Saturday, October 3, 2009

Alert: Low-Cost GSM Bugs Flood Ebay

GSM bugs are simply tiny cell phones without keypads. Insert a SIM card, hide it, call its phone number and eavesdrop from anywhere in the world.

The lowest cost we've seen is 99 cents, plus $21.99 shipping.

This is a major development in illegal electronic surveillance; amazing as it is scary. Anyone can be a high-tech spy for less than $25.00.

In addition to being packaged as tiny self-contained bugs, they are also being sold on Ebay (and many other Internet locations) hidden in every-day office items like power strips.

Search Ebay to see them... (1) (2)

What Murray Associates is doing about this for their clients...

Digital Surveillance Location Analysis™ (DSLA)

With this new capability we pinpoint and solve several of the most serious information security challenges...
cellular bugs
GPS/GSM tracking devices
rogue equipment and access point loopholes
DSLA is a Murray Associates exclusive -- Sample plot map... (enlarge)

Our new graphic triangulation technique may be...
• employed during our regular Eavesdropping Detection Audits,
• monitored by your security/IT staff on a 24/7 basis,
• or, monitored by Murray Associates for you.
The system is Internet compatible; easily monitored from anywhere.

Security Directors at businesses and government agancies (only) are invited contact us for further details.

One Password Will Hurt You

Nearly half of all Brits (and probably everyone else) use the same password to log in to their online banking account as their social networking account, says CPP.

• Two thirds of web users said it's too difficult to remember numerous logins.
• 17 percent said they were concerned they would get locked out of their account if they forgot their password.

• 40 percent of web users admitted that at least one other person knows their passwords, of these two percent confessed an ex partner has access to their social networking and online banking accounts.
• A third of Brits said they believed that these people may have logged in using their details.

• One in ten Brits has had one of their online accounts hacked, with 57 percent of the crimes happening in 2008.

• Of those that saw their online accounts hacked, 18 percent had goods illegally bought in their name, 12 percent had money stolen while five percent also said they'd had their identity stolen.


Sarah Blaney, identity theft expert at CPP, said: "No sensible person would use the same key for their house, car and garage." (
more)

It's time for half of us to develop a better password strategy.

Friday, October 2, 2009

Did you know...

..after the Russians were caught tapping the State Department, Secretary of State, Madeleine Albright protested by wearing a pin with a giant bug on it? (more)

From her new book, Read My Pins: Stories from a Diplomat's Jewel Box

Spy vs. Spy - Mission Impossible

A tentative settlement has been reached in a lawsuit brought 15 years ago by a former DEA agent who accused a CIA operative of illegally bugging his home...

The lawsuit, brought by Richard A. Horn, accused the CIA of illegally bugging his residence in Rangoon, Burma, when he was stationed there. He alleged that portions of a private phone call were used as an excuse to oust him from that job. Horn, 63, filed suit in 1994. His case has meandered through the court system since. (
more)

*CONTEST* (CLOSED) Help me track down an international spy.

Help me track down an international spy.
I have been chasing this person for over 20 years now.
Over this time, my spy has been seen in these cities, in this order;
but for no longer than a month at a time...

Seoul, South Korea
Barcelona, Spain
Atlanta, Georgia (USA)
Sydney, Australia
Beijing, China
Based on this, what city should I plan on traveling to for my next chance to see this spy again?

First correct answer via e-mail wins a nice prize. ~Kevin

We have a winner!
HZC from Texas, who says... "You should look for him in London, England. And Perhaps if you cant find it there afterwards at Rio de Jainero, Brazil"
Why? Because our spy follows the Olympics!

He will be receiving the really cool "Book of Secrets" Check the "Look inside" at amazon.com to see what it is all about. ~Kevin

Thursday, October 1, 2009

Security Colleague Question #523 - Fireproof Bag

Hi Kevin,
Are you aware of any type of document bag that is fire proof?

Try one of these...
It withstands nearly 2000 degrees of fiery heat for up to 15 minutes! They come in two sizes, lots of colors and with locks...
Locking Bag - Fire-Resist Briefcase
~ Kevin

Wednesday, September 30, 2009

Peru’s Fujimori Pleads Guilty to Wiretaps

Peru - Former Peruvian President Alberto Fujimori pleaded guilty yesterday to charges of wiretapping opponents and paying bribes to lawmakers and publishers during his rule from 1990 to 2000.

Fujimori, 71, will be sentenced to up to eight years in prison tomorrow. (more)

Upon reading our Fujimori post...

Taiwan - President Ma Ying-jeou (馬英九) has ordered national security agencies to conduct a thorough investigation into allegations that wiretapping by intelligence agencies had become rampant since he took office and demanded severe punishment for officials who disobeyed his campaign promise to ban the practice... (more)

SpyCam Story #558 - Missed Fujimori Post

Philippines - The Valenzuela city government will implement two ordinances next month that would regulate liquor businesses and requiring all establishments to install spy cameras within their premises. (more)
FutureWatch...
The beginning of a trend?
Liquor stores... cigarette sellers... gun shops... magazine stands... movie theaters...

SpyCam Story #557 - Saw a Fujimori Once

KY - A former Heartland teacher accused of videotaping underneath cheerleaders' skirts enters a guilty plea. Steve McCuiston, 51, of Murray entered the plea Monday on charges of eavesdropping and evidence tampering... McCuiston formerly taught seventh and eighth grade at Livingston Middle School. He resigned after his arrest. (more)

A Fujimori Kind of Dude

WI - A state appeals court has upheld a Plover man's 25-year prison sentence for sexually assaulting his ex-girlfriend at gunpoint, burglarizing her home and wiretapping her telephone. The man awaits a separate trial on a murder charge involving the woman's suspected lover. (more)

New Contest to be Posted 10/2 @ 12:01 PM EST

Our last contest was such a success we are doing another one.
Be here, Friday, October 2, 2009 at 12:01 PM EST.


"Why the specifics?"

Some of our Security Scrapbook family receive the Scrapbook in digest form via e-mail. To give them a fair shot at "first correct answer received wins," they need some advance notice. ~Kevin

Tuesday, September 29, 2009

Spybusters Tip # 385 - FREE Encrypted Memory Sticks. Roll Your Own!

Step 1 - Go to your junk drawer. Grab one of your regular old USB memory sticks.

Step 2 - Go to
TrueCrypt.org.
Grab their FREE encryption software.


Step 3 - Read the Beginner's Tutorial. Load & Lock.


Ta-daaaa!
Instant FREE encrypted memory stick!!!

(clap, clap, clap)

Thank you.

Kevin
P.S. You can also roll Free Mac/Windows XP/Vista/2000/Linus sticks the same way.
Additional Spybusters Tips.

What's Your Counterespionage Strategy?

via Forbes.com...
The biggest security breaches in corporations these days are employees who have been laid off or who are about to get laid off.

When employees leave an organization on their own terms, particularly in good times, many companies scramble to figure out what they had access to and what the value of that information would be to a competitor. There is a large body of case law in the technology industry involving theft of trade secrets, and globalization has added a new twist because laws in some countries are either unenforceable or nonexistent. But in a downturn where millions of workers are being cut, the scale of th
e problem grows by several orders of magnitude. (more)

Chances are, you don't have a counterespionage strategy...
but, can have one at no extra cost!


Face it, an effective counterespionage strategy is not optional.
You need one.

• Executives of publicly held companies have a fiduciary responsibility to protect intellectual property for stockholders.
• Many businesses must demonstrate compliance with privacy and information security laws. (Fines are costly.)
• Keeping your business information private is profitable.

Bonus... It may not cost you a penny!
If your security budget looks like the one below, you are over-protecting the wrong things. Move some coins from left to right, where they will do more good.

For the cost of your least effective security guard, you could have a basic quarterly counterespionage program. No brainer, right? Call me today. I'll set it all up. ~Kevin

(click to enlarge)
Intangible loss has greater $€£¥ impact than physical property loss.
(FULL PRESS RELEASE VERSION)

Monday, September 28, 2009

Tapping into the Treasury...

Intelligence activities across the U.S. government and military cost a total of $75 billion a year, the nation's top intelligence official said on Tuesday, disclosing an overall number long shrouded in secrecy.

Dennis Blair, the U.S. director of national intelligence, cited the figure as part of a four-year strategic blueprint for the sprawling, 200,000-person intelligence community. (more)

"So, uh for $75 Billion every year we must know everything, right Pop?"