Thursday, July 11, 2019

New Report Projects the Size of the World Spycam Market 2019-2025

An extensive analysis of the Global Spy Cameras market strategy of the leading companies in the precision of import/export consumption, supply and demand figures, cost, price, revenue and gross margins.

The report starts by an introduction about the company profiling and a comprehensive review about the strategy concept and the tools that can be used to assess and analyze strategy.

It also analyzes the company’s strategy in the light of Porter’s Value Chain, Porter’s Five Forces, SWOT analysis, and recommendation on Balanced Scorecard for supply chain analysis...

The Spy Cameras market was valued at xx Million US$ in 2018 and is projected to reach xx Million US$ by 2025, at a CAGR of xx% during the forecast period.

In this study, 2018 has been considered as the base year and 2019 to 2025 as the forecast period to estimate the market size for Spy Cameras.

This report presents the worldwide Spy Cameras market size (value, production and consumption), splits the breakdown (data status 2014-2019 and forecast to 2025), by manufacturers, region, type and application. more

If you want to fill in the X's, you'll have to purchase the report ($4,600.). 

Takeaway... It must be a monster market if professional forecast reports are covering it. But, we already knew that. ~Kevin

Wednesday, July 10, 2019

Security Quote of the Week

"To paraphrase Warren Buffett, “we are in uncharted territory, and it’s going to get worse, not better.” By not having the right technology skillsets in every boardroom, companies and their boards have set themselves up for failure, so it’s almost guaranteed to get worse before it gets better.

Hackers come from all over the world with different motivations, including corporate espionage, and financial and health data theft.

They are incredibly diligent in figuring out creative ways to attack corporate networks, and while these anonymous hackers advance their tactics, it is critical for companies to anticipate what’s coming next and stay a step ahead of them." ~Bob Zukis in Forbes Magazine

Inevitable... As IT security improves expect an increase in classic attacks: electronic eavesdropping, VoIP phone taps, dumpster diving, covert intrusions, employee subversion, and blackmail to name a few. Protection will come when information security is addressed in a holistic manner. ~ Kevin

FREE - Security Message Screen Savers

Security Message Screen Savers
  • Reminders work.
  • Put your idle computer screens to work.
  • Three backgrounds to choose from, or commission custom screens.

Supreme Court Relaxes the Confidentiality Standard... but you have to do your part!

via Blank Rome LLP - Robyn N. Burrows

The Supreme Court in Food Marketing Institute v. Argus Leader Media, No. 18-481 (U.S. June 24, 2019) recently relaxed the standard for withholding confidential information under Exemption 4 of the Freedom of Information Act (“FOIA”)—a major win for contractors that regularly submit sensitive business information to the government...

To take full advantage of the Court’s holding, companies doing business with the government should keep in mind the following practical tips:
  • In submissions to the government, clearly indicate which information is to be kept confidential. This includes marking the data with a protective legend identifying it as subject to Exemption 4 protection. Be aware that certain statutes and regulations may require specific language to be used.
  • To the extent possible, obtain written assurances from the agency that the information will be kept confidential and will not be released to third parties absent the contractor’s consent. Contractors may also be able to negotiate contractual provisions protecting the data to be submitted to the government. more
* An independent consultant specializing in quarterly holistic information security audits can do this for you. 

Killed for Spying: The Story of the First Factory

Piedmont, in north-west Italy, is celebrated for its fine wine. But when a young Englishman, John Lombe, traveled there in the early 18th Century, he was not going to savoir a glass of Barolo. His purpose was industrial espionage. 

Lombe wished to figure out how the Piedmontese spun strong yarn from silkworm silk. Divulging such secrets was illegal, so Lombe snuck into a workshop after dark, sketching the spinning machines by candlelight. In 1717, he took those sketches to Derby in the heart of England.

Local legend has it that the Italians took a terrible revenge on Lombe, sending a woman to assassinate him. 

Whatever the truth of that, he died suddenly at the age of 29, just a few years after his Piedmont adventure. more

A Favorite M.I.B. — M.I.A. — R.I.P. Torn

      February 6, 1931 – July 9, 2019

Tuesday, July 9, 2019

Kieffer Ramirez Shares His Favorite Niche Investigations Resources (most are free)

SpyDialer

Cost: Free
Search people via their phone number, name, address, and/or e-mail address by using SpyDialer which contains billions of phone numbers obtained using social media and user-contributed address books.

Concerned about your information showing up on SpyDialer?!?! Check and see. If you appear there, you have the option of deleting your information... anonymously.

The 17 other resources appear here.

More Than 1,000 Android Apps Spy... even when you deny permission!

Permissions on Android apps are intended to be gatekeepers for how much data your device gives up. If you don't want a flashlight app to be able to read through your call logs, you should be able to deny that access.

But... even when you say no, many apps find a way around: Researchers discovered more than 1,000 apps that skirted restrictions, allowing them to gather precise geolocation data and phone identifiers behind your back...

Google said it would be addressing the issues in Android Q, which is expected to release this year.  more

Monday, July 8, 2019

Porcelain — An Industrial Espionage Story

1712 A.D. ...a French Jesuit priest named François Xavier d’Entrecolles pioneered industrial espionage by recording the secrets of porcelain making while on a trip to China and sending them back to Europe...

Another remarkable use for porcelain is the lithophane, a sheet of porcelain so thin as to be translucent, with artwork etched into it. The lithophane is thin enough that the art can only be seen when backlit, but just thick enough that the image can have depth. Lithophanes began to appear in several parts of Europe in the 1820s, but they’re believed to have originated in China a millennia earlier during the Tang Dynasty. Later Ming Dynasty scholars wrote of Tang bowls “as thin as paper” that included secret images.

High Profile Executives — A Company’s Most Vulnerable Target

High-profile people—executives, the board of directors, and other leaders—are privy to sensitive information that cybercriminals lust after which makes them primary targets... 

FBI statistics show that defrauding CEOs is a “$12 billion scam.” When private information about these high-net-worth individuals gets exposed, it carries a high degree of risk for that individual and their business alike. It might even include threats against the executive’s own physical security or that of their family...

When information is readily available about a wealthy person, bad actors have more leverage to compromise them. Consider that Facebook’s board of directors recently granted Mark Zuckerberg a $10 million yearly allowance to security. That money goes to personnel, equipment, and services needed to keep him and his family safe by maintaining vigilance across both physical and digital realms. more

Breach at 10 of the World’s Biggest Telecoms, or Follow the Leader

A multi-year attack carried out by Chinese hackers was exposed recently, and the scope of it is beyond anything previously seen in nation-state cyber espionage.

Hacking group APT10, a notorious team that is widely believed to have Chinese government support, is believed to have compromised at least 10 major global carriers and used their networks to track and spy on high-profile business leaders and members of foreign governments.
 What makes this cyber espionage incident unique is that the Chinese hackers appear to have been following their targets as they move from country to country, hopping from one breached network to another as needed. While this ability is not new, this kind of mass scale has not been seen before. more

Ag Tech Being Targeted by International Espionage

In a special report, HAT (Hoosier Ag Today) focuses on how ag biotech has become a top priority for foreign spies. It sounds like the plot of a James Bond thriller: foreign governments trying to steal top secret military technology to take over the world. But, in reality, it has become agricultural technology that foreign governments want to steal from the U.S. “If you have a competitive advantage in the field of agriculture, there is a high chance that a foreign government would target that technology,” says Craig Moringiello, special agent with the FBI...


However, companies and universities are not the only ones at risk. The FBI is urging farmers to be vigilant as well. “Farmers should be vigilant  in protecting their operations and security measures,” said Moringiello. He warned farmers to be aware when having foreign visitors on their farms. more

How to Tell If Someone Is Bugging or Tracking You

via Popular Mechanics...

Are you being bugged?
To find out, the first step is to consider carefully whether you are sufficiently interesting to warrant surveillance. If you’re a crook, a cheater, or a keeper of political or corporate secrets, the answer may be yes...
Consider also whether that gift from a business acquaintance could be a Trojan paperweight or Dumbo-eared desk clock. Maybe pass those along to Goodwill and, if you have any lingering doubts, call in a pro to execute a “bug sweep.” more

Tuesday, June 25, 2019

Spycam Found in James Bond Loo (No, really!)

A man was arrested Friday after a hidden camera was found in the women's toilets at Pinewood Studios, in Buckinghamshire, England, where the next James Bond film is being filmed.

The 49-year-old man was subsequently charged with voyeurism, a spokesperson for Thames Valley Police told CNN. He will appear in court Saturday.



Filming is currently underway at Pinewood Studios for "Bond 25," the upcoming James Bond movie that's likely to be Daniel Craig's last in the title role. more