UK - An apartment unit manager was arrested on Friday after a tenant found a secret camera hidden in their bathroom.
Police found two more hidden cameras after they detained a 49-year-old man, who works at the unit.
The resident, who is one of ten occupants living in the apartment building, called police after finding the camera in their digital alarm clock.
Police executed a search warrant and located a hidden camera, hard drive and other devices, they said on Saturday.
The man allegedly had more than 50 intimate videos of the occupants of the two units. more
Monday, November 19, 2018
Monday, November 5, 2018
Business Espionage: Ex-Employees Allegedly Steal Trade Secrets Valued At Over $400 Million
Three individuals who worked for DRAM maker's Taiwan subsidiary stole Micron IP to benefit company controlled by China's government, US says in indictment.
Like many other businesses, semiconductor manufacturer Micron Technology employs a range of physical, electronic, and policy measures to protect its trade secrets. Yet all it took for the company to allegedly lose intellectual property worth at least $400 million to a Chinese competitor was two employees with legitimate access to the data.
A federal indictment unsealed this week in the US District Court for the Northern District of California described Micron as the victim of economic espionage involving a Taiwanese semiconductor company, a state-owned company in China, and three individuals who previously worked for Micron. more
Friday, November 2, 2018
This Fortnight in Spycam News
WA - A pastor and teacher at a Christian school in Washington state was
arrested earlier this week and charged with filming hundreds of
voyeurism videos of female staff and students. more
UK - A voyeur was locked up after being caught with 169 video clips taken by a spy camera set up to film an unsuspecting woman. The penalties were imposed when he appeared before magistrates in the city. They were told the offence came to light when the camera was discovered and police were alerted. more
ID - A Ketchum man has been charged with one felony count of video voyeurism. A recording device found in the bathroom of a residence at the Wildwood condominium complex. The recording device was found by a guest who was staying at the residence at points between April and June, with her daughter. The woman told Lundergreen that the device was located in the bathroom wall outlet and disguised as a USB charger. more
Japan - The secretary general of a local assembly in Yamagata Prefecture, northwest Japan is fired for voyeurism in a women's bathroom at town hall. more
PA - A West Chester University student was arrested after police said he hid a cellphone in public bathrooms in several locations, including one at West Chester University, and recorded women in various stages of undress. more
LA - A former WAFB employee who secretly recorded two female station employees using the restroom in 2017 was sentenced to four months in prison Tuesday. He was immediately handcuffed and led to prison. more
New Zealand - The man who filmed women using the shower in his Airbnb homestay then uploaded the videos to a porn site has lost name suppression and has been sent to prison for four years and four months. more
CT - A man who entered a neighbor's home through an unlocked door and
allegedly installed video cameras in four spots in the home has been
arrested by police. An investigation revealed that Pelgrift had entered the home and
installed the videos cameras while the woman was not home. She happened
to notice a camera and called the police, state police said. more
FL - Investigators say they have uncovered an extensive amount of videos and images of under-age students secretly filmed while undressing by a Bloomingdale High School teacher who was arrested last month on a video voyeurism charge. Mark Ackett, 50, who resigned as a fashion design teacher, now faces an additional 353 charges. He was first arrested on Sept. 11 — the same day a 17-year-old student in his class discovered two cell phones hidden in the classroom changing area where she and her classmates disrobed for fashion assignments. more
ND - James O'Keefe's Project Veritas released a new undercover video on Tuesday night showing vulnerable Sen. Heidi Heitkamp's (D-ND) campaign staff exposing her as being a far-left candidate while she has tried to portray herself as being centrist, saying, "when she gets elected she's going to be super liberal." more
VA - A conservative group that creates undercover “sting” videos infiltrated the campaign of Abigail Spanberger, a Democrat in a tight race with Rep. Dave Brat in Virginia’s 7th District. more
AZ - A right-wing operation that creates secretly recorded videos targeted Democratic U.S. Rep. Kyrsten Sinema, who's running a tight race for U.S. Senate, releasing a video Monday with several clips of the representative and her campaign workers making candid off-the-cuff comments. more
MO - An undercover video exposed a Democrat senator's re-election campaign for secretly taking donations from Planned Parenthood. The video, from conservative activist group Project Veritas, shows campaign workers for Democrat Sen. Claire McCaskill of Missouri talking about how Planned Parenthood funnels money to McCaskill's campaign through other organizations. more
CA - New undercover video appears to show signature gatherers pitching falsehoods to voters get them to sign petitions that would force the massive Newland Sierra development to a public vote. more
Thanks for subscribing to Kevin's Security Scrapbook (see top right column). ~Kevin
UK - A voyeur was locked up after being caught with 169 video clips taken by a spy camera set up to film an unsuspecting woman. The penalties were imposed when he appeared before magistrates in the city. They were told the offence came to light when the camera was discovered and police were alerted. more
ID - A Ketchum man has been charged with one felony count of video voyeurism. A recording device found in the bathroom of a residence at the Wildwood condominium complex. The recording device was found by a guest who was staying at the residence at points between April and June, with her daughter. The woman told Lundergreen that the device was located in the bathroom wall outlet and disguised as a USB charger. more
Japan - The secretary general of a local assembly in Yamagata Prefecture, northwest Japan is fired for voyeurism in a women's bathroom at town hall. more
PA - A West Chester University student was arrested after police said he hid a cellphone in public bathrooms in several locations, including one at West Chester University, and recorded women in various stages of undress. more
LA - A former WAFB employee who secretly recorded two female station employees using the restroom in 2017 was sentenced to four months in prison Tuesday. He was immediately handcuffed and led to prison. more
New Zealand - The man who filmed women using the shower in his Airbnb homestay then uploaded the videos to a porn site has lost name suppression and has been sent to prison for four years and four months. more
New Zealand - A
home handyman who used his position of trust to spy on a female friend
in her bedroom has been sentenced to three months of community
detention. The offending...involved Williamson hiding a camera inside a toolbox that he left in the
woman's bedroom, which he left there after performing maintenance
duties in her home. The device was discovered by the woman, who contacted the police. more
FL - In a case involving allegations that a man placed hidden cameras in his
adult stepdaughter’s bedroom, an appeals court Friday overturned a
conviction on video-voyeurism charges because police improperly obtained
evidence from a laptop computer. more
FL - Investigators say they have uncovered an extensive amount of videos and images of under-age students secretly filmed while undressing by a Bloomingdale High School teacher who was arrested last month on a video voyeurism charge. Mark Ackett, 50, who resigned as a fashion design teacher, now faces an additional 353 charges. He was first arrested on Sept. 11 — the same day a 17-year-old student in his class discovered two cell phones hidden in the classroom changing area where she and her classmates disrobed for fashion assignments. more
S. Korea - South Korea is in the grip of a 'spycam'
epidemic, with covert footage of sex, nudity and urination posted online
in what amounts to a "social death penalty" for thousands of women
forced to live with a pornographic shadow. The
footage may be taken surreptitiously by boyfriends or captured on
covert devices as small as car keys. Daily camera checks are now part of
life for cleaners in many public toilets. more
FL - A massage therapist was arrested over the weekend and charged with video
recording a female customer disrobing prior to an appointment. ... Further investigation indicates that Scott had placed a cellphone in the
massage room to video record the customer while she was undressing. more
NM - A Dona Ana County man is facing time behind bars for hiding video
cameras in bathrooms and capturing video of victims using the restroom,
showering, and changing clothes. ... Police say Ikard's face was even seen on some of the videos as he worked to set up the cameras. more
UK - A retired company director who covertly
filmed a young woman getting changed at his luxury home has been jailed
for eight months. Allan Austin, 66, installed a hidden spy camera at his home in Cheshire because he 'liked the figure' of the victim. When officers searched Austin's £500,000 detached house in the village
of High Legh, near Knutsford, Cheshire they found the hidden camera
which was linked to his computer and iPad. more
The above cases represent only the failures, the ones that got caught. The problem is much larger. Learn how to protect yourself and your children.
A video spycam (with audio recording) we found last Friday at a corporate location...
Now, on to the Extortionography cases. Hey, the elections are here, and the tech fists are flying.
ND - James O'Keefe's Project Veritas released a new undercover video on Tuesday night showing vulnerable Sen. Heidi Heitkamp's (D-ND) campaign staff exposing her as being a far-left candidate while she has tried to portray herself as being centrist, saying, "when she gets elected she's going to be super liberal." more
VA - A conservative group that creates undercover “sting” videos infiltrated the campaign of Abigail Spanberger, a Democrat in a tight race with Rep. Dave Brat in Virginia’s 7th District. more
AZ - A right-wing operation that creates secretly recorded videos targeted Democratic U.S. Rep. Kyrsten Sinema, who's running a tight race for U.S. Senate, releasing a video Monday with several clips of the representative and her campaign workers making candid off-the-cuff comments. more
MO - An undercover video exposed a Democrat senator's re-election campaign for secretly taking donations from Planned Parenthood. The video, from conservative activist group Project Veritas, shows campaign workers for Democrat Sen. Claire McCaskill of Missouri talking about how Planned Parenthood funnels money to McCaskill's campaign through other organizations. more
CA - New undercover video appears to show signature gatherers pitching falsehoods to voters get them to sign petitions that would force the massive Newland Sierra development to a public vote. more
Thanks for subscribing to Kevin's Security Scrapbook (see top right column). ~Kevin
Security Director IT Alert: New Corporate Network Attack Vulnerability
Called BleedingBit, this vulnerability impacts wireless networks used in a large percentage of enterprise companies.
Two zero-day vulnerabilities in Bluetooth Low-Energy chips made by Texas Instruments (and used in millions of wireless access points) open corporate networks to crippling stealth attacks.
Adversaries can exploit the bugs by simply being approximately 100 to 300 feet from the vulnerable devices. A compromised access point can then lead to an attacker taking control of the access point, capturing all traffic, and then using the compromised device as a springboard for further internal attacks.
The issue impacts Wi-Fi access points made by Cisco, Cisco Meraki and Hewlett-Packard Enterprise’s Aruba, accounting for a large percentage of hardware used in corporations, according to researchers at Israeli security firm Armis. The firm discovered the two bugs earlier this year and publicly disclosed them on Thursday.
“Attacks can be devastating and carried out by unauthenticated users who can exploit these bugs and break into enterprise networks undetected while sitting in the company’s lobby,” said Ben Seri, head of research at Armis.
...there is concern that the BleedingBit vulnerabilities could impact a larger universe of BLE devices, such as smart locks used in hotel chains and point-of-sale hardware.
Last year, Armis discovered a nine zero-day Bluetooth-related vulnerabilities, dubbed BlueBorne, in Bluetooth chips used in smartphones, TVs, laptops and car audio systems. The scale of affected devices was massive, estimated to impact billions of Bluetooth devices. more
Recommendation: If your company uses devices made by the manufacturers mentioned, contact them for software patches. ~Kevin
Two zero-day vulnerabilities in Bluetooth Low-Energy chips made by Texas Instruments (and used in millions of wireless access points) open corporate networks to crippling stealth attacks.
Adversaries can exploit the bugs by simply being approximately 100 to 300 feet from the vulnerable devices. A compromised access point can then lead to an attacker taking control of the access point, capturing all traffic, and then using the compromised device as a springboard for further internal attacks.
The issue impacts Wi-Fi access points made by Cisco, Cisco Meraki and Hewlett-Packard Enterprise’s Aruba, accounting for a large percentage of hardware used in corporations, according to researchers at Israeli security firm Armis. The firm discovered the two bugs earlier this year and publicly disclosed them on Thursday.
“Attacks can be devastating and carried out by unauthenticated users who can exploit these bugs and break into enterprise networks undetected while sitting in the company’s lobby,” said Ben Seri, head of research at Armis.
...there is concern that the BleedingBit vulnerabilities could impact a larger universe of BLE devices, such as smart locks used in hotel chains and point-of-sale hardware.
Last year, Armis discovered a nine zero-day Bluetooth-related vulnerabilities, dubbed BlueBorne, in Bluetooth chips used in smartphones, TVs, laptops and car audio systems. The scale of affected devices was massive, estimated to impact billions of Bluetooth devices. more
Recommendation: If your company uses devices made by the manufacturers mentioned, contact them for software patches. ~Kevin
Labels:
#espionage,
#hack,
advice,
Bluetooth,
business,
cybersecurity,
Wi-Fi
Thursday, November 1, 2018
Spy Shop Bat Man Shows No Brotherly Love
NJ/PA - The superintendent of a Cumberland County school district is facing criminal charges after allegedly attacking a Philadelphia surveillance equipment store employee with a baseball bat.
Michael Knox, the superintendent of the Fairfield Township School District, faces charges of aggravated assault, possessing an instrument of crime, making terroristic threats and simple assault, court records show.
According to NBC 10 Philadelphia, Knox allegedly had a business arrangement with the shop to spy on his wife for an unknown matter. He thought the store was doing a bad job with the surveillance, NBC reported, leading him to attack an employee inside the store. more
Michael Knox, the superintendent of the Fairfield Township School District, faces charges of aggravated assault, possessing an instrument of crime, making terroristic threats and simple assault, court records show.
According to NBC 10 Philadelphia, Knox allegedly had a business arrangement with the shop to spy on his wife for an unknown matter. He thought the store was doing a bad job with the surveillance, NBC reported, leading him to attack an employee inside the store. more
Apple's New T2 Chip - An Eavesdropper Stopper
At a recent event in New York, Apple finally refreshed its MacBook Air lineup, and the new laptops come with a refreshing new capability — warding off hackers or spies from eavesdropping on your microphone.
According to Apple’s new T2 security guide, both, the new MacBook Air, and the MacBook Pro use the new T2 chip, which helps protect the device’s encryption keys, storage, fingerprint data, and secure boot features.
Per the guide, the T2 chip comes with a hardware microphone disconnect feature, which physically cuts the device’s microphone from the rest of the hardware whenever the lid is closed. more
According to Apple’s new T2 security guide, both, the new MacBook Air, and the MacBook Pro use the new T2 chip, which helps protect the device’s encryption keys, storage, fingerprint data, and secure boot features.
Per the guide, the T2 chip comes with a hardware microphone disconnect feature, which physically cuts the device’s microphone from the rest of the hardware whenever the lid is closed. more
Is Your Boss Spying on You?
(Modern workplace "spying" began with the time clock back in 1888.)
New numbers show almost every single employer is spying on employees.
From keeping an eye on your internet usage to tracking your car, NBC Charlotte found out how they're doing it and if it's legal.
"It's getting to a point people are realizing they don’t have much privacy in the workplace," said Kevin Murray. more
P.S. Make sure your employees are not spying on you.
New numbers show almost every single employer is spying on employees.
From keeping an eye on your internet usage to tracking your car, NBC Charlotte found out how they're doing it and if it's legal.
"It's getting to a point people are realizing they don’t have much privacy in the workplace," said Kevin Murray. more
P.S. Make sure your employees are not spying on you.
Thursday, October 25, 2018
Business Espionage: "A Sellout and a Spy"
Delaware's Incyte Corp. is in court this week seeking hundreds of millions of dollars from a former-Silicon Valley competitor.
The Wilmington pharmaceutical company argues in a lawsuit that its rival,
Flexus Biosciences, in 2014 stole trade secrets for a drug that at the
time was thought to have enormous potential for the treatment
of tumors.
During opening statements on Tuesday, Incyte attorney Steve Wood told
jurors that Flexus employed the services of "a spy and a sellout" to
steal information about blood tests and about how the drug metabolizes
in a patient's body. more
Ex-employee Accuses Huawei of 'Corporate Espionage'
A former employee of Huawei Technologies Co has accused the company of
using a lawsuit against his Silicon Valley startup as part of a strategy
to steal intellectual property and help China achieve technological
dominance over the US. more
M, I, See... see you real soon...
The park around Lake Eola offers a great view of the downtown
skyline, but Orlando police said someone's been peeping into some of the
apartments closer than the naked eye can see with either a super
high-powered camera or a drone.
"I don't even think about people watching me or anything like that. So, to me, that's just mind-blowing, honestly,” said downtown resident Mary Pericles.
Women who live in The Waverly and Post Parkside apartments say they've seen a drone flying outside their windows at least three times. more
"I don't even think about people watching me or anything like that. So, to me, that's just mind-blowing, honestly,” said downtown resident Mary Pericles.
Women who live in The Waverly and Post Parkside apartments say they've seen a drone flying outside their windows at least three times. more
File Under: You Can't Do That in the Private Sector
UK - A former Royal Marine carried out body searches on his girlfriend, placed bugging devices in her bedroom and installed a tracking device on her mobile phone due to his paranoia over her alleged infidelity.
In the first conviction of coercive and controlling behaviour offences secured at Grimsby Crown Court, Lee Jensen received a 12-month suspended sentence.
The prosecutor said bugging devices were concealed under cushions in her bedroom by Jensen, so he could listen to her. He subjected her to body checks. He prevented her from visiting her own GP.
After the relationship ended he made "futile threats to burn her house down". more sing-a-long
In the first conviction of coercive and controlling behaviour offences secured at Grimsby Crown Court, Lee Jensen received a 12-month suspended sentence.
The prosecutor said bugging devices were concealed under cushions in her bedroom by Jensen, so he could listen to her. He subjected her to body checks. He prevented her from visiting her own GP.
After the relationship ended he made "futile threats to burn her house down". more sing-a-long
Making Security Grate Again - Part II
China has jokingly suggested that US President Donald Trump should swap
his Apple iPhone for a Chinese model, as it denied a report claiming
Beijing was bugging his private calls. more
Making Security Grate Again
When President Trump calls old friends on one of his iPhones to gossip, gripe or solicit their latest take on how he is doing, American intelligence reports indicate that Chinese spies are often listening — and putting to use invaluable insights into how to best work the president and affect administration policy, current and former American officials said.
Mr. Trump’s aides have repeatedly warned him that his cellphone calls are not secure, and they have told him that Russian spies are routinely eavesdropping on the calls, as well. But aides say the voluble president, who has been pressured into using his secure White House landline more often these days, has still refused to give up his iPhones. White House officials say they can only hope he refrains from discussing classified information when he is on them. more
Mr. Trump’s aides have repeatedly warned him that his cellphone calls are not secure, and they have told him that Russian spies are routinely eavesdropping on the calls, as well. But aides say the voluble president, who has been pressured into using his secure White House landline more often these days, has still refused to give up his iPhones. White House officials say they can only hope he refrains from discussing classified information when he is on them. more
Saturday, October 6, 2018
Print Centers Leak Information
These behemoth systems do far more than just make copies,
confusing their users, and opening up vulnerabilities to the company. Although copying may be the main business of the machines, they can also scan, fax, send and receive vital company information — all in one place. Essentially, these machines have become a networking hub within the workplace, where each new action or service provides a new opportunity for exploitation wirelessly, by ethernet cable, or by both.
Researchers have recently been investigating access on printer/copiers as a potential opportunity for information leakage or industrial espionage, or even sabotage. In a January 2017 Quocira survey of 200 US and European businesses, more than half reported some data loss through intercepted print jobs (50%), access and loss or theft of printer hard disk data (48%), documents emailed externally (44%), or outright hacking of the printer system to gain company network access (18%). Some hackers have been very clever in attacking these systems. more
confusing their users, and opening up vulnerabilities to the company. Although copying may be the main business of the machines, they can also scan, fax, send and receive vital company information — all in one place. Essentially, these machines have become a networking hub within the workplace, where each new action or service provides a new opportunity for exploitation wirelessly, by ethernet cable, or by both.
Researchers have recently been investigating access on printer/copiers as a potential opportunity for information leakage or industrial espionage, or even sabotage. In a January 2017 Quocira survey of 200 US and European businesses, more than half reported some data loss through intercepted print jobs (50%), access and loss or theft of printer hard disk data (48%), documents emailed externally (44%), or outright hacking of the printer system to gain company network access (18%). Some hackers have been very clever in attacking these systems. more
Tech-Head Alert: Smartphone Anti-Spyware & Anti-IMSI Catcher Development
We are looking for recommendations of top tier stealthy Spyware Command and Control APKs to place on a testbed of Windows, iOS, Android, Ubuntu handsets and handsets carrying a modded version of the Google Android 7.0 Nougat OS for a test that we wish to conduct to measure the capture rate and automated counter measure response of a mobile adaptive threat defence suite.
We are also looking for a list of non-LE "StingRay" type cellphone-surveillance and cell-site simulators available publicly as part of our testing of our MITM detection, automated counter measures response, and triangulation software suite. more
Subscribe to:
Posts (Atom)