Canada - Workers preparing the former Nortel complex as the new home for the Department of National Defence have discovered electronic eavesdropping devices, prompting new fears about the security of the facility.It’s not clear whether the devices were recently planted or left over from an industrial espionage operation when Nortel occupied the complex...Recently released DND documents indicate that concerns about the security surrounding the former Nortel campus at 3500 Carling Ave. were raised last year... Last year it was also revealed...
Monday, 30 September 2013
Saturday, 28 September 2013
Commercial Espionage Fears Prompts... a conference?!?!
Posted on 08:51 by Unknown

Jamacia - Commercial espionage affecting Jamaican businesses are to be addressed at a two-day conference on Cyber Security and Digital Forensics, to be staged at the University of the West Indies from September 30 to October 1. Mr. Robinson said he became aware of the level of corporate espionage occurring in Jamaica recently, and the conference will address this concern in a fulsome way. “We’re not talking about a man hacking into a website and...
Business Espionage - Bra Biz Ops Man Bugged
Posted on 06:39 by Unknown

Michelle Mone's firm bugged director's office amid fears he was about to jump ship to ex-husband's new company, tribunal hears MICHELLE MONE monitored recordings from a bug in a director’s office amid fears he was about quit for a job work with her ex, her new business partner claimed yesterday.Eliaz Poleg told an employment tribunal he came up with the idea of bugging Scott Kilday’s plant pot.Poleg – the chairman of the company formed from...
Posted in amateur, business, cautionary tale, eavesdropping, employee, find, lawsuit, recording, TSCM
|
No comments
Friday, 27 September 2013
When Business Espionage Doesn't Work the Next Step is Sabotage
Posted on 06:57 by Unknown

Real News or Business Sabotage? You decide...The following "news story" was found in Yahoo News. It is filled with anonymous quotes, no proof, no substance, no follow-up with the side being attacked. “Apple’s new operating system is making me nauseous and giving me a headache - just like when you try to read in the car,” says one user. Others complain of “vertigo” when apps “zoom” in and out - and say that using iOS 7 devices has left them feeling...
Monday, 23 September 2013
Yet Another Good Reason to Conduct TSCM Sweeps
Posted on 13:47 by Unknown

Police have arrested eight men in connection with a £1.3m theft by a gang who remotely took control of the computer system of a Barclays bank branch. A man posing as an IT engineer gained access to the Swiss Cottage branch in north London on 4 April, fitting a keyboard video mouse (KVM) device, which enabled the gang to remotely transfer funds to bank accounts under its control. (mo...
Fingerprint Security Appears Risky on iPhone, and Elsewhere
Posted on 07:51 by Unknown
Reason 1. - iPhone's fingerprint biometrics defeated, hackers claim.Just one day after the new fingerprint-scanning Apple iPhone-5s was released to the public, hackers claimed to have defeated the new security mechanism. After their announcement on Saturday night, the Chaos Computer Club posted a video on YouTube which appears to show a user defeating Apple’s new TouchID security by using a replicated fingerprint. Apple has not yet commented on this matter, and, as far as I can tell, no third-party agency has publicly validated the video or the...
Posted in advice, biometric, cautionary tale, cell phone, extortionography, government, law, X-Ray Vision
|
No comments
Is Your Cell Phone Talking to Your Carrier, or Behind Your Back to a Rogue?
Posted on 07:28 by Unknown

It's not easy to tell, but very important if you want to have a confidential conversation. What is a rogue or IMSI catcher? "An IMSI catcher is essentially a false mobile tower acting between the target mobile phone(s) and the service providers real towers. As such it is considered a Man In the Middle (MITM) attack. It is used as an eavesdropping device used for interception and tracking of cellular phones and usually is undetectable for the users...
Posted in cell phone, Clothing, eavesdropping, encryption, Hack, privacy, product, spybot, surveillance, wiretapping
|
No comments
Saturday, 21 September 2013
PRISM as part of the BLARNEY program
Posted on 09:11 by Unknown
(Updated: September 25, 2013)Last June, the still on-going Snowden-leaks started with the unveiling of PRISM, an NSA program which collects information about foreign targets from American internet companies like Facebook, Google, Yahoo and Microsoft.Since then, no new information about PRISM was published, but recently some new details could be found. These show that PRISM is part of another NSA program, codenamed BLARNEY, and that US-984XN is not...
Wednesday, 18 September 2013
Ex-Sheriff Pleads Guilty to Wiretapping
Posted on 19:25 by Unknown

WV - Former Clay County Sheriff Miles Slack pleaded guilty Tuesday to a federal charge that he hacked his wife’s work computer. Slack entered the plea to a wiretapping charge Tuesday in U.S. District Court in Charleston. He faces up to five years in prison. Sentencing was set for Dec. 19.The government said Slack secretly installed a keystroke logger on a computer in the Clay County Magistrate Court office in April where his wife worked. They were...
Tuesday, 17 September 2013
Afraid of Getting a Virus from a Public Recharging Station?
Posted on 09:28 by Unknown

For every scare, there is an inventor with an answer...via int3.cc...Have you ever plugged your phone into a strange USB port because you really needed a charge and thought: "Gee who could be stealing my data?." We all have needs and sometimes you just need to charge your phone. "Any port in a storm." as the saying goes. Well now you can be a bit safer. "USB Condoms" prevent accidental data exchange when your device is plugged in to another...
Posted in cautionary tale, cell phone, computer, Hack, malware, product, spyware, weird
|
No comments
New iPhones Are Coming - Learn How to Sanitize Your Old One
Posted on 07:27 by Unknown

Planning on buying a new iPhone? Whether you trade-in, sell or gift your old one, do this first. Erase all your personal data. Here's how:1. Plug your phone into the charger, or make sure you have enough charge to complete the process.2. Take a moment to back-up the phone. iTunes or iCloud make this easy.3. Go to SETTINGS > GENERAL > RESET4. Press ERASE ALL CONTENT AND SETTINGS. Press CONFIRM.5. (Optional) Press all the other RESETS.6....
Monday, 16 September 2013
How Law Enforcement Can Watch Tweets in Real-time
Posted on 12:33 by Unknown

BlueJay, the "Law Enforcement Twitter Crime Scanner," provides real-time, geo-fenced access to every single public tweet so that local police can keep tabs on #gunfire, #meth and #protest (yes, those are real examples) in their communities. BlueJay is the product of BrightPlanet, whose tagline is "Deep Web Intelligence" and whose board is populated with people like Admiral John Poindexter of Total Information Awareness infamy. BlueJay allows...
New Mobile Survey Reveals 41% of Employees Are Deliberately Leaking Confidential Data
Posted on 09:42 by Unknown
Congratulations and condolences to the nation’s CIOs for being responsible for data security. There’s now more job security but now there’s less information security too. Because, according to a new survey from uSamp, 41% of workers used an unsanctioned cloud service for document storage in the last 6 months, despite the fact that 87% of these workers knew their company had policies forbidding such practices.Welcome to the mobile workplace. It’s less secure and loaded with risk. And, according to the research, the estimated annual cost to...
"Secure" Integrated Circuit Chip Salami'ed into Spilling Secrets
Posted on 07:09 by Unknown

A technique has been developed to bypass elaborate physical protections and siphon data off the most secure chips potentially including those used to protect military secrets.The proof-of-concept technique demonstrated by researchers at Berlin's Technical University and security consultancy IOActive was successfully applied to a low-security Atmel chip commonly used in TiVo video recording devices. But the research team found that their complex and...
SpyCam Nails Airline Baggage Handlers at JFK
Posted on 06:47 by Unknown
Seven baggage handlers at JFK Airport were arrested Wednesday for allegedly stealing thousand of dollars in items from checked baggage.After receiving customer complaints of missing items, Israeli airline EL AL installed a camera in the belly of one of their 747 jets.Over a five month period they caught seven employees - often wearing gloves - rifling through passenger's suitcases and stuffing luxury items in their pockets and down their pants. (mo...
Sports Spying - Italian Football
Posted on 06:41 by Unknown

Italy - In a frankly bizarre twist, Sampdoria caught a Genoa scout dressed in camouflage gear spying on their training ahead of Sunday’s derby.The two local rivals will face off at Marassi on Sunday. It seems Genoa were hoping to gain an advantage, but were left red-faced when Primavera youth team goalkeeping Coach Luca De Prà was caught spying on Samp’s training session. It was Sampdoria who revealed the strange story with a statement on their...
Sunday, 15 September 2013
Alps Slayings Could be Linked to Industrial Espionage - Prosecutor
Posted on 13:33 by Unknown
French authorities said Friday they were investigating the possibility that the British family shot dead while on holidays in the Alps a year ago was executed over industrial espionage. (mo...
Friday, 13 September 2013
The US classification system
Posted on 11:35 by Unknown

(Updated: October 12, 2013)Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments have systems to protect sensitive information by classifying it, which is best known from document markings like "Top Secret".Here we'll explain the classification system of the United States, which is far more complex than most people think, also because it's one of the world's biggest secrecy systems. In 2012...
School v. Students - Monitoring Social Media for Anti-Social Behavior
Posted on 07:42 by Unknown
Authorities in California are now snooping on school students’ social media postings to catch law-breaking, bullying and other harmful activities. But parents worry the move is yet another example of Big Brother prying into ordinary Americans’ lives.Glendale Unified School District, the third-largest in Los Angeles County, has paid Geo Listening Company over $40,000 to follow its students on social media networks. The stated aim is to prevent law-breaking, bullying and doing harm to themselves and others.Under the scheme, the online activities...
Posted in computer, eavesdropping, government, mores, privacy, product, Ra-parents, spybot, surveillance
|
No comments
Wednesday, 11 September 2013
Sometimes the Bird Really is a Spy
Posted on 14:59 by Unknown
Over the past few years there have been a flock of spy stories about birds, the latest being a stork in Egypt. He was interrogated and let go, only to be found dead two days later. "...a wildlife organization claiming that it was 'eaten by local villagers.'" (more)This story is different. Some birds do spy.The John Downer Productions team created a set of highly realistic robotic penguins to spy on living birds for a recent BBC documentary. Some penguins are timid around humans, and may flee when a normal camera team approaches. So, these robots...
Business Espionage: BMW Accused of Spying on Paris Electric Car-Share Company
Posted on 14:39 by Unknown

The group that runs Paris car-sharing scheme Autolib’ said Tuesday it had filed a criminal complaint accusing German carmaker BMW of using spies to gather information on its electric cars. The Bollore group said it had filed the industrial espionage complaint after two employees of a firm employed by BMW were spotted three times tampering with charging points and Autolib’ vehicles parked in Paris.BMW denied any wrongdoing...The group that runs...
Friday, 6 September 2013
How to Check an iPhone for Spyware
Posted on 06:24 by Unknown

a tip via Techlicious..."The best way to detect if your iPhone has been hacked is to download an app like Lookout that tells you whether your phone has been "jailbroken". If the answer is yes (and you didn't jailbreak it), there's a good chance your suspected spy did. To remove an iPhone hack, simply update to the latest version of iOS. And to protect against future hacks, make sure that your phone is password protected so no one can get...
The New York Times Quote of the Day :)
Posted on 05:48 by Unknown
QUOTATION OF THE DAY"This is the golden age of spying." PAUL KOCHER, a cryptographer, on the National Security Agency's ability to circumvent encryption systems in gathering private Internet information. ...
Thursday, 5 September 2013
IT Industry Admits ‘Losing Battle’ Against State-Backed Attacks
Posted on 08:46 by Unknown
More than half of senior IT security professionals believe the industry is losing the battle against state-sponsored attacks, according to a survey. Nearly 200 senior IT security professionals were surveyed by Lieberman Software Corporation at the Black Hat USA 2013 conference in Las Vegas, with 58 per cent of saying they believe the profession is losing the battle against state-sponsored attacks.And 74 per cent of respondents were not even confident that their own corporate network has not already been breached by a foreign state-sponsored hacker,...
Wednesday, 4 September 2013
An NSA eavesdropping case study
Posted on 15:41 by Unknown

(Updated: September 28, 2013)On September 1, the popular Brazilian television news magazine Fantástico reported about an NSA operation for wiretapping the communications of the presidents of Mexico and Brazil. Fantástico is part of the Globo network, which already disclosed various top secret NSA presentations last July.Now, the Brazilian magazine showed some new top secret NSA documents, like a powerpoint presentation about the eavesdropping operation,...
Subscribe to:
Posts (Atom)