News copied from other online sources.

Story of a Russian spy in 1950’s Brooklyn

From Narrative.ly comes a well told tale, by Robert Silverman, of cold war espionage in Brooklyn, NY. It is interesting to note the author’s observation that the spy does not usually appear as a James Bond or Jason Bourne: “How could Emil be a ‘master spy,’ or even a common, everyday spy? He was an amateur painter, a fine guitar player and a charming older gentleman.”  An average or less than average person. Something to consider when trying to protect confidential information in your facilities. The threat may come from the least suspected source.
Excerpts from Robert Silverman’s story are below. The entire interesting story can be read here: [ narrative.ly].  

This is a story about a man named Rudolf […]

2016-12-16T20:23:54-05:00February 8th, 2014|

Baltimore police officer resigns so wiretapping charges are dropped, after recording conversation with judge

Maryland requires “all party consent” before recording any conversations (remember Linda Tripp?). Police Sergeant Carlos Vila is now out of a job, not just for making the recording, but also because he played it for others to hear. Know your state’s laws before you consider recording any phone conversations.

BALTIMORE —A Baltimore City police officer has agreed to resign his post so charges against him in an illegal phone recording case will be dropped.

Sgt. Carlos Vila was indicted in August 2012 under the state’s wiretapping law after he was accused of illegally recording Baltimore Judge Joan Gordon, who sits in the city’s eastside district court. Officials said in April 2012, Vila used his cellphone to record an argument he had with Gordon about a warrant.

Aside from the wiretapping charge, Vila was also charged with playing the recordings for his colleagues. Both […]

2016-12-16T20:23:54-05:00February 8th, 2014|

Peep on a Rope: Sochi Official Reveals Hotel Shower Video

Attempting to demonstrate that hotel vandalism has occurred, Dmitry Kozak revealed a bit too much “We have surveillance video from the hotels that shows people turn on the shower, direct the nozzle at the wall and then leave the room for the whole day,” 

From the Wall Street Journal

SOCHI, Russia—Rooms without doorknobs, locks or heat, dysfunctional toilets, surprise early-morning fire alarms and a Welcome Wagon of stray dogs: These are the initial images of the 2014 Winter Olympics that foreign journalists have blasted around the world from their officially assigned hotels—and the wave of criticism has rankled Russian officials.

Dmitry Kozak, the deputy prime minister responsible for the Olympic preparations, seemed to reflect the view held among many Russian officials that some Western visitors are deliberately trying to sabotage Sochi’s big debut out of bias against Russia. “We have […]

2016-12-16T20:23:54-05:00February 6th, 2014|

Target Hackers Broke in Via HVAC Company

Brian Krebs, KrebsOnSecurity.com offers a good summary of how the hackers found their way into the Target data network by stealing an HVAC vendor’s network access credentials. Expect to hear more about such vulnerabilities as more and more devices are connected online for maintenance, updates, and control.

 KrebsOnSecurity.com 

Last week, Target told reporters at The Wall Street Journal and Reuters that the initial intrusion into its systems was traced back to network credentials that were stolen from a third party vendor. Sources now tell KrebsOnSecurity that the vendor in question was a refrigeration, heating and air conditioning subcontractor that has worked at a number of locations at Target and other top retailers.

Sources close to the investigation said the attackers first broke into the retailer’s network on Nov. 15, 2013 using network credentials stolen from 

2016-12-16T20:23:54-05:00February 6th, 2014|

Corporate Espionage Countermeasures for Car Manufacturers…

I SPY A STRANGE-LOOKING CAR

 Autonet.ca, Montreal QC

How does one hide a car in plain sight? There’s a clandestine component to automotive testing – the act of car cloaking with camouflage.

When an automaker builds a new model, the vehicle reaches the prototype stage, and is known as a “mule,” that must be tested on the track.

There is a small, stealthy group of auto photographers dedicated to grabbing photos of this test, so to combat their long lenses, many car companies keep a “camo expert” on staff.

There’s the threat of corporate espionage, or maybe the automaker wants to hide a new, proprietary feature that could separate them from their competition. Camouflaging is done to control perception (mules are quite ugly), and so a potential buyer doesn’t see the upcoming model, and decide to hold off on their purchase of this year’s car.

Plus, leaked images really suck the drama […]

2016-12-16T20:23:54-05:00February 5th, 2014|

No Butts (dialing) – Airport Chairman’s Wiretapping Lawsuit Dismissed

Back in December we reported on a case where Jim Huff, a member of the Cincinnati airport board, filed a lawsuit against airport administrative assistant Carol Spaw stating he accidentally called her while discussing firing another board member and the woman recorded the call and shared the information, citing the Federal Wiretap Act. [Law suit cites Federal Wiretap Act www.upi.com] On Friday, January 25, U.S. District Court Judge David Bunning ruled that even though the cell phone call was accidental, Spaw was under no obligation to hang up. Advice here: protect yourself from "pocket dialing". Make sure your phone locks when you turn it off and put it away and also consider using a case that protects the keypad or buttons from redialing (if your phone still has buttons). Bluetooth earpieces are also a big vulnerability. Many of them will redial with a long press of the earpiece button. Shoving it in a pocket or even into a case could inadvertently squeeze the button initiating a redial even if when phone itself was locked. Some earpieces have an actual on-off switch, that is the best way to keep it off when it is not in use. Some Motorola earpieces will flip the mouthpiece to close and turn off, but (I found out the hard way) even when they were flipped closed, a firm squeeze would still wake up the phone and redial the last number.

2016-12-16T20:23:54-05:00January 27th, 2014|

Teachers’ union hires sweep team.

The United Federation of Teachers union in NYC hired a TSCM team to sweep their offices.  Unfortunately, comments on articles we read and even the articles themselves tend to make fun of their desire for privacy.  One frequent comment we hear about TSCM is how a sweep is “James Bond-like”.  What people do not seem to recognize is that 007 was a spy, TSCM sweeps are performed to catch and prevent spying. 
The information of the sweep came from a review of their spending reports. That highlights another need to try to keep your security information under wraps. 

from the NY Post:

Something’s bugging teachers-union boss Michael Mulgrew — or, at least, he thinks so.

Teachers’ union boss spent $18K in Bond-like HQ spy sweep

The United Federation of Teachers president blew a huge wad of union cash to play out a paranoid James […]

2016-12-16T20:23:54-05:00January 23rd, 2014|

Massive credit card data leak hits South Korea

The leak is linked to an insider. Reports vary as to how many accounts have been compromised, but all of them are big numbers. Bank executives are offering to resign.

Report below is from Reuters.com   

The theft of personal information from more than 100 million South Korean credit cards and accounts, reportedly including those of President Park Geun-hye and UN chief Ban Ki-moon, has ignited a storm of anger and litigation against credit firms.

The theft of personal information from more than 100 million South Korean credit cards and accounts, reportedly including those of President Park Geun-hye and UN chief Ban Ki-moon, has ignited a storm of anger and litigation against credit firms.

Worried Koreans on Tuesday packed into branches of one of the banks hit by the theft to ensure their money was safe, while lawyers said 130 people joined a class action suit against their credit […]

2016-12-16T20:23:54-05:00January 21st, 2014|

The FBI’s secret hunt for a KGB mole

Some interesting history of espionage and the FBI. The author, David Wise, originally wrote a longer article for Smithsonian.com, this can be viewed here. Some of the details were supplied by David Major, a former FBI counterintelligence agent who now runs the Centre for Counterintelligence and Security Studies found online at www.cicentre.com, a valuable resource for up to date information on international espionage and counterintelligence.

ONE SPRING NIGHT in 1962, a short, stocky Russian walked into the FBI office in Midtown Manhattan and offered his services as a spy for the United States. Aleksei Kulak, then 39, was working undercover as a science official at the United Nations. He said he was unhappy with his progress at his true employer, the KGB.

Kulak was taking a huge risk by entering the FBI office. The building was […]

2016-12-16T20:23:54-05:00January 19th, 2014|

1971 anti-war activists admit FBI document burglary, perpetrators feel emboldened and kinship with Snowden.

After 43 years, activists admit theft at FBI office that exposed domestic spying

In the bombshell book, “The Burglary,” journalist Betty Medzger exposes the robbers behind the momentous theft from an FBI office outside Philadelphia over 40 years ago. The perpetrators have come forward in an interview with NBC News.

By Michael Isikoff, National Investigative Correspondent, NBC News [Full article and video at nbcnews.com]

Forty-three years after the mysterious theft of up to 1,000 documents from an FBI office outside Philadelphia, three former political activists are publicly confessing to the brazen burglary, calling it an act of “resistance” that exposed “massive illegal surveillance and intimidation.”

 “We did it … because somebody had to do it,” John Raines, 80, a retired professor of religion at Temple University, said  in an interview with NBC News.  “In this case, by breaking a law — entering, removing files — we exposed a […]
2016-12-16T20:23:55-05:00January 8th, 2014|

Hidden camera in a bathroom forces plane to make emergency landing

By Jeff Black,  NBC News

An American Airlines flight from San Francisco to New York was forced to make an emergency landing in Kansas City on Sunday afternoon because an electronic device thought potentially to be a bomb was found on board, authorities said.

Upon landing, the plane carrying 215 passengers and nine crew members was moved to a remote area of the airport where the jet was evacuated and searched, officials said.

The device found on the JFK-bound 767 was initially described to NBC News by a senior law enforcement official as a “flash drive.”

Later, senior government officials said the device was taped to part of the bathroom.

An preliminary inspection of the device showed it was actually a camera disguised as a flash drive, the officials said.

Security officials, including the FBI in Kansas City, were working to determine who the device belongs to.

No injuries related […]

2016-12-16T20:23:55-05:00January 6th, 2014|

Fiction sheds light on the reality of industrial espionage: author’s research highlights the threats.

Author Christopher Reich did a lot of research for his new novel, some of his comments in this interview from the Epoch Times reflect the real security concerns corporations face.

By Joshua Philipp, Epoch Times | December 31, 2013

Three politicians die in fear as their car, controlled by an unseen hacker, charges onto the White House lawn and into a line of armed Secret Service agents. In his final moments, one of the men texts his son, a hedge fund manager in New York, a single word that could unravel a sinister plot to destroy the U.S. economy and bring the country to its knees.

So begins “The Prince of Risk,” the latest novel by bestselling author Christopher Reich. While the story is fiction, it’s haunting theme hits uncomfortably close to home. The novel plays on the Chinese Communist Party’s real-world use of industrial espionage and imagines […]

2016-12-16T20:23:55-05:00December 31st, 2013|

Surveillance Countermeasures also means you should be aware of your surroundings, you never know who might be listening…

Man Sits Behind Ex-CIA Director On The Train, Eavesdrops, And Live-Tweets His Conversation,
by Brian Jones, Business Insider

Former Director of the CIA and head of the National Security Agency Michael Hayden had his cover blown on the Acela train by  Tom Matzzie, a political strategist who used to run the D.C. branch of MoveOn.org, according to Dylan Matthews at The Washington Post

According to Matzzie, Hayden was on a call with reporters and was speaking under the condition of anonymity, intending to be cited only as “a former senior administration official.”

Matzzie didn’t just recognize him, he live-tweeted the conversation, and made some great quips about when he was going to get rendered for live-tweeting the private conversations of a man who was among the most powerful on the planet. 

In subsequent tweets, Matzzie said he was working […]

2016-12-16T20:23:55-05:00December 30th, 2013|

HTC VP and others indicted in Taiwan for corporate espionage

As reported by The Wall Street Journal, top HTC senior executive and vice president of product design Thomas Chien has been indicted along with five other HTC employees by the Taiwanese courts for corporate espionage. The charges include leaking company secrets, falsifying expense reports, and taking kickbacks.

Chien has been accused of leaking interface designs based on the upcoming Sense 6.0 UI, as well as receiving some 33.57 million New Taiwan dollars ($1.12 million) through kickbacks from suppliers.

HTC has declined to comment on Chien or confirm who the other charged HTC employees are, but released this statement:

“The company expects employees to observe and practice the highest levels of integrity and ethics. Protecting the company’s proprietary and intellectual properties, privacy and security is a core fundamental responsibility of every employee. The company does not condone any violation.”

Chien had supposedly leaked the interface designs to a partner he […]

2013-12-30T21:11:06-05:00December 30th, 2013|

Naughty or nice, how did Santa know? Early newspaper photos caught him in the act.

Santa’s elves have been known for their cleverness with technology. This photograph made was available to the public in the 1924 edition of the Western Morning News. 

It shows a sinister Santa perched on a snow-capped roof, using a listening device to eavesdrop on the praying family below. The caption describes how ‘Father Christmas is ascertaining the wishes of children by the latest scientific methods.’

A 1924 edition of the Western Morning News shows a Sinister Santa perched on a snow-capped roof, using a listening device to eavesdrop on the praying family below. The caption describes how ‘Father Christmas is ascertaining the wishes of children by the latest scientific methods’.

 

The British Newspaper Archive has released a number of chilling images taken from British local papers that depict Father Christmas as at best an eerie ghost and at worst a predatory-looking spy.

2016-12-16T20:23:55-05:00December 27th, 2013|

Hidden microphone helps save Christmas…

Shelby County Sheriff’s Office arrests The Grinch, saves Christmas
www.abc3340.com Dec 23, 2013 By Ben Culpepper

COLUMBIANA, Ala. — Christmas has been saved and the gift-stealing, green-faced Grinch is behind bars Monday thanks to some great police work by the Shelby County Sheriff’s Office.

According to a news release, 56-year-old The Grinch, of Whoville, was taken into custody by deputies at an unknown hideout, where he was waiting to snatch Christmas joy from the hearts of children everywhere.

“Children throughout Shelby County can sleep soundly tonight, as the Shelby County Sheriff’s Office has apprehended the famed Christmas thief, The Grinch,” the sheriff’s office said.

Authorities were tipped off to the Grinch’s whereabouts by a concerned Whoville resident, Cindy Lou, who told deputies the suspect was headed their way. A short time later, deputies spotted Grinch’s dog, Max, at the Alabaster Dog Park, […]

2016-12-16T20:23:55-05:00December 26th, 2013|

Eavesdropping device installed in vehicle; Dubai man fined and sent to jail for spying on ex-wife

Ex-husband used tracking devices on woman’s car to eavesdrop and find out her whereabouts

By Eman Al Baik  Published Thursday, December 26, 2013

Dubai Courts found an ex-husband guilty of spying by fixing a listening and tracking device in his divorced wife’s car and sentenced him to six months in jail and ordered him to pay Dh10,000 for invading the woman’s private life.

The Court also ordered the information solution company to pay Dh100,000 fine and another Dh100,000 to be paid by its manager for selling and offering the spying device without obtaining the necessary permissions from Telecom Regulatory Authority.

Consultant Ismail Ali Madani, Head of Funds Prosecution who investigated the case said that in 2009 the victim had bought a car from her husband with whom she had trade deals. In 2010, her husband asked her to get the car’s windows tinted from a specific outlet. […]

2013-12-26T00:12:27-05:00December 26th, 2013|

Virtual Reality, Real Spies- What else goes on in the world of online gaming?

New York Times, World; By MARK MAZZETTI and JUSTIN ELLIOTT (Dec 9, 2013)

Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the online games played by millions of people across the globe, according to newly disclosed classified documents.

Fearing that terrorist or criminal networks could use the games to communicate secretly, move money or plot attacks, the documents show, intelligence operatives have entered terrain populated by digital avatars that include elves, gnomes and supermodels.

The spies have created make-believe characters to snoop and to try to recruit informers, while also collecting data and contents of communications between players, according to the documents, disclosed by the former National Security Agency contractor Edward J. Snowden. Because militants often rely on features common to video games — fake identities, […]

2016-12-16T20:23:55-05:00December 24th, 2013|
Go to Top