A Canada Border Service Agency employee opened himself up to the threat of exploitation by "hostile intelligence services" after visiting massage parlours in China, Japan and Canada, documents obtained by CBC News reveal.
The case is just one of more than 500 allegations the CBSA deemed "founded" last year and released as part of an access to information request.
According to the redacted file, the employee — who is not named in the document — allegedly engaged in illegal activities "by purchasing sexual services from massage parlours in Japan, China and Canada." more
Saturday, November 18, 2023
Update: Court Grants Exec Bail in Industrial Espionage Case
A South Korean court has granted bail to a former executive of Samsung Electronics accused of stealing sensitive information developed by the technology giant, court records showed on Tuesday.
In a case that underscores the country's efforts to crack down on industrial espionage, prosecutors have alleged that the former executive Choi Jinseog, a South Korean chip expert, stole information formulated by the world's top memory chipmaker to help his client set up a chip factory in China. more
In a case that underscores the country's efforts to crack down on industrial espionage, prosecutors have alleged that the former executive Choi Jinseog, a South Korean chip expert, stole information formulated by the world's top memory chipmaker to help his client set up a chip factory in China. more
BlackBerry - The Best Movie Of 2023?
The True Story Thriller That’s Being Called The Best Movie Of The Year... Matt Johnson’s BlackBerry, managed to make a small but noticeable splash at the box office, resulting in a stunning 98 percent certified fresh critic score from Rotten Tomatoes...
Though the film’s premise may not immediately strike you as rife with thrilling storytelling potential, BlackBerry manages to take the high-intensity world of tech development, corporate espionage, and the true tale of one corporation’s rise and incredible fall to its absolute limits.
Those who lived through the era of BlackBerry phones being the must-have product on the market will look back at the moment in history with a newfound sense of awe after seeing the film, while those too young to recall the ubiquity of the full-keyboard phone will be shocked and appalled by the underhanded business practices which brought mobile internet to the next level. more
Those who lived through the era of BlackBerry phones being the must-have product on the market will look back at the moment in history with a newfound sense of awe after seeing the film, while those too young to recall the ubiquity of the full-keyboard phone will be shocked and appalled by the underhanded business practices which brought mobile internet to the next level. more
ChatGPT Is Apparently a Great Surveillance Tool
This week, Forbes reported that a Russian spyware company called Social Links had begun using ChatGPT to conduct sentiment analysis. The creepy field by which cops and spies collect and analyze social media data to understand how web users feel about stuff, sentiment analysis is one of the sketchier use-cases for the little chatbot to yet emerge.
Social Links, which was previously kicked off Meta’s platforms for alleged surveillance of users, showed off its unconventional use of ChatGPT at a security conference in Paris this week. The company was able to weaponize the chatbot’s ability for text summarization and analysis to troll through large chunks of data, digesting it quickly.
Social Links, which was previously kicked off Meta’s platforms for alleged surveillance of users, showed off its unconventional use of ChatGPT at a security conference in Paris this week. The company was able to weaponize the chatbot’s ability for text summarization and analysis to troll through large chunks of data, digesting it quickly.
In a demonstration, the company fed data collected by its own proprietary tool into ChatGPT; the data, which related to online posts about a recent controversy in Spain, was then analyzed by the chatbot, which rated them “as positive, negative or neutral, displaying the results in an interactive graph,” Forbes writes.
Obviously, privacy advocates have found this more than a little disturbing... more
Obviously, privacy advocates have found this more than a little disturbing... more
How an Indian Startup Hacked the World
Appin was a leading Indian cyberespionage firm that few people even knew existed.
A Reuters investigation found that the company grew from an educational startup to a hack-for-hire powerhouse that stole secrets from executives, politicians, military officials and wealthy elites around the globe.
Appin alumni went on to form other firms that are still active...
Chuck Randall was on the verge of unveiling an ambitious real estate deal he hoped would give his small Native American tribe a bigger cut of a potentially lucrative casino project.
A well-timed leak derailed it all.
Chuck Randall was on the verge of unveiling an ambitious real estate deal he hoped would give his small Native American tribe a bigger cut of a potentially lucrative casino project.
A well-timed leak derailed it all.
In July of 2012, printed excerpts from Randall’s private emails were hand-distributed across the Shinnecock Nation’s square-mile reservation, a wooded peninsula hanging off the South Fork of Long Island... more
Smart Toys Spying on Children
Smart toys are becoming more common, and an increase in concerns about them spying on children has coincided with that, according to a new report from the U.S. PIRG Education Fund.
In its Trouble in Toyland" report released Thursday, the organization explained that smart toys "can incorporate various technologies, like cameras, microphones and sensors, as well as artificial intelligence capabilities and connectivity through the internet or Bluetooth." It specifically flagged some risks that it said parents and their children could see arise. more
How We Got This Way - The effect of kids being influenced by their spy toys.
In its Trouble in Toyland" report released Thursday, the organization explained that smart toys "can incorporate various technologies, like cameras, microphones and sensors, as well as artificial intelligence capabilities and connectivity through the internet or Bluetooth." It specifically flagged some risks that it said parents and their children could see arise. more
How We Got This Way - The effect of kids being influenced by their spy toys.
Wednesday, November 15, 2023
Why You Really Need a Technical Information Security Consultant
The non-existence of a trade secret asset: ‘confidential’ information
by R. Mark Halligan
by R. Mark Halligan
FisherBroyles LLP
For years, there has been a debate whether “confidential” information is analogous to a “trade secret.” It is not. Information is either protected as a “trade secret” or not protected as a “trade secret.” Any other characterization of “confidential” information undermines the protection of trade secret assets and interferes with lawful and fair business competition.
There is no such thing as non-trade secret “confidential” information.
There is no such thing as “confidential” information that does not rise to the level of a trade secret.
There is no middle ground: Either the information is a “trade secret” (and protectable) or not a trade secret (and not protectable).
A “trade secret” is an intellectual property asset that requires reasonable measures to protect the information as a “trade secret” and proof that such information derives an actual or potential economic advantage from the secrecy of the information. more
For years, there has been a debate whether “confidential” information is analogous to a “trade secret.” It is not. Information is either protected as a “trade secret” or not protected as a “trade secret.” Any other characterization of “confidential” information undermines the protection of trade secret assets and interferes with lawful and fair business competition.
There is no such thing as non-trade secret “confidential” information.
There is no such thing as “confidential” information that does not rise to the level of a trade secret.
There is no middle ground: Either the information is a “trade secret” (and protectable) or not a trade secret (and not protectable).
A “trade secret” is an intellectual property asset that requires reasonable measures to protect the information as a “trade secret” and proof that such information derives an actual or potential economic advantage from the secrecy of the information. more
Your business is based on information and conversations considered confidential, sensitive, or intellectual property. These create your competitive advantage. No less important than trade secrets, and yet, not protected under trade secret law.
So, what protection do you have?
Start by adding a Technical Information Security Consultant to your team. Their proactive surveys can spot espionage issues like electronic eavesdropping, information security risks, and employee compliance with information security policies—before they become losses.
Sunday, November 12, 2023
Professor Accused of Wiretapping Other Professors
LA - Officers of the University of Louisiana Monroe Police Department initiated an investigation due to a wiretapping complaint on campus. During the investigation, authorities learned that a professor for the University of Louisiana Monroe, along with his graduate assistant, located two small recording devices around their office doors.
According to the affidavit, the devices were being held in place by a substance. The ULM professor was in his office when one of the devices fell on the floor. The second device was found after the graduate assistant searched the door area of the office.
ULM Police then stationed themselves and conducted surveillance, identifying the suspect as Chad Allen Lewing, who is also a professor at the university. On November 8, 2023, at 5:30 AM, Lewing was detained by authorities while allegedly attempting to remove the devices.
Police learned that Lewing arrived at work two hours early and he was the only person in the building, besides two ULM police officers. Lewing was transported to the university’s police station and refused to talk with authorities...
Officers went on to find two more devices in the office spaces of two other ULM professors. more
According to the affidavit, the devices were being held in place by a substance. The ULM professor was in his office when one of the devices fell on the floor. The second device was found after the graduate assistant searched the door area of the office.
ULM Police then stationed themselves and conducted surveillance, identifying the suspect as Chad Allen Lewing, who is also a professor at the university. On November 8, 2023, at 5:30 AM, Lewing was detained by authorities while allegedly attempting to remove the devices.
Police learned that Lewing arrived at work two hours early and he was the only person in the building, besides two ULM police officers. Lewing was transported to the university’s police station and refused to talk with authorities...
Officers went on to find two more devices in the office spaces of two other ULM professors. more
This find was based on luck. Surveillance devices rarely just fall on the floor in front of you. Smart businesses and educational institutions hire technical information security consultants to periodically conduct searches for electronic surveillance devices. Learn more about that at counterespionage.com.
AirTags: The New Go-to Tool for Cops
After a viral TikTok trend spurred tens of thousands of car thefts this summer, cops in Washington, DC, started realizing that it was much easier to recover stolen vehicles that could be tracked with Apple AirTags.
Because of this, the Metropolitan Police Department (MPD) rolled out a pilot program this week, doling out free tracking devices to residents in DC areas where cops are seeing "the greatest increase in vehicle theft," according to a press release from the office of DC Mayor Muriel Bowser. more
Court: Automakers Can Record & Intercept Owner Text Messages
A federal judge on Tuesday refused to bring back a class action lawsuit alleging four auto manufacturers had violated Washington state’s privacy laws by using vehicles’ on-board infotainment systems to record and intercept customers’ private text messages and mobile phone call logs.
The Seattle-based appellate judge ruled that the practice does not meet the threshold for an illegal privacy violation under state law, handing a big win to automakers Honda, Toyota, Volkswagen and General Motors, which are defendants in five related class action suits focused on the issue. One of those cases, against Ford, had been dismissed on appeal previously. more
The Seattle-based appellate judge ruled that the practice does not meet the threshold for an illegal privacy violation under state law, handing a big win to automakers Honda, Toyota, Volkswagen and General Motors, which are defendants in five related class action suits focused on the issue. One of those cases, against Ford, had been dismissed on appeal previously. more
NJ Jury Finds Attorney Illegally Recorded Ex-Son-In-Law
A New Jersey jury on Tuesday found that a law professor illegally wiretapped her ex-son-in-law and invaded his privacy, awarding him $361,000 in damages, but also found that he painted her in a false light in social media posts alleging she framed him for a crime. more
NSA Unveils "Artificial Intelligence Security Center"
The National Security Agency is establishing a new “Artificial Intelligence Security Center” to help spur on the secure development and adoption of AI capabilities, and defend AI advancements from foreign adversaries.
NSA Director and Cyber Command chief Gen. Paul Nakasone broke the news during an event at the National Press Club on Thursday.
“The AI Security Center will become NSA’s focal point for leveraging foreign intelligence insights, contributing to the development of best practices guidelines, principles, evaluation methodology, and risk frameworks for AI security, with an end goal of promoting the secure development, integration, and adoption of AI capabilities within our national security systems and our defense industrial base,” Nakasone said...
The news about the center comes as the NSA also plans to establish a new “innovation pipeline” focused on China. more
“The AI Security Center will become NSA’s focal point for leveraging foreign intelligence insights, contributing to the development of best practices guidelines, principles, evaluation methodology, and risk frameworks for AI security, with an end goal of promoting the secure development, integration, and adoption of AI capabilities within our national security systems and our defense industrial base,” Nakasone said...
The news about the center comes as the NSA also plans to establish a new “innovation pipeline” focused on China. more
Friday, November 3, 2023
Weekend Read: “Spymaster’s Prism: The Fight Against Russian Aggression”
November 1, 2023
I am pleased to announce that the paperback edition of my second book “Spymaster’s Prism: The Fight Against Russian Aggression” comes out today.
When the book was first published in the middle of the pandemic in 2021, there was only an emergent acknowledgement of the real threat posed by Russian "active measures" and espionage to Western interests. Though I devoted an entire section to Ukraine called "New Berlin", I could not have foretold how much the world would change only a year later, on 24 February 2022...
by Jack Devine (Author)
When the book was first published in the middle of the pandemic in 2021, there was only an emergent acknowledgement of the real threat posed by Russian "active measures" and espionage to Western interests. Though I devoted an entire section to Ukraine called "New Berlin", I could not have foretold how much the world would change only a year later, on 24 February 2022...
I hope that the release of the paperback of "Spymaster's Prism: The Fight Against Russian Aggression" will give you an opportunity to discover or revisit a thorough accounting of the Russian intelligence services relentless and unending campaign against the West and what we must continue to do to arrest it. Good Hunting!
Wednesday, November 1, 2023
The CIA Teaches You How to Speak Like a Spy
Spy Speak Glossary
Example: Rolled-up - when an undercover operation goes bad and is raided by opposing forces, resulting in agents or assets being arrested.
You might walk the walk, but can you talk the talk?
Being a spy is more than just the gadgets and the disguises. To be successful in the field, you need to speak like a spy.
So, before you head out on your next mission, or write the next great American spy novel, take some time to familiarize yourself with our Spy Speak glossary.
Example: Rolled-up - when an undercover operation goes bad and is raided by opposing forces, resulting in agents or assets being arrested.
Shady Things You Can Do With a Flipper Zero
Since it’s evil week at Lifehacker, let’s take a look at a gadget that can be used for mild evil: the Flipper Zero. Despite its toy-like looks, this pocket-friendly multitool can be used for all kinds of hacking and penetration testing.
It gives anyone, even newbs, an easy-to-understand way to interact with the invisible waves that surround us, whether they’re RFID, NFC, Bluetooth, wifi, or radio. It’s a like a hacker Swiss army knife that you can buy for less than $200.
You can use a Flipper Zero to control your TV, cheat your Nintendo, replace your work ID, open your hotel room door, and more. I’m sure you could see where the “evil” part could comes in. But on the other hand, it’s just a tool, and its ability to commit crimes is... more
Flipper Zero – Corporate Security Threat
You can use a Flipper Zero to control your TV, cheat your Nintendo, replace your work ID, open your hotel room door, and more. I’m sure you could see where the “evil” part could comes in. But on the other hand, it’s just a tool, and its ability to commit crimes is... more
Subscribe to:
Posts (Atom)