Tuesday, June 28, 2016

Facebook listens and records your conversations...

Have you been on your computer and seen an ad for the brand of shoes you were just talking about with your coworker? Or seen a link to a special sale that Home Depot is having minutes after you heard about it on your radio?

Coincidence? Maybe not.
Recent reports suggest that this information is being gathered in the sneakiest way. And it all has to do with a certain app that we all use multiple times a day, every day.

We're talking about the Facebook app, specifically its always-listening feature.

According to Kelli Burns, a mass communication professor at the University of South Florida, not only is Facebook gathering information from you based on the conversations you're having, it's showing you ads for products related to what you were talking about.

"The tool appears to be using the audio it gathers not simply to help out users, but to listen in to discussions and serve them with relevant advertising," Burns explained. In an effort to prove her theory, Burns would talk about certain topics with her phone nearby and then observe that ads related to her conversations would appear on her Facebook News Feed.

Monday, May 23, 2016

Beware of keystroke loggers disguised as USB phone chargers

FBI officials are warning private industry partners to be on the lookout for highly stealthy keystroke loggers that surreptitiously sniff passwords and other input typed into wireless keyboards.

The FBI's Private Industry Notification is dated April 29, more than 15 months after whitehat hacker Samy Kamkar released a KeySweeper, a proof-of-concept attack platform that covertly logged and decrypted keystrokes from many Microsoft-branded wireless keyboards and transmitted the data over cellular networks. To lower the chances that the sniffing device might be discovered by a target, Kamkar designed it to look almost identical to USB phone chargers that are nearly ubiquitous in homes and offices.
"If placed strategically in an office or other location where individuals might use wireless devices, a malicious cyber actor could potentially harvest personally identifiable information, intellectual property, trade secrets, passwords, or other sensitive information," FBI officials wrote in last month's advisory. "Since the data is intercepted prior to reaching the CPU, security managers may not have insight into how sensitive information is being stolen."

Sunday, May 15, 2016

2016 Espionage Research Institute International Counterespionage Conference



Annual ERII Counterespionage Conference September 9, 10 & 11th 2016 at the Embassy Suites - Old Town Alexandria, VA 22314.


TSCM professionals from across the globe will meet to discuss counter espionage news and events, see demonstrations of new TSCM equipment and network with colleagues.

The ERII Conference experience will include presentations by top experts in the fields of Technical Surveillance Countermeasures (TSCM), Counterintelligence Counterespionage, Cyber Countermeasures, Equipment vendors and more.

Wednesday, April 27, 2016

Corporate Espionage and Protecting Proprietary Information

>>        On average, corporate espionage costs businesses more than $400 billion yearly.
>>        Certain precautions must be incorporated into the framework of an effective Data Security Program to protect valuable corporate information from espionage attempts.>>        TSCM is an acronym that stands for Technical Surveillance Countermeasures.  
>>        Personnel charged with maintaining your cybersecurity program are trained to detect network threats, and typically are not trained to detect eavesdropping devices.>>        If your risk management program does not include Cyber TSCM™ , you have made the job of the corporate spy much easier. 
On average, corporate espionage costs businesses more than $400 billion yearly. Corporate information theft implements can range from cyber espionage attacks in your enterprise to the use of bugging devices to capture data, audio or video. The individual or “spy” behind the attack may be anyone motivated to: damage the reputation of a business, access insider information to profit from making illicit trades, undermine relationships with business partners, gain a competitive advantage or access personal/sensitive data.

Thursday, April 7, 2016

ComSec, LLC Announces New Office in Washington DC

Demand for company's TSCM and Cyber TSCM™ services fuels need for expansion

WASHINGTONApril 7, 2016 /PRNewswire/ -- ComSec, LLC, a world-class provider of Technical Surveillance Countermeasures (TSCM) services, today announced the opening of an office in Washington DC. ComSec's electronic eavesdropping detection services are already widely used by corporations, executives, government agencies, non-profit organizations and dignitaries throughout the US and globally. ComSec's office in Washington DC will provide businesses and government agencies a local asset in their efforts to defend and protect valuable information from electronic eavesdropping exposures.

Read more here.

Sunday, February 21, 2016

ELECTION YEARS AND ELECTRONIC EAVESDROPPING

Election years present an increased risk of politically motived electronic eavesdropping. The candidates, campaign staff, political organizations, the press and/or news media may be targeted for electronic eavesdropping. From campaign strategies to dirty little secrets, an election can be won (or lost) because valuable information is captured, leveraged and/or reported.


An exclusive election news story can make the career of a reporter, or generate significant revenue for a news organization. An election news story can launch a candidate to the top of the polls, or destroy their chances of winning the election. Was the information collected legally? Maybe, and maybe not. But, to a spy who seeks to influence an election, the potential reward far outweighs the risk of being caught. The news organization that breaks the pivotal story is often the winner. The candidate that outwits the eavesdropper(s) may be closer to the election victory. But, the bugged candidate or organization may be faced with a very damaging outcome.


The election candidate’s hopes for victory may instead collide with the demise of their political aspirations. How can damaging politically motivated election outcomes be prevented? Have you heard of technical surveillance countermeasures (TSCM)? It’s the science of detecting bugging devices. We’ll explain how TSCM can help prevent the damaging outcomes of politically motivated electronic eavesdropping.

Read more here.

Thursday, February 18, 2016

Gift Rolex watches to three senior Liberal politicians might have been bugged..

It is unknown watch exact model of the luxury Rolex watch Tony Abbott, Ian Macfarland and Stuart Robert were given.

Former Defence minister Joel Fitzgibbon says it is "absolutely possible" Rolex watches gifted to Tony Abbott, Stuart Robert and Ian Macfarlane by a Chinese businessman were bugged.

Intelligence sources are concerned about Chinese intelligence agencies targeting Australian MPs and want all items offered as gifts checked for bugs, Fairfax Media reports.
Mr Fitzgibbon confirmed today any gifts he received were sent to the Defence Signals Directorate, now the Australian Signals Directorate, for X-raying.

"Anyone in a senior position should do the same in the interests of national security," Mr Fitzgibbon said.

However, spokespeople for Mr Robert and Mr Macfarlane admitted the watches were not submitted for any sort of testing. Mr Abbott's office declined to comment, according to Fairfax.

The Rolex watches were gifted to the three politicians by Chinese billionaire Li Ruipeng in June 2013.

Read more here.