvious missing to alert you to the incident. By the time the loss of information is recognized it may be too late, the damage may be done. 

::::::::::::::::::::::::::::::::::::::::::

Digital security website Dark Reading reports:

Generation Y Users Say They Will Break Corporate BYOD Rules

Majority of users ages 21 to 32 say they would flout company policies restricting the […]

2016-12-16T20:23:57-05:00November 9th, 2013|

Spy shoes to drones: How U.S. surveillance changed

An article in USA Today reviews the history of spy-dom with an interactive graphic reviewing some devices and techniques from the 1940’s through 2013.  An important point to remember when considering all forms of technology today, is that the advancements have a cumulative effect, especially when it comes to spying. Techniques from the 1700’s, 1800’s, and 1900’s are still valid in 2013. Just because new technology has emerged does not mean that old technology or techniques have disappeared.  We now have Kindles and iPads, Youtube and podcasts, yet books, radio, and TV are still with us and very significant.  With much of today’s spying taking place in the cyber world, it’s important to remember that the old techniques have not gone away. Hidden microphones, transmitters, covert video, even putting your ear up to an air vent to hear voices from another room are still active valid eavesdropping threats […]

2016-12-16T20:23:57-05:00November 8th, 2013|
Go to Top