Thursday, June 29, 2023

The Spying Scandal Inside One of America’s Biggest Power Companies

A private investigator surveilled Southern Co.’s CEO, prompting an internal investigation into whether it was commissioned by another executive...


On a late spring day in 2017, a private investigator parked outside a fitness center in an Atlanta strip mall and covertly recorded video of a personal trainer as she entered her business.

Forty-five minutes later, the investigator took photos as the woman returned to her car, stowed her gym bag and drove away. He next followed her for 25 minutes to the home of her then-boyfriend, Tom Fanning, who, as chief executive of Southern Co., had for years been one of the energy industry’s most powerful figures.

Atlanta-based Southern, one of the largest utility companies in the U.S. and one of the most prominent corporate brands across the Southeast, has been bedeviled for much of the past year by the peculiar espionage effort, which led to an internal investigation but no public explanation.

Word of the surveillance surfaced last summer in a lawsuit between consultants in a firm that for decades has done work for Alabama Power, a Southern subsidiary. One of them alleged that, at the direction of Alabama Power officials, the other consultant had ordered surveillance of Southern executives in order to possibly gain internal leverage. more

Nissan Installed Covert Camera to Monitor No. 2's Home

Nissan installed a camera surveillance system at the home of former executive Ashwani Gupta so the automaker's internal security team could monitor him
, according to the preliminary findings of an investigation into the surveillance, two people with knowledge of the report said.

Nissan has been investigating a claim that Chief Executive Makoto Uchida carried out surveillance of the carmaker's second- in-command to acquire leverage to remove him from the company because of Gupta's opposition to some terms in a new partnership deal with Renault. more

From the What Goes Around Files: Phone Spy App Hacked

LetMeSpy, a phone tracking app spying on thousands, says it was hacked...

A data breach reveals the spyware is built by a Polish developer hacker has stolen the messages, call logs and locations intercepted by a widely used phone monitoring app called LetMeSpy, according to the company that makes the spyware.

The phone monitoring app, which is used to spy on thousands of people using Android phones around the world, said in a notice on its login page that on June 21, “a security incident occurred involving obtaining unauthorized access to the data of website users​​.”

“As a result of the attack, the criminals gained access to e-mail addresses, telephone numbers and the content of messages collected on accounts,” the notice read.

LetMeSpy is a type of phone monitoring app that is marketed for parental control or employee monitoring. The app is also specifically designed to stay hidden on a phone’s home screen, making it difficult to detect and remove. Also known as stalkerware or spouseware, these kinds of phone monitoring apps are often planted by someone — such as spouses or domestic partners — with physical access to a person’s phone, without their consent or knowledge. more

FutureWatch: Mind Reading Marches On, Maybe

At first glance, the headset is unassuming. It almost looks like a pair of oversized headphones. There’s no outward indication that it can read signals in your brain and help alter your mood.
But its creator, the startup Neurosity Inc., believes it’s at the forefront of a new wave of consumer products that will literally alter customers’ state of mind. 

Neurosity is one of a growing number of new companies making hardware that can read brainwaves. ... Startups with names like Emotive Inc., InteraXon Inc. and Earable Inc. are all working on devices that use EEG to measure everything from sleep to creativity...

It’s true that it’s early days for the intersection of brains and computers. “This is a huge area, and we’re going to see more of these devices,” Welle said. “Measuring your own brain signals is a cool thing to do." more   Previous mind reading news.

Saturday, June 24, 2023

Spybuster Tip #712 - Stop Smartphone Eavesdropping - Cap The App

Remember to check from time to time which apps have access to the microphone.


Here’s how to do it on iPhone:
  • Open the Settings app 
  • Scroll to Privacy & Security 
  • Tap Microphone 
  • Review the apps that have access to your microphone and toggle them on or off 
Here’s how to do it on an Android handset:
  • Open the Settings app 
  • Tap Privacy 
  • Tap Permission Manager 
  • Tap on Microphone 
  • Review the apps that have access to your microphone and toggle them on or off | more
Why is this important and timely?
A hacking group linked to the North Korean government has been caught using new wiretapping malware in recent surveillance attacks, according to an advisory from cybersecurity firm AhnLab. more

The US Presidential Race Gets More Interesting

Former CIA clandestine officer and GOP Rep. Will Hurd has announced he is joining the Republican race to be president.
The Texan and Donald Trump critic announced he is jumping into the growing GOP field with 14 rivals during an interview with CBS on Thursday morning. 'This is a decision that my wife and I decided to do because we live in complicated times and we need common sense,' he said. more

Man Arrested for Spying on Woman with Drone

RI - The Cranston Police Department announced a convicted sex offender was arrested for spying on a woman through her bathroom window with a drone...

Officials said the woman victim...was preparing to use the shower when she heard a buzzing noise from outside. The woman went to her back yard thinking the sound had something to do with her pool when she noticed a drone hovering outside her bathroom window. When the victim approached the drone, she said it moved quickly in an attempt to get away from her when it crashed into a tree and hit the ground...the victim disabled the drone in her pool and called 911 shortly after. more

Fishy Spy News, or Flipper Flips Sides

Russia's navy is using trained dolphins to step up security at its Sevastopol Black Sea fleet base, according to UK intelligence.
 The mammals are intended to "detect and counter" enemy divers, British intelligence reported.

Last month, the Norwegian Directorate of Fisheries advised beachgoers to "avoid contact" with a well-known beluga whale that's suspected of being used for Russian espionage. The warning came in response to the whale's travels to a densely populated area, putting him at far greater risk of injury or death. The whale, nicknamed Hvaldimir, became famous in 2019 after it was spotted wearing a specially made harness with mounts for a camera, leading to the "Russian spy" allegations. more

Friday, June 23, 2023

China’s Corporate Spy War

CNBC Documentaries examines the case of a Chinese government spy who tried to steal secrets from some of America’s biggest companies and delves into the shadowy world of economic espionage that could endanger millions of U.S. jobs. more

Saturday, June 17, 2023

A Tale of High-Stakes Corporate Espionage... a cautionary tale.

When Chinese tech giant Huawei learned it was set to lose a $200 million contract, a run-of-the-mill equipment deal spiraled into a saga of hidden microphones, drone encounters and covert surveillance, according to investigators for a Danish telecoms firm. Bloomberg reporters crisscrossed Copenhagen for the tale of TDC’s 5G showdown, in which technology, business and national security collide. more

No business is immune. Help is available. Click here. 

Monday, June 12, 2023

Corporate Espionage - Legal or Illegal? (The Full Story)

Corporate espionage, or economic or industrial espionage, involves stealing or illegally acquiring trade secrets and confidential information from a company or organization.
This process, which may also include practices such as bribery, blackmail, and surveillance, is a growing concern for businesses in various industries. Companies may engage in such activities in an increasingly competitive global market to gain a competitive advantage or undermine competitors.

The legality of corporate espionage is a complex subject, as it encompasses various actions and laws depending on the jurisdiction. Corporate spying may be considered illegal under various statutes that protect intellectual property, trade secrets, and economic interests. However, there are instances where certain espionage activities may fall within legal limits, especially in cases where information is obtained from public sources or through legitimate means... more
(Now that you know, protect yourself.)

77 Industrial Espionage Arrests

South Korean police have arrested 77 people involved in 35 cases of suspected industrial espionage
discovered during a recent nationwide investigation, Yonhap news agency reported on Sunday.

Most cases only involved domestic companies, although eight were related to the leak of technology secrets to China or other countries, Yonhap quoted the National Police Agency as saying...

The number of international cases was double that of a similar probe conducted one year ago, Yonhap said, citing police data. more

Blackmail with Email, or The Employer's Lawyer Destroyer

Last month, Lewis Brisbois Bisgaard & Smith, one of the nation’s largest law firms, was rocked by the announcement that two top partners were starting their own boutique practice and taking as many as 140 colleagues with them.

The shock inside Lewis Brisbois’ downtown Los Angeles headquarters soon gave way to anger... over the weekend, Lewis Brisbois struck back.

In an extraordinary move, its management team directed the release of scores of emails in which Barber and Ranen used vile terms for women, Black people, Armenians, Persians, and gay men and traded in offensive stereotypes of Jews and Asians. In one fell swoop, the venerable firm managed to torpedo its new rival, destroy the defecting partners’ careers and send the legal establishment reeling. more
-----
“Say it with flowers,
Say it with mink,
But never, ever say it with ink."

Eavesdropping: Advanced Aliens Could Detect life on Earth...

Only aliens with more advanced technology would be able to ‘eavesdrop’ on the signals transmitted on Earth – but apparently that’s more likely than you’d think.

While we work hard to search for extra-terrestrial life beyond our planet, radiation leaked from Earth’s mobile towers could be helping aliens find us. Put your tinfoil hat away: this isn’t anything to do with 5G. And the radiation being leaked isn’t the cancer-causing kind – it's the same type of energy used in radio and TV signals.

New research shows that this radio leakage from mobile towers is not currently strong enough on its own to be detectable by alien civilisations – assuming they are using the same technology as we are to find them. But if aliens have more advanced systems and are looking at radiation from more sources – such as Wi-Fi networks – we could soon be discovered by extra-terrestrials living on nearby stars. more

Thursday, June 8, 2023

Police Lt. Sentenced - Illegally Videotaping Women

MA - Belchertown Police Lt. Michael Beaupre, a former officer charged with illegally recording multiple women without their consent, pleaded guilty and was sentenced to two years of probation on Tuesday in Eastern Hampshire District Court, according to Worcester County District Attorney Joseph Early.

Beaupre, 38, pleaded guilty to eight counts of photographing an unsuspecting nude person, the district attorney’s office said, and was sentenced to two years of probation.

The officer also admitted in court to sufficient facts on 11 counts of unlawful wiretapping, the office said. A judge continued those counts for two years without a finding, and those probation sentences will run concurrently.

Beaupre used multiple concealed recording devices to secretly video record women as they undressed in his home between January 2017 through January 2022, the office stated. A woman who’d found some of the videos had reported them to law enforcement. more

Protect yourself and loved ones. 
Learn how to discover covert spy cameras.



Notable US Spies Fast Facts

Timeline Summaries* of Spies Who Failed

Aldrich Ames
1962 - Aldrich Ames, son of a CIA analyst, joins the agency as a low-level documents analyst. 

David Boone
1970-1991 - David Boone serves in the US Army as a signals intelligence analyst. During the late 1980s, he is assigned to the National Security Agency as a senior cryptologic traffic analyst. 

Peter Rafael Dzibinski Debbins
1996 - Peter Rafael Dzibinski Debbins makes visits to Russia to meet with their intelligence agents. He is given a code name and signs a settlement “attesting that he wanted to serve” them.

Noshir Gowadia
1968-1986 - Noshir Gowadia is employed by Northrop Grumman where he works on technology relating to the B-2 Spirit Bomber, aka the “Stealth” bomber.

Robert Hanssen
January 12, 1976 - Robert Hanssen joins the FBI.

Ana Montes
1984 - Ana Montes is recruited to spy for Cuba. She is never paid for her spying.

Walter Kendall Myers
1977 - Walter Kendall Myers begins working for the US State Department on contract, as an instructor.

Harold James Nicholson
1980 - Harold Nicholson joins the CIA after serving in the United States Army.

Ronald Pelton
1965-1979 - Ronald Pelton works for the National Security Agency, with top-level security clearance.

Earl Pitts
1983-1996 - Earl Edwin Pitts works at the FBI.

Jonathan Pollard
1979 - Pollard is hired to work at the Navy Field Operational Intelligence Office. He had been rejected previously from employment at the CIA due to drug use. His specialty is North America and the Caribbean.

George Trofimoff
1969-1994 - George Trofimoff, a naturalized American citizen of Russian parentage, works as a civilian for the US Army at the Joint Interrogation Center in Nuremberg, Germany. He also attains the rank of colonel in the Army reserve.     *Complete timelines for each spy.
---
And, one successful spy hero...
VA - The local FBI agent who cracked the notorious Walker spy ring in the 1980s has died. Robert "Bob" Hunter was the lead investigator in the 1985 arrest of master spy John Walker, who led what U.S. officials called the most damaging espionage case in American history. The Walker spy ring operated for nearly two decades, spanning five presidencies, stealing top-secret information from the Navy and selling it to the Soviet Union. In 1999, Hunter wrote a book about his experiences: "Spy Hunter: Inside the FBI Investigation of the Walker Espionage Case.more

America’s ‘Most Damaging’ Soviet Spy Dies in Prison

America’s “most damaging spy”, who spied for Russia over more than two decades during and after the Cold War, has been found dead in prison. Robert Hanssen, 79, was found unresponsive at a maximum-security facility in Florence, Colorado, where he was serving a life sentence. more

Cuba to Host Secret Chinese Spy Base Focusing on U.S.

Beijing agrees to pay Havana several billion dollars for eavesdropping facility...

China and Cuba have reached a secret agreement for China to establish an electronic eavesdropping facility on the island, in a brash new geopolitical challenge by Beijing to the U.S., according to U.S. officials familiar with highly classified intelligence. 

An eavesdropping facility in Cuba, roughly 100 miles from Florida, would allow Chinese intelligence services to scoop up electronic communications throughout the southeastern U.S., where many military bases are located, and monitor U.S. ship traffic. 

Officials familiar with the matter said that China has agreed to pay cash-strapped Cuba several billion dollars to allow it to build the eavesdropping station, and that the two countries had reached an agreement in principle. more

Cautionary Tale: Commercial Espionage - Bugging of Business Meetings

The billionaire owners of the Telegraph newspapers say their businesses are in good shape following claims they are on the cusp of receivership...

The sale of the Ritz hotel in London in 2020 exposed a bitter rift between the two families of the twins, with claims of commercial espionage over the bugging of business meetings.

At the centre of the affair was CCTV footage allegedly showing Sir Frederick's nephew handling a device. It saw the billionaire and his daughter, Amanda, sue three of Sir David's sons for invasion of privacy...

One person close to the talks said the banking group's patience over the debt was "running out", the FT said. more  previous coverage

Thursday, June 1, 2023

Corporate TSCM Information Security Inspections - Myths, Excuses & Reality


There are some myths and excuses that really need to be debunked.
(Not sure what a TSCM inspection is. Check here first.) 

TSCM SECURITY INSPECTION MYTHS and EXCUSES


Espionage is a Covert Act
Excuse: “I don’t see that we have a problem. No one is bugging our offices and boardroom.” 
 
Reality: The first rule of espionage is, “Be invisible.” You won’t know if you are being eavesdropped on if you never check.

Fear of being Labeled Paranoid
Myth: Peer pressure from upper management. 
 
Reality: Most top management appreciate proactive security thinking from their staff.

Lack of Awareness
Excuse: Yes. 
 
Reality: A lack of awareness of the risks associated with electronic eavesdropping, or the need for TSCM security inspections is common. Management may be unaware of TSCM as an available countermeasure.

Cost
Myth: TSCM inspections can be expensive. The costs involved in hiring a professional TSCM specialist, or purchasing specialized equipment, and conducting regular inspections can be a deterrent to scheduling TSCM inspections. 
 
Reality: Espionage losses are more expensive, much more. Hiring a TSCM specialist is very cost-effective, if you hire a competent firm. TSCM inspections are cheap insurance. Actually, better than insurance; TSCM can prevent the loss in the first place.

Perception of Low Risk
Excuse: Some businesses may believe that the risk of electronic eavesdropping is low in their industry or specific workplace. They might assume that their organization does not hold valuable or sensitive information that would attract eavesdroppers. 
 
Reality: Being “in business” means having a competitive advantage, and others do want it.

Lack of In-House Expertise
Excuse: Conducting TSCM inspections requires specialized knowledge and equipment. If a business does not have the expertise in-house they may choose not to pursue these inspections. 
 
Reality: Hiring an information security consultant–who has TSCM as their speciality–is the solution.

 

More TSCM Security Inspection Myths & Excuses


Fear of Disruption
Myth: TSCM security inspections can temporarily disrupt normal business operations. The process involves sweeping the premises, potentially causing interruptions or inconveniences to employees or ongoing activities. Some businesses might be reluctant to undergo such disruptions. 
 
Reality: Most inspections are conducted after business hours. When necessary, a TSCM team will assume the same dress and demeanor as employees, have a plausible reason for being in the area, and will work around employees so as not to disturb them.

Trust in Existing Security Measures
Excuse: Businesses may have confidence in their existing security measures, such as physical security, cybersecurity, or access controls. They might believe that these measures are sufficient to protect against eavesdropping and thus forego TSCM security inspections. 
 
Reality: Experience has shown that do-it-yourself security measures are never sufficient to protect against eavesdropping and other forms of information loss. TSCM inspections always identify vulnerabilities and provide recommendations for improvement.

Lack of Legal or Regulatory Requirements
Excuse: Depending on the industry or geographical location, there may be no legal or regulatory obligations that mandate TSCM inspections. In the absence of such requirements, businesses may choose not to prioritize these inspections. 
 
Reality: The financial success of a business should be a more effective motivator than a legal requirement.

Perception of Invasion of Privacy
Myth: TSCM security inspections are invasive or a breach of employee privacy. They might fear that conducting such inspections could harm employee morale or create an atmosphere of distrust. 
 
Reality: Employees appreciate security measures which protect their livelihood and personal privacy. When an employer demonstrates care for information security, employees will act more carefully too.

Limited Resources
Excuse: Small businesses or those with resource constraints may prioritize other operational needs over TSCM security inspections. They might allocate their limited resources to other critical areas or invest in measures they perceive as more immediate concerns. 
 
Reality: Defense is mandatory for survival. Budget waste and misallocation can usually fund TSCM security inspections without added expense, once corrected.

Overconfidence
Excuse: Some businesses might have a sense of overconfidence in their security measures, believing that they are already adequately protected against electronic eavesdropping. This false sense of security can lead to complacency and a disregard for TSCM inspections. 
 
Reality: These businesses are at-risk.

Carefully assess the risks in your workplace. Schedule TSCM security inspections, because… corporate espionage is not a myth.

###

Murray Associates is an independent technical information security consulting firm. They provide electronic surveillance detection and counterespionage services to business, government and at-risk individuals.

Headquartered in the New York metropolitan area, a Murray Associates team can assist you quickly, anywhere in the United States, and internationally.