Monday, December 13, 2010

Business Lobbyist Drowned in Leaked Wiretaps

India - A fresh batch of leaked recordings of wiretapped phone calls between an Indian corporate lobbyist and her high-profile political and media contacts are aggravating the political turmoil that has paralyzed Parliament.

The tapes show how Niira Radia, a lobbyist for two of the nation's largest conglomerates, industrial titan Tata Group and oil-and-petrochemicals company Reliance Industries Ltd., advanced her clients' interests with friendly journalists and sought to use her connections to influence the formation of the Indian government's cabinet after last year's national elections.
 
Associated Press
Lobbyist Niira Radia being questioned in New Delhi.
The recordings have fueled the unfolding controversy in India over the way the government allocated mobile-phone spectrum to companies in 2008—a process critics describe as a multibillion-dollar heist of taxpayers, in which a few favored companies got bargain prices for a valuable public resource. The tapes have given rise to a debate over the extent to which powerful Indian industrial houses have been favored by close government ties in one of the nation's biggest industries, mobile telecommunications.

The tapes are being examined by investigators to see if they shed light on the spectrum-allotment controversy. (more)

Sunday, December 12, 2010

SpyCam Story #594 - Tap Cappy Defender

Turkey - The lawyer of former Eskişehir police chief Hanefi Avcı -- who is suspected to have illegally wiretapped dozens of individuals -- is accused of having installed a hidden camera in the management room of the apartment building where he currently resides.

Lawyer Fidel Okan, who resides in the Baymak Apartment in Ankara’s Eryaman neighborhood, is said to have installed the camera to record building management meetings. The residents of the building noticed the camera during a recent meeting. (more)

SpyCam Story #593 - Cops Play Hardball

OK - A former Oklahoma City high school coach has admitted to police that he secretly videotaped his girls’ softball team while players changed clothes in the locker room, a police detective reported Wednesday...

Police have been investigating him since May, when the new coach found Hestand’s personal Sony video camera and tapes in the softball equipment room...

Police officers also viewed the tapes and found evidence the girls were recorded on different days in the locker room and that the hidden camera was repositioned to capture a better angle, the detective reported. The officers discovered numerous teenage softball players were recorded in various stages of undress.

“After the softball players leave the room … a male voice asks, ‘Is everyone out?’ After receiving no answer, a hand is shown and the video ends,” the detective wrote. (much more)

Doh! Another spycam'er shoots himself.

Cop Bugs Exam Room - Caught, Testing 1-2-3-4

UK - A senior officer in Scotland Yard's anti-terrorist squad has been sacked after trying to cheat in a promotion exam.

The detective inspector bugged an examination room where rival candidates were being interviewed — but the recorder was discovered when the tape holding it to the bottom of a table came unstuck and it fell to the floor...

The senior officer conducting the interview called the Yard's internal investigations unit to launch an inquiry. The detective inspector had tested the machine earlier by using his own voice and was quickly recognised by colleagues. (more)

Doh! Another bugger shoots himself.

A Brief History of U.S. Tap and Bug Law

Congress enacted the first federal wiretap statute as a temporary measure to prevent disclosure of government secrets during World War I. Later, it proscribed intercepting and divulging private radio messages in the Radio Act of 1927, but did not immediately reestablish a federal wiretap prohibition. By the time of the landmark Supreme Court decision in Olmstead v. United States, 277 U.S. 438 (1928), however, at least forty-one of the forty-eight states had banned wiretapping or forbidden telephone and telegraph employees and officers from disclosing the content of telephone or telegraph messages or both. (more

Extra Credit:

Friday, December 10, 2010

...thus giving Santa a run for his money in the spying department.

If the popularity of spy toys as holiday gifts is any indication, the future of our TSCM services to business and government is secure for decades to come. Kids learn through play.

The only thing that has changed since my last big review in December, 2006 is the sophistication of the toys themselves. There are some amazing gadgets out there this year.

Check out this toy... 
"The Spy Net Secret Mission Video Watch is the ultimate infiltration tool and comes packed with high-tech features. The working video camera and microphone record over 20 minutes of video, 2,000 photos or 4 hours of audio. The watch's full color 1.4" TFT screen lets you watch recorded videos and provides live playback. Onboard memory lets you store your secret evidence, which you can then load onto your home computer with the included USB cable. Video missions are available for download on the cool Spy Net website."

 Only one of their many spy tools for kids...
"Spy Net takes high end electronics and interactive gadgets and puts them in the hands - and on the wrists! - of burgeoning young secret agents. For undercover surveillance, detection and communication, Spy Net provides all the technology you'll need to tackle any secret mission!"

Think this is a myth meme? 
Google "spy toys for kids" you will see about 756,000 results in .2 seconds. (sing-a-long)

Third Man Spy Gets First Memorial Plaque

Russia on Thursday unveiled a memorial plaque to British double agent Kim Philby at the headquarters of the Foreign Intelligence Service in Moscow, the Echo of Moscow radio station reported.

Philby, who died in 1988, was a decorated member of British intelligence who worked as a spy for the Soviet Union. He was exposed in 1963 as one of the so-called Cambridge Five spy ring and defected to Moscow. (more) (historical video) (The Third Man)



SpyCam Story #592 - The Eggman, superhero.

Anonymous for Animal Rights, an Israeli nonprofit dedicated to exposing cruelty in factory farms, has done something truly revolutionary. Instead of sending in an undercover volunteer to collect horrific footage at slaughterhouses and Confined Animal Feeding Operations (CAFOs), the group has installed a web camera at an egg farming facility to stream the cruelty live. 
 

And because factory farms are so enormous and indistinguishable, the farmers can’t find the camera.

This ingenious move is part of a larger, ongoing campaign by Anonymous to outlaw battery cages for egg laying hens in Israel. These cages mean that hens spend their entire lifetime in a space smaller than even a page of a trade paperback book—about 550 square centimeters. Click on the link and you’ll see the daily life of egg laying hens, crammed three (or more) to a cage. They can’t spread their wings, bathe in dust, forage, fly, run, or engage in any of their natural behaviors. They don’t even get to stand on solid ground — their feet poke through the gaping wire mesh they’re forced to stand on, twenty four hours a day, seven days a week. (more)

SpyCam Story #591 - The Nappyman, supercreep

Nappie fetish copycat.
Australia - A man who filmed naked boys in a changeroom at a swimming centre with a camera hidden in his bag has been sentenced to at least 18 months' jail.

The Adelaide District Court heard Julius Fabian Ohmer, 31, had been secretly filming children at the Elizabeth Aquadome for some time before he was arrested by police last November.

Ohmer was also found to have more than 200,000 images and films of child pornography at his home and the court heard he had a sexual fetish for nappies.

Judge Rosemary Davey said she was revolted by the offending. (more)

Wednesday, December 8, 2010

Hamlet with Headphones

Canada - A file folder opens to reveal surveillance photos of a young couple embracing. Around the periphery of a government office, blocky security guards stand vigilant, occasionally opening their briefcases to reveal eavesdropping equipment. The forces of paranoia have won.

If each generation gets the Hamlet it deserves, then the National Theatre’s much-lauded version, which will be shown in Canadian movie theatres Thursday, is WikiLeaks set in Denmark. The older generation, desperate to maintain power, feels the world shifting irrevocably beneath its feet. (more) (trailer)

Kevin's advice... "Give thy thoughts no tongue."
- William Shakespeare, Hamlet, 1.3

Security Director Budget Booster - The Value Of Corporate Secrets

Here are the findings from a Forrester Consulting paper on the value of corporate secrets.

Secrets comprise two-thirds of the value of firms’ information portfolios. Despite the increasing mandates enterprises face, custodial data assets aren’t the most valuable assets in enterprise information portfolios. Proprietary knowledge and company secrets, by contrast, are twice as valuable as the custodial data. And as recent company attacks illustrate, secrets are targets for theft.

Compliance, not security, drives security budgets. Enterprises devote 80% of their security budgets to two priorities: compliance and securing sensitive corporate information, with the same percentage (about 40%) devoted to each. But secrets comprise 62% of the overall information portfolio’s total value while compliance related custodial data comprises just 38%, a much smaller proportion. This strongly suggests that investments are over-weighed toward compliance.
 
Firms focus on preventing accidents, but theft is where the money is. Data security incidents related to accidental losses and mistakes are common but cause little quantifiable damage. By contrast, employee theft of sensitive information is 10 times costlier on a per-incident basis than any single incident caused by accidents: hundreds of thousands of dollars versus tens of thousands.
 
The more valuable a firm’s information, the more incidents it will have. The “portfolio value” of the information managed by the top quartile of enterprises was 20 times higher than the bottom quartile. These high value enterprises had four times as many security incidents as low-value firms. High-value firms are not sufficiently protecting data from theft and abuse by third parties. They had six times more data security incidents due to outside parties than low-value firms, even though the number of third parties they work with is only 60% greater.
 
CISOs do not know how effective their security controls actually are. Regardless of information asset value, spending, or number of incidents observed, nearly every company rated its security controls to be equally effective — even though the number and cost of incidents varied widely. Even enterprises with a high number of incidents are still likely to imagine that their programs are “very effective.” We concluded that most enterprises do not actually know whether their data security programs work or not. (more)

Need help. Call us.

SpyCam Story #591 - You can stop saluting now.

Australia - An army corporal has gone on trial accused of putting a tiny camera in women's showers at his barracks.

Prosecutors told Adelaide Magistrates Court Nathan William Freeman disguised a tiny camera as a car remote control and put it in the women's showers at Woodside army barracks in the Adelaide Hills last December.

A police analysis of the footage allegedly showed Freeman putting the device in the shower. (more)

Doh! Another spycam'er shoots himself.

Stolen Laptop Reward... Drugs

PA - A Philadelphia man used his skills as an advertising executive to devise a unique way of getting back his stolen laptop... Surveillance video captured the robbery on tape... Refusing to take the robbery lying down, Kurt Shore devised a campaign to find the missing notebook.

First, he posted the surveillance video on the Philly-based website wheresthefairness.com with hopes of getting attention for his cause. The same video also went to YouTube, announcing a reward of an ounce of marijuana.

He then printed and posted posters offering a “fabulous drug stash” to whoever returned the computer.

Shore isn’t actually offering drugs. The bottom of the poster reads “Actual reward may vary.” (more)

The Wrong Question

I am asked some really odd security questions. Take this one from a media editor, for example…

“I’ve been reading various articles in which experts are quoted as saying that terrorism is a threat that is just as important as malware to corporations. But I’m not sure whether that is the case, or if it is, what terrorism means in the enterprise context. Also, how can corporate terrorism be guarded against?”

She was right. The debate didn’t make sense. She smelled a rat and was double-checking. I asked her to bear with me while I steered the discussion back to sanity. I began…

Malware is annoying and can be damaging, but keep it in perspective. It won’t sink your ship. A “terrorist spending vs. IT spending” debate also misses the mark... The welfare of the employees and their companies is better served with an “intellectual assets spending vs. IT spending” debate. (more)

Tuesday, December 7, 2010

Why you want us on your team in 2011...

“The secret of business is to know something that nobody else knows.”
—Aristotle Onassis (1906-1975)

You know some things.
We help you keep them confidential.
Have us check your offices for bugs, taps and more in 2011.
—Kevin D. Murray, counterespionage.com