NY - The owners of a Long Island, New York, exotic car dealership that sells Bentleys and Aston Martins were charged with corporate espionage against a rival that sells Ferraris and Maseratis.
Giacomo Ciaccia and Leka Vuksanaj, owners of Universal Autosports LLC in Glen Cove, were arrested along with Creative Director Michael Lussos at their homes today, according to a statement by Acting U.S. Attorney Lev Dassin in Manhattan.
They are accused of illegally tapping into the e-mails of Ferrari Maserati of Fort Lauderdale-Long Island in Plainview, New York. The defendants accessed Ferrari Maserati’s e-mail server about 2,500 times between February and September last year from their homes or Universal Autosports, according to the criminal complaint dated April 16 and unsealed today.
“In one instance a dealer associated with Universal Autosports e-mailed a customer who had been negotiating with Ferrari Maserati to buy a rare Ferrari Enzo worth more than $1.3 million,” according to the statement.
“Is there any way I can help or get in the middle,” the dealer wrote, according to the complaint. “Have they found you a car yet?” (more)
Car dealers.
Is anyone out there surprised?
Anyone?
....silence....
Wednesday, April 22, 2009
Wireless LAN Security Survey
Note: This article may prompt you to conduct an independent, company-wide WLAN Security Survey and Legal Compliance Vulnerability Assessment.
If so, be sure to read this.
via infosecnews.org...
Deloitte Touche (India) released the results of a survey titled, "Wireless Security Survey." 35860 wireless networks were surveyed.
Key findings...
• 37% appeared to be unprotected i.e. without any encryption.
• 49% were using low level of protection i.e. Wired Equivalent Privacy (WEP) encryption.
• Balance 14% were using the more secure Wi-Fi Protected Access (WPA/WPA2).
• This makes around 86% of the observed wireless networks vulnerable. (more)
Records from Murray Associates on-site WLAN security surveys show IT departments in the U.S. maintain better security.
However...
More costly problems (legal and espionage) are discovered in almost every system we inspect...
PROBLEM 1: Non-compliance with applicable laws:
• Sarbanes-Oxley Act – U.S. Public Companies
• HIPAA – Health Insurance Portability and Accountability Act
• GLBA – Gramm-Leach-Bliley Financial Services Modernization Act
• PCI-DSS – Payment Card Industry Data Security Standard
• FISMA – Federal Information Security Management Act
• DoD 8100.2 – Use of Commercial Wireless Devices, Services, and Technologies in the Department of Defense Global Information Grid
• ISO 27001 – Information Security Management
• Basel II Accord – Banking
• EU - CRD (Cad 3) – EU - Capital Requirements Directive - Banking
I am sure you can remember the name of every person you have loved. Laptop computers remember the names of their past connections, too. Unlike you, however, laptops keep trying to reconnect every time they are turned on.
Unauthorized re-connections are never a good idea, with lovers or computers.
Data hackers pretend to be an old connection. They set up a Wi-Fi station with the old flame’s name (hhonors, starbucks, boingo etc.) Laptop gets turned on; automatically connects. Hacker steals sensitive corporate data on laptop.
Wait! It get’s worse...
Your employee returns to the workplace, jacks the laptop directly to your corporate LAN and logs in. The data hacker is right in there, too! (background)
If so, be sure to read this.
via infosecnews.org...
Deloitte Touche (India) released the results of a survey titled, "Wireless Security Survey." 35860 wireless networks were surveyed.
Key findings...
• 37% appeared to be unprotected i.e. without any encryption.
• 49% were using low level of protection i.e. Wired Equivalent Privacy (WEP) encryption.
• Balance 14% were using the more secure Wi-Fi Protected Access (WPA/WPA2).
• This makes around 86% of the observed wireless networks vulnerable. (more)
Records from Murray Associates on-site WLAN security surveys show IT departments in the U.S. maintain better security.
However...
More costly problems (legal and espionage) are discovered in almost every system we inspect...
PROBLEM 1: Non-compliance with applicable laws:
• Sarbanes-Oxley Act – U.S. Public Companies
• HIPAA – Health Insurance Portability and Accountability Act
• GLBA – Gramm-Leach-Bliley Financial Services Modernization Act
• PCI-DSS – Payment Card Industry Data Security Standard
• FISMA – Federal Information Security Management Act
• DoD 8100.2 – Use of Commercial Wireless Devices, Services, and Technologies in the Department of Defense Global Information Grid
• ISO 27001 – Information Security Management
• Basel II Accord – Banking
• EU - CRD (Cad 3) – EU - Capital Requirements Directive - Banking
Just one loophole... Hackers are in. Data is out. & "You are out of compliance."
and...
I am sure you can remember the name of every person you have loved. Laptop computers remember the names of their past connections, too. Unlike you, however, laptops keep trying to reconnect every time they are turned on.
Unauthorized re-connections are never a good idea, with lovers or computers.
Data hackers pretend to be an old connection. They set up a Wi-Fi station with the old flame’s name (hhonors, starbucks, boingo etc.) Laptop gets turned on; automatically connects. Hacker steals sensitive corporate data on laptop.
Wait! It get’s worse...
Your employee returns to the workplace, jacks the laptop directly to your corporate LAN and logs in. The data hacker is right in there, too! (background)
Tuesday, April 21, 2009
Secret Recording of Confidential Meeting Exposed...
...negotiations sour.
PA - A judge wants bankrupt Philadelphia Newspapers to focus on its financial reorganization while others investigate claims an investor illegally tape-recorded a sensitive financial meeting.
The ruling follows testimony Monday from Brian Tierney, chief executive of Philadelphia Newspapers. Tierney says a representative of New York-based CIT Group Inc. recorded a November meeting in his office. He says the pre-bankruptcy negotiations soured after he raised concerns about the taping. (more) (more) (more)
PA - A judge wants bankrupt Philadelphia Newspapers to focus on its financial reorganization while others investigate claims an investor illegally tape-recorded a sensitive financial meeting.
The ruling follows testimony Monday from Brian Tierney, chief executive of Philadelphia Newspapers. Tierney says a representative of New York-based CIT Group Inc. recorded a November meeting in his office. He says the pre-bankruptcy negotiations soured after he raised concerns about the taping. (more) (more) (more)
Police chief charged in bugging scheme
MN - The police chief of Gaylord... Dale Lee Roiger, 60, is charged with misconduct of a public officer and illegal interception of communications... According to charges: Roiger ordered one of his police officers to secretly place a voice-activated tape recorder in the Chamber of Commerce office... Roiger admitted to two people that he tried "bugging the Chamber office but failed. He said he got the "bugging device" from the city of Glencoe. A Glencoe police detective later confirmed loaning a digital voice-activated tape recorder to Gaylord police officer Tom Webster. (more)
Computer Spies Breach U.S. Electricity Grid
Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials.
The spies came from China, Russia and other countries, these officials said, and were believed to be on a mission to navigate the U.S. electrical system and its controls.
The intruders haven't sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or war. (more)
The spies came from China, Russia and other countries, these officials said, and were believed to be on a mission to navigate the U.S. electrical system and its controls.
The intruders haven't sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or war. (more)
Computer Spies Breach Fighter-Jet Project
Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project -- the Defense Department's costliest weapons program ever -- according to current and former government officials familiar with the attacks.
Similar incidents have also breached the Air Force's air-traffic-control system in recent months, these people say. In the case of the fighter-jet program, the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft.
The latest intrusions provide new evidence that a battle is heating up between the U.S. and potential adversaries over the data networks that tie the world together. (more)
Similar incidents have also breached the Air Force's air-traffic-control system in recent months, these people say. In the case of the fighter-jet program, the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft.
The latest intrusions provide new evidence that a battle is heating up between the U.S. and potential adversaries over the data networks that tie the world together. (more)
Labels:
computer,
data,
espionage,
government,
leaks,
trade secret
"Calling all White Hats. Calling all White Hats..."
"...Computer hacked at Pentagon. Electric Grid hacked..."
The Department of Homeland Security is looking to recruit white-hat hackers to help defend the US's critical internet infrastructure.
An ad by General Dynamics Information Technology on behalf of of the DHS seeks applicants who can "think like the bad guy", understand hacking tools and tactics, analyse net traffic and identify vulnerabilities in federal systems. In a budget request, Defense Secretary Robert Gates requested funds to increase the number of experts it trained each year from 80 to 250 by 2011. (more)
Might also want to put a call out to the Blue Blaze Irregulars. Just sayin'.
The Department of Homeland Security is looking to recruit white-hat hackers to help defend the US's critical internet infrastructure.
An ad by General Dynamics Information Technology on behalf of of the DHS seeks applicants who can "think like the bad guy", understand hacking tools and tactics, analyse net traffic and identify vulnerabilities in federal systems. In a budget request, Defense Secretary Robert Gates requested funds to increase the number of experts it trained each year from 80 to 250 by 2011. (more)
Might also want to put a call out to the Blue Blaze Irregulars. Just sayin'.
When Respected Business Magazines Start Running SpyCam Ads...
...you know
the business climate is brutal!
from the ad...
What happens while you're away?
Let's face it. Our vision is limited to what we can see in the moment. The Agent Camera gives you an extra pair of eyes for a new perspective on what is going on around you. Slip into your shirt pocket, and you'll have access to a whole new world of information you didn't see before.
This tiny spy cam provides you with a high quality audio and video in a package no larger than a USB stick or a pack of gum.
Easily concealable in your pocket, on a shelf, behind a picture, or wherever you need to focus your security, with the Agent Camera you'll know for certain that you won't miss a thing. The Agent Camera is an absolute cinch to use. Simply pop in a Micro SD Card (128MB to 2 GB, aim the camera, and press record. It's that simple. The camera will record continuously in real time for up to 3 hours! After you're done recording simply back up your evidence on your computer with the provided USB cable. (more)
Of course, there is no mention of how that "high quality audio" could easily put you on the wrong end of a criminal and/or civil U.S. lawsuit. As a public service, allow me fill you in... click here. ~Kevin
"Bug the bugs, then kill them!"
The Island of Guam became a living laboratory for scientists as they attached acoustic equipment to coconut trees in order to listen for rhinoceros beetles... the Guam Coconut Rhinoceros Beetle Eradication Project.
"This method of acoustic detection allowed Guam 'rhino hunters' to quickly and efficiently locate feeding grubs in an area thought to be rhino-beetle free," says Aubrey Moore, "and as the beetle broadens its range the acoustic approach to detection may save money and the lives of many coconut trees." (more)
Oryctes rhinoceros (L.) (Coleoptera: Scarabaeidae: Dynastinae) causes economically important damage to ornamental and commercial coconut palm trees in the western Pacific region that could be mitigated significantly by early detection and treatment. Adults are difficult to detect visually because they attack the crowns of the trees and feed internally before mating and dispersing to new hosts. Visual inspection is nevertheless the most widely used detection method, augmented with pheromone traps. This species is an ideal candidate for acoustic detection because the adults are large, active borers that produce stridulations during courtship and mating. (more)
Fun to play with.
"For some weird reason, Japanese people love Rhinoceros Beetles. It is very common for a boy to have a beetle as a pet. They usually put them in little boxes and carry them around in their pockets. Used almost like a Pokemon, boys will whip out their beetles and make them fight each other. This vending machine sells Rhinoceros Beetles - Males for 300 yen, and females for 100 yen." (more)
...and, Not Your Grandfather's Beetle! Uneavesdroppable. Won't be your pet. Would probably make a great fighter, however. (video)
"This method of acoustic detection allowed Guam 'rhino hunters' to quickly and efficiently locate feeding grubs in an area thought to be rhino-beetle free," says Aubrey Moore, "and as the beetle broadens its range the acoustic approach to detection may save money and the lives of many coconut trees." (more)
Oryctes rhinoceros (L.) (Coleoptera: Scarabaeidae: Dynastinae) causes economically important damage to ornamental and commercial coconut palm trees in the western Pacific region that could be mitigated significantly by early detection and treatment. Adults are difficult to detect visually because they attack the crowns of the trees and feed internally before mating and dispersing to new hosts. Visual inspection is nevertheless the most widely used detection method, augmented with pheromone traps. This species is an ideal candidate for acoustic detection because the adults are large, active borers that produce stridulations during courtship and mating. (more)
Fun to play with.
"For some weird reason, Japanese people love Rhinoceros Beetles. It is very common for a boy to have a beetle as a pet. They usually put them in little boxes and carry them around in their pockets. Used almost like a Pokemon, boys will whip out their beetles and make them fight each other. This vending machine sells Rhinoceros Beetles - Males for 300 yen, and females for 100 yen." (more)
...and, Not Your Grandfather's Beetle! Uneavesdroppable. Won't be your pet. Would probably make a great fighter, however. (video)
Monday, April 20, 2009
"Protect us, but..."
The head of the Senate Intelligence Committee said Thursday that the panel would investigate reports that the National Security Agency improperly tapped into the domestic communications of American citizens.
The Justice Department confirmed Wednesday that it had reined in the NSA's wiretapping activities in the United States after learning that the agency had improperly accessed American phone calls and e-mails while eavesdropping on foreign communications.
Senate Intelligence Committee Chairman Dianne Feinstein, D-Calif., said the committee will hold a hearing within a month to look at the NSA's surveillance activities. "We will make sure we get the facts," she said.
The Justice Department discovered the problems during a routine review of NSA wiretapping. The government's action was first divulged Wednesday by The New York Times. (more)
The Justice Department confirmed Wednesday that it had reined in the NSA's wiretapping activities in the United States after learning that the agency had improperly accessed American phone calls and e-mails while eavesdropping on foreign communications.
Senate Intelligence Committee Chairman Dianne Feinstein, D-Calif., said the committee will hold a hearing within a month to look at the NSA's surveillance activities. "We will make sure we get the facts," she said.
The Justice Department discovered the problems during a routine review of NSA wiretapping. The government's action was first divulged Wednesday by The New York Times. (more)
You Need More Than a Password to Protect You
Canada - ...a young woman was apparently killed by her laptop last month.
Heather Storey, 25, of Delta died after the small car she was driving was hit by a tow truck turning left.
When investigators looked into the incident, however, they concluded she would have survived if not for her laptop computer.
Storey was on her way out of town for work at the time of the accident and usually kept her laptop in a backpack in the backseat, according to her brother Michael Pratt.
"What we believe happened [was] that she was struck in the back of her head and neck with this laptop computer," RCMP Sgt. Roger Morrow said Wednesday morning at the Surrey detachment, east of Vancouver.
"She simply didn't have it secured within the confines of her car, and ultimately it has been the instrument of her death," he said. (more)
We have too many electronic gadgets these days. We worry more about the information on them than we do about the safety risks they pose. Use common sense. Think ahead. Don't use cell phones while driving. Don't place electronic gadgets on the dashboard or rear deck. Don't wear earphones while driving, and don't wear Bluetooth earpieces while driving or making love. They give the same wrong impression either way.
Heather Storey, 25, of Delta died after the small car she was driving was hit by a tow truck turning left.
When investigators looked into the incident, however, they concluded she would have survived if not for her laptop computer.
Storey was on her way out of town for work at the time of the accident and usually kept her laptop in a backpack in the backseat, according to her brother Michael Pratt.
"What we believe happened [was] that she was struck in the back of her head and neck with this laptop computer," RCMP Sgt. Roger Morrow said Wednesday morning at the Surrey detachment, east of Vancouver.
"She simply didn't have it secured within the confines of her car, and ultimately it has been the instrument of her death," he said. (more)
We have too many electronic gadgets these days. We worry more about the information on them than we do about the safety risks they pose. Use common sense. Think ahead. Don't use cell phones while driving. Don't place electronic gadgets on the dashboard or rear deck. Don't wear earphones while driving, and don't wear Bluetooth earpieces while driving or making love. They give the same wrong impression either way.
"Is this a game of chance?" (update)
..."Not the way I play it, no." ~W.C. Fields
New York - A jury began deliberations on Monday in Brooklyn federal court for the retrial of six men accused in a criminal case of an alleged plan to misuse information announced over brokerage-firm "squawk" boxes.
The case concerns announcements at many Wall Street firms that disclose when customers are about to buy or sell big blocks of stock. Federal prosecutors from the U.S. attorney's office for the Eastern District of New York claim that brokers at Merrill Lynch & Co. (now a part of Bank of America Corp.), Citigroup Inc.'s Smith Barney unit and the old Lehman Brothers Holdings Inc. were paid to leave open telephone lines next to the internal speaker systems at their firms so that traders at the now-defunct A.B. Watley Inc. could secretly eavesdrop on block orders by institutional clients between 2002 and 2004.
Prosecutors say the Watley traders made nearly $1 million by trading ahead of, or front-running, the orders that were broadcast. (more) (background)
New York - A jury began deliberations on Monday in Brooklyn federal court for the retrial of six men accused in a criminal case of an alleged plan to misuse information announced over brokerage-firm "squawk" boxes.
The case concerns announcements at many Wall Street firms that disclose when customers are about to buy or sell big blocks of stock. Federal prosecutors from the U.S. attorney's office for the Eastern District of New York claim that brokers at Merrill Lynch & Co. (now a part of Bank of America Corp.), Citigroup Inc.'s Smith Barney unit and the old Lehman Brothers Holdings Inc. were paid to leave open telephone lines next to the internal speaker systems at their firms so that traders at the now-defunct A.B. Watley Inc. could secretly eavesdrop on block orders by institutional clients between 2002 and 2004.
Prosecutors say the Watley traders made nearly $1 million by trading ahead of, or front-running, the orders that were broadcast. (more) (background)
Business Espionage - Patent Theft Costs
Australia - The Australian Commonwealth Scientific and Research Organisation (CSIRO) has had some more wins in an ongoing legal battle over the use of patented Wi-Fi technology...
Three weeks after Hewlett-Packard reached an agreement with the CSIRO, a spokesman has confirmed that Intel, Dell, Fujitsu, Microsoft and Asus have followed suit. Discussions are continuing with a range of other companies, including Nintendo and Netgear.
...law experts say the settlements could be a windfall for the CSIRO, because of the scale of the unauthorised use of the wireless technology. (more)
UPDATE - 4/23/09 - The Australian Commonwealth Scientific and Industrial Research Organisation (CSIRO) will use the money won from a Wi-Fi technology patent battle to fund further research.
Legal action in the United States between the CSIRO and a number of global computing giants came to an end today, with the last of 14 companies opting for confidential settlements with the scientific agency. (more)
Three weeks after Hewlett-Packard reached an agreement with the CSIRO, a spokesman has confirmed that Intel, Dell, Fujitsu, Microsoft and Asus have followed suit. Discussions are continuing with a range of other companies, including Nintendo and Netgear.
...law experts say the settlements could be a windfall for the CSIRO, because of the scale of the unauthorised use of the wireless technology. (more)
UPDATE - 4/23/09 - The Australian Commonwealth Scientific and Industrial Research Organisation (CSIRO) will use the money won from a Wi-Fi technology patent battle to fund further research.
Legal action in the United States between the CSIRO and a number of global computing giants came to an end today, with the last of 14 companies opting for confidential settlements with the scientific agency. (more)
Labels:
business,
government,
lawsuit,
miscellaneous,
product,
software,
Wi-Fi
Sunday, April 19, 2009
The Cell Phone Jammer Conundrum
Commentary by Richard Roth, Chicago Technology Examiner...
Why would anyone want to “jam” or block a cellular phone? In truth its already done by the federal government in certain areas to prevent the detonation of bombs by simply dialing a lethal number.
However, many businesses would also like to use them as well. Movie theaters and restaurants for one, prisons and financial institutions as well, but in the city of Chicago along with most other municipalities doing so is illegal. In fact, each country has unique laws. The UK and Japan allow you possess but not use jamming technology.
The equipment exists to block cellular networks and also GPS tracking, and can readily be purchased over the internet regardless of the fact it is technically illegal. It is sold by two groups of people. The first are legitimate distributors who and supply the government with cellular and more sophisticated radio frequency signal blocking equipment, and the second group, which is everybody else who imports them for resale, largely from China.
The question is “should civilians or at least business’s be allowed to use this equipment?" If the federal government can, why can’t its citizens? When federal officials make public appearances such as the president’s recent inauguration he was protected from bomb detonated cell phones. Shouldn’t everyone have the right to such protection? (more)
Why would anyone want to “jam” or block a cellular phone? In truth its already done by the federal government in certain areas to prevent the detonation of bombs by simply dialing a lethal number.
However, many businesses would also like to use them as well. Movie theaters and restaurants for one, prisons and financial institutions as well, but in the city of Chicago along with most other municipalities doing so is illegal. In fact, each country has unique laws. The UK and Japan allow you possess but not use jamming technology.
The equipment exists to block cellular networks and also GPS tracking, and can readily be purchased over the internet regardless of the fact it is technically illegal. It is sold by two groups of people. The first are legitimate distributors who and supply the government with cellular and more sophisticated radio frequency signal blocking equipment, and the second group, which is everybody else who imports them for resale, largely from China.
The question is “should civilians or at least business’s be allowed to use this equipment?" If the federal government can, why can’t its citizens? When federal officials make public appearances such as the president’s recent inauguration he was protected from bomb detonated cell phones. Shouldn’t everyone have the right to such protection? (more)
Labels:
amateur,
business,
cell phone,
Hack,
law,
miscellaneous,
mores,
product,
wireless
Subscribe to:
Posts (Atom)