There is nothing more luxurious than your own private island.
A secluded space, which is owned only by you. Private islands are the definition of privacy, security, peace, tranquility and an extraordinary lifestyle. There are only a handful of people in the world who have the opportunity to provide themselves and their family with the exclusive privacy and seclusion.
Enjoy it while you can...
Sea level rise accelerated by the melting of glaciers due to rising global temperatures has put many island nations on high alert, as their very survival hangs in the balance.
NASA researchers recently predicted that we are currently "locked into at least three feet of sea level rise, and probably more" by the end of the century.
Specifically, the Intergovernmental Panel on Climate Change listed the "Marshall Islands, Kiribati, Tuvalu, Tonga, the Federated States of Micronesia and the Cook Islands (in the Pacific Ocean); Antigua and Nevis (in the Caribbean Sea); and the Maldives (in the Indian Ocean)," as the most vulnerable nations to the effects of climate change. more
Thursday, June 29, 2017
Business Espionage: The Slow Burn Costs
"Businesses need to be aware of the full costs of a cyber-attack, in particular, the “slow-burn” costs (i.e. those associated with the long-term impacts of a cyber-attack, such as the loss of competitive advantage and customer churn). When added to immediate costs (i.e. legal
and forensic investigation fees, and extortion pay outs), slow burn costs can dramatically increase the final bill." Lloyd's Report - in association with KPMG and legal firm DAC Beachcroft more
Lloyd's is promoting their cyber-insurance with this report. Their warning, however, actually applies to all forms of business espionage. Insurance is for the disaster. A good Technical Information Security Survey can prevent disasters. You need both.
15 Photos of ATM Scams
Take note of some of the most common ways thieves will try to steal your credit card details.
Fourteen more photos.
Fourteen more photos.
Stepfather Accused of Murder Preceded by Spycam
Man accused of killing stepdaughter may have photographed her through peep holes.
Detectives found a photo they believe is of 13-year-old Jayden Glomb in her bathroom wearing a sports bra, apparently taken secretly by her stepfather who is now accused of killing her, court documents say.
Property seized so far in the investigation includes an endoscope camera, spy camera, thumb drives, clothing and photographs, according to a search warrant.The Tucson Police Department’s crime laboratory has begun to analyze the contents of a home computer that was used by Joshua Lelevier, 37, who was arrested May 31 in Jayden’s suffocation death. more
Detectives found a photo they believe is of 13-year-old Jayden Glomb in her bathroom wearing a sports bra, apparently taken secretly by her stepfather who is now accused of killing her, court documents say.
Property seized so far in the investigation includes an endoscope camera, spy camera, thumb drives, clothing and photographs, according to a search warrant.The Tucson Police Department’s crime laboratory has begun to analyze the contents of a home computer that was used by Joshua Lelevier, 37, who was arrested May 31 in Jayden’s suffocation death. more
Tuesday, June 27, 2017
Cyber Espionage: Canada and China Agree to Knock it Off
The Chinese government has reached a landmark agreement with Canadian authorities that pledges to halt "economic cyber espionage", a technique long-used by Beijing to hack into large firms and steal trade secrets, often including details of proprietary technology and military plans...
"The two sides agreed that neither country's government would conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages," a portion of the deal stated.
According to the Globe and Mail, which first reported the deal, the accord solely covers economic espionage, declining to mention online espionage, surveillance and hacking to spy on state activity. more
Other business espionage items the accord does not cover...
"The two sides agreed that neither country's government would conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages," a portion of the deal stated.
According to the Globe and Mail, which first reported the deal, the accord solely covers economic espionage, declining to mention online espionage, surveillance and hacking to spy on state activity. more
Other business espionage items the accord does not cover...
- Electronic eavesdropping.
- Telephone wiretapping.
- Physical penetration of the workplace.
- Social Engineering.
- Infiltration of the workforce.
- Subversion of employees. (blackmail, payoffs, etc.)
- Optical surveillance.
Sunday, June 25, 2017
Dumb Thought #1: Spying — Dumb Thought #2...
On June 22, Kevin Patrick Mallory was brought before a US federal judge
for his first hearing on charges that he sold highly classified
documents to a Chinese intelligence agent.
These documents, which are considered "National Defense Information," included at least one Top Secret document and three classified as Secret and were found on a phone Mallory had been provided by his Chinese contacts.
Mallory, a 60-year-old former Central Intelligence Agency employee had thought the documents were in messages that had been deleted automatically from the device. Mallory faces life in prison if convicted. more
These documents, which are considered "National Defense Information," included at least one Top Secret document and three classified as Secret and were found on a phone Mallory had been provided by his Chinese contacts.
Mallory, a 60-year-old former Central Intelligence Agency employee had thought the documents were in messages that had been deleted automatically from the device. Mallory faces life in prison if convicted. more
Saturday, June 24, 2017
Things We See — Blue Bucket Blues
Not all information security issues are this obvious.
Finding all of them requires an independent Technical Information Security Survey. more
Business Espionage: America's Cup Teams Spy
The definition of a spy is that he or she operates furtively. But there's been no secrecy around the blatant spying of Oracle and Team New Zealand on each other's boats during the five-day America's Cup break.
Both teams have dropped all pretense about their intelligence-gathering ahead of the final resuming in Bermuda this Sunday New Zealand time.
With Peter Burling and the red-hot Kiwis leading 3-0 in the first-to-seven-wins showdown, desperate Oracle spies went about their work today with the subtlety of a sledgehammer...
Team New Zealand has been doing the same thing, assiduously gaining as much information as possible... more
Both teams have dropped all pretense about their intelligence-gathering ahead of the final resuming in Bermuda this Sunday New Zealand time.
With Peter Burling and the red-hot Kiwis leading 3-0 in the first-to-seven-wins showdown, desperate Oracle spies went about their work today with the subtlety of a sledgehammer...
Team New Zealand has been doing the same thing, assiduously gaining as much information as possible... more
How a Calgary Woman Brought Down the CanadaCreep Account
Canada - The Twitter user who initially raised alarm about the 'CanadaCreep' is relieved to hear her actions may have taken a voyeur off the street.
Jeffrey Robert Williamson, 42, is accused of filming women without their knowledge and posting the images online under the Twitter handle ‘CanadaCreep.’
He was charged last week with three counts each of voyeurism and publication of voyeuristic recordings in relation to three alleged incidents and later released on bail, but freedom would be short-lived... more
Jeffrey Robert Williamson, 42, is accused of filming women without their knowledge and posting the images online under the Twitter handle ‘CanadaCreep.’
He was charged last week with three counts each of voyeurism and publication of voyeuristic recordings in relation to three alleged incidents and later released on bail, but freedom would be short-lived... more
Snapchat is Now Your New GPS Ankle Bracelet
Bored Snapchat users looking for something to do should update their apps today: they'll be greeted with a new map view that shows where exactly their friends are and what they're up to.
Snap Map, as the company is calling it, can be activated by pinching your fingers together on the camera view when you first start the app. Once in map view, you'll see "Actionmoji" versions of your nearby friends, which include their names and profile photos in a configuration that vaguely resembles the tags you might find on plants for sale at the nursery.
When you tap on one of your friends' icons, you'll see stories they've posted recently...
What if none of your friends are around or they haven't posted anything interesting recently? Not to worry: the map view will also show a heat map based on the activity of other Snapchat users. more
Snap Map, as the company is calling it, can be activated by pinching your fingers together on the camera view when you first start the app. Once in map view, you'll see "Actionmoji" versions of your nearby friends, which include their names and profile photos in a configuration that vaguely resembles the tags you might find on plants for sale at the nursery.
When you tap on one of your friends' icons, you'll see stories they've posted recently...
What if none of your friends are around or they haven't posted anything interesting recently? Not to worry: the map view will also show a heat map based on the activity of other Snapchat users. more
Friday, June 23, 2017
TSCM Questions We Get - "How small is a bug's microphone?"
A. Very small.
You probably carry the one shown in the photo, in your cell phone.
In some cases, microphones are invisible. Before you say impossible, hear me out...
You are surrounded by items which can be commandeered for surveillance eavesdropping wherever you go. Solids and liquids conduct sound even better than air. Vibrations through these items may be picked up and amplified at some distance using: a piezoelectric contact microphone, a hydrophone, or light / sound beams (laser / ultrasonic).
There is also one esoteric microphone to consider—the fiber optic microphone. No wires. No electricity. Just connected to a clear glass thread.
It is so unusual, many people who claim to be technical surveillance countermeasures (TSCM) technicians don't know it exists.
So, when you add Technical Information Security Surveys to your organization's security program, ask the vendor what they know about fiber optic microphones. Good ones will tell you all about it, and how it works. They will also be impressed with you for asking.
Click here for more questions we get.
You probably carry the one shown in the photo, in your cell phone.
In some cases, microphones are invisible. Before you say impossible, hear me out...
You are surrounded by items which can be commandeered for surveillance eavesdropping wherever you go. Solids and liquids conduct sound even better than air. Vibrations through these items may be picked up and amplified at some distance using: a piezoelectric contact microphone, a hydrophone, or light / sound beams (laser / ultrasonic).
Optimic1140 fiber optical microphone |
It is so unusual, many people who claim to be technical surveillance countermeasures (TSCM) technicians don't know it exists.
So, when you add Technical Information Security Surveys to your organization's security program, ask the vendor what they know about fiber optic microphones. Good ones will tell you all about it, and how it works. They will also be impressed with you for asking.
Click here for more questions we get.
Wednesday, June 21, 2017
Security Alert: If Your Phone Says Avaya... ask IT about this.
Internet telephony company Avaya has patched a high-severity vulnerability in its Aura Application Enablement Services product that put phone call and API data running through the server at risk for interception.
Researchers at Digital Defense found a vulnerability where an attacker could, without authentication, abuse Remote Procedure Calls (RPC) into the server and modify input in such a way that they would be granted remote administrative access...
“Anything that passes through that server [would be at risk],” said Mike Cotton, vice president of research and development... “An attacker could send malformed input at the interfaces and take control over the service and any voice data... “Eventually you can get root command through remote compromise,” he said.
In an advisory updated June 14, Avaya said versions 6.3.1, 6.3.2, 6.3.3 and 7.x are affected. The company said that versions 6.3.1, 6.3.2 and 6.3.3 should install Super Patch 7 and apply AE Services 6.3.3.7 security hotfix. Users on 7.0.x should upgrade to 7.0.1 and install Super Patch 4 and AE Services 6.3.3.7 security hotfix as well. Users on 7.1 should apply AE Services 7.1.0.0.0 Security Hotfix.
“Certainly for enterprises that use the product, this is a high-impact vulnerability,” Cotton said. “The ultimate severity is how many business-critical apps are attached to this thing and where it’s sitting within the network infrastructure. This is something I would prioritize and move to the top of patching lists.” more
Researchers at Digital Defense found a vulnerability where an attacker could, without authentication, abuse Remote Procedure Calls (RPC) into the server and modify input in such a way that they would be granted remote administrative access...
“Anything that passes through that server [would be at risk],” said Mike Cotton, vice president of research and development... “An attacker could send malformed input at the interfaces and take control over the service and any voice data... “Eventually you can get root command through remote compromise,” he said.
In an advisory updated June 14, Avaya said versions 6.3.1, 6.3.2, 6.3.3 and 7.x are affected. The company said that versions 6.3.1, 6.3.2 and 6.3.3 should install Super Patch 7 and apply AE Services 6.3.3.7 security hotfix. Users on 7.0.x should upgrade to 7.0.1 and install Super Patch 4 and AE Services 6.3.3.7 security hotfix as well. Users on 7.1 should apply AE Services 7.1.0.0.0 Security Hotfix.
“Certainly for enterprises that use the product, this is a high-impact vulnerability,” Cotton said. “The ultimate severity is how many business-critical apps are attached to this thing and where it’s sitting within the network infrastructure. This is something I would prioritize and move to the top of patching lists.” more
Tuesday, June 20, 2017
Be Successful Like Apple - Get Serious About Information Security
A recording of an internal briefing at Apple earlier this month obtained by The Outline sheds new light on how far the most valuable company in the world will go to prevent leaks about new products.
The briefing, titled “Stopping Leakers - Keeping Confidential at Apple,” was led by Director of Global Security David Rice, Director of Worldwide Investigations Lee Freedman, and Jenny Hubbert, who works on the Global Security communications and training team...
The briefing, which offers a revealing window into the company’s obsession with secrecy, was the first of many Apple is planning to host for employees. In it, Rice and Freedman speak candidly about Apple’s efforts to prevent leaks...
Director of Global Security, David Rice...“We deal with very talented adversaries. They're very creative and so as good as we get on our security controls, they get just as clever.” more
If your security plan does not include Technical Information Security Surveys, contact me. ~Kevin
The briefing, titled “Stopping Leakers - Keeping Confidential at Apple,” was led by Director of Global Security David Rice, Director of Worldwide Investigations Lee Freedman, and Jenny Hubbert, who works on the Global Security communications and training team...
The briefing, which offers a revealing window into the company’s obsession with secrecy, was the first of many Apple is planning to host for employees. In it, Rice and Freedman speak candidly about Apple’s efforts to prevent leaks...
Director of Global Security, David Rice...“We deal with very talented adversaries. They're very creative and so as good as we get on our security controls, they get just as clever.” more
If your security plan does not include Technical Information Security Surveys, contact me. ~Kevin
Friday, June 16, 2017
Why You Need a Technical Information Security Survey - Reason #413
Reason #413 - Yes, they are out to get you.
Here is a brief excerpt from an Entrepreneur Magazine article I read recently. It's entitled:
"One of the best ways to thoroughly understand your market is to take a look at your competition. By not spying, you are at a significant disadvantage.
Here are three reasons it’s a good idea to spy on your competition…
Background
There have always been industrial espionage spies and business espionage tricks. Heck, the Industrial Revolution in the U.S. began this way. The Chinese lost their secrets of silk this way.
Spying as a method of getting ahead in business, was not encouraged by the media during most of the 20th Century. Children were taught entrepreneurial ideals, like: hard work, independence, persistence, and inventiveness.
So, how did we get to the point of, "Screw it, let's just spy!”
Corrosion of societal mores is an evolutionary process. Some of you will remember the days when kids had heroes who exemplified moral codes: The Shadow ("The weed of crime bears bitter fruit. Crime does not pay."), Joe Friday (Dragnet), Dan Matthews (Highway Patrol), The Lone Ranger, etc. Others may remember the glamorization of the "good" spy from TV shows like: Secret Agent Man, The Man from U.N.C.L.E., Mission Impossible, and The Prisoner.
These radio and TV shows still languish deep in digital tombs like YouTube; as forgotten as the Greek Chorus. On the bright side, at least these morality plays still exist.
1960’s spy shows spawned a huge market for children’s spy toys. The market remains strong today, and much more technically advanced.
For decades, children have grown up with spy toys. Spy toy manufacturers blatantly promote spying as cool and fun.
The morally strong TV heroes children used to look up to have disappeared. Today’s “Super Hero” has little connection with reality. The good vs. evil dividing line in the plots has become fuzzy. The super heroes themselves are confusing. Dark sides and moral cracks have infected the genre. Several generations of children have been desensitized to spying, and now, as adults, their moral compasses look like Batman fidget spinners.
Today’s Reality
The workplace is now filled with former children who have no compunction about spying. Almost everyone has a spy tool in their pocket that Maxwell Smart could only dream about. And, if one needs a thumb-sized bug that can be listened in on via a cell phone, from anywhere in the world… it can be purchased on eBay for less than $25.00.
Analysis of Business Espionage Today
• Risk level: Low.
• Reward level: High.
• Why people spy in the workplace:
- Money.
- Power.
- Sex
• Surveillance Tools:
- Inexpensive.
- Readily available in spy shops and on the Internet.
- Untraceable when purchased from foreign countries.
Other Contributing Factors…
How would you know?
Spy Rule #1 - Stay undetected.
By definition, successful espionage goes undetected, only failures become known.
If you ignore business espionage, or decide to take a “risk-assessment” gamble, you will never know if you’re bleeding information. (Parasites don’t alert their hosts.)
Business espionage can be forced to fail.
Actively look for:
An independent consultant’s report is proof of the organization’s due diligence, and may be very helpful in showing enhanced duty of care for trade secrets and other sensitive information in legal settings.
Considering what is at stake, a Technical Information Security Survey is very economical insurance, even better than insurance… it can prevent losses in the first place. Add it to your security program.
Here is a brief excerpt from an Entrepreneur Magazine article I read recently. It's entitled:
3 Reasons You Should Spy on Your Competition
"One of the best ways to thoroughly understand your market is to take a look at your competition. By not spying, you are at a significant disadvantage.
Here are three reasons it’s a good idea to spy on your competition…
- Without spying, it’s impossible to know what you’re up against -- as a result, you can’t completely prepare.
- It’s easy to do. Don’t be discouraged from spying on your competition by assuming that it is daunting or resource intensive.
- It would be wasteful to not spy. Speaking of wasted resources, without spying on your competition it’s very easy to waste time trying to find your ideal market and your reach."
Background
There have always been industrial espionage spies and business espionage tricks. Heck, the Industrial Revolution in the U.S. began this way. The Chinese lost their secrets of silk this way.
Spying as a method of getting ahead in business, was not encouraged by the media during most of the 20th Century. Children were taught entrepreneurial ideals, like: hard work, independence, persistence, and inventiveness.
So, how did we get to the point of, "Screw it, let's just spy!”
Corrosion of societal mores is an evolutionary process. Some of you will remember the days when kids had heroes who exemplified moral codes: The Shadow ("The weed of crime bears bitter fruit. Crime does not pay."), Joe Friday (Dragnet), Dan Matthews (Highway Patrol), The Lone Ranger, etc. Others may remember the glamorization of the "good" spy from TV shows like: Secret Agent Man, The Man from U.N.C.L.E., Mission Impossible, and The Prisoner.
These radio and TV shows still languish deep in digital tombs like YouTube; as forgotten as the Greek Chorus. On the bright side, at least these morality plays still exist.
1960’s spy shows spawned a huge market for children’s spy toys. The market remains strong today, and much more technically advanced.
For decades, children have grown up with spy toys. Spy toy manufacturers blatantly promote spying as cool and fun.
The morally strong TV heroes children used to look up to have disappeared. Today’s “Super Hero” has little connection with reality. The good vs. evil dividing line in the plots has become fuzzy. The super heroes themselves are confusing. Dark sides and moral cracks have infected the genre. Several generations of children have been desensitized to spying, and now, as adults, their moral compasses look like Batman fidget spinners.
Today’s Reality
The workplace is now filled with former children who have no compunction about spying. Almost everyone has a spy tool in their pocket that Maxwell Smart could only dream about. And, if one needs a thumb-sized bug that can be listened in on via a cell phone, from anywhere in the world… it can be purchased on eBay for less than $25.00.
Analysis of Business Espionage Today
• Risk level: Low.
• Reward level: High.
• Why people spy in the workplace:
- Money.
- Power.
- Sex
• Surveillance Tools:
- Inexpensive.
- Readily available in spy shops and on the Internet.
- Untraceable when purchased from foreign countries.
Other Contributing Factors…
- The mores about eavesdropping and espionage have changed.
- Increased competitive pressures placed on employees, consultants and businesses force ethics bending.
- Media glorification presents spying as sexy and justifiable.
- Since the 60's, spy toys and games have been actively promoted to children as being fun and acceptable. Children grow up.
How would you know?
Spy Rule #1 - Stay undetected.
By definition, successful espionage goes undetected, only failures become known.
If you ignore business espionage, or decide to take a “risk-assessment” gamble, you will never know if you’re bleeding information. (Parasites don’t alert their hosts.)
Business espionage can be forced to fail.
Actively look for:
- evidence of information loss,
- evidence of electronic surveillance: audio, video and data,
- information loss vulnerabilities in: the workplace, your transportation, your home office, and at off-site meeting venues,
- loopholes in your perimeter security,
- decaying or broken security hardware, upon which you rely,
- information security policies employees no longer follow,
- information security vulnerabilities inherent in normal office equipment,
- and, an independent security consultant, whose specialty is the Technical Information Security Survey, to do this for you.
An independent consultant’s report is proof of the organization’s due diligence, and may be very helpful in showing enhanced duty of care for trade secrets and other sensitive information in legal settings.
Considering what is at stake, a Technical Information Security Survey is very economical insurance, even better than insurance… it can prevent losses in the first place. Add it to your security program.
Labels:
#eavesdropping,
#espionage,
#TSCM,
advice,
ethics,
historical,
mores,
privacy,
toy
Wiretapping in the Workplace
by Benjamin E. Widener - Stark & Stark
The recent turmoil, investigation and controversy surrounding President Donald Trump’s firing of former FBI Director James Comey has thrust the issue of wiretapping into the public and political spotlight. “James Comey better hope that there are no ‘tapes’ of our conversations before he starts leaking to the press!,” President Trump tweeted on May 12, 2017, suggesting that “tapes” of his private conversations with Director Comey might exist...
All of this commotion prompted me to think about wiretapping in the workplace and, specifically, the issue of audio recordings or, as President Trump has expressed, “tapes” of conversations secretly recorded by an employer of its employees. What types of audio or tape recordings are legally permitted in the employment environment? more
Extra Credit: Workplace Eavesdropping - Time to Consider a Recording in the Workplace Policy
The recent turmoil, investigation and controversy surrounding President Donald Trump’s firing of former FBI Director James Comey has thrust the issue of wiretapping into the public and political spotlight. “James Comey better hope that there are no ‘tapes’ of our conversations before he starts leaking to the press!,” President Trump tweeted on May 12, 2017, suggesting that “tapes” of his private conversations with Director Comey might exist...
All of this commotion prompted me to think about wiretapping in the workplace and, specifically, the issue of audio recordings or, as President Trump has expressed, “tapes” of conversations secretly recorded by an employer of its employees. What types of audio or tape recordings are legally permitted in the employment environment? more
Extra Credit: Workplace Eavesdropping - Time to Consider a Recording in the Workplace Policy
Subscribe to:
Posts (Atom)