Articles intended for TSCM technicians.

Canadian DND now says no listening devices were found at Nortel building

No bugs found in former Nortel building, Defence officials now say
Ottawa Citizen, October 1, 2013 by David Pugliese

OTTAWA — The Conservative government says Defence officials have assured it that no listening devices have been found at the former Nortel campus, contradicting previous security concerns raised by both former Nortel and government intelligence employees.

Former Nortel employees have contacted the Citizen to say that the listening devices were found when Department of National Defence officials did their initial security sweeps of the facility, purchased for DND’s new home.

DND documents also indicate that concerns about the security surrounding the former Nortel campus were raised last year within the department. A briefing document for then-Defence minister Peter MacKay warned that the public announcement that the DND was moving into the complex before it could be properly secured created a major problem.

“This not only raises the level of difficulty of verifying appropriate security […]

2013-10-02T20:11:21-04:00October 2nd, 2013|

Espionage history: Stasi museum in Berlin, fascinating photos

The Stasi was an Eastern Germany version of the KGB, established by the Soviets in 1952. Just like the KGB, the Stasi was mostly busy looking for enemies of the people, employing round-the-clock surveillance, and eavesdropping on German citizens. After the fall of the Berlin Wall, people assaulted the Stasi headquarters, dissolved the organization, opened its archives to the public, and created a museum in the main building.

Stasi Museum 

On the evening of January 15th in 1990 demonstrators took possession of the headquarters of the Ministry for State Security (MfS) in Berlin-Lichtenberg. The Berliner Bürgerkomitee (Berlin Committee of Citizens) started here the closure and disorganisation of the MfS. One week later the Zentrale Runde Tisch (The Central Round Table) decided that a memorial place and research centre should be established in the former House No. 1 in the Stasi-Headquarters.
The new government of the GDR, formed after the elections on March 18th in […]

2016-12-16T20:23:59-05:00September 24th, 2013|

New technology provides new tools, new threats

by Charles Patterson, Surveillance Countermeasures and Information Security Specialist

Two new tech items in are in the news and expected to hit the market soon. As we watch such new products emerge we should be reminded of the need to be aware of surveillance threats that appear alongside new technical advancements and modern conveniences.

First of note, Samsung has introduced their new Android powered, smartwatch, Galaxy Gear. Along with many other features the watch includes the ability to record both video and audio, making it a convenient surveillance device.

Samsung Galaxy Gear smart watch

 

Sony has also unveiled a somewhat unique product with the QX10 and QX100, two “lens style” cameras offering high quality optics in a small packages that interface with smart phones or tablets for control and viewing. The devices are small, with all of the camera electronics is inside the lens housing. […]

2016-12-16T20:23:59-05:00September 6th, 2013|

Times are changing- this ain’t your father’s spy world.

Spy Kids: A sci-fi visionary on why the children of tomorrow are the NSA’s biggest nightmare.

The following article by Charles Stross, a Hugo Award-winning science-fiction writer, is an interesting read. We all know that technology is changing faster than we can digest it. What does this mean for our children? And more pointedly, what does it mean for the future world of espionage,  privacy, and information security.  While I may not entirely share the author’s view of the future, it is clear that many old and current rules will not apply.  It is worth paying attention, especially when considering new threats and new adversaries as they come of age. The author focuses on the challenge spy agencies will face in dealing with new recruits, but it is worth considering as well, the challenges to information security that new technology and the users of […]

2016-12-16T20:23:59-05:00September 1st, 2013|

Can’t believe it’s not bugger, er Bulger… supposed FBI wiretap equipment on ebay.

Problem with the auction, it is just parts from an old NEC phone system that happens to have the words “Bulger phone switch” written on the side. The claim is that it came from surplus FBI parts although they deny it. $3500 is bit steep for busted phone parts.

‘Bulger wiretap’ electronics on eBay

From the Boston Herald, by Laurel Sweet

A Connecticut history buff is selling a pile of electronic stuff on eBay that he claims was the surveillance equipment used “to tap phone conversations” and gather evidence against convicted mob killer James “Whitey” Bulger while he was on the lam — and which was later salvaged from a scrap heap — but the FBI says it’s not what it is purported to be.

Available on eBay for $3500, sold by universityarchives02

John Reznikoff of Westport is asking nearly $4,000 for […]

2016-12-16T20:24:01-05:00August 24th, 2013|

Idaho hospital CEO accused of recording phone calls, stalking. IT department employees also accused of assisting.

from KTVB.com Boise, ID

BOISE, Idaho — The leader of the public hospital in Blackfoot, ID has pleaded guilty to second-degree stalking in the wake of an investigation by the Idaho Attorney General.
Bingham Memorial Hospital Chief Executive Officer Louis Kraml entered the plea Friday in 7th District Court.
He was indicted last month along with three other hospital staff for recording telephone calls made by and to former hospital director Robert Rosin and staff. The wiretapping allegedly occurred between June 2009 and August 2010.
In a plea agreement, Kraml pleaded guilty to misdemeanor stalking and was sentenced to 30 days in jail. But the judge suspended the sentence and withheld judgment in the case.
The Attorney General has issued a warrant for the arrest of Jack York, one of three information technology employees accused of helping Kraml.

also from am-news.com:

Kraml was indicted […]

2013-08-18T23:51:26-04:00August 18th, 2013|

Travel Tips: be wary of free cell phone charging stations.

This was reported a while back, but I was reminded of it while planning for an overseas trip. Airports, convention centers, and many other locations offer free charging stations for attendees or visitors to be able to get an extra boost of power for their cell phones. They typically will have USB cables attached or built in USB ports where users can plug their own cables in.

The other side of that cable could be connected a device or computer designed to download data, contacts, and images from the cell phone. This can be done to some degree even if the lock screen is still on.  It was proved in concept at the DefCon hacker convention in 2011 when researchers from Aries Security set up charging kiosks specifically designed to warn users of the risk. The kiosks did not steal any information, but when an active device was plugged […]

2016-12-16T20:24:02-05:00July 16th, 2013|

James Bond Lotus Esprit submarine from The Spy Who Loved Me up for auction

 {this would have been a good deal for Auction Hunters…}

Goes under the hammer in September

The Lotus Esprit submarine that starred in The Spy Who Loved Me will be going under the hammer at RM Auctions’ London auction in September.

Dubbed “Wet Nellie,” the car was built by Florida-based Perry Oceanographic for a reported cost in excess of $100,000 (€76,870/ £65,755) – roughly $500,000 (€384,350 / £328,775) in today’s money. It was a fully functional submarine that was used for underwater shots during filming.

After production wrapped up, the car was shipped to New York where it was put into storage for a decade. In 1989, the contents of the storage unit were sold at a blind auction to cover delinquent rent. A local couple submitted a “modest” bid and were surprised to discover they won a classic movie car.

Bond spy car up for auction

 

2016-12-16T20:24:02-05:00June 28th, 2013|

Cat Bandit Smuggles Cellphones into Russian Prison

By Matt Peckham @mattpeckham  TIME News Feed

How far would you go to smuggle a clutch of cellphones into a prison? Strap them with packing tape to a cat, then let the poor unwitting feline sneak over a prison fence to deliver the contraband goods?
Cat Smuggler

Guards at a prison in northern Russia noticed just such a feline perched on a fence, reports the Moscow Times. Upon closer inspection, they discovered the cat had several cellphones and chargers secured by tape encircling its abdomen. The cat was caught last Friday attempting to bypass a security perimeter around Russia’s Penal Colony No. 1, a prison located near the Republic of Komi’s capital city, Syktyvkar.

“Two packages were taped to the animal’s back,” said the Republic of Komi’s penitentiary service in a statement. “When the packages were unwrapped, guards found objects prohibited in the penitentiary facility — two […]

2016-12-16T20:24:03-05:00June 22nd, 2013|

New weapon in the terror tool kit? Encryption software blocks eavesdropping

By Shaun Waterman  The Washington Times

 A cheap new encryption technology for mobile phones completely blocks eavesdropping, even from warrant-wielding law enforcement agents – raising fears the technology could fall into the hands of terrorists or criminals.

The software poses a growing problem that U.S. law enforcement agencies call “going dark” – the spread of communications technologies that cannot be intercepted even with a warrant because agencies lack the technical capabilities.

But experts say the feds’ proposed solution to get around the blackout – by legally mandating the insertion of “back doors” into such software to allow eavesdropping – creates an opening which could be exploited by hackers, online criminals or cyberspies.

The issue is not unique to the United States. Intelligence and counter-terrorism officials in the United Kingdom are concerned about the new mobile phone application, called Seecrypt, according the London Mail on Sunday.

The app provides individual users with military […]

2016-12-16T20:24:03-05:00May 23rd, 2013|

The Cat Who Couldn’t Spy: A CIA Fail

 News.Discovery.com   MAY 10, 2013
The CIA once recruited a feline agent to spy on enemies, according to a new book that sheds light on the elite cat and its abysmal failure during “Operation Acoustic Kitty.”

Emily Anthes, author of the new book “Frankenstein’s Cat”, told Discovery News that felines weren’t the only non-human field agents.

There were “cyborg insects as well as cyborg rats (called ratbots),” she said, adding that “there’s a long history of using dogs in military and police operations” with some of the dogs “outfitted with cameras and other sophisticated technological equipment.”

The U.S. military has also tried to use implants to control shark movements. Cat

Operation Acoustic Kitty, however, is one of the more memorable attempts to turn an animal into a spy. It took place in the 1960s.

“In an hour-long procedure, a veterinary surgeon transformed the furry feline into an […]

2013-05-13T21:27:11-04:00May 13th, 2013|

Symantec: Industrial espionage on the rise, SMBs a target

Symantec’s latest Internet Security Threat report suggests that SMBs remain an attractive target for those trying to steal intellectual property. 

Charlie Osborne  By  for Zero Day |

Security giant Symantec’s latest Internet Security Threat reportsays that attacks focused on stealing intellectual property surged by 42 percent in 2012 in comparison to the previous year.

Targeted cyberattacks based on IP theft are being conducted against both the manufacturing industry and smaller businesses, which are likely to have less income to invest in shoring up their defenses against attack. Symantec says that SMBs — with fewer than 250 employees — now account for 31 percent of targeted attacks, and are often seen as a means to gain access to larger firms through “watering hole” techniques.

The average number of targeted attacks has increased to an average of 116 per day, made popular by the Elderwood […]

2016-12-16T20:24:03-05:00April 23rd, 2013|

Industrial espionage: AMD files suit against former employees for alleged document theft

 AMD has filed (and been granted) a request for immediate injunctive relief against multiple former employees that it alleges stole thousands of confidential documents. Named in the complaint are Robert Feldstein, Manoo Desai, Nicholas Kociuk, and Richard Hagen. All four left AMD to work at Nvidia in the past year. The loss of Feldstein was particularly noteworthy, as he’d been the head of AMD’s console initiatives for years. Feldstein was behind the work that landed AMD the Wii UPS4, and Xbox Durango. He also worked closely with Microsoft during the Xbox 360′s development cycle and brought that contract to ATI prior to AMD’s acquisition.

The AMD complaint states that “He [Feldstein] transferred sensitive AMD documents, and in the next six months, the three defendants either did the same thing, violated ‘no-solicitation of employees’ promises, or […]

2016-12-16T20:24:04-05:00January 17th, 2013|

Vulnerability on VOIP phone systems.

by Charles Patterson
Patterson Communications, Inc.
www.execsecurity.com 

VOIP vulnerability and disaster recovery

 We’ve had a busy schedule here in the New York area since Hurricane Sandy hit. A few of our clients lost their entire offices due to flooding from the Hudson River and had to relocate. We have been spending many hours helping some of them get their phone systems situated and back on line.

Flood waters

 One of our clients’ entire office (60 employees) was under four feet of water and they quickly had to relocate to a temporary facility a few miles away. To keep their business operational they signed up with a VOIP hosted phone provider who was able to give them phone service at their new office in a very short period of time. This was great for their quick recovery from the disaster. In helping them set up their new phones, though, […]

2016-12-16T20:24:04-05:00December 11th, 2012|

Apple’s secret garden: the struggle over leaks and security

 “I understand why people leak, because everyone wants to feel important and prove that they know things,” one employee said.

Apple’s secret garden: the struggle over leaks and security

by  – Oct 22 2012, 9:00am 

 Apple engineers love the “big reveal.” When a surprising new product they have been toiling over in secrecy finally bursts into public view during an Apple keynote, they enjoy seeing the public reaction. But the public wants its products details early, and it gets them in the form of leaks, rumors, and grainy cell phone shots of dubious authenticity. To the engineers, this is a bit like children who insist of spoiling the fun of opening presents by shaking them, squeezing them, and finally guessing exactly what’s within. Increasingly, though, leaked products are the reality even for the famously secretive Apple.

Products have always leaked out of Apple. To the leaker, knowledge is a form of power, […]

2016-12-16T20:24:04-05:00October 22nd, 2012|

Kremlin Wiretaps Dissident Blogger — Who Tweets and Posts Video of the Bug

from Wired.com,  August 8, 2012, By Robert Beckhusen

Alexei Navalny showed up to work in Moscow on Monday to discover he was being bugged. He called the police, like many perhaps would, but not before tweeting photos and video of himself and his colleagues taking the Kremlin’s monitoring devices apart.

It’s not hard to figure out why Navalny was bugged. He’s one of Russia’s most influential anti-corruption bloggers and is at the center of a protest movement aimed at toppling the regime of President Vladimir Putin. Since late July, the 36-year-old lawyer has faced possible arrest, trial and up to 10 years in prisonfor charges Putin’s prosecutors claim stem from an embezzlement scheme, but which Navalny and his supporters claim is an attempt to silence him.

The discovery began when Navalny’s colleagues at the watchdog group Anti-Corruption Fund had just returned from vacation, and “just […]

2016-12-16T20:24:05-05:00August 9th, 2012|

Sniffing out RF at the Olympics

pic.twitter.com/h9L2RYWc 

https://www.theverge.com/2012/8/2/3215016/wi-fi-police-london-olympics

Apparently they were searching the airwaves for unauthorized wifi hotspots, or perhaps other wireless network problems. Similar steps can be taken for office environments. If someone set up a rogue access point in your office, that could open your network to intruders and a number of associated problems. Electronic systems are available that can monitor wifi as well as cellular signals in an office or building and locate and identify any unauthorized signals. Check with us if you need more information.

2012-08-02T23:51:04-04:00August 2nd, 2012|

Communications Security and Eavesdropping Countermeasures

Protection of information and communications is critical in today’s business world.  We will be updating our blog regularly with news, information, and advice to help you strengthen your information infrastructure. 
Please contact us directly if you have questions regarding your own privacy needs or specific situations.

Charles Patterson, President
Patterson Communications, Inc.
New York 

2016-12-16T20:24:06-05:00July 23rd, 2012|
Go to Top