Monday, November 25, 2013
Shop Owner Installs Surveillance Cameras to... watch the police!?!?
A Miami convenience store owner is fed up with his employees and
customers being allegedly harassed by police. So he installs
surveillance video to get evidence against the local cops. (more)
Help The OSS Society Pass a Law (It's easy.)
What is The OSS Society?
The Office of Strategic Services Society celebrates the historic accomplishments of the OSS during World War II, the first organized effort by the United States to implement a centralized system of strategic intelligence and the predecessor to the US intelligence and special operations communities. It educates the American public regarding the continuing importance of strategic intelligence and special operations to the preservation of freedom in this country and around the world.
Why pass a law?
The OSS was the World War II predecessor to the U.S. intelligence and special operations communities. It was founded and led by the legendary General William "Wild Bill" Donovan, the only American to receive our nation's four highest military honors, including the Medal of Honor. President Roosevelt called General Donovan his "secret legs."
When General Donovan died in 1959, President Eisenhower said: "What a man! We have lost the last hero."
It's time to honor the "last hero" and all the heroes of the OSS with the Congressional Gold Medal. (more)
Click each link below to show support...
S. 1688 and H.R. 3544: A bill to award the Congressional Gold Medal to the members of the Office of Strategic Services (OSS), collectively, in recognition of their superior service and major contributions during World War II.
The Office of Strategic Services Society celebrates the historic accomplishments of the OSS during World War II, the first organized effort by the United States to implement a centralized system of strategic intelligence and the predecessor to the US intelligence and special operations communities. It educates the American public regarding the continuing importance of strategic intelligence and special operations to the preservation of freedom in this country and around the world.
Why pass a law?
The OSS was the World War II predecessor to the U.S. intelligence and special operations communities. It was founded and led by the legendary General William "Wild Bill" Donovan, the only American to receive our nation's four highest military honors, including the Medal of Honor. President Roosevelt called General Donovan his "secret legs."
When General Donovan died in 1959, President Eisenhower said: "What a man! We have lost the last hero."
It's time to honor the "last hero" and all the heroes of the OSS with the Congressional Gold Medal. (more)
Click each link below to show support...
S. 1688 and H.R. 3544: A bill to award the Congressional Gold Medal to the members of the Office of Strategic Services (OSS), collectively, in recognition of their superior service and major contributions during World War II.
Bond Car Submarines at Auction
A car that transformed into a submarine in
the James Bond movie "The Spy Who Loved Me" has been sold at a London
auction for 550,000 pounds ($865,000).
The sale price was below the auction house's initial estimate price of 650,000 to 950,000 pounds — perhaps because the vehicle (a distinctively-shaped white Lotus Esprit) cannot be driven on the road, although it is said to be a fully operational submarine. (more)
The sale price was below the auction house's initial estimate price of 650,000 to 950,000 pounds — perhaps because the vehicle (a distinctively-shaped white Lotus Esprit) cannot be driven on the road, although it is said to be a fully operational submarine. (more)
Friday, November 22, 2013
REPORT: Corporate Espionage Against Nonprofit Organizations
How common is corporate espionage against nonprofits?
Most of the cases of corporate espionage we know about in recent years have been uncovered by accident. There has been no comprehensive, systematic effort by federal or state government to determine how much corporate espionage is actually occurring, and what tactics are being used. It is likely that corporate espionage against nonprofits occurs much more often than is known.
Who actually conducts the espionage?
When a nonprofit campaign is so successful that it may impair a company’s profits or reputation, companies may employ their own in house espionage capabilities, or they may retain the services of an intermediary with experience in espionage...
The intermediary may hire a private investigations firm that either has multiple espionage capacities or that specializes in the particular kind of intelligence needed – such as human intelligence and the infiltration of nonprofits, or electronic or physical surveillance. These private investigations firms may subcontract out espionage to experienced operatives, which gives corporations access to specialized talent while further increasing the level of plausible deny-ability...
Corporations may also hire the services of experienced nonprofit infiltrators who may pose as volunteers, to scout out workplaces and to steal documents left unattended or unguarded. Corporate spies may also plant bugs to obtain and transmit verbal communication. Both offices and homes may be targeted for the gathering of physical intelligence. (more)
Security Directors: FREE Security White Paper - "Surreptitious Workplace Recording ...and what you can do about it."
Most of the cases of corporate espionage we know about in recent years have been uncovered by accident. There has been no comprehensive, systematic effort by federal or state government to determine how much corporate espionage is actually occurring, and what tactics are being used. It is likely that corporate espionage against nonprofits occurs much more often than is known.
Get the "T" |
When a nonprofit campaign is so successful that it may impair a company’s profits or reputation, companies may employ their own in house espionage capabilities, or they may retain the services of an intermediary with experience in espionage...
The intermediary may hire a private investigations firm that either has multiple espionage capacities or that specializes in the particular kind of intelligence needed – such as human intelligence and the infiltration of nonprofits, or electronic or physical surveillance. These private investigations firms may subcontract out espionage to experienced operatives, which gives corporations access to specialized talent while further increasing the level of plausible deny-ability...
Corporations may also hire the services of experienced nonprofit infiltrators who may pose as volunteers, to scout out workplaces and to steal documents left unattended or unguarded. Corporate spies may also plant bugs to obtain and transmit verbal communication. Both offices and homes may be targeted for the gathering of physical intelligence. (more)
Security Directors: FREE Security White Paper - "Surreptitious Workplace Recording ...and what you can do about it."
Recent Technological Innovations Have Completely Changed the Game of Espionage
According to the FBI, competitors criminally seek economic intelligence by aggressively recruiting employees and conduct economic intelligence through bribery, cyber attacks, theft of property, dumpster diving and wiretapping.
They also establish seemingly-innocent business relationships between foreign companies and U.S. industries to gather economic intelligence, including trade secrets.
Technologies Used for Espionage
Many of the technologies now used for espionage are just updated versions of previous technology: smaller, lighter and orders of magnitude more powerful.
They also establish seemingly-innocent business relationships between foreign companies and U.S. industries to gather economic intelligence, including trade secrets.
Technologies Used for Espionage
Many of the technologies now used for espionage are just updated versions of previous technology: smaller, lighter and orders of magnitude more powerful.
- Spying Equipment
- Spy Cameras
- Lock Picks
- Computer Hacking
- Network Intrusion
- Video Pen Cameras
- Miniature Cameras
- Mobile Phone Spy Gadgets
- Call Recorders
- SIM Card Readers
- Stun Guns Looking Like Cell Phones
- Telebugs
- Bionic Ear Boosters
- Voice Changers
- Audio Jammers
- Wireless Video Cameras
- Pinhole Video Cameras
- Google Glass type sunglasses, or glasses that record video, pictures and sound
- Asset Tracking Devices
- GPS Tracking Devices
- Cellphone Detectors
- Bug Detectors
- Thermal Vision
- Surveillance Cameras (more)
Wednesday, November 20, 2013
Audio Surveillance Laws (Party Consent) by State
Mass Surveillance Is Big Business: Corporations Are as Good at Spying as Governments
Data is the currency of surveillance, and it's not just the NSA and GCHQ looking to cash in. As a newly released cache of documents and presentation materials highlights, the private surveillance industry is booming. More shocking is that many firms claim in their own corporate PowerPoints that they've got capabilities that rival that of the government giants.
The document trove, called the Surveillance Industry Index (SII) and released by Privacy International, and contains 1,203 documents from 338 companies in 36 countries, all of which detail surveillance technologies...
Of course, that world isn't open to average consumers, which is why SII—and previously, Wikileaks' Spy Files, among others—is eye-opening. What's even more concerning than systems that guarantee "complete data inflow from all networks" is who's buying it. And while all the brochures I've read so far are careful to specify that surveillance tech is only for legal data collection, "legal" is a very fluid term worldwide...
There's a very good reason that the UN High Commissioner called privacy a human right earlier this year: The vast tools available to people with enough money and network access are more capable of accessing private information than ever before...
"There is a culture of impunity permeating across the private surveillance market, given that there are no strict export controls on the sale of this technology, as there on the sale of conventional weapons," Matthew Rice, a research consultant with Privacy International, told The Guardian. (more)
The document trove, called the Surveillance Industry Index (SII) and released by Privacy International, and contains 1,203 documents from 338 companies in 36 countries, all of which detail surveillance technologies...
Of course, that world isn't open to average consumers, which is why SII—and previously, Wikileaks' Spy Files, among others—is eye-opening. What's even more concerning than systems that guarantee "complete data inflow from all networks" is who's buying it. And while all the brochures I've read so far are careful to specify that surveillance tech is only for legal data collection, "legal" is a very fluid term worldwide...
There's a very good reason that the UN High Commissioner called privacy a human right earlier this year: The vast tools available to people with enough money and network access are more capable of accessing private information than ever before...
"There is a culture of impunity permeating across the private surveillance market, given that there are no strict export controls on the sale of this technology, as there on the sale of conventional weapons," Matthew Rice, a research consultant with Privacy International, told The Guardian. (more)
Tuesday, November 19, 2013
Business Espionage - IKEA Snooping Investigation Continues
French police are questioning top executives of the Swedish furniture chain IKEA after allegations that the company illegally used police files to spy on staff and customers.
The arrests of the chief executive officer of IKEA France, Stefan Vanoverbeke, his predecessor, and the chief financial officer, come after more than a year and a half of investigations.
Police searched the company’s head office outside Paris 11 days ago. (more)
The arrests of the chief executive officer of IKEA France, Stefan Vanoverbeke, his predecessor, and the chief financial officer, come after more than a year and a half of investigations.
Police searched the company’s head office outside Paris 11 days ago. (more)
Monday, November 18, 2013
Snooping on Credit Cards with Shopping Carts
Researchers at the University of Surrey, UK have successfully used readily available and inexpensive electronic components, combined with a shopping cart antenna, to eavesdrop on NFC and HF RFID contactless communication.
The shopping cart did not perform as well as a small inductive loop antenna (that could be concealed with the electronics in a backpack) but neither are likely to arouse suspicion.
The researchers say that the eavesdropping distance can be as much as 100cm but is dependant on the strength of the magnetic field generated by the victims device.
Companies like VISA, Mastercard and Google who have already developed platforms for contactless payments can now add eavesdropping to the existing security threats of skimming and relay attacks. Original paper here (PDF).
The shopping cart did not perform as well as a small inductive loop antenna (that could be concealed with the electronics in a backpack) but neither are likely to arouse suspicion.
The researchers say that the eavesdropping distance can be as much as 100cm but is dependant on the strength of the magnetic field generated by the victims device.
Companies like VISA, Mastercard and Google who have already developed platforms for contactless payments can now add eavesdropping to the existing security threats of skimming and relay attacks. Original paper here (PDF).
Labels:
cautionary tale,
data,
eavesdropping,
FutureWatch,
Hack,
RFID,
spybot,
weird
Sunday, November 10, 2013
Seattle, where a java junkie hanging on a light pole won't be alone.
If you're walking around downtown Seattle, look up: You'll see off-white boxes, each one about a foot tall with vertical antennae, attached to utility poles. If you're walking around downtown while looking at a smartphone, you will probably see at least one—and more likely two or three—Wi-Fi networks named after intersections: "4th&Seneca," "4th&Union," "4th&University," and so on.
That is how you can see the Seattle Police Department's new wireless mesh network, bought from a California-based company called Aruba Networks, whose clients include the Department of Defense, school districts in Canada, oil-mining interests in China, and telecommunications companies in Saudi Arabia.
The question is: How well can this mesh network see you? (more)
That is how you can see the Seattle Police Department's new wireless mesh network, bought from a California-based company called Aruba Networks, whose clients include the Department of Defense, school districts in Canada, oil-mining interests in China, and telecommunications companies in Saudi Arabia.
The question is: How well can this mesh network see you? (more)
Vegas, where a drunk hanging on a light pole won't be alone.
What happens in Vegas stays... with the authorities?
Las Vegas is installing Intellistreets, which are street lights that have many talents -- including the ability to record sound and shoot video. (video report)
Las Vegas is installing Intellistreets, which are street lights that have many talents -- including the ability to record sound and shoot video. (video report)
Economic Espionage: Competing For Trade By Stealing Industrial Secrets
In September 2012 FBI agents in Kansas City, Missouri, arrested two Chinese nationals, Huang Ji Li and Qi Xiao Guang, after they paid $25,000 in cash for stolen trade secrets pertaining to an American company’s manufacture of cellular-glass insulation, or foam glass.
Huang trespassed onto the company’s flagship plant in Sedalia, Missouri, 3 months prior and asked suspiciously detailed questions about the facility’s manufacturing process for the insulation. It also is believed he approached an employee at the company’s corporate headquarters in Pittsburgh, Pennsylvania, just days before seeking to build a foam-glass factory in China.
A judge sentenced Huang to 18 months in prison and a $250,000 fine in January 2013 and Qi, Huang’s interpreter, to time served, a $20,000 fine, and deportation. During sentencing, company officials estimated the value of the targeted trade secrets at $272 million.
The threat of economic espionage and theft of trade secrets to U.S.-based companies is persistent and requires constant vigilance. Even after Huang was arrested, pled guilty, and was sentenced, investigators believed the company’s trade secrets still were at risk for targeting by would-be competitors. (more)
Huang trespassed onto the company’s flagship plant in Sedalia, Missouri, 3 months prior and asked suspiciously detailed questions about the facility’s manufacturing process for the insulation. It also is believed he approached an employee at the company’s corporate headquarters in Pittsburgh, Pennsylvania, just days before seeking to build a foam-glass factory in China.
A judge sentenced Huang to 18 months in prison and a $250,000 fine in January 2013 and Qi, Huang’s interpreter, to time served, a $20,000 fine, and deportation. During sentencing, company officials estimated the value of the targeted trade secrets at $272 million.
The threat of economic espionage and theft of trade secrets to U.S.-based companies is persistent and requires constant vigilance. Even after Huang was arrested, pled guilty, and was sentenced, investigators believed the company’s trade secrets still were at risk for targeting by would-be competitors. (more)
Corporate espionage: The spy in your cubicle
Corporate espionage from a German perspective...
At a trade fair, the head of a company discovers a machine developed by his own employees - but at the stand of a competitor, where the new item is proudly displayed. Looking through his company's inventory, he sees four new printers, even though he in fact ordered five. And to top things off, he's having problems with the state prosecutors, who say his firm is implicated in a bribery charge. His company, in short, has fallen victim to industrial espionage - three times over.
Since 2001, some 61 percent of German companies have fallen prey to these or similar crimes. In 2013, by comparison, just 45 percent of German firms were entangled in such an affair. Those were the conclusions of a study conducted by business consulting giant PricewaterhouseCoopers (PCW) together with Martin Luther University in Halle-Wittenberg (MLU). For the study, more than 600 German companies, each with at least 500 employees, were examined every two years...
...in the areas of "industrial espionage, economic espionage and the leaking of work and business secrets," there have been frighteningly high numbers of suspected cases. And there could be far more, the analyst added, since being spied upon doesn't necessarily mean that you know it's happening. Corruption ends with prosecutors knocking at the door; an inventory check usually clears up theft. But with spying, "Nothing is gone." (more)
Part of the Security Scrapbook's reason for being is that last sentence. Tracking some of the business espionage stories per year indicates the size of the problem.
Example: If 1% of business espionage is discovered, and 1% of discovered business espionage becomes news, then 50 business espionage news stories equals 500,000 business espionage attacks — 499,950 of which were successful. Adjust the percentages to suit yourself, but you get the idea.
The point is, you won't know when your intellectual and strategic pockets are being picked. Especially, if you are not checking regularly.
Call me. I can help.
At a trade fair, the head of a company discovers a machine developed by his own employees - but at the stand of a competitor, where the new item is proudly displayed. Looking through his company's inventory, he sees four new printers, even though he in fact ordered five. And to top things off, he's having problems with the state prosecutors, who say his firm is implicated in a bribery charge. His company, in short, has fallen victim to industrial espionage - three times over.
Since 2001, some 61 percent of German companies have fallen prey to these or similar crimes. In 2013, by comparison, just 45 percent of German firms were entangled in such an affair. Those were the conclusions of a study conducted by business consulting giant PricewaterhouseCoopers (PCW) together with Martin Luther University in Halle-Wittenberg (MLU). For the study, more than 600 German companies, each with at least 500 employees, were examined every two years...
...in the areas of "industrial espionage, economic espionage and the leaking of work and business secrets," there have been frighteningly high numbers of suspected cases. And there could be far more, the analyst added, since being spied upon doesn't necessarily mean that you know it's happening. Corruption ends with prosecutors knocking at the door; an inventory check usually clears up theft. But with spying, "Nothing is gone." (more)
Part of the Security Scrapbook's reason for being is that last sentence. Tracking some of the business espionage stories per year indicates the size of the problem.
Example: If 1% of business espionage is discovered, and 1% of discovered business espionage becomes news, then 50 business espionage news stories equals 500,000 business espionage attacks — 499,950 of which were successful. Adjust the percentages to suit yourself, but you get the idea.
The point is, you won't know when your intellectual and strategic pockets are being picked. Especially, if you are not checking regularly.
Call me. I can help.
Friday, November 8, 2013
Private Investigator + Software Firm = Cell Phone Spyware Arrest
India - The Central Crime Branch (CCB) police arrested two persons, who allegedly used a software to collect confidential and personal data of cellphone users, for detective purposes...
The preliminary investigation has revealed that several mobile numbers of clients all over India have been snooped upon over the past year, the police said.
[The] firm was allegedly involved in using snooping software on Android and Blackberry based mobile phones. The firm was allegedly monitoring phone calls and messages of people, on behalf of their clients for detective purposes...
Once the software is installed and whenever user starts using the mobile, all data pertaining to his calls including conversation recordings / messages / e-mails, chats, picture and videos on the mobile phone would be automatically uploaded to a server hosted somewhere else using the target mobile phone’s GPRS data.
Even the exact geographical movements of the target in terms of latitude and longitude would be recorded and sent to the server in real time. The clients of detective agencies would be provided with a login username and password to view the data and movements of target’s mobile phone on a web browser and Google maps. (more)
The preliminary investigation has revealed that several mobile numbers of clients all over India have been snooped upon over the past year, the police said.
[The] firm was allegedly involved in using snooping software on Android and Blackberry based mobile phones. The firm was allegedly monitoring phone calls and messages of people, on behalf of their clients for detective purposes...
Once the software is installed and whenever user starts using the mobile, all data pertaining to his calls including conversation recordings / messages / e-mails, chats, picture and videos on the mobile phone would be automatically uploaded to a server hosted somewhere else using the target mobile phone’s GPRS data.
Even the exact geographical movements of the target in terms of latitude and longitude would be recorded and sent to the server in real time. The clients of detective agencies would be provided with a login username and password to view the data and movements of target’s mobile phone on a web browser and Google maps. (more)
Labels:
amateur,
cell phone,
eavesdropping,
PI,
spyware,
tracking
Subscribe to:
Posts (Atom)