Monday, April 24, 2017

Top app has been spying on users and lying about it..

Uber, the ride-hailing service, is having a bad year. Last month, a secret Uber program called Greyball was exposed and it revealed how the company uses data collected from its app to evade authorities in areas where the service is resisted by law enforcement or banned.

Greyball was allegedly used in cities like Las Vegas, Boston and Paris, plus in countries like China, Australia and South Korea, to deny service to Uber accounts considered as a threat to the company.

Now, another controversy has surfaced and it involves a tussle with a company that Uber can't afford to irk.

The New York Times reported that in early 2015, Uber CEO Travis Kalanick met with Apple's Tim Cook to discuss specific questionable techniques the Uber app was allegedly employing.

Apple engineers discovered that the app was tracking its users even after it was deleted from iPhones. This practice, called "fingerprinting," violates Apple's privacy guidelines. "Fingerprinting" assigns each iPhone a specific identity via a small piece of code that persists even after the device's data has been wiped.

Tuesday, April 4, 2017

Someone is spying on cellphones in the nation's capital..

A CBC/Radio-Canada investigation has found cellphone trackers at work near Parliament Hill and embassies.

A months-long CBC News/Radio-Canada investigation has revealed that someone is using devices that track and spy on cellphones in the area around Parliament Hill.
The devices are known as IMSI catchers and have been used by Canadian police and security authorities, foreign intelligence and even organized crime.
The devices, sometimes known by the brand name of one model, StingRay, work by mimicking a cellphone tower to interact with nearby phones and read the unique ID associated with the phone — the International Mobile Subscriber Identity, or IMSI.
That number can then be used to track the phone and by extension the phone's user. In some instances, IMSI catchers can even be used to gain access to a phone's text messages and listen in on calls.

Thursday, March 16, 2017

Suspected Hack Attack Snagging Cell Phone Data Across D.C.

Malicious entity could be tracking phones of domestic, foreign officials

An unusual amount of highly suspicious cellphone activity in the Washington, D.C., region is fueling concerns that a rogue entity is surveying the communications of numerous individuals, likely including U.S. government officials and foreign diplomats, according to documents viewed by the Washington Free Beacon and conversations with security insiders.
A large spike in suspicious activity on a major U.S. cellular carrier has raised red flags in the Department of Homeland Security and prompted concerns that cellphones in the region are being tracked. Such activity could allow pernicious actors to clone devices and other mobile equipment used by civilians and government insiders, according to information obtained by the Free Beacon.
It remains unclear who is behind the attacks, but the sophistication and amount of time indicates it could be a foreign nation, sources said.
Mass amounts of location data appear to have been siphoned off by a third party who may have control of entire cell phone towers in the area, according to information obtained by the Free Beacon. This information was compiled by a mass-monitoring program supported by DHS and ESD America and known as ESD Overwatch.
Cell phone information gathered by the program shows major anomalies in the D.C.-area indicating that a third-party is tracking en-masse a large number of cellphones. Such a tactic could be used to clone phones, introduce malware to facilitate spying, and track government phones being used by officials in the area.

Wednesday, March 8, 2017

ComSec LLC Adds OverWatch IMSI Catcher Detection Services

Virginia Beach, VA, March 08, 2017 --( J.D. LeaSure, President/CEO of ComSec LLC announces the addition of IMSI catcher detection capabilities to ComSec’s world-class electronic eavesdropping / detection services. Surreptitious use of IMSI (international mobile subscriber identity) catchers and stingray devices pose a significant threat to the security and privacy of USA corporations and individuals. With ComSec’s IMSI catcher detection services, our clients gain cost-effective, real-time knowledge of IMSI catchers, baseband processor attacks, rogue base stations and cellular jamming threats to their devices and environment.

“ComSec LLC’s exclusive deployment of the ESD Overwatch System equips our clientele with real-time, actionable intelligence they can use to stop cellular attacks and to secure their networks. Enhancing our service offerings with IMSI catcher detection capability further demonstrates ComSec’s commitment to providing all-inclusive eavesdropping threat detection services that strengthen our clients’ security defenses," remarked J.D. LeaSure, ComSec LLC's President/CEO.

Hackers, foreign governments, foreign intelligence services, authoritarian regimes (via the black market in China), etc. use IMSI catchers to illegally access information sent and received via the 2G cellular network. IMSI catchers can be used to verify a phone’s location, track and locate a device, perform a denial of service attack, monitor cell phone use, intercept calls and SMS, and/or alert on the arrival and exit of a phone from a location. While an IMSI catcher can be made for approximately $500, the information illegally captured can be worth millions to the right buyer, and can result in critical financial and other ramifications for the affected corporation or individual.

Call ComSec LLC at 800-615-0392 to schedule IMSI catcher detection / TSCM services.

Saturday, March 4, 2017

Donald Trump Questions ‘Sick Guy’ Barack Obama for ‘Wire Tapping’ His Campaign..

President Donald Trump accused former President Barack Obama of wiretapping his campaign headquarters during the election in a series of messages on Twitter.

*Note: Folks, This is not the first time nor will it be the last. Wiretapping, bugging and eavesdropping is rampant in the political, corporate and private sector. Worried you might be next? Contact ComSec, we can help. JDL~

“Terrible! Just found out that Obama had my ‘wires tapped’ in Trump Tower just before the victory,” he wrote on Twitter. “Nothing found. This is McCarthyism!”
Trump questioned whether it was legal for Obama to be wiretapping a presidential candidate while he was still in office.
“How low has President Obama gone to tapp (sic) my phones during the very sacred election process,” he wrote. “This is Nixon/Watergate. Bad (or sick) guy! Is it legal for a sitting President to be ‘wire tapping’ a race for president prior to an election? Turned down by court earlier. A NEW LOW!”
Trump is likely referring to calls from talk radio hosts Mark Levin and Rush Limbaugh to investigate the nature of the Obama administration’s investigations of his campaign aides for their communications with Russia, as Breitbart News editor Joel Pollak reported. 

Thursday, March 2, 2017

Are Today's Cameras Cybersecure?

Are Today's Cameras Cybersecure? 10 Tips to Avoid Camera Hacking

We’ve all heard about the dangers of hacking into computers and smart devices, as well as cyberthieves stealing credit and debit card information. But have you though specifically about the hacking of the built-in camera in each of those devices?

Here’s the thing: If your device is connected to the internet, then your device’s camera is at risk for being hacked. And it’s not just computers—it’s cameras such as baby monitors or security cameras.

Plenty of experts and insiders use a low-tech way of helping to block camera and microphone access: They simply cover the camera lens or mic port with tape. Beyond that simple, cheap method, though, there are a number of best practices that can help build better security around your camera. That includes super-strong passwords (no “1234” please) as well as up-to-date software, which may solve security lags.


Want to learn more? This graphic can help with additional ideas. Or contact ComSec, we can help. JDL~

Read more here.

Friday, February 10, 2017

JOHN C. PLATT III. Rest in Peace Cowboy...

Potomac Falls, VA - John Cheney Platt III (Jack), aged 80, died unexpectedly on January 4, 2017 of advanced esophageal cancer. Jack, also known as "Cowboy," served proudly as an officer in the United States Marine Corps followed by 25 years of service in the Central Intelligence Agency. He led a life full of intrigue, mystery and adventure serving his country abroad in Austria, Laos and France. He was a natural leader, a mentor to many, and did not suffer fools lightly.

After retiring from the CIA, he formed the Hamilton Trading Group partnership that allowed him to continue training others on security awareness measures to protect themselves in a dangerous new world. He spent his last few years traveling widely with his wife and friends. 

Mr. Platt, who was known as Jack, was a gruff former Marine officer who for years ran a training program in Washington to teach C.I.A. case officers how to operate under cover. But he was best known in the spy world for his longtime friendship with Gennadiy Vasilenko, a K.G.B. officer whose betrayal by Aldrich Ames, the Soviet mole at the C.I.A., led to Mr. Vasilenko’s imprisonment in Moscow.

Mr. Platt was hired by the CIA in 1963. He was an operations officer with an extensive information collection and counter-intelligence background.  In the course of various assignments overseas, he lived and worked in Austria, Germany, France and Laos. He also traveled extensively in Latin America, the Caribbean and to a lesser extent in Eastern Europe. For five years he directed a CIA training program which was awarded a Unit Citation for excellence.  This program was successful in preparing U.S. personnel and their families to live and work productively in hostile countries.  Upon retirement, Mr. Platt was awarded the CIA's Career Intelligence Medal for exceptional performance and commended by the Director of the Federal Bureau of Investigation for his professionalism, zeal and vital assistance to the FBI. 
Mr. Platt and several like-minded Americans took steps to open a window on the “new  Russian Federation” in the early 1990s. He contacted former Soviet adversaries and pushed for mutual agreements on conducting commercial inquiries and personal security and safety –in Russia.  The joint business efforts of the company and the Russians were favorably described in news stories (LA Times, Palm Beach Post, Forbes Magazine and the NYT). Platt’s unusual but interesting relationships with “former KGB enemies” have been cited in TV programs about the CIA and KGB (Discovery Channel in 1997 and CBS 60 Minutes II in 2001). 
Regrettably, the results of “regime change” in Russia (i.e., Putin’s Kremlin) rendered bilateral business cooperation with Russian contacts as damaged efforts best observed in the rear-view mirror. In 2005, the prime business partner in Russia, retired KGB officer Gennadiy Vasilenko, was arrested in Moscow on trumped up charges and sentenced to a long prison term. After serving 5 ½  years of a 3-year sentence in the Russian prison system, Mr. Vasilenko was granted free passage to be resettled with his family in the USA  -- being part of a historic “Russian- USA spy swap” of July 2010. 
In addition to his wife, the former Paige Gordon, he is survived by three daughters, Leigh, Michelle and Diana Platt, and one grandson.

Rest in Peace Cowboy.  You will be greatly missed. J.D.L. ~