Tuesday, April 17, 2012

How much information about yourself are you putting online?

As a business owner, you are doubly responsible in safekeeping the information you put online. But before you can protect you business data, you need to learn to protect your personal data first.

Read the Trend Micro Digital Lifestyle e-guide, Be Privy to Online Privacy, and be a better informed digital citizen.

You’ll learn:
How online advertisers are tracking your browsing behavior,
The consequences of what you post in your social media.
How mobile apps can access the information stored in your mobile device, if you allow them.

Irony Alert: You'll have to give up some information about yourself to get it. ~Kevin

Cyber Intelligence Sharing and Protection Act of 2011 (CISPA) Protest


Civil liberties organizations are launching a week of Internet-wide protests against the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA), the controversial cybersecurity legislation that would negate existing privacy laws and allow companies to share user data with the government without a court order.

The coalition is urging the public to take part in a Twitter protest directed at their lawmakers. The Electronic Frontier Foundation (EFF) has created an interactive tool for people to find their representatives and their Twitter handles, and to share how CISPA's privacy invasions would affect their day-to-day lives. (more)

Monday, April 16, 2012

Indonesia Now a Business Espionage Target

As Indonesia’s economy soars at an impressive rate and with the defense budget expanding aggressively, several state companies and government agencies have increasingly become targets of espionage.

National Intelligence Agency (BIN) head Lt. Gen. Marciano Norman said recently there were indications that espionage activities have been increasing lately.

“We’re worried with such activities. More resources are now allocated to prevent them. It’s part of my priorities,” Marciano said, refusing to elaborate further. He said there were two Asian countries — one of which is a neighboring nation — that have become more aggressive in spying into Indonesia’s economy. (more)
Belgium - Reuters reported that ArcelorMittal workers involved in a bitter dispute over the closure of furnaces in Belgium pointed the finger at the company after discovering that a union meeting was recorded with a camera pen and after being sent secretly filmed footage of workers.

Belgium's heavy industry has been in decline for years and Liege has been the scene of acrimonious protests by workers after ArcelorMittal, the world's biggest steelmaker, said it planned to close operations there. (more)

A Memory Stick that Self-Destructs

Technology has now created the ultimate USB stick - used by the secret service. If you lose it you can track its location and if it falls into the wrong hands you can even remotely scramble its content. (video) (product)

Sunday, April 15, 2012

What are spies really like?

via the BBC...
Most people have watched a spy film, but few have ever met someone from the intelligence community. So how close are real spies to the Bournes and the Bonds? Peter Taylor looks at the world of the modern day secret agent... (more)



What does a spy look like? There is no exact answer, but a composite picture was developed by the Business Espionage Controls and Countermeasures Association... (more)

The Cybercrime Wave That Wasn’t

via The New York Times...
In less than 15 years, cybercrime has moved from obscurity to the spotlight of consumer, corporate and national security concerns. Popular accounts suggest that cybercrime is large, rapidly growing, profitable and highly evolved; annual loss estimates range from billions to nearly $1 trillion...

Yet in terms of economics, there’s something very wrong with this picture...

...in numeric surveys, errors are almost always upward: since the amounts of estimated losses must be positive, there’s no limit on the upside, but zero is a hard limit on the downside. As a consequence, respondent errors — or outright lies — cannot be canceled out. Even worse, errors get amplified when researchers scale between the survey group and the overall population...

The cybercrime surveys we have examined exhibit exactly this pattern of enormous, unverified outliers dominating the data. In some, 90 percent of the estimate appears to come from the answers of one or two individuals. In a 2006 survey of identity theft by the Federal Trade Commission, two respondents gave answers that would have added $37 billion to the estimate, dwarfing that of all other respondents combined...

Among dozens of surveys, from security vendors, industry analysts and government agencies, we have not found one that appears free of this upward bias. As a result, we have very little idea of the size of cybercrime losses. (more)

Thus proving once again, fear-mongering is profitable.

• Keep a cool head. 
• View the risk holistically. 

Your valuable information was/is available elsewhere, before it is ever entered into a computer.

• Balance your security budgets appropriately. 

Information risk management isn't solely an IT issue... no matter what the IT security vendors and other vested interests tell you. ~Kevin

Thursday, April 12, 2012

Teen Taps Top Cops

A teenager eavesdropped on highly-sensitive police counter-terror conversations after bypassing technology from the 1980s, hackers have claimed.

The leader of an anarchist group known as Team Poison said it was "easy" to drop "a 24-hour phone bomb" on elite security officers...

Is that, at, at, at you Bryce?
In another recording officers appear to be discussing counter-terror operations while Team Poison listens in. The group - which uses the Twitter name @_TeaMp0isoN - claimed the calls were made to MI6 - but it is understood they were in fact picked up by the Metropolitan Police's counter-terrorism command.

Trick, reportedly a 17-year-old who launched Team Poison in 2010, emailed the Press Association, saying the group bypassed outdated technology to compromise a server from Malaysia to record conversations. He wrote: "Yes, it was easy :)"

Trick said: "The phone denial of service was done via a custom script for Asterisk which was installed on an overseas server. The conversation was tapped into via a private phreaking method, their phone system is old and we found a way to get in via basic but private phreaking technique." (more)

Privacy Journal 2012 Privacy Law Compilation Updated

With a surge in the final days of the 2011 session, the California legislature enacted several new privacy protections that clearly keep the state at the top of the privacy-protecting states in the U.S., according to a new survey of the states by Privacy Journal.

The monthly newsletter reports on new privacy laws enacted by states and Congress each year. The information is available in its Compilation of State and FederalPrivacy Laws, updated yearly. (more)

Two Cell Phone Eavesdropping Attacks Reported

 • Security firm Cryptography Research showed how it's possible to eavesdrop on any smartphone or tablet PC as it is being used to make a purchase, conduct online banking or access a company's virtual private network.

• Researchers at security firm McAfee, a division of chipmaker Intel, highlighted several ways to remotely hack into Apple iOS, the operating system for iPads and iPhones.

McAfee's research team remotely activated microphones on a variety of test devices and recorded conversations taking place nearby. They also showed that it's possible to steal secret keys and passwords, and pilfer sensitive data, including call histories, e-mail and text messages.

"This can be done with absolutely no indication to the device user," says Ryan Permeh, McAfee's principal security architect. (more)


Monday, April 9, 2012

IKEA Apologizes to Workers for Spying

 The management of IKEA in France, where workers have sued the company for allegedly spying on employees, admitted that activities contravening its ethical standards had taken place and pledged to put a stop to them. (more)

SpyCam Story #658 - This Week in SpyCam News

SpyCam stories have become commonplace and the techniques used, repetitive. We continue to keep lose track of the subject for statistical purposes, but won't bore you with the details. Only links to the stories will be supplied unless there is something useful to be learned.

Friday, April 6, 2012

UK - Sky News, a 24-hour news channel in the U.K., twice authorized its reporters to hack into emails of suspected criminals but said the actions were "editorially justified" and in "the public interest."

The disclosure adds to the intensified scrutinty of British reporting tactics. Sky News is a unit of British Sky Broadcasting Group PLC, which itself is 39.1%-owned by News Corp., whose U.K. newspapers have been at the center of a storm over reporting methods. (more)

Wheelchair Bug Saves Disabled Child from Cruel Teachers

Two Alabama teachers were caught cruelly taunting and abusing a 10-year-old boy who has celebral palsy after the boy’s mother attached an audio recorder to his wheelchair.

The shocking recording captures two voices chiding Jose Salinas for his ‘disgusting’ drooling and reveals he was left alone with no instruction for long periods of time...

Determined to be sure of what was happening herself she attached a bugging device to Jose’s wheelchair and left it recording over three days. The recording revealed that her son was being cruelly taunted about his disability and ignored for the majority of the day with no-one giving him instruction.

She played the tapes to the school board and the teachers were placed on administrative leave... But within days the teachers were returned to their positions so Salinas and other parents took their children out of the school in protest.

Feeling that ‘nobody was listening’ Salinas took the recordings to her local newspaper and the teachers were placed on leave once again. (more) (audio)

The Woman Who Bugged Her Ex-Boyfriend's Car - Case Closed

WI - Charges are settled for a local woman accused of bugging her ex-boyfriend's car so she could keep tabs on him. 

Jamie Mesang was accused of duct-taping a digital tape recorder underneath a car seat that belonged to her ex. Police say he became suspicious when Mesang started sending text-messages to him about his whereabouts. Eventually he searched his car and found the device, which was recording at that time. 

On Wednesday, Mesang entered a guilty plea. She also admitted she posted a female rival's picture and contact information on a website which led to that woman getting calls from men seeking sexual relationships. But prosecutors agreed to recommend dismissal of the felonies in one year if Mesang stays out of trouble during that time. (more)