Saturday, June 17, 2023
A Tale of High-Stakes Corporate Espionage... a cautionary tale.
Monday, June 12, 2023
Corporate Espionage - Legal or Illegal? (The Full Story)
The legality of corporate espionage is a complex subject, as it encompasses various actions and laws depending on the jurisdiction. Corporate spying may be considered illegal under various statutes that protect intellectual property, trade secrets, and economic interests. However, there are instances where certain espionage activities may fall within legal limits, especially in cases where information is obtained from public sources or through legitimate means... more
77 Industrial Espionage Arrests
Most cases only involved domestic companies, although eight were related to the leak of technology secrets to China or other countries, Yonhap quoted the National Police Agency as saying...
The number of international cases was double that of a similar probe conducted one year ago, Yonhap said, citing police data. more
Blackmail with Email, or The Employer's Lawyer Destroyer
The shock inside Lewis Brisbois’ downtown Los Angeles headquarters soon gave way to anger... over the weekend, Lewis Brisbois struck back.
In an extraordinary move, its management team directed the release of scores of emails in which Barber and Ranen used vile terms for women, Black people, Armenians, Persians, and gay men and traded in offensive stereotypes of Jews and Asians. In one fell swoop, the venerable firm managed to torpedo its new rival, destroy the defecting partners’ careers and send the legal establishment reeling. more
Eavesdropping: Advanced Aliens Could Detect life on Earth...
Only aliens with more advanced technology would be able to ‘eavesdrop’ on the signals transmitted on Earth – but apparently that’s more likely than you’d think.
While we work hard to search for extra-terrestrial life beyond our planet, radiation leaked from Earth’s mobile towers could be helping aliens find us. Put your tinfoil hat away: this isn’t anything to do with 5G. And the radiation being leaked isn’t the cancer-causing kind – it's the same type of energy used in radio and TV signals.
New research shows that this radio leakage from mobile towers is not currently strong enough on its own to be detectable by alien civilisations – assuming they are using the same technology as we are to find them. But if aliens have more advanced systems and are looking at radiation from more sources – such as Wi-Fi networks – we could soon be discovered by extra-terrestrials living on nearby stars. more
Thursday, June 8, 2023
Police Lt. Sentenced - Illegally Videotaping Women
Beaupre, 38, pleaded guilty to eight counts of photographing an unsuspecting nude person, the district attorney’s office said, and was sentenced to two years of probation.
The officer also admitted in court to sufficient facts on 11 counts of unlawful wiretapping, the office said. A judge continued those counts for two years without a finding, and those probation sentences will run concurrently.
Notable US Spies Fast Facts
Timeline Summaries* of Spies Who FailedAldrich Ames
1962 - Aldrich Ames, son of a CIA analyst, joins the agency as a low-level documents analyst.
1970-1991 - David Boone serves in the US Army as a signals intelligence analyst. During the late 1980s, he is assigned to the National Security Agency as a senior cryptologic traffic analyst.
1996 - Peter Rafael Dzibinski Debbins makes visits to Russia to meet with their intelligence agents. He is given a code name and signs a settlement “attesting that he wanted to serve” them.
Noshir Gowadia
1968-1986 - Noshir Gowadia is employed by Northrop Grumman where he works on technology relating to the B-2 Spirit Bomber, aka the “Stealth” bomber.
Robert Hanssen
January 12, 1976 - Robert Hanssen joins the FBI.
Ana Montes
1984 - Ana Montes is recruited to spy for Cuba. She is never paid for her spying.
Walter Kendall Myers
1977 - Walter Kendall Myers begins working for the US State Department on contract, as an instructor.
Harold James Nicholson
1980 - Harold Nicholson joins the CIA after serving in the United States Army.
Ronald Pelton
1965-1979 - Ronald Pelton works for the National Security Agency, with top-level security clearance.
Earl Pitts
1983-1996 - Earl Edwin Pitts works at the FBI.
1979 - Pollard is hired to work at the Navy Field Operational Intelligence Office. He had been rejected previously from employment at the CIA due to drug use. His specialty is North America and the Caribbean.
George Trofimoff
1969-1994 - George Trofimoff, a naturalized American citizen of Russian parentage, works as a civilian for the US Army at the Joint Interrogation Center in Nuremberg, Germany. He also attains the rank of colonel in the Army reserve. *Complete timelines for each spy.
America’s ‘Most Damaging’ Soviet Spy Dies in Prison
Cuba to Host Secret Chinese Spy Base Focusing on U.S.
Cautionary Tale: Commercial Espionage - Bugging of Business Meetings
Thursday, June 1, 2023
Corporate TSCM Information Security Inspections - Myths, Excuses & Reality
TSCM SECURITY INSPECTION MYTHS and EXCUSES
Excuse: “I don’t see that we have a problem. No one is bugging our offices and boardroom.”
Reality: The first rule of espionage is, “Be invisible.” You won’t know if you are being eavesdropped on if you never check.
Fear of being Labeled Paranoid
Myth: Peer pressure from upper management.
Reality: Most top management appreciate proactive security thinking from their staff.
Lack of Awareness
Excuse: Yes.
Reality: A lack of awareness of the risks associated with electronic eavesdropping, or the need for TSCM security inspections is common. Management may be unaware of TSCM as an available countermeasure.
Cost
Myth: TSCM inspections can be expensive. The costs involved in hiring a professional TSCM specialist, or purchasing specialized equipment, and conducting regular inspections can be a deterrent to scheduling TSCM inspections.
Reality: Espionage losses are more expensive, much more. Hiring a TSCM specialist is very cost-effective, if you hire a competent firm. TSCM inspections are cheap insurance. Actually, better than insurance; TSCM can prevent the loss in the first place.
Perception of Low Risk
Excuse: Some businesses may believe that the risk of electronic eavesdropping is low in their industry or specific workplace. They might assume that their organization does not hold valuable or sensitive information that would attract eavesdroppers.
Reality: Being “in business” means having a competitive advantage, and others do want it.
Excuse: Conducting TSCM inspections requires specialized knowledge and equipment. If a business does not have the expertise in-house they may choose not to pursue these inspections.
Reality: Hiring an information security consultant–who has TSCM as their speciality–is the solution.
More TSCM Security Inspection Myths & Excuses
Myth: TSCM security inspections can temporarily disrupt normal business operations. The process involves sweeping the premises, potentially causing interruptions or inconveniences to employees or ongoing activities. Some businesses might be reluctant to undergo such disruptions.
Reality: Most inspections are conducted after business hours. When necessary, a TSCM team will assume the same dress and demeanor as employees, have a plausible reason for being in the area, and will work around employees so as not to disturb them.
Trust in Existing Security Measures
Excuse: Businesses may have confidence in their existing security measures, such as physical security, cybersecurity, or access controls. They might believe that these measures are sufficient to protect against eavesdropping and thus forego TSCM security inspections.
Reality: Experience has shown that do-it-yourself security measures are never sufficient to protect against eavesdropping and other forms of information loss. TSCM inspections always identify vulnerabilities and provide recommendations for improvement.
Lack of Legal or Regulatory Requirements
Excuse: Depending on the industry or geographical location, there may be no legal or regulatory obligations that mandate TSCM inspections. In the absence of such requirements, businesses may choose not to prioritize these inspections.
Reality: The financial success of a business should be a more effective motivator than a legal requirement.
Perception of Invasion of Privacy
Myth: TSCM security inspections are invasive or a breach of employee privacy. They might fear that conducting such inspections could harm employee morale or create an atmosphere of distrust.
Reality: Employees appreciate security measures which protect their livelihood and personal privacy. When an employer demonstrates care for information security, employees will act more carefully too.
Limited Resources
Excuse: Small businesses or those with resource constraints may prioritize other operational needs over TSCM security inspections. They might allocate their limited resources to other critical areas or invest in measures they perceive as more immediate concerns.
Reality: Defense is mandatory for survival. Budget waste and misallocation can usually fund TSCM security inspections without added expense, once corrected.
Overconfidence
Excuse: Some businesses might have a sense of overconfidence in their security measures, believing that they are already adequately protected against electronic eavesdropping. This false sense of security can lead to complacency and a disregard for TSCM inspections.
Reality: These businesses are at-risk.
Carefully assess the risks in your workplace. Schedule TSCM security inspections, because… corporate espionage is not a myth.
Murray Associates is an independent technical information security consulting firm. They provide electronic surveillance detection and counterespionage services to business, government and at-risk individuals.
Headquartered in the New York metropolitan area, a Murray Associates team can assist you quickly, anywhere in the United States, and internationally.
Wednesday, May 31, 2023
Ring to pay $5.8M - Staff & Contractors - Snooping on Videos
The settlement was filed in the U.S. District Court for the District of Columbia on Wednesday. The FTC confirmed the settlement a short time later. News of the settlement was first reported by Reuters.
The FTC said that Ring employees and contractors were able to view, download, and transfer customers’ sensitive video data for their own purposes as a result of “dangerously over-broad access and lax attitude toward privacy and security.”
The FTC alleged on at least two occasions Ring employees improperly accessed the private Ring videos of women. In one of the cases, the FTC said the employee’s spying went on for months, undetected by Ring. more
Taiwan Raids 8 Companies for Alleged Tech Espionage
Delete Alert - Android App iRecorder has Morphed Into Spyware
The app, iRecorder – Screen Recorder, was first uploaded to the Google Play store on September 19, 2021, according to Lukas Stefanko, a malware researcher with cybersecurity firm ESET.