News copied from other online sources.

Sports: Ex-Patriots hinted that the locker room may be bugged – says Tony Dungy

from Sportsgrid.com

On Thursday’s “Dan Patrick Show,” Tony Dungy — a regular on the program — casually threw out a very disconcerting bit of information about the Patriots’ intelligence gathering procedures. He made a point to say that this kind of stuff — which essentially amounts to spying — is not confined to New England. He’s just “heard” that it might definitively occur within the walls of Gillette Stadium.

Dan Patrick: “Did you think that your locker rooms were being spied on?”

Tony Dungy: “We had a few ex-Patriots that said, ‘You better be careful what you do in the locker room and what you say,’ and that kind of thing. I think a lot of that is psychological warfare, you know, they want to think certain things and worry about more about what’s going on off the field than on it. You can’t worry […]

2016-12-16T20:23:39-05:00August 21st, 2015|

Japan: Government taking steps to fight industrial espionage

The Yomiuri Shimbun

The National Police Agency will soon team up with the Economy, Trade and Industry Ministry to fight industrial espionage.

Joint measures will include visits by police officers to about 10,000 domestic corporations with cutting-edge technology to give them advice, according to NPA sources.

Under the plan, which will be implemented as early as this autumn, companies with state-of-the art technology will also be provided with the latest information about how industrial spying is conducted, according to the NPA sources.

The move reflects growing concerns that the theft of leading technology from domestic companies could lower the international competitiveness of Japan’s corporate sector.

The economy ministry will list companies with sophisticated technologies or products that might be targeted by industrial spies from overseas and provide the information to the NPA.

Based on instructions from the NPA, officers of prefectural police forces will visit the companies’ head offices, plants and laboratories.

They will […]

2015-08-11T17:56:21-04:00August 11th, 2015|

SC Mayor arrested on wiretap charges- when computer hacking is not enough…

Mayor Rodney Turner of Lyman, South Carolina was arrested along with an associate on computer hacking and wiretap charges. It is important to recognize that while cyber crime receives the majority of attention these days, oral communication is still very much at risk and needs protection. None of the reports we read gave any indication of the wiretapping techniques used but they do refer to interception of oral communications. We will be following this story to see if there is any indication of how wiretapping of the town hall was accomplished.

From Gannett Greenville Online:

The mayor of the town of Lyman was arrested Wednesday in connection to a wiretapping investigation, state law enforcement officials said.

Rodney Dean Turner, 58, of 303 Earl Drive, was charged with wiretapping, misconduct in office and misconduct in office by a public official, according to warrants.

Warrants allege Turner failed to faithfully execute the responsibilities and power […]

2016-12-16T20:23:39-05:00August 6th, 2015|

Louisiana: bugged picture frame eavesdrops on office conversations.

Detention center secretary, trying to be a whistle blower,  secretly recorded her supervisor’s conversations by placing a recording device behind a picture frame in his office. Regardless of intentions, the article indicates how easy it is to eavesdrop by hiding a recording device in an office or conference room. 

The Advocate, 7/30/2015

The Louisiana Supreme Court will decide who will preside over a criminal case against a Florida Parishes Juvenile Detention Center secretary, accused of illegally recording her supervisor’s conversations, now that a judge has recused himself and all of his colleagues in the judicial district.

State District Judge Bruce Bennett recused himself and the five other general jurisdiction judges of the 21st Judicial District Court from hearing Joy Chauvin’s case.

Chauvin faces one count of interception of wire, electronic or oral communications for allegedly bugging her boss’s office in an attempt to prove she was being […]

2016-12-16T20:23:39-05:00July 30th, 2015|

Windows 10 security concern. Windows 10 wants to share your WiFi key through “WiFi Sense”

An article in The Register explains that a new Windows 10 feature could be opening up your wifi for others to use without your knowledge.

A Windows 10 feature, Wi-Fi Sense, smells like a security risk: it can share access to Wi-Fi networks with the user’s contacts.

Those contacts include their Outlook.com (neeHotmail) contacts, Skype contacts and, with an opt-in, their Facebook friends. There is method in the Microsoft madness – it saves having to shout across the office or house “what’s the Wi-Fi password?” – but ease of use has to be teamed with security. If you wander close to a wireless network, and your friend knows the password, and you both have Wi-Fi Sense, you can log into that network.

Wi-Fi Sense doesn’t reveal the plaintext password to your family, friends, acquaintances, and the chap at the takeaway who’s an […]

2016-12-16T20:23:39-05:00July 29th, 2015|

Charges stand against woman who bugged diaper bag.

The CIA is known to have used fake poop for passing information, I don’t think I ever heard of them bugging a diaper bag, though.

The Ogden, Utah, Standard Examiner reports that slipping a recorder into a child’s diaper bag was not a good idea for Teri Anne Smith.

FARMINGTON — A judge ruled that even though a woman claimed she only wanted to record conversations between her ex-husband and children, the electronic eavesdropping charges against her will stand.

For more than an hour Thursday, 2nd District Judge Robert Dale heard arguments by defense attorney Rebecca Skordas and Deputy Davis County Attorney Richard Larsen about whether the charges against Teri Anne Smith are valid.

Smith, 37, is charged with three counts of wiretapping or intercepting electronic communications, all third-degree felonies. Another hearing is scheduled for Aug. 27.

Smith secretly recorded conversations between […]

2016-12-16T20:23:39-05:00July 25th, 2015|

Canada’s new spy palace glass walls could allow eavesdropping

If your building boasts beautiful large glass walls and windows, you may want to follow Canada’s CSEC’s plan and find ways to darken the glass to prevent spying eyes.

From the Ottawa Citizen:

The government’s new billion-dollar spy palace in Ottawa has a problem that doesn’t sit well with the employees of one of the most secretive buildings in the world – it’s built like a fish bowl that might allow prying eyes to see inside.

The new Communications Security Establishment Canada complex, located in Ottawa.

The former head of the Communications Security Establishment once called the Ogilvie Road complex – with its massive glass walls – an “architectural wonder.”

But now CSE officials are realizing that all that glass could potentially allow foreign intelligence agencies to eavesdrop on Canada’s electronic eavesdroppers.

Specialized darkened screens are now going to be added to the windows to prevent such […]

2016-12-16T20:23:40-05:00July 11th, 2015|

Article: Economic Espionage- Is Your Competition Hacking You?

This article was originally posted to LinkedIn by Marcus Eagan, CEO and Founder at Nodal Industries. Nodal produces the network security device, Numa.

Corporate espionage is on the rise. For those unfamiliar with the term – also commonly referred to as industrial or economic espionage – corporate espionage is when one corporate entity or government hacks into the systems of another corporate entity to steal their data. The first conviction for economic espionage in the U.S. happened only recently. Last year a Taiwanese national who worked for Boeing and later Rockwell Corporation was convicted of stealing trade secrets from the Aerospace giants. Acting on behalf of the People’s Republic of China, not Taiwan, Dongfan “Greg” Chung exfiltrated thousands of technical documents from Rockwell and Boeing to aid in China’s quest to build an earth-orbiting space shuttle.

Also making headlines is the report that the FBI was investigating the […]

2016-12-16T20:23:40-05:00July 11th, 2015|

Waitergate, bug in the bread basket: A year later, four Polish government ministers and the speaker of parliament resign

From The Washington Post, 6/11/15

It began with something so small: a tiny microphone hidden near a dining table in a fancy Warsaw restaurant.

But after the bug caught Polish government ministers discussing private deals, Cuban cigars and off-color jokes — including a comparison of U.S.-Poland relations to oral sex — over expensive meals, a scandal that began as small-talk quickly spread. There were arrests, accusations of international spying and sealed documents leaked on social media.

On Wednesday, almost exactly a year after they first emerged, the secret recordings claimed their biggest scalp yet when four Polish government ministers and the speaker of parliament abruptly resigned.

Polish parliament speaker Radoslaw Sikorski, who stepped down on Wednesday. (European Pressphoto Agency)

The resignations are bad news for the already embattled governing party, Civic Platform, which two weeks ago narrowly lost its grip on the presidency. Its chances to retain control of parliament in elections four months from now are disappearing faster […]

2016-12-16T20:23:40-05:00June 12th, 2015|

Tech alert: GOOGLE TONE Shares Links Using Beeps and Boops

If your computer starts sounding like R2D2, it may be sharing links to others within earshot. 

A report from Popular Science discusses a new Chrome extension that lets a computer share a URL with another computer using tones.

Popular Science, Jason Cipriani

Google Tone

A new Chrome extension, called Google Tone, released this week makes it possible to share a URL with another computer in the room using a series ofbeeps and boops. The concept is dead simple yet instantly instills a sense of disbelief. A computer making seemingly random sounds can transmit the URL for the tab I have open in Chrome across the room? Get out.

Full of skepticism, I decided to put it to the test. I installed the Chrome extension on a MacBook Air and a HP laptop running […]

2016-12-16T20:23:40-05:00May 27th, 2015|

South Africa: Increased corporate espionage concerns

Times Live, Graeme Hosken

Industrial espionage is at an all-time high in South Africa, with an increase in requests for debugging services coming from gaming firms, research and development companies and those tendering for multimillion-rand contracts.

Driving fear in the world of Spy vs Spy are tough economic times and the ease with which South Africans can buy listening devices online.

The unregulated eavesdropping industry had led to an apparent surge in spying by businessmen on one another, according to Justicia Investigations, a company specialising in surveillance.

Its operations director, Alan Carey, said the number of inquiries about debugging services had increased rapidly since November, indicating a spike in South Africans spying on each other.

“In the past we received maybe two inquiries every fortnight. Now we are receiving at least three a week.

“The majority are from the gaming industry, research and development firms, cellular communication companies and businesses bidding for […]

2015-05-16T09:05:30-04:00May 16th, 2015|

Where do you keep your passwords? Posted on your monitor for all to see on a TV documentary?

Reported in The Hacker News, the passwords and login credentials for a London railway station were posted on the top of a computer monitor and broadcast on a BBC TV documentary. Company security policies should include never displaying your credentials where they might be viewed by unauthorized personnel… or TV cameras!

The Weakest Link In the Information Security Chain is still – Humans.

And this news has ability to prove this fact right.
One of London’s busiest railway stations has unwittingly exposed their system credentials during a BBC documentary. The sensitive credentials printed and attached to the top of a station controller’s monitor were aired on Wednesday night on BBC.
What could be even worse?
If you think that the credentials might have been shown off in the documentary for a short while or just some seconds, then you are still unaware of the limit of their stupidity.
The login credentials were visible for […]
2016-12-16T20:23:40-05:00May 4th, 2015|

Future watch: secure fiber optics

Scientists Create Secure Communications By Slowing Down Light

Ubergizmo.com

Have you always wanted a more secure way of transmitting your information and not be worried about it being intercepted or eavesdropped along the way? While there are various security measures available at the moment, such as encryption, scientists at the Vienna University of Technology have come up with a way that could technically make eavesdropping impossible.

How they achieved this is by slowing down the speed of light from its typical speed of 300 million meters per second to a much more manageable 180kmph, and they did this using fiber optics which is a system that is currently in place around the world, thus making their findings even more applicable and viable.

To slow down the speed of light, the scientists grafted cesium atoms to the fibers which allowed it to slow light […]

2016-12-16T20:23:40-05:00April 12th, 2015|

Turkish beauty queen’s bedroom ‘bugged by in-laws’

Hurrieyt Daily News

A former Turkish beauty queen has sued her former in-laws for bugging her bedroom with the help of her ex-husband, according to a local media report.

Sinem Sülün and the bug in the power socket.

Sinem Sülün, who was crowned Miss Model Turkey in 2005 and was runner-up at Miss Turkey-Universe in2007, divorced her husband Mustafa Yüksel last month. She was awarded 200,000 Turkish Liras in compensation and 2,500 liras as a monthly alimony after the divorce.

Daily Milliyet reported on April 1 that the divorce case led to a fierce argument between the two sides, after Sülün claimed that her husband and his parents had illegally wiretapped their private conversations by bugging a power socket in their bedroom.

The 5th Criminal Court of Peace recently ruled for the trial of businessman Yüksel and his parents on charges of illegally recording a […]

2016-12-16T20:23:41-05:00April 12th, 2015|

Smart phones not limited to smart people. Stupid criminals can still use technology.

Everyone seems to like stupid criminal stories.

Wanted by police in Maine for theft of a wood stove, Christopher Wallace announced his location on Snapchat. One of his trusty followers was kind enough to report it to police.

While the police were searching his girlfriend’s home, a bit over confident he posted again on Snapchat that he was hiding in a cabinet.

“While the deputies/officers were wrapping up their search, Wallace posted again on Snapchat. This time he posted that the police were searching for him in the house, and that he was hiding in a cabinet. Again, we received phone calls.”  Somerset County Sheriff’s Office posted on it’s own Facebook page.

“A search of the kitchen cabinets turned up some food, some pots and pans, and also a pair of feet,” the police explained on the Facebook page. “The pair of feet just so happened to be attached […]

2016-12-16T20:23:41-05:00March 26th, 2015|

Walkie-talkies lead to eavesdropping accusations at SF Zoo

Many modern two-way radios have a feature that can allow a supervisor to remotely turn on the transmitter of one of the units of the connected radios. The user of that radio will be automatically put into hands-free communication with the supervisor or with others in the group, possibly with their knowledge. We reported on the vulnerability of this type of feature in a previous post [here]. The feature has legitimate application for such things as emergency response for medical or safety services. Knowing that the capability exists could lead others to misuse the feature for eavesdropping. 

Workers at the San Francisco Zoo were abusing this capability in their radios. Their misadventures created union trouble with possible legal ramifications. Radios, telephone systems, intercom systems, all have features that can be misused. Employees need to understand proper use of the equipment. If you have such features you may want to consider having them […]

2016-12-16T20:23:41-05:00March 19th, 2015|

Covert cameras found at Denver area Post Office

FOX31 DenverMysterious spy cameras collecting data at post offices

DENVER — Within an hour of FOX31 Denver discovering a hidden camera, which was positioned to capture and record the license plates and facial features of customers leaving a Golden Post Office, the device was ripped from the ground and disappeared.

FOX31 Denver investigative reporter Chris Halsne confirmed the hidden camera and recorder is owned and operated by the United State Postal Inspection Service, the law enforcement branch of the U.S. Postal Service.

Cover Camera Post Office

The recording device appeared to be tripped by any vehicle leaving the property on Johnson Road, but the lens was not positioned to capture images of the front door, employee entrance, or loading dock areas of the post office.

An alert customer first noticed the data collection device, hidden inside a utilities box, around Thanksgiving 2014. It stayed in […]

2016-12-16T20:23:41-05:00March 16th, 2015|

Ponemon Institute study: Low tech information theft successful nine times out of ten

“Factors that made a noticeable difference in the amount of information collected were clean desk policies, standardized document shredding policies, suspicious reporting processes, and mandatory training and awareness.”

By Maria Korolov, CSO online

Researchers were able to get sensitive corporate information just by looking around corporate offices in 88 percent of attempts, according to a new study.

Michigan based Ponemon Institute sent researchers to 43 offices belonging to seven large corporations who had previously agreed to participate in benchmarking research. The researchers had valid identification as temporary employees, and management knew they were coming — though the office staff did not.

The researchers spent up to two hours in each office, wandering around, taking pictures of computer screens, and picking up documents marked “confidential” and putting them in their bags — all deliberately within full view of the regular employees.

In the vast majority of the cases, the regular office staff did not […]

2016-12-16T20:23:41-05:00March 2nd, 2015|
Go to Top