Friday, October 23, 2020

Corporate Security: Patent and Trade Secret Enforcement in China

via Zhong Lun Law Firm
Over the past decade, patent and trade secret litigation has become increasingly popular in China. 

This chapter focuses on China’s adjudication system in patent and trade secret cases, on the various ways to collect evidence and the procedures involved. It also looks at recent trends to help foreign companies understand China’s patent and trade secret litigation system and to safeguard their legal rights and interests in China...

Electronic intrusion, violation of confidentiality obligations and other criminal acts are also recognized as misappropriation of trade secrets. In addition, commercial espionage crimes have also been added, which are defined as “stealing, spying, buying, and illegally providing trade secrets for foreign institutions, organizations and personnel”. more

The "electronic intrusion" part is important. Not conducting regular Technical Surveillance Countermeasures (TSCM) inspections risks weakening your standing, and missing crucial supporting evidence.

Orianne Cevey vs. Phil Collins - Accusations of Hidden Cameras

There’s been many twists and turns in the ongoing legal battle between Phil Collins and his on-again, off-again ex-wife Orianne Cevey. 

...the Swiss jewelry designer is alleging she’s being spied on by the Grammy winner after discovering a large number of hidden cameras in the hotly contested home.

In an affidavit obtained exclusively by the Daily Mail, Cevey claims she “discovered approximately 20 hidden cameras throughout the Family Home, including in my personal bathroom and changing room. These cameras were installed without my knowledge or consent. I covered these cameras with Band-Aids in order to preserve my privacy and the privacy of my children in the Family Home." more

When it comes to electronic surveillance, Band-Aid solutions are often applied. Corporations and high profile individuals either ignore the threat, or hire the most inexpensive, least knowledgeable, and least effective individuals to protect their information and privacy. Here is a list of questions to ask before you hire anyone to debug your home or business.

"Bond?, James Bond?!?! ...You're Putting Me on."

Recently declassified Cold War-era documents about a suspected British agent named James Bond have the Polish public and some in the intelligence community shaken, not stirred.

On Feb. 18, 1964, the agent named Bond, James Bond, arrived in Warsaw, then behind the Soviet Union's Iron Curtain, a barrier separating the Communist Eastern Bloc from the West.

Officially, he was employed as an archivist for the British Embassy Military Attache. But he soon earned the attention of Polish counter-intelligence officers. At one point, he was spotted snooping around a military base along the Soviet border, the Wall Street Journal reported. more

Friday Funnies

High Bridge, NJ - Tin Foil Hat Contest
Worried about microwave mind zapping, spies, aliens, or your nosy neighbor?  You may find a answer to your concerns here... Polka Dot CafĂ© in High Bridge, NJ more

Trump’s Twitter Account Was Hacked
President Trump’s Twitter account was hacked last week, after a Dutch researcher correctly guessed the president’s password: “maga2020!more

Ghostbusters sneakers from Reebok
Reebok is releasing this fun and cartoony Ghostbusters "Ghost Smashers" sneaker design on Halloween. more (You really need the matching backpack to complete the outfit.)

Wednesday, October 21, 2020

Spycam Detection Training - Now with English, Spanish & Korean Closed Captions

On-line, entertaining, self-paced, video training with Certificate of Completion...

Click to enlarge.
teaches the basic investigative skills necessary to identify and detect covert spy cameras. 
It also provides a complete due diligence strategy to help organizations protect their employees, customers and visitors against this privacy invasion. 
By taking a pro-active approach to “the video voyeur in the workplace problem" the organization also mitigates the risk of expensive lawsuits, damaging publicity and loss of good will.

In addition to the forensic training, the student receives a 25-page course text which includes a strong Recording in the Workplace policy template, a simple Inspection Log form and links to additional information.

Upon completing the course, the student will be able to conduct a professional inspection without the need for expensive instrumentation. Should an organization want to invest in instrumentation (useful for large scale inspections) links to these items are provided in the course text.

SPYCAM DETECTION TRAINING is primarily useful for:

  • security managers,
  • facilities managers,
  • store managers,
  • security officers,
  • private investigators,
  • landlords,
  • real estate management companies,
  • targets of activist groups,
  • and businesses which invite the public into their locations.

Recognizing and detecting spy cameras is also a valuable skill for:

  • law enforcement personnel,
  • security management students,
  • and the general public wishing to protect themselves against video voyeurism.

The course is structured to give the student:

  • a full understanding of the video voyeur problem,
  • a written policy which provides deterrence, leverage, and shows due diligence in court,
  • an understanding of the different types of spy cameras and how to identify them,
  • instruction on how to plan and execute a proper inspection,
  • and instruction on what to do if a camera is found and how to handle the evidence.

The course takes about an hour to complete.

Spy cameras are inexpensive and readily available via the Internet and local spy shops. Every child and adult is a potential target. Business especially have a duty to protect the people using their expectation of privacy areas.

Although SPYCAM DETECTION TRAINING focuses heavily on protecting workplace environments, there is a greater good. By taking this course you will be able to use what you have learned to protect yourself and your family during your everyday travels. The effect is cumulative. As more people take this course, opportunities for video voyeurs decreases. 


Tuesday, October 20, 2020

Kevin's Security Scrapbook Tops 100,000 Visitors from the USA Alone!

 Thank you, everyone! ~Kevin

The Most Underrated Threat to Corporate Information Security

Sharp spike in internet sales of USB spy cables has corporate security and IT directors concerned. Murray Associates researched and developed a solution. 

• Malicious USB cables look exactly like the real thing.
• Some act as eavesdropping bugs.
• Some have GPS tracking capability.
• The worst ones… more  pdf

Cautionary Tale: What's Worse Than Being Caught on an Open Microphone?

Being caught on an open camera...

"I believed I was not visible on Zoom," he told Vice. "I thought no-one on the Zoom call could see me. I thought I had muted the Zoom video."

Jeffrey Toobin, 60, also a prominent CNN commentator, has been in demand as the US election campaign intensifies.

The incident, first reported by Vice News, happened during an election simulation involving the New Yorker and WNYC radio last week.

Mr Toobin, in a statement to Vice, said: "I made an embarrassingly stupid mistake, believing I was off-camera." more

Spybuster Tip #840:
• Always assume the mic and camera are live, and act appropriately.

Spybuster Tip #841:
• Know how to use your tech.

Estimated Lifespan of Your Passwords

Click to enlarge.

Spread the Word - Not the Germs

Friday, October 16, 2020

Consumer Reports - All the tools You Need for Online Safety

Keep Your Data Secure With a Personalized Plan

Cut down on data collection and prevent hackers from invading your laptop, tablet and even your phone. Answer a few simple questions to get customized recommendations to help you:
  • Safely backup files
  • Browse online without tracking
  • Avoid phishing scams
  • Prevent identity theft

CR Security Planner is a free, easy-to-use guide to staying safer online. It provides personalized recommendations and expert advice on topics such as keeping social media accounts from being hacked, locking down devices ranging from smartphones to home security cameras, and reducing intrusive tracking by websites.

Consumer Reports is an independent, nonprofit member organization that works with consumers to create more fairness, safety, and transparency in the marketplace. We don’t run third-party ads, and no company will ever exercise influence over our recommendations of products or services.

Even North Korea has Industrial Espionage Problems

North Korean man investigated for industrial espionage...
A North Korean man in his 40s is reportedly under investigation by the Ministry of State Security for turning over internal analyses from his workplace to a Chinese trader, Daily NK has learned.

The internal analyses the man gave to the trader reportedly concerned technology used to develop North Korean-style cosmetics. There is speculation that he will be sent to a political prison camp for espionage. more

Covid 19 Affects MI5's Spies Street Surveillance Tactics

The pandemic has changed the way millions of people work -- and even spies aren't exempt.

Near-empty streets caused by fewer people traveling into city centers can make it difficult for Britain's spies to track suspects, the new head of MI5, the UK's domestic security service, has said.

Ken McCallum told journalists Wednesday that his agents have adjusted the way they work as a result of the coronavirus crisis, after crowds thinned in public spaces. more

Facebook "Bug" Bugged iPhone Camera - Bugged Instagram'er Sues

Facebook has got itself in trouble again as the California-based tech giant has been allegedly sued for spying on Instagram users using the camera on the phone, Bloomberg reported.

According to the lawsuit, which has come following reports from July, the photo-sharing application had been accessing the camera on the iPhone to spy on users even when they weren’t activated.

Facebook has denied the claim and blamed a bug saying that it’s correcting the problem. more

Woman Allegedly Hacked Ex’s Alexa to Scare off New Girlfriend

Double Feature!
An IoT Cautionary Tale...
A Crazy Ex Tale...

A jilted London woman allegedly hacked into her ex-boyfriend’s Amazon Alexa device and used it to scare off his new girlfriend, a report said.

Philippa Copleston-Warren, 45, was accused in a London court of using the virtual assistant to flash the lights inside her former boyfriend’s house on and off and tell his new sweetie to scram after he ended their relationship of two years, The Sun reported.

The defendant spoke through the Alexa account to tell the complainant’s friend in the property to leave and to take her stuff,” prosecutor Misba Majid told Westminster Magistrates’ Court, according to the newspaper.

This so distressed the girlfriend, it caused her to cry and she left.

Copleston-Warren (inset), a management consultant, controlled the device from London, about 130 miles from her businessman ex-beau’s house in Lincolnshire, the paper reported.

She is also accused of hacking her ex’s Facebook account and uploading nude pictures of him. more

Spybuster Tip # 721: Learn how to adjust ALL the features of your digital assistant. This could have been prevented.