Monday, June 20, 2016

Spycam, Blackmail and a former Waffle House CEO (surprise ending)

Mye Brindle, a housekeeper for Joe Rogers, former CEO of the Waffle House restaurant chain, was indicted on Friday, for allegedly trying to extort millions of dollars from her boss. 
 
Her lawyers, John Butters and David Cohen, were charged as well. According to the Associated Press, all three were indicted for secretly videotaping Brindle and Rogers having sex in Rogers’ home, and then trying to blackmail him with the recording...

Records indicated that the video, made with a spy camera Brindle received from a private investigator, did not show that Brindle did anything against her will.

Secretly recording someone in their bedroom is considered eavesdropping, which is a felony in Georgia.

Brindle, Butters, and Cohen are all charged with conspiracy to commit extortion, conspiracy to commit unlawful eavesdropping, and eavesdropping, each facing a sentence of up to five years of incarceration. more

The Future of Eavesdropping Past – The Thought Recorder

ELECTRICAL EXPERIMENTER May, 1919
Click to enlarge.

Tuesday, June 14, 2016

Active Shooter: This 5-Minute Video Could Save Your Life

Run. Hide. Fight.


More Tips
Former Secret Service agent warns: You are the soft targets | Fox News Video

Follow the general "if you see something, say something".

Reminder of what you should do to be "situationally aware":
• Report suspicious activity to your local law enforcement agency.
• If you think there's an imminent threat use 911, otherwise call law enforcement on their local lines.
• Threats to the President or Vice President should go to the Secret Service first if there's time.
• Describe, to the best of your ability, specifically what you heard or observed, including:
      - Who or what you saw;
      - When you saw it;
      - Where it occurred; and
      - Why you believe it's suspicious.

It is better to report and be wrong than to not report and have a potentially serious incident occur. Let Law Enforcement (LE) be the deciding factor.

Make sure you ALWAYS look for a second exit when entering a building. This is not just in case of terrorism, robbery, etc., but in case there's a fire.

Resource materials for security directors:
1. IF YOU SEE SOMETHING, SAY SOMETHING. Department of Homeland Security

2. Active Shooter Guide - FEMA

3. Operational Templates and Guidance for EMS Mass Incident Deployment

4. The First Responder Guidance for Improving Survivability in Improvised Explosive Device and/or Active Shooter Incidents (DHS)

5. Mass Casualty Management Systems – World Health Organization

6. Active Shooter Study: Quick Reference Guide (FBI)

Tuesday, June 7, 2016

Video Voyeur Spycam Incidents Still Running at High Levels

AR - Police in Greenwood, AR arrested a man on Sunday after he was accused of recording women in a restaurant bathroom, says a 5 News Online report. Authorities were notified after a 10-year-old girl found a hidden cell phone that had been recording video in the women’s bathroom at El Palenque. more

AR -  A Lowell man pleaded not guilty Monday to charges accusing him of secretly recording in a men's bathroom. more

DE - Police in Milltown, Delaware, are investigating a hidden camera found in the women’s bathroom of Moe’s Southwest Grill that contained video clips of over 100 women and even an little girl. The bathroom camera was discovered after a restaurant employee overheard a man discussing the camera. The camera was found fastened to a garbage can in the women’s restroom. Along with the camera a power source and a memory card was discovered. more

FL - Authorities found cameras disguised as wall-mounted coat hooks in at least three public bathrooms in and around the Florida Keys, according to a new report. Over the last week the hidden devices were discovered in the women’s room of a Circle K outlet, the girls’ room in a park at Anne’s Beach, and the women’s room at Harry Harris Park, police said this week. more

FL - Authorities arrested David Newell, 55, after a female friend of the jail informant told officials she had rented a room from Newell but moved out after she said she found cameras within the walls of the room. Authorities obtained a search warrant Thursday morning for Newell's Southport home, where they found camera wires in the walls and a camera in Newell's closet. Investigators say they also found a large, underground room in his backyard. more

OH - He'll be back in court next Tuesday. Bond for 65-year-old Jerry Rowe is being kept at $20,000. Rowe was arrested last week after cameras were found installed in the bathrooms of five women at the Steeplechase apartments where Rowe was a maintenance worker. According to the sheriff's office, one of the cameras captured Rowe installing it. more

Until Your Offices Look Like This, Keep Your TSCM Inspections Current

Dutch firm MVRDV recently completed an unusual project in Hong Kong that involved the gutting of an existing factory interior and its replacement with all-glass office spaces. Featuring glass walls, glass floors, and glass tables, 133 Wai Yip Street is conceived as a new working space for the business with nothing to hide.

Click to enlarge.
While glass architecture is not too unusual in itself, the 13-floor 133 Wai Yip Street building goes to remarkable lengths in the pursuit of transparency...

In MVRDV's model office (Arch-Innovativ was also involved in the project), music booms out of glass-encased speakers and computers rest on glass computer stands. Glass elevators also move through glass elevator shafts, and even the emergency fire-stairs are encased in (fire-retardant) glass.

"We are moving into a transparent society, businesses are becoming more open with the public, and people care more about what goes on behind closed doors," reckons MVRDV co-founder Winy Maas. "In that way, a clear workspace leaves nothing questionable, nothing hidden; it generates trust. But also it is an opportunity for the building to become a reminder of the industrial history of the neighborhood, monumentalized in a casing of glass." more

Monday, June 6, 2016

Spybuster Tip # 845: How to Give Google Amnesia

Did you know, you can tell Google to forget everything you said to it, searched on it, and watched on YouTube?

Visit your Web and Activity Page.
  • Look for the three dots in the upper right corner. Click on them.
  • Then, click on Delete Web & App Activity. 
  • Click Advanced. 
  • Click Select Date.
You can take it from there!
~Kevin

NSA's Untangling the Web, A Guide to Internet Research

Want to learn how to search like a spy? 
This 600+ page tome will help you do it.

Untangling the Web, A Guide to Internet Research – has just been declassified, to satisfy a Freedom of Information Request. Download the irony here.

(Originally posted in 2013. Back by popular demand.)

Business Espionage Alert: Select Your Hotel Carefully

You are a business executive or a member of the government with sensitive data on your laptop computer. You check into a luxury hotel in the United States or in many other countries. Chances are this hotel may be owned by a Chinese company even though it carries a known western brand name. Often such investors get their money directly from the Chinese Government.

You connect your computer to the hotel wifi and you may notice your secure connection can no longer be secure. Ever noticed wanting to send an email using your own domain, and you have to unblock "authentication" to make it work while connected to a hotel network? Did you ever wonder how this could open up your computer data to foreign espionage? You are no longer the only one worrying...

Chinese global investments in tourism, specifically in name brand luxury hotels and resorts is overwhelming. This is the same for Chinese investments in the United States, as it is for Chinese domination in Cuba, South America, India, South East Asia and many African countries...

A review of the Chinese $1.95-billion acquisition of New York's Waldorf-Astoria Hotel in 2014, possibly recognizing that the hotel's role as the official residence of the U.S. ambassador to the United Nations and the frequent lodging for U.S. and foreign dignitaries with business in New York made it a prime target of CFIUS (The Committee on Foreign Investment in the United States). No action by US authorities were taken...

The next time you travel on business, you have sensitive data on your computer that could lead to industrial espionage attacks, or you are a government official with data you don't want to get into Chinese hands, select your hotel carefully. more

Russian Hi-Tech Spy Devices Under Attack Over Privacy Fears

New Russian technologies, including phone call interception and a facial recognition app, have stirred a fierce debate about privacy and data monitoring. 
 
Infowatch, a Moscow-based IT security company managed by businesswoman Natalya Kasperskaya, found itself in hot water last month after it revealed it had invented a system that companies can use to intercept employees' mobile phone conversations...

The goal behind phone call interception, Kasperskaya said, is to provide large businesses with a tool to prevent information leaks, including companies whose success depends on protecting corporate secrets. more

34 Officials Pardoned for Wiretapping 20,000 People... now unpardoned.

President Gjorge Ivanov on Monday revoked pardons he had granted to 34 officials implicated in a wire-tapping scandal that has thrown Macedonia into political turmoil, meeting demands from the opposition, the European Union and the United States.

In an EU-brokered deal last year, Macedonia's political parties agreed to hold an early election and that a special prosecutor should investigate allegations that former prime minister Nikola Gruevski and his close allies authorized eavesdropping on more than 20,000 people.

Ivanov's decision in April to pardon 56 officials prosecuted over their involvement in the scandal drew nationwide protests that led to the cancellation of an election set for June 5. more

Thursday, June 2, 2016

Book - "Accidental P.I." by David B. Watts - Very Non-Fiction. Very Good.

Accidental P.I. takes you on a thrill ride following the fifty-year professional career of Private Investigator David Watts, as his life story treats you to these experiences and more. From murder, rioting, gambling and drug raids to sex cases, and fraud, this behind-the-scenes peek at real-life cases shows how investigators get the job done—not like in the movies or on television.

David Watts entered the investigative field as a young New Jersey policeman at the beginning of the turbulent 1960s. His descriptions of the seedier side of the cultural revolution during that era is riveting . . . and you get to go along for the ride! Switching to the private sector, armed with a Super 8 camera, he had the guts to quit law enforcement and start his own business in 1976 and has been at it ever since...

About the Author 
David B. Watts, a licensed private investigator for the past four decades, specializes in fraud and business investigations. He and Linda, his wife of 53 years, worked for major law firms and the Fortune 500 in the busy New York to Philadelphia corridor on cases ranging from kickbacks to special security issues. Dave has also worked several murder cases and innumerable insurance fraud matters.

His investigation career began in his twenties as a Plainfield, New Jersey patrolman. He was promoted to detective, then joined the Union County Prosecutor's Office as a County Investigator. These early experiences eventually launched him into a lifetime of investigation work in the private sector. His pursuit of the facts brought him into state and federal courts as well as the board rooms of major corporations. He is respected among his peers and continues to take on special investigations, now in his seventies. more

Dave and I go way back. I am familiar with some of his cases (as he is with some of mine) so I can assure you he shares these experiences accurately. Reading about them brought back some good memories. It also made me realize how much he and his wife Linda accomplished in their career together.  Congratulations, Dave & Linda! 

Meet Dave - Book Signings
June 12, 2016 – 1 to 3 p.m. Clinton Book Shop, Clinton, NJ
July 10, 2016 – 12 N to 2 p.m. Barnes & Noble, Bridgewater, NJ

Wednesday, June 1, 2016

Spy on Any Phone, Anywhere... for a price.

With just a few million dollars and a phone number, you can snoop on any call or text that phone makes – no matter where you are or where the device is located.

That’s the bold claim of Israel’s Ability Inc, which offers its set of bleeding-edge spy tools to governments the world over. And it’s plotting to flog its kit to American cops in the coming months.

Ability’s most startling product, from both technical and price perspectives, is the Unlimited Interception System (ULIN). Launched in November last year, it can cost as much as $20 million, depending on how many targets the customer wants to surveil.

All a ULIN customer requires is the target’s phone number or the IMSI (International Mobile Subscriber Identity), the unique identifier for an individual mobile device. Got those? Then boom – you can spy on a target’s location, calls and texts.

This capability is far more advanced than that of IMSI-catchers (widely known as StingRays), currently used by police departments in the United States. IMSI-catchers can help acquire a target’s IMSI number, as well as snoop on mobiles, but only if the target is within range. more

"What are the most important characteristics of a great InfoSec professional in 2016?"

23 Information Security Leaders Reveal the Most Important Traits for InfoSec Pros in 2016

Digital Guardian compiled their responses to create a comprehensive guide outlining the most important characteristics for InfoSec professionals. (My contribution appears below. The additional 22 thoughtful responses appear here.)
---

"The single most important characteristic for successful InfoSec professionals in 2016 is..."

Inquisitiveness.

With this quality, an InfoSec professional will question the status quo, look for loopholes, seek new solutions, follow-up on red flags early on, and look at InfoSec from a holistic viewpoint.

The viewpoint is the most important element. It shapes all other aspects of the job. The inquisitive person will see their job not as an IT defender, but as a defender of information, no matter how it is generated, stored, or transmitted. The great InfoSec professional realizes all the data stored on the computers was available to the adversary long before it ever entered a database.

This holistic outlook takes into account the genesis of information. It may start out as a phone call, which may be wiretapped; a conference room strategy meeting, which can be bugged; unsecured written information left on desks or unlocked file cabinets, which may be easily photographed; information stored on a photocopier hard drive, which can later be reprinted; or on an unsecured Wi-Fi Appearance Point, or wireless printer, whose transmissions may be intercepted. The list of info-vulnerabilities is long.

In recent years, the rush has been to focus on IT security, and rightly so. But, in doing so, the gap between great InfoSec professionals and tunnel-visioned InfoSec managers has become wide and clear. Great InfoSec professionals, being inquisitive, see and handle the big picture. It isn't just computers. The real task is detecting and plugging any method by which information can leak out. Today's great InfoSec professionals defend accordingly. They are much more successful than their colleagues, who only put out fires.  ~Kevin

Tuesday, May 31, 2016

10 types of spy cameras that could be watching you right now - No. 6 is a surprise

Camera technology has advanced a lot the past few years. They keep getting smaller and smaller, making it possible to conceal them any which way.

Spy cam manufacturers have been creative in producing some of the most cleverly disguised (and tiny) camera/DVR systems, complete with HD video, motion detection, large storage card support and remote controls...

1. USB flash drive spy cameras
These cameras look like your regular USB storage sticks, but think again. They have a hidden camera inside! It’s not unusual these days for someone to be carrying USB sticks around so spotting them can be a bit challenging.

So how can you tell? The camera lens for these USB stick cameras is usually located on the posterior end of the stick, opposite the USB plug. With this form factor, this spy cam will blend seamlessly in an office or classroom.

See all 10 here.

Concerns for Energy Espionage Climb

The FBI is warning U.S. energy companies that the oil industry's downturn is increasing their vulnerability to theft of technological secrets.
 

Companies that long have faced the prospect of economic espionage must now be prepared for the possibility that workers who have been laid off could be targeted by foreign entities and competitors wanting to steal intellectual property. 

"FBI investigations indicate economic espionage and trade secret theft against U.S. oil and natural gas companies and institutes are on the rise," according to an unclassified briefing report prepared for the energy industry.

Agents shared the report recently with about 150 energy sector executives, managers and others who gathered behind closed doors at the FBI building... more