The WowWee Rovio allows
Wednesday, September 17, 2008
The Spy Who Loved Me
The WowWee Rovio allows
Labels:
eavesdropping,
miscellaneous,
product,
Ra-parents,
spybot,
spycam,
toy,
Wi-Fi,
wireless
New York Issues RFID-Encoded Drivers Licenses
OMG!
Scotland - The government were yesterday urged to hand over intelligence tapes of calls made by the Omagh bombers.
Relatives have been horrified at claims the atrocity may have been stopped by security staff, who were eavesdropping.
A total of 29 people, plus two unborn babies, were killed in the town centre blast in 1998. (more)
Relatives have been horrified at claims the atrocity may have been stopped by security staff, who were eavesdropping.
A total of 29 people, plus two unborn babies, were killed in the town centre blast in 1998. (more)
Terry and the Pirates (update)
The device, referred to as a "terminal server" in court documents, appears to be a router that was installed to provide remote access to the city's Fiber WAN network, which connects municipal computer and telecommunication systems throughout the city. City officials haven't been able to log in to the device, however, because they do not have the username and password. In fact, the city's Department of Telecommunications and Information Services (DTIS) isn't even certain where the device is located, court filings state.
The router was discovered on Aug. 28. When investigators attempted to log in to the device, they were greeted with what appears to be a router login prompt and a warning message saying "This system is the personal property of Terry S. Childs," according to a screenshot of the prompt filed by the prosecution. (more) (history)
16 Extra Eyes in the Florida Eye Institute (update)
FL - Florida Eye Institute founder Dr. Paul Minotty says he had a security system installed in the three-story building because he believed there was a conspiracy against him, threatening his well-being.
Minotty told jurors on Tuesday he wanted protection fearing that he was going to set up for an arrest for drunken driving following a Christmas party in 2007.
He also told jurors he heard a clinic employee bought a 50-caliber military rifle.
Minotty is on trial in a multimillion-dollar lawsuit brought by three of the institute's six doctor-owners. The three contend Minotty financially mismanaged the firm, over their objections, and allegedly resorted to having electronic surveillance equipment secretly installed in their private offices in violation of state law. (more) (history)
Minotty told jurors on Tuesday he wanted protection fearing that he was going to set up for an arrest for drunken driving following a Christmas party in 2007.
He also told jurors he heard a clinic employee bought a 50-caliber military rifle.
Minotty is on trial in a multimillion-dollar lawsuit brought by three of the institute's six doctor-owners. The three contend Minotty financially mismanaged the firm, over their objections, and allegedly resorted to having electronic surveillance equipment secretly installed in their private offices in violation of state law. (more) (history)
Bavarian Police Seeking Skype Trojan Informant
Germany - Bavarian police searched the home of the spokesman for the German Pirate Party (Piratenpartei Deutschland) looking for an informant who leaked information about a government Trojan used to eavesdrop on Skype conversations. (more)
More Countries Flex Surveillance Muscle
NEW ZEALAND - Police search and surveillance powers are to be broadened under legislation introduced to Parliament. (more)
On second thought...
A bill to give police stronger powers to snoop and search, including in some serious crime cases without a warrant, has been tabled in Parliament. The Search and Surveillance Powers Bill reforms search and surveillance powers and follows a Law Commission report which described the current situation as a mess. (more)
Look for a rewrite, and re-introduction soon.
MACEDONIA - New amendments to laws governing surveillance of communications came into effect earlier this month after parliament adopted what many considered controversial changes earlier this summer. (more)
GEORGIA - Georgia’s eavesdropping operation was made possible because many South Ossetians — including the border officials whose calls were intercepted on Aug. 7 by Georgia’s intelligence services — used the Georgian cellphone network of MagtiCom, a United States-owned Georgian mobile operator. (more)
SWEDEN - Several hundred demonstrators marched from Sergels Torg in central Stockholm to the steps of the Riksdag on Tuesday to protest Sweden’s surveillance law. (more)
On second thought...
A bill to give police stronger powers to snoop and search, including in some serious crime cases without a warrant, has been tabled in Parliament. The Search and Surveillance Powers Bill reforms search and surveillance powers and follows a Law Commission report which described the current situation as a mess. (more)
Look for a rewrite, and re-introduction soon.
MACEDONIA - New amendments to laws governing surveillance of communications came into effect earlier this month after parliament adopted what many considered controversial changes earlier this summer. (more)
GEORGIA - Georgia’s eavesdropping operation was made possible because many South Ossetians — including the border officials whose calls were intercepted on Aug. 7 by Georgia’s intelligence services — used the Georgian cellphone network of MagtiCom, a United States-owned Georgian mobile operator. (more)
SWEDEN - Several hundred demonstrators marched from Sergels Torg in central Stockholm to the steps of the Riksdag on Tuesday to protest Sweden’s surveillance law. (more)
SpyCam Story #466 - CERN PARTICLE ACCELERATOR
Watch scientists create Black Holes. (more)
Tuesday, September 16, 2008
The Second Cold War and Corporate Security
from stratfor.com...
Since the fall of the Soviet Union, foreign corporations have been very busy in Russia as they scramble for market share, attempt to profit from Russia’s massive natural resources and seek to meet growing demand for consumer products. For these companies, growing Russian nationalism and tension with the West increases both the chance of regulatory and legal hassles and the possibility that Russian intelligence activity might be directed their way. In other words, as tensions rise, so could the risk for Western corporations.
Not all these problems are new. As a young KGB officer, Putin earned his living by stealing technology from the West. And he has since encouraged Russian intelligence agencies to expand their collection programs with the awareness that such information can assist the Russian economy and specifically the revival of the defense sector. While the Russians have an advanced weapons research and development infrastructure, they are very pragmatic. They do not see the need to spend the money to develop a technology from scratch when they can steal or buy it for a fraction of the cost and effort. This pragmatism was clearly demonstrated in their early nuclear weapons program...
This surveillance of Western businesses may apply to both corporate offices and employees’ residences. Businessmen may be physically surveilled and their residences subjected to technical surveillance and mail/garbage covers. Domestic workers may also be recruited in an effort to collect information on their employers. Known or suspected NOCs will be carefully watched and will likely even be overtly harassed. (more)
Since the fall of the Soviet Union, foreign corporations have been very busy in Russia as they scramble for market share, attempt to profit from Russia’s massive natural resources and seek to meet growing demand for consumer products. For these companies, growing Russian nationalism and tension with the West increases both the chance of regulatory and legal hassles and the possibility that Russian intelligence activity might be directed their way. In other words, as tensions rise, so could the risk for Western corporations.
Not all these problems are new. As a young KGB officer, Putin earned his living by stealing technology from the West. And he has since encouraged Russian intelligence agencies to expand their collection programs with the awareness that such information can assist the Russian economy and specifically the revival of the defense sector. While the Russians have an advanced weapons research and development infrastructure, they are very pragmatic. They do not see the need to spend the money to develop a technology from scratch when they can steal or buy it for a fraction of the cost and effort. This pragmatism was clearly demonstrated in their early nuclear weapons program...
This surveillance of Western businesses may apply to both corporate offices and employees’ residences. Businessmen may be physically surveilled and their residences subjected to technical surveillance and mail/garbage covers. Domestic workers may also be recruited in an effort to collect information on their employers. Known or suspected NOCs will be carefully watched and will likely even be overtly harassed. (more)
GSM Bug Roundup - September
• Direct dial-in.
• Or, have it call up to three numbers when it hears sounds in the car.
• Uses the vehicle's power.
• Controls may be set remotely.
This is only one of eight covert GSM Bugs found here.
(Rearview Mirror Bug spec. sheet) (August's GSM Bug Roundup)
Industrial Espionage - Other Auto Parts
MI - A Kent County couple likely is headed to federal prison after they pleaded guilty Monday to conspiring to steal trade secrets from auto parts supplier Metaldyne Corp. and sell the knowledge to Chinese competitors.
Anne Lockwood, 55, and her husband, Michael Haehnel, 53, were charged in 2006 with stealing Plymouth-based Metaldyne's technology for manufacturing connecting rods and other parts. (more)
Anne Lockwood, 55, and her husband, Michael Haehnel, 53, were charged in 2006 with stealing Plymouth-based Metaldyne's technology for manufacturing connecting rods and other parts. (more)
Monday, September 15, 2008
How to Bug & Wiretap... Legally.
The game puts gamers in the gumshoes of a private investigator as he attempts to solve a series of infidelity cases. To succeed players must conduct surveillance using a range of tools and gadgets, collect and analyze evidence, and solve difficult puzzles.
Features include:
• Investigate 15 unique cases.
• Eavesdrop using phone tapping devices to catch your suspects.
• Recover deleted text messages to form evidence.
• Conduct polygraph tests during interviews to unearth the truth.
• Buy and sell investigation gadgets – the tools of your trade.
(MAC or PC - $9.95) (more)
Saturday, September 13, 2008
Your Trade Secrets Are At Constant Risk
Professor Jon Cavicchi has opened the Vault to the world and shares a wide range of information on trade secrets. The intent of this blog is to raise consciousness as to the range, extent, predominance and role trade secrets play in day to day business and legal environments.
The sources of the blogs vary from news on the web, proprietary sources on the hidden web, jury verdicts, court opinions, reports by government and NGOs around the globe as well as fun stuff such as trivia questions about products that are the subject of trade secrets.
It is designed as a blog to keep anyone interested in trade secrets coming back for more up to date news and data.
Regular Counterespionage Audits Are Cheap Insurance, compared to this...
TX - Jim Damman thought somebody was looking over his shoulder for months. Little did he know that his office was routinely broken into and more than 150-million dollars worth of trade secrets were stolen without a visible trace according to a federal lawsuit. The President of Exel Transportation Services says his suspicion grew so strong that he took the unusual step of sweeping the company's Addison offices for electronic bugs.
Exel is not a business typically considered a target of corporate spying. It's a shipping broker. Inside its offices, logistic agents sit in front of computer terminals with telephones cradled to their ears. Hundreds of times a day, they match-up shippers to freight carriers and move loads of everything from potatoes to computer chips around the world...
Damman says a new start-up competitor in Plano named Total Transportation Services (TTS) stilled seemed to have an uncanny knack of taking away Exel's customers, "the competitor was like one step ahead of us but they could not have known we were going to see a certain person, they could not have known what we were going to talk about when we were going to see that person unless they were getting information somewhere. We knew something was wrong."
Two of the former Exel executives, Mike Musacchio and Roy Brown, are accused of installing a backdoor into Exel's computer system according to the lawsuit. An exhibit in the lawsuit features a series of email messages titled "You will enjoy this" that were exchanged between Musacchio and Brown last October. Musacchio who had left Exel a month earlier to set-up TTS asked Brown who was still working at Exel, "...how are we going to get into email after you leave?" Brown left Exel three days later for TTS after replying, "Not a problem. I have the back door password that only I know and no one else can change." Musaccho replied, "Beauty!"
The lawsuit alleges that the hackers brazenly created exact replicas of Exel's documents, such as contracts, budget templates, and spreadsheets, for use in connection with TTS's business. Damman says the looted information included a $300-thousand dollar marketing study, "It's scary...it's something we all have to watch out for in this electronic day and age that we are in." (more)
Counterespionage Audits are an important element of corporate security programs. If you don't conduct Counterespionage Audits, you need to. Please contact me for assistance.
Exel is not a business typically considered a target of corporate spying. It's a shipping broker. Inside its offices, logistic agents sit in front of computer terminals with telephones cradled to their ears. Hundreds of times a day, they match-up shippers to freight carriers and move loads of everything from potatoes to computer chips around the world...
Damman says a new start-up competitor in Plano named Total Transportation Services (TTS) stilled seemed to have an uncanny knack of taking away Exel's customers, "the competitor was like one step ahead of us but they could not have known we were going to see a certain person, they could not have known what we were going to talk about when we were going to see that person unless they were getting information somewhere. We knew something was wrong."
Two of the former Exel executives, Mike Musacchio and Roy Brown, are accused of installing a backdoor into Exel's computer system according to the lawsuit. An exhibit in the lawsuit features a series of email messages titled "You will enjoy this" that were exchanged between Musacchio and Brown last October. Musacchio who had left Exel a month earlier to set-up TTS asked Brown who was still working at Exel, "...how are we going to get into email after you leave?" Brown left Exel three days later for TTS after replying, "Not a problem. I have the back door password that only I know and no one else can change." Musaccho replied, "Beauty!"
The lawsuit alleges that the hackers brazenly created exact replicas of Exel's documents, such as contracts, budget templates, and spreadsheets, for use in connection with TTS's business. Damman says the looted information included a $300-thousand dollar marketing study, "It's scary...it's something we all have to watch out for in this electronic day and age that we are in." (more)
Counterespionage Audits are an important element of corporate security programs. If you don't conduct Counterespionage Audits, you need to. Please contact me for assistance.
Labels:
advice,
business,
cautionary tale,
data,
eavesdropping,
email,
employee,
espionage,
lawsuit,
TSCM,
wiretapping
Cops Shot While Installing Bug
NZ - The two South Auckland men charged over the shooting of Sergeant Don Wilkinson have been granted name suppression.
One man has been charged with murdering Mr. Wilkinson and another man has been charged with assault. Both have been remanded in custody.
A second police officer is undergoing surgery in hospital after being shot several times. His injuries are not life threatening.
The two police officers were installing a bugging device in a car outside a suspected P lab in the suburb of Mangere in the early hours of this morning when they were attacked. (more)
One man has been charged with murdering Mr. Wilkinson and another man has been charged with assault. Both have been remanded in custody.
A second police officer is undergoing surgery in hospital after being shot several times. His injuries are not life threatening.
The two police officers were installing a bugging device in a car outside a suspected P lab in the suburb of Mangere in the early hours of this morning when they were attacked. (more)
Subscribe to:
Comments (Atom)