Showing posts with label blackmail. Show all posts
Showing posts with label blackmail. Show all posts

Friday, October 30, 2020

Florida Woman Arrested for Hacking Home Camera System

A woman from Naples, Florida has been arrested after allegedly hacking into the home camera system of a family member as part of an extortion attempt.

Agents with the Florida Department of Law Enforcement arrested Jennifer Lenell Small on October 26 and charged the 44-year-old with a third-degree felony cybercrime.

Agents say that Small accessed the home camera system of a male family member as part of an extortion attempt that involved a contested will. Her alleged victim was a former employee of her husband's construction company.

"Small gained access to the camera and stored recordings after her husband’s construction company fired the victim and he turned the cell phone back into the company," said a spokesperson for the Florida Department of Law Enforcement.

The company cell phone that the victim had returned to his employer had an app installed on it that allowed the victim to view footage from his home security camera system...

A FDLE spokesperson said: "Small sent a short video clip to the victim telling him she had hours of videos that she would use against him in court if the victim did not agree to mediation." more

Spybusters Tip #934: Wipe your devices before passing them on.

Saturday, September 26, 2020

Extortionography: Executives Recorded Bragging of Cozy Government Relationships

Top executives hoping to blast open North America's largest gold and copper mine were secretly recorded describing in detail their cozy influence over US lawmakers and regulators. 

They also revealed their intentions to go far beyond what they were saying on applications for federal permits to work near the headwaters of Bristol Bay, Alaska -- one of the last great wild salmon habitats left on Earth.

"I mean we can talk to the chief of staff of the White House any time we want, but you want to be careful with all this because it's all recorded," said Ron Thiessen, CEO of Northern Dynasty Minerals, of official communications to the White House, as he himself was recorded unknowingly. "You don't want to be seen to be trying to exercise undue influence." more

What is Extortionography? You need to know. 

Monday, May 18, 2020

Sir Frederick Barclay's Nephew 'Caught with Bugging Device' at Ritz Hotel

The footage is at the centre of a bitter legal row between the families of the billionaire Barclay twins.

Sir Frederick, 85, and his daughter Amanda are suing three of Sir David Barclay's sons for invasion of privacy.

They claim the surveillance gave the men commercial advantage and they sold the Ritz for half its market value.

The Barclay brothers' businesses include the Telegraph Media Group, the online retailer Very Group, the delivery business Yodel, and - at the time of the bugging - the Ritz hotel in London.

Sir Frederick, the elder twin by 10 minutes, and his daughter Amanda are suing Sir David Barclay's sons - Alistair, Aidan and Howard, Aidan's son Andrew, and Philip Peters, a board director of the Barclay group for invasion of privacy, breach of confidence and data protection laws.

The claim stems from a falling out between the children of the famously private twins...


The CCTV footage allegedly shows Alistair Barclay handling a bugging device at the Ritz hotel on 13 January this year. The recording shows Mr Barclay inserting a plug adaptor, which is claimed to contain a listening device, into a socket.

In court documents lodged by Sir Frederick and Amanda Barclay, it is claimed the bug - which was placed in the hotel's conservatory where Sir Frederick liked to conduct business meetings and smoke cigars - captured more than 1,000 separate conversations amounting to some 94 hours of recordings.

The pair claim the recordings amount to "commercial espionage on a vast scale"....
Voice Activated Wireless GSM Spy Bug SIM Mains 2 Way Adapter Plug Doubler Surveillance Adaptor

Second bug

It is also claimed a separate Wi-Fi bug was supplied by private investigation firm Quest Global. Its chairman is former Metropolitan Police commissioner Lord Stevens.

The claimants' documents say that Quest invoiced for 405 hours of listening and transcribing.

The recordings, it is alleged, captured "private, confidential, personal and Sir Frederick's privileged conversations with his lawyers, and with his daughter's trustees, bankers and businesspeople"more

Oddly, there is no mention of the video bug which recorded the incident. It does however make the nephew eligible for our Darwin Award for capturing himself with his own bug. ~Kevin

Friday, May 15, 2020

Assembling an Ikea Spy Case

Ikea and some of its former executives were ordered to face trial in France over accusations they conspired with police officers to spy on staff.

An Ikea unit in France was accused of collecting information on employees and people applying to work for the furniture giant, according to an indictment dated April 30.

In exchange for a fee, police officers provided confidential information to former Ikea executives on past convictions.

This was in turn used to dismiss staff or turn down applications.

Ikea France said it has “always firmly disapproved” of such practices. more

Wednesday, October 23, 2019

Free Ransomware Decryption Tool

Emsisoft Decryptor for STOP Djvu

The STOP Djvu ransomware encrypts victim's files with Salsa20, and appends one of dozens of extensions to filenames; for example, ".djvu", ".rumba", ".radman", ".gero", etc.

Please note: There are limitations on what files can be decrypted. more

Of course, put all the safeguards in place first so you won't need this tool. ~Kevin

Tuesday, July 31, 2018

Corporate Espionage Alert: Deep Portrait Videos – Not Just a Government Problem

The bad actors have stepped up their game with perhaps the most potentially devastating cyber ruse of all – the high-tech “Deepfake” videos...

Deepfake videos are the residue of new internet technology that supplies almost anyone the ability to alter reality so that subjects can be manipulated to say anything the hacker wants, from the ludicrous and inflammatory to the downright incriminating...appears so real it is almost impossible to spot the bogus video.

The potential security impact of these altered videos has both the federal government and the U.S. Intelligence community on high alert...

“This started several years ago with fake videos and then it turned into Deepfake videos and it’s currently progressing to deep portrait videos,” says Bob Anderson, who is a Principal in The Chertoff Group’s global Strategic Advisory Services and a former national security executive and former Executive Assistant Director with the FBI...


“This is a potentially huge national security threat for a variety of reasons. Picture telecommunication calls or video conference calls that an adversary could potentially interject a fake deep portrait video of a three-star general or CEO of a company directing members of that company or organization to partake in potential detrimental national security or criminal actions,” Anderson says. “Nation-states like Russia, China and Iran could potentially utilize this technology for a variety of counterintelligence, corporate espionage, economic espionage and political influence campaigns across the United States.” more

Monday, April 16, 2018

A Snitch on the Foreign Spy Website ...what could possibly go wrong?

China has launched a new website that allows citizens to report people they suspect of being foreign spies or separatists.

The Ministry of State Security reporting platform even offers rewards to citizens who report those who are trying to “overthrow the socialist system,” the South China Morning Post reported.

Accessible in both English and Mandarin, the website (www.12339.gov.cn) was launched on April 15 as part of China's National Security Education Day.

The new website details an exhaustive list of offenses that can be reported, including collusion with foreign countries, plotting to “dismember the state” and “fomenting subversion of state power” through “rumor, libel or other ways.” more

Saturday, February 24, 2018

Extortionography and the Missouri Gov. Eric Greitens Felony Indictment

Missouri Gov. Eric Greitens, who was once considered a rising star in the Republican Party, has been under siege since January, when accusations emerged that he threatened to use a nude photo to blackmail his former hairstylist, with whom he was having an extramarital affair.

Greitens had allegedly threatened the woman by saying he would distribute a nude photo he had secretly taken of her if she exposed their relationship.

The accusations stemmed from a covert recording by the woman’s ex-husband published by KMOV in St. Louis, in which the woman is heard describing how Greitens invited her to his home in 2015 and, with her consent, taped her hands to exercise rings and blindfolded her. He then allegedly took a photo of her naked. more

What is extortionography?

Wednesday, October 12, 2016

Yahoo Email'ers Fed-Up with Hacking and Spying Find Forwarding Door Locked

After back-to-back revelations that hackers had compromised a staggering 500 million Yahoo Mail accounts and that the company had complied with a US government request to open incoming emails for surveillance, 

some users are having a hard time switching to any of Yahoo's competitors.

While it remains unclear how many users intend to leave over the privacy concerns and bad publicity, several told the Associated Press that their ability to do so has been hampered since the beginning of the month, when Yahoo disabled its automated email-forwarding option.

Those who had already set up their forwarding are unaffected, but those who wish to begin forwarding messages now are unable. more

Thursday, October 29, 2015

Business Espionage: Buy Your Batting Average with Blackmail

Former big leaguer Lenny Dykstra admitted to spending "half a million bucks" on private investigators to dig up dirt on umpires during his playing career.

Dykstra says he then used the information not necessarily to bribe umpires, but to intimidate them into giving him favorable calls. "Fear does a lot to a man," he says. Here's the video:


 "Their blood is just as red as ours. Some of them like women, some of them like men, some of them gamble," said Dykstra. He then imagined a scenario in which he asked the umpire if he "covered the spread last night" after a called strike, then the strike zone shrunk to his advantage.

"It wasn't a coincidence that I led the league in walks the next few years," he added. Dykstra led the league with 129 walks in 1993 while with the Phillies. His previous career high was 89 walks, though he missed plenty of time with injuries. Dykstra's walk rate did spike from 1993-94:

Monday, August 10, 2015

Government-Level Spy Gear Found Used for Blackmail and Bid Rigging

South Africa - In what has been described as a serious compromise of the sovereignty of the state, three men appeared in court this week after they were found in possession of a super-spying device which can tap into more than 10 000 phones and eavesdrop on conversations from as far as 3km away.

The discovery is creating sleepless nights for South African intelligence officials and the police, as the men allegedly acquired the device with the help of government officials.

The Sunday Independent understands the device has been used to bug top politicians, cabinet ministers and prominent business people who do business with the government.

The men behind the acquisition of this powerful device had been using it for almost a year.

They apparently used it to manipulate and blackmail people in powerful positions, as well as sway multibillion-rand tenders in state institutions. more more

Tuesday, February 3, 2015

Chinuts - Move Here, Give Us Source Code and Build Some Back Doors (wtf?!?!)

China plans to unveil new cybersecurity rules that require tech companies to hand over source code and build back doors in hardware and software for government regulators. The rules only apply to companies selling computer products to Chinese banks, but they have already sparked anxiety on the part of Western tech companies about being trapped between either giving up intellectual property or not doing business in China.

The new rules—part of cybersecurity policies intended to protect China’s critical industries—first appeared in a 22-page document at the end of 2014, according to a New York Times report. Such rules have not been officially announced yet. But the U.S. Chambers of Commerce joined a number of other foreign business groups in sending a letter [pdf] to the Central Leading Group for Cyberspace Affairs, chaired by President Xi Jinping, that called for “urgent discussions” about the policies. Tech giants such as Microsoft, Cisco, and Qualcomm have also independently voiced their concerns.

Under the bank rules, tech companies would have to hand over source code, set up research and development centers in China, and build hardware and software back doors that would permit Chinese officials to monitor data within their computer systems
.
(more)

Friday, August 8, 2014

China, Sex, Spycams and PIs... A Cautionary Tale

(June) A covert sex tape involving a senior executive and his Chinese lover was the trigger for a major investigation into corruption at British drugs giant GlaxoSmith-Kline...

The video of married Mark Reilly and his girlfriend was filmed by secret camera and emailed anonymously to board members of the pharmaceutical firm.

It led to an investigation that has rocked the £76billion company... (more)

(Yesterday) A British private investigator (PI) has been sentenced to two and a half years in jail by a Chinese court after becoming embroiled in a sex and whistleblowing scandal at the drug firm GlaxoSmithKline.

Peter Humphrey, 58, was also fined 200,000 yuan (£19,300), and his wife, Yu Yingzeng – a naturalised American citizen – was sentenced to two years and fined 150,000 yuan in the first case of its kind involving foreigners in China...

GSK had hired them to investigate why the company's then head of China operations, Mark Reilly, had been filmed surreptitiously having sex with his Chinese girlfriend in his guarded luxury home. (more)

Money Saving Spy Tips
1. No area you think is private is private until a competent TSCM team says so.
2. The "girlfriend" spy is an old trick.
3. Bugs, taps and spycams are old spy tricks. #3 used with #2 will cost you.
4. Executives: beware of #2, check for #3 frequently.
5. PIs, working in China has its risks.
6. Blackmail works, especially when state sponsored.
7. Proactive TSCM is far cheaper than a mess like this.

Thursday, August 7, 2014

FBI Citizens Academy - Hey, corporate America, turn around and pay attention.

“The top secret, government, political secrets, all that top secret stuff that you kind of think about spies, probably less than 10% of what they are trying to go after.” 

FBI experts say that 90% of what they go after, is industrial and trade secret espionage, and the target: students and executives from companies traveling abroad carrying trade secrets from their research and development at universities and companies.. And it's highly sought after.

“Every company, your research and development, it’s your next product down the road, and if I can steal that information and beat you to the market it's going to be devastating for you as a company.” (more) (video)

Tuesday, July 1, 2014

Travel - Should executives expect to be subjected to more traditional means of surveillance...

...such as hidden cameras or microphones, intrusion into hotel rooms, or being followed?

Hidden cameras, microphones or physical surveillance are all reportedly routine in many parts of the world, not just China, for purposes that can include industrial espionage, blackmail and to identify and monitor potential criminal activity. 


Physical security systems, domestic security practices and personal privacy expectations can vary in different areas, but all of the above may be encountered. 

At major facilities catering to foreign business travelers, we expect that plainclothes police and domestic security personnel are nearby at almost all times. 

However, some individuals claiming to be police or facility staff may be scam artist impersonators – you never want to hand over a wallet containing identification, cash and all your payment cards. 

If you travel into the interior on a domestic flight, do not be surprised if your wallet and personal electronic devices are removed to a location out of your view during screening at the security checkpoint. (more)

Thursday, March 13, 2014

Wiretapped Doctor Sues Med Center $5 Million+

GA - A trial date was set for September 15, 2014 in a highly publicized lawsuit alleging wiretapping and racketeering against Tanner Medical Center. An amended lawsuit, filed in the Superior Court of Carroll County by law firm Gary Bunch, P.C. on behalf of prominent Atlanta physician Randy Warner, seeks monetary damages in excess of $5 million.

According to the lawsuit, Tanner Medical Center, a subsidiary of Tanner Health System, eavesdropped on a private telephone conversation of Warner and used the contents of that conversation to "coerce and functionally blackmail" him. In addition, the suit claims that Tanner interfered with Warner's business relationships and engaged in wire fraud, mail fraud and a pattern of racketeering that damaged Warner... (more)

Thursday, February 20, 2014

Hero: TSCM Bug Report Author Fired for Not Changing Report Under Political Pressure

Turkey - The former head of the Scientific and Technological Research Council of Turkey's (TÃœBÄ°TAK) Research Center for Advanced Technologies on Informatics and Information Security (BÄ°LGEM) has said he was forced to make changes in a report as part of an investigation into a "bugging device" found at the prime minister's office.

In a blistering statement over his dismissal from the top post at BÄ°LGEM, a critical department within TÃœBÄ°TAK that prepares expert reports for court cases and state agencies, Hasan Palaz said he was forced to make changes on a scientific report that was prepared as part of a criminal investigation into the installment of bugging devices at Prime Minister Recep Tayyip ErdoÄŸan's office in Parliament and his home in 2012...

In a stern warning, he said the government's interference in TÃœBÄ°TAK reports and politicians' meddling in scientific inquiries would be suicide for the science world.

The discovery of the bugging devices led to an outcry and fueled a debate over who is responsible for monitoring and bugging the prime minister's office. (more)


Note: Although this translated news story makes it sound as if he did make the change, a careful reading of the whole story indicates he did not, hence his dismissal. 

From the other side of the fence in Turkey today...

Turkey - Battling a corruption scandal, Turkish Prime Minister Tayyip Erdogan is seeking broader powers for his intelligence agency, including more scope for eavesdropping and legal immunity for its top agent, according to a draft law seen by Reuters. (more)

UPDATE: (2/22/14) - Turkish prime minister Recep Tayyip Erdogan has said that two suspects believed to be involved in a bugging scandal have fled the country. (more)

Sunday, January 26, 2014

800+ Detained in China for Illegal Surveillance

Chinese police have arrested over 800 people suspected of producing, selling and using illegal wiretapping and photography equipment to conduct surveillance.

Through joint efforts by police from 14 provincial regions, 13 production facilities have been destroyed and 67 groups associated with illegal wiretapping equipment have been uncovered in the action, the Ministry of Public Security said. 

The police have uncovered over 1,550 criminal cases involving the use of wiretapping equipment in blackmail, kidnapping, illegal detention and other crimes. Over 15,000 sets of equipment for covert tracking, positioning, photographing and recording have been confiscated, state-run Xinhua news agency reported today. (more) (sing-a-long)

Monday, December 9, 2013

On "Free" Security Apps...

I came across a new smartphone security app the other day which caught my eye. It promised...
  • Free and secure phone calls.
  • Send self-destructing messages.
  • Recall or remotely wipe sent messages.
  • Safely share private photos and videos.
  • Photo vault to hide photos and videos.
  • Hide text messages, contacts, call logs.
  • Private vault for documents, notes and diary.
Just load the app on your phone (and the people you want to communicate with), and you're good to go. It sounded like something which my readers would like to know about. I downloaded it with the thought of giving it a try. But then, I thought again.

In my mind, I could hear my father saying, "there is no free lunch, if it looks too good to be true..." The years have always proven him correct.

The app's web site had a foreign country URL. Not a big issue. Perhaps it was the only place where the site's name was available. A little more digging and I came up with a company address here in the United States; a residential address. Again, not a big issue. The company is just over a year old, they have no other products, and software development from home is common. Both the Chairman and CEO of the company have names normally associated with a foreign country. I am still not phased. The United States is the world's melting pot.

A question on their FAQ page was the first red flag. "Why do you need my cell phone number to activate the service?" The answer, "we need the number so we can send you the activation code." My question is, why does a free encryption product need an activation code? It sounds like a ploy to identify users. Apparently, enough people felt this was an invasion of their privacy. The next part of the company's answer was that the code would no longer be needed after version x.xx.

The next FAQ was, "Why do you upload my contact book to your servers?" The answer smelled like more dung. Apparently, everything the app does goes through their servers.

On to the fine print. 

The product is specifically not guaranteed: not the encryption, not the self-destruction of the messages, photos or videos, nothing. They accept no liability. The are held harmless in the event transmissions are decrypted, deleted, copied, hacked, or intercepted.

Apps cost money to develop. Even allowing for ads, as these folks do, that is not enough money to justify an app this fancy (assuming it fulfills all its claims). There must be another payoff. What's worth money here? 

Information. 

People who use encryption are a select group; easy to target. For whatever reason, they feel their information is valuable. Hummm, a free security app could be great espionage tool. Let's see what information the company admits to collecting...

"We have the right to monitor..." Boom! What!?!? 

And, they collect: IP addresses, email addresses, phone numbers, address books, mobile device ID numbers, device names, OS names and versions. They can know who you are, where you are, and information about everyone you know. Even if you never use this app, if you are in the address book of someone who does, you're now coin of their realm.

"Photos and videos are cashed on servers..." and you can't delete them. They claim they will do this for you after, "a period of time."

Throughout all of this, the user's fire-of-fear is dowsed with, don't worry, it's all encrypted, no one but you can see it, trust me. Right... how about a little trust, but verify. Other security software companies allow vetting. I saw no claims that their code was independently vetted for bugs, back doors, or spyware. And, what about that "We have the right to monitor..." clause? How is that accomplished without a back door?

They, "May collect statistics about the behavior of users and transmit it to employees, contractors and affiliated organizations outside your home country." Yikes. Who are you affiliated with anyway? Please don't tell me, "if I tell you, I will have to kill you."

Here's another kicker. If they sell the company, "user information is one of the assets which would be transferred or acquired by the third party."

This may be a perfectly legitimate app. Maybe I'm paranoid. But, money, power, politics, espionage and blackmail all come to mind. Any government intelligence service, business espionage agent, or organized crime boss could have come up with this as a ruse. 

Which brings me to the moral of this story...

Before you trust any security service, vet it thoroughly. 
If your OTHBD needle starts to tremble, don't rationalize, move on. ~Kevin

Wednesday, November 6, 2013

Security Director Alert - Draft a 'No Recording' Policy for Your Company

IMPORTANT 
Here's why... 

by Philip L. Gordon, Littler Mendelson P.C.
With audio recording applications (“apps”) often standard issue on ubiquitous smart phones, employees are now armed with a relatively inconspicuous way to capture their supervisor’s every gaffe.  

Signs available here.
In September, a $280,000 jury verdict in favor of an employee on race and sex discrimination claims demonstrated just how damaging an audio recording can be in employment litigation. In that case, the plaintiff, who is African American, caught her supervisor, who is Hispanic, using the “N” word on tape, and the judge admitted the recording into evidence. Putting aside the risk of employees collecting damaging evidence for anticipated litigation, the ever-present specter of audio recording can undermine the type of corporate culture that so many employers are trying to encourage nowadays, one that thrives on collaboration and candid discussion among colleagues.

In 13 states — California, Connecticut, Delaware, Florida, Illinois, Maryland, Massachusetts, Michigan, Montana, Nevada, New Hampshire, Pennsylvania and Washington — anti-wiretap laws generally prohibit the recording of face-to-face communications without the consent of all parties to the communication. However, in the remaining 37 states and under federal law, audio recordings, whether surreptitious or not, are legal so long as the person making the recording participates in the recorded conversation. In these states, secret recordings by one of the participants not only are legal, but the former Acting General Counsel (“Acting GC”) of the National Labor Relations Board (NLRB) recently took the position that workers have a legally protected right to record their co-workers and managers. In a decision published on October 30, 2013, an administrative law judge (ALJ) flatly rejected the Acting GC’s position and upheld the employer’s general prohibition on all audio recordings in the workplace without prior management approval.

The employer in that case, Whole Food Markets, promulgated the prohibition to thwart the “chilling effect” of workplace audio recording. More specifically, Whole Foods’ policy explains that concern about audio recording “can inhibit spontaneous and honest dialogue especially when sensitive or confidential matters are being discussed.” Although not stated in the policy, Whole Foods’ head of human resources testified that the policy applied to all employees, whether management or non-management; to all devices that captured voice; and in all areas of the store, including the store’s parking lot and entrance area; but only during working time. (more)


Ask Philip Gordon about drafting a "no recording in the workplace" policy for you. 
Be sure to add video, too.

Security Directors: FREE Security White Paper - "Surreptitious Workplace Recording ...and what you can do about it."