Wednesday, June 3, 2009

TSCM Technical Security Officer - Job Opening

Shift: None
Type of Travel: Continental US, Outside Continental US - Hazard, Local
Percent of Travel Required: Up to 75%
Description: The candidate will assist in all aspects of of TSCM management that involves technical security (including TEMPEST) entailing new construction, modification, accreditation, re-accreditation, withdrawal and advice and assistance (SAV). The candidate will help schedule and perform TSCM evaluations and security staff visits of facilities locate CONUS/OCONUS, provide comprehensive, risk-based technical security advice, guidance, and general security support to program offices and contractor facility security offices. The candidate will prepare written correspondence to include facility file reports, cable messages, approvals, status/technical briefs and inspections reports, SAV reports, maintain databases; which includes entering new data and correspondence and quality controlling file records. Conduct analysis of complex technical, surveillance, counter surveillance, surveillance detection or other technical vulnerabilities. Provide technical support to projects in areas such as training, logistics, acquisition and technical counterintelligence investigations. Assists in developing and monitoring project tasks and schedules. Maintain a thorough knowledge of all technical security governing directives. The candidate must be a graduate of the Interagency Training Center for TSCM and an EXPERT in two of the following areas: a) Counterintelligence , b)Automated Information Systems, c) Lock and Key Control Systems, d) Access Control Systems, g) TEMPEST, h) DoD SCIF construction standards. Experience using a variety of ADP systems that include Microsoft Office applications (e.g. Word, Excel, Outlook, PowerPoint). Requires a Bachelors degree and 10-12 years experience. (more)

"Hazard," ok.
PowerPoint?!?... I'm outta here.

Time to Review and Clean Up Your On Line Act

via Tamara Thompson, PI Magazine...
Intelius is the ubiquitous Internet provider of background reports — serving the consumer hungry for criminal records and other dirt on potential dates, family members and service providers — but more expensive and not as comprehensive as professional databases...

Spock is a fee-based search engine — with a free teaser — for finding social networking profiles. Spock crawls websites, matching the personal information you provide, then returns the links. You’ll probably get more results from snitch.name, Wink or Pipl, and more refined returns from an advanced query at the top search engines. (more)

Time to run your name and delete those old college party photos before you hand in that resume. ~Kevin

Nuke Web Page Nuked

The federal government mistakenly made public a 266-page report, its pages marked “highly confidential,” that gives detailed information about hundreds of the nation’s civilian nuclear sites and programs, including maps showing the precise locations of stockpiles of fuel for nuclear weapons...

On Tuesday evening, after inquiries from The New York Times, the document was withdrawn from a Government Printing Office Web site. (more)

Finished feeling smug? Now, go check your corporate web site, marketing department, Boardroom and secretarial desks to see what confidential materials you have out for the taking. ~Kevin

Monday, June 1, 2009

First Economic Espionage Trial in California

CA - Dongfan "Greg" Chung developed a reputation as an innovator during his three decades as an engineer for Boeing Co. and Rockwell International.

Federal prosecutors say he was also a hardworking spy.

On Tuesday, Chung is scheduled to become the first person to stand trial under the Economic Espionage Act, which was passed more than a decade ago.

Prosecutors say the Chinese-born Chung, 73, stole hundreds of thousands of pages of highly sensitive documents on the U.S. space shuttle, Delta IV rockets and the C-17 military troop transport, then relayed the secrets to contacts in China. (more)

Ever Wonder How-to...

...eavesdrop with a cell phone
...hack a cell phone into a spy device
...make a spy listening bug for $20
...build a laser microphone
...build a spy microphone
...hack a Mr. Microphone into a high tech spy device
...make a high-tech spy stethoscope
...make a portable spy scope cellphone camera
...make your own spy sunglasses
...build a $40 USB spy telescope
...spy on friends with a hidden camera
...spy on your partner
...build a wireless finger phone
Ok, I'll stop.
You get the point.
There is no shortage of creative minds out there.

By the way, there has never been a time in history when spying has been easier or cheaper for the average person. ~Kevin

SpyCam Story #530 - "Shrimps in the barbie."

An Antwerp man was indicted Wednesday by a Jefferson County grand jury on a charge that he used a spycam to watch people in his bathroom.

Dennis J. Koerick Jr., 44, of 35558 Pulpit Rock Road, faces two counts of second-degree unlawful surveillance and one count each of tampering with physical evidence and making a punishable false written statement.

Mr. Koerick is accused of using the tiny camera between Dec. 10 and 15 and then burning it and a computer in an outdoor wood-burning boiler before police could question him. He is further accused of telling police Dec. 18 that he was unaware that a camera was installed in his bathroom. (more)

Sunday, May 31, 2009

"Do you or do you not have tattooed on your bottom the words 'Jesus is coming, look busy'? "

via Wired...
Yet another breach of sensitive, unencrypted data is making news in the United Kingdom. This time the breach puts Royal Air Force staff at serious risk of being targeted for blackmail by foreign intelligence services or others.

The breach involves audio recordings with high-ranking air force officers who were being interviewed in-depth for a security clearance. In the interviews, the officers disclosed information about extra-marital affairs, drug abuse, visits to prostitutes, medical conditions, criminal convictions and debt histories — information the military needed to determine their security risk.

The recordings were stored on three unencrypted hard drives that disappeared last year. (more) (more) (heading quote)

Can't Touch This! ~MIB

DC - This part happens all the time: A construction crew putting up an office building in the heart of Tysons Corner a few years ago hit a fiber optic cable no one knew was there.

This part doesn't:
Within moments, three black sport-utility vehicles drove up, a half-dozen men in suits jumped out and one said, "You just hit our line."

Whose line, you ma
y ask? The guys in suits didn't say, recalled Aaron Georgelas, whose company, the Georgelas Group, was developing the Greensboro Corporate Center on Spring Hill Road. But Georgelas assumed that he was dealing with the federal government and that the cable in question was "black" wire -- a secure communications line used for some of the nation's most secretive intelligence-gathering operations.

"The construction manager was shocked," Georgelas recalled. "He had never seen a line get cut and people show up within seconds. Usually you've got to figure out whose line it is. To garner that kind of response that quickly was amazing." (more) (sing-a-long)
...and then he forgot all about it.

Friday, May 29, 2009

Everything You Need to Know about Electronic Eavesdropping Detection for Business

“Should we be checking check for bugs and wiretaps, or am I just being paranoid?”

This thought would not have occurred to you if everything were fine. Trust your instincts. Something is wrong. Eavesdropping is a common practice; so are regular inspections to detect it.

You never hear about successful eavesdropping or espionage attacks. You’re not supposed to. It’s a covert act. Eavesdropping and espionage is invisible. Discovery relies heavily on the victim’s intuition and preparedness to handle the problem. Prevention—via regular inspections—is the logical and cost-effective solution.

Spying Is a Common Activity
Due to the covert nature of spying, the exact... (Full Article)

Wednesday, May 27, 2009

How do you sell end to end data encryption?

With the world's coolest data breach map!
Guaranteed to scare the dollars out of any tight-fisted CFO. ~Kevin
Voltage Data Breach Index
Round of applause to the curators of
The Museum of Bitten Bytes...

DataLossDB is a research project aimed at documenting known and reported data loss incidents world-wide. The effort is now a community one, and with the move to Open Security Foundation's DataLossDB.org, asks for contributions of new incidents and new data for existing incidents.

Tuesday, May 26, 2009

Police bugging incident claims another cop

MN - Another member of the Gaylord Police Department is on paid administrative leave in an alleged "bugging" scheme.

The Gaylord City Council has voted unanimously to place Officer Tom Webster on leave until further notice. The move stems from charges filed against Gaylord Police Chief Dale Roiger over allegations that he had Webster plant a recording device in the Gaylord Chamber of Commerce office two years ago. (more) (background)

Napoleon Returns to Face Eavesdropping Charge

IL - A man who ran from a sentencing hearing and spent 10 years in Missouri returned to a Illinois courtroom on Friday to face the same judge. The judge gave him three years in prison and a scolding...

Authorities say Napoleon Williams, now 54 years old, made audio tapes of two people and broadcast their words without their consent on an independent radio station.

In 1998, a jury found him guilty of felony eavesdropping. (
more)

The rest of the story...

The "broadcasts" Napoleon made were over his pirate FM radio station, "BLR" Black Liberation Radio. It only covered about a 10 block area of town. While I was there, I heard several of these broadcasts. The story of Napoleon's station and his dealings with the FCC and local law enforcement are the real story.

In 1999, just before he was about to be sentenced, Napoleon vanished. He wrote letters explaining his case. You can find them posted on the Net. He remained underground until now.

People may disagree with his views and tactics, but all should agree that he has a place in history. He is one of the founders of the U.S. microradio movement. Low-power FM radio is legal today. (
more) (more) (more)

FutureWatch - ChipCam

A MICROCHIP-sized digital camera patented by the California Institute of Technology could provide vision for the US military's insect-sized aircraft. It is light enough to be carried by these tiny surveillance drones and also uses very little power.

Caltech's Jet Propulsion Lab in Pasadena has squeezed all the components of a camera onto one low-power chip, revealed in a US patent filed last week.

The gadget can be
radio-controlled via a secure frequency-hopping link from up to a kilometre away, say its inventors. (more)

Spy Needs New Home

MT - A Cold War spy plane with three tail fins and a hump on the fuselage needs a new home after being parked in Helena since 1981.

The retired EC-121, a version of which transported President Eisenhower from 1954-61, flew here 28 years ago for use in aviation maintenance classes. The military adaptation of the Lockheed Constellation taxied now and then, but mostly it has stood idle next to a hangar at the University of Montana's Helena College of Technology.

The college no longer wants the old Air Force plane... equipped to snoop on enemy aircraft during the Cold War that followed World War II. The surveillance planes carried radar in domes atop and below the fuselage. (more)

Cool SpyCam... Except, you don't smoke!

Lighter Spy Camcorder with built-in 2GB memory, recharegable Li-ion battery, light weight and easy to carry design. $66.00 (more)

Soooo, if you don't smoke, how about a nice key chain camera? (more)

Why do we mention it?
So you will know what you're up against.