US - Four people have been arrested in the United States on spying charges relating to the sale of classified information - including details of the Space Shuttle - to China. (more)
Bolivia - President Evo Morales declared a U.S. Embassy security officer to be an "undesirable person" on Monday after reports that the officer asked an American scholar and 30 Peace Corps volunteers to pass along information about Cubans and Venezuelans working in Bolivia. (more)
US - Senator Specter, a Republican of Pennsylvania, wants to know more about the New England Patriots' practice of spying on the opposition... (more)
Afghanistan - Soldiers seized two Taliban fighters spying on Nato forces after one of the militant's smart shoes gave him away... A soldier said they were suspicious as he wore expensive shoes - rare in the poor farming area. (more)
South Korea's outgoing president has accepted the resignation of his spy chief, who offered to quit over the leak of a document detailing his secret trip to North Korea in December, a spokesman said Monday. (more)
Kenya’s longest serving spy master, James Kanyotu, died in Nairobi yesterday. The shadowy and burly spy who headed the Directorate of State Intelligence, then known as the Special Branch for 27 years, died at the Nairobi Hospital where he was undergoing treatment for an undisclosed illness. (more)
US - Hewlett-Packard Co. said late Wednesday that it has settled with the New York Times and three BusinessWeek journalists who were spied on as part of the company's boardroom surveillance scheme. (more)
Sunday, February 17, 2008
Saturday, February 16, 2008
Friday, February 15, 2008
SpyCam Story #431 - Sticky Fingers
Security Guard Arrested For Vending Burglary
NC - A covert machine/changer camera was installed at the location to help determine the cause of these chronic unexplained shortages.
The video revealed evidence that a security guard from the location, a federal facility, was opening a vending machine and stealing cash. This machine was used to store the account vending collections in a mother bag from all the machines. The security guard was taking the cafeteria manager's vending key from an unlocked desk drawer in the cafeteria office. Audit records indicate that this individual stole $1,000 over three months. (more)
This is a commom problem. Many of our counterespionage reports contain this obvious recommendation...
Do not leave keys behind.
The most common offense we see is: Admin locks the executive's office door at night and leaves the keys in their unlocked desk just a few feet away.
"Would locking the desk help?"
No. Desk locks are easily pickable (or destructible)... as are filing cabinet locks.
"What could be worse?"
Those big key control cabinets which hold all the spare keys!
Most of their locks are as easily pickable as the desk locks... and, by the way, where is this key "hidden"? Can't find the key? Can't pick it? No problem. People rarely secure key-cabinets to the wall properly, anyway. Just grab it and go.
A few key control solutions for you...
FREE - Guide to Developing and Managing Key Control Policies and Procedures
Traka Key Control System
KeyTrak
NC - A covert machine/changer camera was installed at the location to help determine the cause of these chronic unexplained shortages.
The video revealed evidence that a security guard from the location, a federal facility, was opening a vending machine and stealing cash. This machine was used to store the account vending collections in a mother bag from all the machines. The security guard was taking the cafeteria manager's vending key from an unlocked desk drawer in the cafeteria office. Audit records indicate that this individual stole $1,000 over three months. (more)
This is a commom problem. Many of our counterespionage reports contain this obvious recommendation...
Do not leave keys behind.
The most common offense we see is: Admin locks the executive's office door at night and leaves the keys in their unlocked desk just a few feet away.
"Would locking the desk help?"
No. Desk locks are easily pickable (or destructible)... as are filing cabinet locks.
"What could be worse?"
Those big key control cabinets which hold all the spare keys!
Most of their locks are as easily pickable as the desk locks... and, by the way, where is this key "hidden"? Can't find the key? Can't pick it? No problem. People rarely secure key-cabinets to the wall properly, anyway. Just grab it and go.
A few key control solutions for you...
FREE - Guide to Developing and Managing Key Control Policies and Procedures
Traka Key Control System
KeyTrak
"An ye, leave nae stone unturned..."
Isle of Arran, Scotland - Local police are on the look-out for a large quantity of rock that has gone missing from Hawthorn Quarry near Whiting Bay. The Forestry Commission alerted the police to the quarry theft last Friday, and are now being forced to install covert video surveillance at the quarry... (more)
SpyCam Story #430 - Spiderman Cam
Australia - A HI-TECH peeping tom rigged his house with an elaborate network of miniature hidden cameras to spy on his housemates, a court was told yesterday.
But police have been unable to view the footage Gold Coast man Rohan Wyllie is suspected to have recorded because he has refused to give them his computer password.
Mr Harris said he discovered an "amazingly small" camera hidden behind the wall and "kilometres" of cable in the roof cavity leading to Mr Wyllie's locked bedroom.
"I followed the wires - they all went from his room and fanned out across the roof trusses," he said.
Ms Chilcott said Mr Wyllie "lived in the roof and in his bedroom" and the roof was like "another home". She said there were so many hidden cameras she lost count "but I can tell you it was more than 10". (more)
But police have been unable to view the footage Gold Coast man Rohan Wyllie is suspected to have recorded because he has refused to give them his computer password.
Mr Harris said he discovered an "amazingly small" camera hidden behind the wall and "kilometres" of cable in the roof cavity leading to Mr Wyllie's locked bedroom.
"I followed the wires - they all went from his room and fanned out across the roof trusses," he said.
Ms Chilcott said Mr Wyllie "lived in the roof and in his bedroom" and the roof was like "another home". She said there were so many hidden cameras she lost count "but I can tell you it was more than 10". (more)
Snuggly, The Security Bear speaks...
to... apparently, anyone who can be persuaded by a talking cartoon bear whose head is filled with fluff.
Let's join Snuggly now ashe she it explains why a new federal wiretap law is being passed. (video)
Let's join Snuggly now as
Thursday, February 14, 2008
"And, the Number One security threat is..."
"YOU!"
When it comes to security, human threats score much higher than those posed by technology. So says a new survey by consulting firm Deloitte of more than 100 technology, media and telecommunications companies worldwide. (more)
When it comes to security, human threats score much higher than those posed by technology. So says a new survey by consulting firm Deloitte of more than 100 technology, media and telecommunications companies worldwide. (more)
Facing the music in Hitsville
Wall Street Journal - 2/13/08
Hit of the Day
Hezbollah today said the fugitive militant Imad Mughniyeh, who was indicted in the U.S. for the 1985 hijacking of a TWA airliner in which a Navy diver died, has been killed by Israeli agents. Israel denied involvement in his death. (more)
Wall Street Journal - 2/14/08
Quote of the Day
"This guy had it coming to him," former Mossad official Yossi Alpher tells Newsweek, in describing how "there are many intel agencies who had a score to settle with" Hezbollah's Imad Mughniyeh. (more)
Hit of the Day
Hezbollah today said the fugitive militant Imad Mughniyeh, who was indicted in the U.S. for the 1985 hijacking of a TWA airliner in which a Navy diver died, has been killed by Israeli agents. Israel denied involvement in his death. (more)
Wall Street Journal - 2/14/08
Quote of the Day
"This guy had it coming to him," former Mossad official Yossi Alpher tells Newsweek, in describing how "there are many intel agencies who had a score to settle with" Hezbollah's Imad Mughniyeh. (more)
Tuesday, February 12, 2008
Ultra-wideband (UWB). Now a TSCM reality.
UWB materializes on an RSA6114A Tektronix spectrum analyzer.
New Eavesdropping Threat. Bug transmissions via Ultra-wideband. Standard eavesdropping detection techniques don't 'see' it.
Research Electronics explains it nicely...
"Ultra-Wide Band (UWB) transmitters represent a new method of RF modulation, typically consisting of extremely narrow pulses (in the range of 250 picoseconds). The modulation scheme is a time division multiplexed system based on the timing of the pulses across a large frequency range. It is suspected that this new method of modulation will likely be used for short-range communications (approximately 10 meters), but other applications will certainly be developed. With a potential frequency band of 2GHz to 10GHz, the new UWB modulation represents some interesting characteristics from the technical security perspective, specifically with regard to the detection of UWB transmissions potentially used in eavesdropping devices."
Murray Associates recognized the threat early.
(from Kevin's Security Scrapbook - February, 2002)
FutureWatch
Ultra-wideband (UWB) makes it debut... (this will be big)
Applications...
- Ground Penetrating Radar Systems
- Wall Imaging Systems
- Through-wall Imaging Systems
- Medical Systems
- Surveillance Systems
- Vehicular Radar Systems
- Communications and Measurement Systems
Not to mention, low-probability-of-intercept bugging devices.
(Shhhhhh! We told you not to mention that.)
Because of this foresight, Murray Associates can counter UWB eavesdropping threats today. Knowledge and military-level TSCM instrumentation (from REI and Tektronix) are being used now to protect their client family.
Consider the advanced TSCM services of Murray Associates if your current TSCM team can't show you what UWB looks like.
New Eavesdropping Threat. Bug transmissions via Ultra-wideband. Standard eavesdropping detection techniques don't 'see' it.
Research Electronics explains it nicely...
"Ultra-Wide Band (UWB) transmitters represent a new method of RF modulation, typically consisting of extremely narrow pulses (in the range of 250 picoseconds). The modulation scheme is a time division multiplexed system based on the timing of the pulses across a large frequency range. It is suspected that this new method of modulation will likely be used for short-range communications (approximately 10 meters), but other applications will certainly be developed. With a potential frequency band of 2GHz to 10GHz, the new UWB modulation represents some interesting characteristics from the technical security perspective, specifically with regard to the detection of UWB transmissions potentially used in eavesdropping devices."
Murray Associates recognized the threat early.
(from Kevin's Security Scrapbook - February, 2002)
FutureWatch
Ultra-wideband (UWB) makes it debut... (this will be big)
Applications...
- Ground Penetrating Radar Systems
- Wall Imaging Systems
- Through-wall Imaging Systems
- Medical Systems
- Surveillance Systems
- Vehicular Radar Systems
- Communications and Measurement Systems
Not to mention, low-probability-of-intercept bugging devices.
(Shhhhhh! We told you not to mention that.)
Because of this foresight, Murray Associates can counter UWB eavesdropping threats today. Knowledge and military-level TSCM instrumentation (from REI and Tektronix) are being used now to protect their client family.
Consider the advanced TSCM services of Murray Associates if your current TSCM team can't show you what UWB looks like.
Labels:
detection,
eavesdropping,
FutureWatch,
historical,
product,
TSCM,
UWB
"Please, speak into my lapel."
Wireless CCTV, a UK-based provider of mobile surveillance systems, has launched its 3G body-worn services that are aimed at providing enhanced security to agents in the field.
Wireless says that the systems, which have been developed in response to the growing demand for body-worn surveillance equipment whether overt or covert, offer evidential quality recording of suspects and enable security supervisors to coordinate and carry out tactical operations that involve multiple members. (more)
Wireless says that the systems, which have been developed in response to the growing demand for body-worn surveillance equipment whether overt or covert, offer evidential quality recording of suspects and enable security supervisors to coordinate and carry out tactical operations that involve multiple members. (more)
LinkedIn To Mine User Data For Corporate Espionage
(From Insider Chatter by Donna Bogatin...)
"LinkedIn’s Mike Gamson is touting an impending fee-based “Research Network” aimed at capitalizing on the reams of data LinkedIn houses on those millions of people:
The service will help hedge fund managers and investment banks find people who used to work at a company they’re interested in, or even who is working for a customer of a company they are interested in. (as cited by eWeek)
In other words, insider corporate intelligence, or espionage:
Let’s say I’m thinking about making an investment in a producer of product X. I might want to speak to people that sell that product, people that buy that product, or that used to work at that company as part of my research process to have a better understanding of how valuable that product is.
BUT, “let’s say” the “producer of product X” does NOT want current or past employees talking to hedge funds and investment banks about its proprietary, confidential, insider goings on. LinkedIn’s financial incentives to its “17 million professionals” may nevertheless be hard to resist. Gamson boasts, “If we can begin to help our members make money and help our clients find the right people, that’s when you create value on both sides and we like those situations.”
Corporations about which LinkedIn users divulge insider information to hedge funds and investment banks, however, will undoubtedly NOT “like those situations.” (more)
"LinkedIn’s Mike Gamson is touting an impending fee-based “Research Network” aimed at capitalizing on the reams of data LinkedIn houses on those millions of people:
The service will help hedge fund managers and investment banks find people who used to work at a company they’re interested in, or even who is working for a customer of a company they are interested in. (as cited by eWeek)
In other words, insider corporate intelligence, or espionage:
Let’s say I’m thinking about making an investment in a producer of product X. I might want to speak to people that sell that product, people that buy that product, or that used to work at that company as part of my research process to have a better understanding of how valuable that product is.
BUT, “let’s say” the “producer of product X” does NOT want current or past employees talking to hedge funds and investment banks about its proprietary, confidential, insider goings on. LinkedIn’s financial incentives to its “17 million professionals” may nevertheless be hard to resist. Gamson boasts, “If we can begin to help our members make money and help our clients find the right people, that’s when you create value on both sides and we like those situations.”
Corporations about which LinkedIn users divulge insider information to hedge funds and investment banks, however, will undoubtedly NOT “like those situations.” (more)
72% of Scots against CCTV eavesdropping
The Information Commissioner’s Office (ICO) launched its new CCTV code of practice at the Scottish Parliament today, and also released details of a survey of a thousand people in Scotland.
Seventy-two per cent of respondents to the survey were against CCTV cameras which record conversations. This supports an earlier survey in London and South East England which produced similar results (70% against). (more)
Seventy-two per cent of respondents to the survey were against CCTV cameras which record conversations. This supports an earlier survey in London and South East England which produced similar results (70% against). (more)
Most wall warts just look ugly. This one just looks.
But wait.
There's more...
This wall wart contains a hidden camera and a microphone!
But wait.
There's more...
It also contains a digital audio / video recorder!!
But wait.
There's more...
It can record up to 66 hours of audio and video on its internal 2GB SD memory card!!!
But wait.
There's more...
No long cords to hide.
No wireless transmissions to give it away.
(more)
Why do I mention this?
So you know what you are up against.
There's more...
This wall wart contains a hidden camera and a microphone!
But wait.
There's more...
It also contains a digital audio / video recorder!!
But wait.
There's more...
It can record up to 66 hours of audio and video on its internal 2GB SD memory card!!!
But wait.
There's more...
No long cords to hide.
No wireless transmissions to give it away.
(more)
Why do I mention this?
So you know what you are up against.
Perfect Passwords - GRC's Ultra High Security Password Generator
Every time you visit this page, you get (FREE) a unique set of custom, high quality, cryptographic-strength password strings which are safe for you to use.
Example...
If you decide to use these great passwords, you might also need this.
Example...
If you decide to use these great passwords, you might also need this.
Who Are You (I really want to know... who, who)
Take the Internet Vulnerability Profiling test to see yourself as hackers and data-thieves see you. You may be surprised (and scared) by what you see. Hope you don't see anything. (music to hack by)
Subscribe to:
Posts (Atom)