News copied from other online sources.

Dating apps pose corporate security risk, says IBM

Reporting by Bill Rigby, ReutersThe millions of people using dating apps on company smartphones could be exposing themselves and their employers to hacking, spying and theft, according to a study by International Business Machines Corp.

IBM security researchers said 26 of 41 dating apps they analyzed on Google Inc’s Android mobile platform had medium or high severity vulnerabilities, in a report published on Wednesday.

IBM did not name the vulnerable apps but said it had alerted the app publishers to problems.

Dating apps have become hugely popular in the past few years due to their instant messaging, photo and geolocation services. About 31 million Americans have used a dating site or app, according to a 2013 Pew Research Center study.

IBM found employees used vulnerable dating apps in nearly 50 percent of the companies sampled for its research. Using the same phone for work and […]

2016-12-16T20:23:41-05:00February 14th, 2015|

LA Confidential; West Hollywood council deputy suspended in eavesdropping case

We’re not sure how this eavesdropping was accomplished, whether through a bugging device or perhaps just through the phone. Phone call recording is often a built in feature for phone systems, but can also be performed through the use of external devices. Phone technicians could have access to the recordings. Even digital phones and VOIP phones can be recorded easily. It could be legal in many locations, if the person doing the recording is part of the conversation. What happens with the content of recordings, on the other hand, could be illegal and can often lead to detrimental results. Wayward employees or staff often think they acting righteously as whistle blowers when committing eavesdropping, but they could be breaking the law and end up in prison.

By Hailey Branson-Potts, LA Times;

A West Hollywood City Council aide has been suspended and is being investigated by sheriff’s detectives on charges of eavesdropping on […]

2016-12-16T20:23:42-05:00February 14th, 2015|

TV vs Reality: former intelligence officers discuss new NBC spy show “Allegiance”

NBC’s new spy drama “Allegiance” was previewed at the International Spy Museum in Washington, DC, along with a panel discussion with former intelligence officers including Vince Houghton, historian and curator at the Spy Museum, CIA analyst Mark Stout, and former KGB General Oleg Kalugin. Their comments offer some insight into the real world of spying.

10 Things We Learned Watching Allegiance at The International Spy Museum,
By Nancy Dunham, February 7, 201, pastemagazine.com

If you watched the premiere of Allegiance, NBC’s new spy drama, on Thursday night, you likely wonder what the creators can possibly do to top it. Modern day sex, lies and videotape—not to mention some pretty gnarly torture and a spy-within-a-spy plots—kept us on the edge of our seats when we previewed it at the International Spy Museum in Washington, D.C.

Still, questions arise as to whether or not the show, which centers on a 40-something Brooklyn couple (she’s Russian-born, […]

2016-12-16T20:23:42-05:00February 9th, 2015|

Spy cam found in corporate restroom.

When inspecting or sweeping corporate offices, it is good to pay attention to restrooms that the executives may use. While trade secrets may not be discussed there, tremendous embarrassment could occur if improper images were distributed. It is also good for staff to be aware of such threats and take them seriously. In this instance the camera was reported by the building maintenance supervisor.

From nypost.com

A Chelsea building that hosts high-end brands and services, including fashion shoots, had a hidden pinhole camera in its unisex bathroom, sources said. A Johnson & Johnson employee discovered the creepy spy cam on the 16th floor of the Starrett-Lehigh building on West 26th Street Jan. 15, and the company immediately reported it to police, a spokeswoman said.

The device was hidden above a light switch in the bathroom next to offices that include Ralph Lauren and Haynes Roberts, whose interior-design projects focus on mansions […]

2016-12-16T20:23:42-05:00January 28th, 2015|

FBI busts alleged Russian spy ring in New York City

They “tried to recruit U.S. citizens as intelligence sources in New York… Their targets included people working for ‘major companies’ and ‘young women with ties to a major university located in New York,’ according to authorities.”
New York (CNN) The men would sometimes say they needed to meet to exchange tickets, but they never seemed to end up actually attending or discussing a sporting event or a concert. They once talked about going to a movie. But that was it.
The reason for the puzzling behavior, according to a federal complaint unsealed Monday, is that the men were Russian spies exchanging intelligence information in New York City. They used tickets and other everyday objects — like […]
2016-12-16T20:23:42-05:00January 28th, 2015|

Panama: ex-president at center of wiretap probe

From McClatchyDC by T. Johnson

— When the United States rejected former Panamanian President Ricardo Martinelli’s request for spying equipment to eavesdrop, U.S. diplomats feared, on his political enemies, the former supermarket baron turned to another source: Israel.

Now scores of Panama’s political and social elite are learning that the eavesdropping program that Martinelli’s security team set in place sprawled into the most private aspects of their lives – including their bedrooms. Rather than national security, what appears to have driven the wiretapping was a surfeit of the seven deadly sins, particularly greed, pride, lust and envy.

Nearly every day, targets of the wiretapping march to the prosecutors’ office to see what their dossiers contain, often emerging in distress. Martinelli, who left office in July, is facing a rising tide of outrage not only over the wiretapping, but also over reports of vast corruption. His personal secretary has left […]

2016-12-16T20:23:42-05:00January 28th, 2015|

P.I.s accused of using GPS tracking get restraining order but keep their licenses.

GPS tracking devices are readily obtainable. The legality of their use on unauthorized vehicles is questionable at best. The story below highlights that such devices can pose a significant threat to privacy and security. 

Orange County Register: Two private investigators accused of illegally tracking and harassing a pair of Costa Mesa councilmen have been ordered to stay away from the politicians, but a judge on Thursday declined to immediately approve a state request to take away their work and weapons permits.

Orange County Superior Court Judge Elizabeth Macias issued a restraining order against Christopher Joseph Lanzillo on Thursday, several weeks after a similar order was issued against Scott Alan Impola.

As part of the order, Lanzillo and Impola must stay away from Costa Mesa Mayor Steven Mensinger and Mayor Pro Tem Jim Righeimer – whom the two men are accused of targeting prior to a recent election – and to […]

2016-12-16T20:23:42-05:00January 20th, 2015|

Stolen surveillance system exposes drug dealing thieves.

DOERUN, GA (WALB) – Images from a stolen surveillance system helped investigators arrest a suspected drug dealer. Colquitt County Sheriff’s Investigators made three arrests stemming from a burglary and drug deal connection.

A Colquitt County farmer went online to see if he could find his stolen video surveillance system. He not only found his system but he also helped the Sheriff’s office arrest a drug dealer they had been investigating.

Drug dealers caught on camera they stole.

Hundreds of images showing illegal drug activity inside a Doerun home were sent to the Google account of a chicken farmer in Colquitt County.

Investigators say the Wi-Fi camera motion detection system was one of several electronic items Mark Harrell stole from the farm Wednesday morning.

“A computer and surveillance camera was stolen,” said Lt. Shawn Bostick.

Investigators believe Harrell traded in or sold the electronic items to his drug dealer, Ricky […]

2017-02-12T21:28:49-05:00January 19th, 2015|

UK: Former deputy prime minister finds car was bugged.

John Prescott seems to be taking this find in stride, but it could be a sign of something more sinister going on. Vehicle TSCM sweeps are an important part of regular security precautions.

The former Deputy Prime Minister discovered the device hidden in his car when he took it to a garage because it had problems starting. John Prescott has turned detective after finding his Jaguar had been bugged.

John Prescott with tracker found in his car.

Mechanics found a tracker concealed under the driver’s seat that was hooked up to the car battery, draining its power.

The sophisticated device uses mobile phone technology and is capable of reporting the Jag’s movements at all times. It also has an inbuilt microphone enabling it to pick up conversations.

And the 6 inch-square black box is even capable of immobilizing the car if instructed to by mobile phone.

Lord […]

2015-01-18T19:03:53-05:00January 18th, 2015|

Tech watch: Device uses lasers to map an entire room through a 1-inch gap

from DailyMail.co.uk Science and Tech

Looking through a keyhole could soon reveal far more than you imagine. Scientists have developed a device that could map an entire room simply by shining a laser through a 2cm gap. The system could be used in applications such as firefighting, battlefield surveillance and disaster recovery operations.

The technology is the work of Harbin Institute of Technology in China and is based on a laser that can see around corners, according to a report by Jacob Aron at the New Scientist. The system worked by firing ultrafast laser pulses at walls ‘behind’ an area that can’t be seen, to capture a ghostly 3D reflection. The technique is similar to using a mirror to see round a corner – but instead of a mirror, the ‘reflection’ is reconstructed from laser light that scatters back off a wall. The camera ‘times’ the beams […]

2016-12-16T20:23:43-05:00January 10th, 2015|

Morgan Stanley sacks employee who pilfered account data

...companies now no longer face just external threats. Employees may give in to threat or greed, and with their access to information, can cause a data breach without specialized knowledge or cyber security skills. Staff are often given far-reaching data access rights, but with this power, rouge employees can prove to be a serious risk to corporations. While the threat of insiders is unlikely to wane, companies can protect themselves more effectively by setting in place access restrictions to sensitive data and monitoring employee access to information caches.

2016-12-16T20:23:45-05:00January 7th, 2015|

Fake “The Interview” app is really an Android banking trojan

Graham Cluley’s computer security website provides information about a Korean Android app that claims to offer a download of the movie “The Interview” is actually infecting smart phone’s with malware that is stealing banking information, analyzed by researchers at McAfee. If you are looking for a free version of the film, think twice before downloading this app.  www.grahamcluley.com

Following the devastating hack upon its computer systems by a hacking group which might (or might not) have the blessing and backing of North Korea, Sony Pictures flip-flopped as to whether the Seth Rogan comedy about the assassination of Kim Jung-un would have a Christmas Day release.

Eventually, the movie had a limited Christmas Day release in the States, much wider online availability for US internet users via sites like YouTube, and an even wider still […]

2016-12-16T20:23:45-05:00December 29th, 2014|

The Sony hack should make cyber security a hot boardroom topic

From Fortune, by Tom Huddleston, Jr.

The massive scale of the cyber attack shows why top executives need to be more involved in shaping cyber strategy at companies.

Spooked by the Sony Pictures hack and the leak of sensitive documents, companies of all kinds are now scrambling to shore up their cyber defenses.

The movie studio’s breach is just the latest in a series of hacks in recent years, including attacks on Target, Home Depot, and JPMorgan Chase that collectively compromised the personal information of tens of millions of customers. But Sony’s hack stands out as a more frightful example because of hackers’ unfettered access, the huge damage they caused and the ultimate capitulation to their demands, seen by Sony’s controversial — albeit short-lived — decision to shelve the comedy film The Interview.

“I think the scale of this impact on Sony is what’s going to make a lot of […]

2016-12-16T20:23:45-05:00December 28th, 2014|

Surveillance alert: Elf On A Shelf and a Santa Spy Cam

Ontario professor Laura Pinto thinks the popular “Elf on a Shelf”  toy is conditioning children for growing up in a surveillance state. Is that any different than Santa knowing when you are sleeping, when you’re awake, and if you’ve been naughty or nice?  It is apparently quite sinister.  

from the Inquisitr.com

Laura Pinto is a digital technology professor at the University of Ontario Institute of Technology. Pinto recently published an academic report which argues that the Elf On The Shelf book fosters a “sinister” message. The “Who’s The Boss” paper claims that the idea of an elf reporting back to Santa Claus each night in regards to the behavior of children, “sets up children for dangerous, uncritical acceptance of power structures.”

What you looking at?

Elf on the Shelf is a story about how

2016-12-16T20:23:45-05:00December 17th, 2014|

Internal threat: Spying, subterfuge and stolen treasure- Inside Nike and Adidas

by Drew Harwell, Washington Post

The massive heist from the world’s biggest sportswear firm was, as Nike attorneys allege, an inside job.

Nike vs Adidas

Faking a broken laptop, one of the sneaker giant’s top directors is said to have met secretly with an interloper to copy some of what a Nike lawsuit this week called the firm’s “most important and highly confidential” intelligence.

Days later, the director and two other elite designers defected to the firm’s bitter rival, allegedly scrubbing e-mails and text messages that, attorneys said, hid “evidence of their betrayals.”

 The claims of stealth and subterfuge have reignited Nike’s decades-long sneaker war with Adidas, the German-based shoe titan and Nike’s chief competitor. But they have also cast a spotlight on the high-stakes palace intrigue hidden beneath the world’s fiercely competitive, multibillion-dollar sneaker and sportswear empire.
2014-12-16T17:40:52-05:00December 16th, 2014|

NORAD tracking Santa for over 50 years

For almost 60 years, NORAD and its predecessor, the Continental Air Defense Command (CONAD) have tracked Santa’s flight.

The tradition began in 1955 after a Colorado Springs-based Sears Roebuck & Co. advertisement misprinted the telephone number for children to call Santa. Instead of reaching Santa, the phone number put kids through to the CONAD Commander-in-Chief’s operations “hotline.” The Director of Operations at the time, Colonel Harry Shoup, had his staff check the radar for indications of Santa making his way south from the North Pole. Children who called were given updates on his location, and a tradition was born.

In 1958, the governments of Canada and the United States created a bi-national air defense command for North America called the North American Aerospace Defense Command, also known as NORAD, which then took on the tradition of tracking Santa.

Santa reviews his flight plan at NORAD  Photo By:  [...]
</p>
</body></html>

2016-12-16T20:23:45-05:00December 13th, 2014|

Future watch: iPhone with laser beams, 3D mapping, more…

Consumer technology eventually encroaches on ideas that were only dreamed of in the past. Developments come quickly these days, so it’s worthwhile to keep an eye on where things are going. An eavesdropping technique that has been difficult to deploy in the past, could also be built right into an iPhone if this reported patent comes to fruition. Lasers can be used for eavesdropping by beaming onto a distant object or window pane, then interpreting reflections of vibrations of that beam in order to get audio from the target room. If the lasers described below get built into a smart phone, I’m sure it wouldn’t be long until an app is developed for using them for eavesdropping as well. As it is, though, a pocket-sized 3D laser mapping device would also be a spy’s delight. 

“such technology may result in museums and other public venues [not to mention engineering and […]

2016-12-16T20:23:46-05:00December 8th, 2014|

Cyber bugs studied used for disaster rescue, real bugs…

by Kelly Dickerson, LiveScience.com

Remote-controlled cyborg cockroaches could one day be among the first responders at disaster scenes to help locate survivors.

A team of researchers at North Carolina State University has created a swarm of cyborg cockroaches, nicknamed “biobots,” that are equipped with microphones to pick up sounds and trace them to their sources. The researchers hope the biobots could one day be used in disaster-relief situations to locate survivors.

Cyber cockroach, equipped with microphones and transmitters could aid in disaster rescue.

Each cockroach has a tiny circuit board “backpack” attached to it that researchers can use to control the bug’s movement. Some of the biobots have a single microphone that can capture sounds at a disaster scene and send them back to personnel. Others have a series of microphones that can pinpoint the source of a sound and then steer […]

2016-12-16T20:23:46-05:00November 27th, 2014|
Go to Top