Saturday, June 16, 2018


Registration Open @ https://erii.org

Join ERII members, and Counterespionage, Counterintelligence and TSCM professionals from across the globe to discuss TSCM, cyber, counterespionage and counterintelligence news and events, see demonstrations of new TSCM equipment and network with colleagues. 
The 2018 ERII Conference experience will include presentations by top experts in the fields of Technical Surveillance Countermeasures (TSCM), Counterintelligence, Counterespionage, Cyber Countermeasures, Equipment Vendors and more. 
Conference ticket includes: breakfast & evening reception (for hotel guests), conference presentations, and catered lunch/beverages/snacks on ticketed conference day(s) (8:30 AM to 5:00 PM.)
US Government employee ticket discounts available. Contact Lisa LeaSure, ERII Development Director for more information.Phone: +1-757-716-7353 Ext: 102. Email: lml@erii.org

Friday, June 15, 2018

Economic Espionage and the Growing Case for Corporate Counterintelligence

In the 2016 movie, “Snowden” former National Security Agency intelligence contractor Edward Snowden uncovers massive amounts of illegally obtained data assembled to track digital communications from foreign governments, terrorist groups and ordinary Americans. For many, the biographical political thriller was a wakeup call. For those in risk management and information security, it reaffirmed what we probably already knew or suspected — that many different entities around the globe know quite a bit about where we work and live and our daily habits.
For corporate businesses, information protection is critical and the risks and threats keep changing. Now, the theft of information and intelligence is increasingly gathered on U.S. companies from foreign entities that use the results for a variety of different types of what is now called economic espionage.

Monday, June 11, 2018

Sonic and ultrasonic attacks damage hard drives and crash OSes

Sounds played over off-the-shelf or embedded speakers often require a reboot.

Attackers can cause potentially harmful hard drive and operating system crashes by playing sounds over low-cost speakers embedded in computers or sold in stores, a team of researchers demonstrated last week.

The attacks use sonic and ultrasonic sounds to disrupt magnetic HDDs as they read or write data. The researchers showed how the technique could stop some video-surveillance systems from recording live streams. Just 12 seconds of specially designed acoustic interference was all it took to cause video loss in a 720p system made by Ezviz. Sounds that lasted for 105 seconds or more caused the stock Western Digital 3.5 HDD in the device to stop recording altogether until it was rebooted.

The device uses flash storage to house its firmware, but by default it uses a magnetic HDD to store the large quantities of video it records. The attack used a speaker hanging from a ceiling that rested about four inches above the surveillance system’s HDD. The researchers didn’t remove the casing or otherwise tamper with the surveillance system.

Tuesday, May 15, 2018

Could your hotel room be bugged?

LOST luggage, missed connections and flight delays are some of the common concerns that plague nervous travellers.

But if you're heading to countries like China, Russia, Israel or even the UK, you might have another major issue: bugged hotel rooms.

Yep, it happens more often than you'd think. And while it's unlikely a holidaying family would be bugged by a suspicious government or deviant company, it's a real problem for some travelers, as these experts explain.

WHY WOULD SOMEONE BUG A ROOM?
"Security and safety are easily at risk anytime you enter a space where somebody else has had access prior to your arrival," says Jeffrey Jurist, president of SpyAssociates.com.
And there are plenty of reasons why you might be the target. "A hotel would not be the ones to bug a room, but a nefarious employee, hotel worker, investigator, or government agency would have their reasons: divorce, legal, military, insurance, espionage, business, financial," he added.
Jim Angleton, president and chief executive officer of crypto-currency company AEGIS FinServ Corp, explained how it could be carried out.
"An intelligence community might have someone gain access to the room by paying off a front desk person, who tells them - for money - which room a target or suspect is staying in," he said.

Tuesday, April 3, 2018

AP News Break: US suspects cellphone spying devices in DC

For the first time, the U.S. government has publicly acknowledged the existence in Washington of what appear to be rogue devices that foreign spies and criminals could be using to track individual cellphones and intercept calls and messages.

The use of what are known as cellphone-site simulators by foreign powers has long been a concern, but American intelligence and law enforcement agencies — which use such eavesdropping equipment themselves — have been silent on the issue until now.

In a March 26 letter to Oregon Sen. Ron Wyden, the Department of Homeland Security acknowledged that last year it identified suspected unauthorized cell-site simulators in the nation’s capital. The agency said it had not determined the type of devices in use or who might have been operating them. Nor did it say how many it detected or where.
The agency’s response, obtained by The Associated Press from Wyden’s office, suggests little has been done about such equipment, known popularly as Stingrays after a brand common among U.S. police departments. The Federal Communications Commission, which regulates the nation’s airwaves, formed a task force on the subject four years ago, but it never produced a report and no longer meets regularly.

The devices work by tricking mobile devices into locking onto them instead of legitimate cell towers, revealing the exact location of a particular cellphone. More sophisticated versions can eavesdrop on calls by forcing phones to step down to older, unencrypted 2G wireless technology. Some attempt to plant malware.

Saturday, March 10, 2018

Kestrel Flies High at NDIA SO/LIC Symposium & Exhibition

ComSec LLc- Professional Development TSCM Group | National Defense Industrial Association (NDIA)

Technical Security Specialist's (TSS) TM and Technical Security Instructors (TSI) TM from Canadian based Professional Development TSCM Group Inc., attended the 29th Annual SO/LIC Symposium & Exhibition organized by the National Defense Industrial Association (NDIA) this week in Arlington, VA, in support of our exclusive US distribution partner COMSEC LLc, located in Virginia Beach.

The event, has been a tremendous success with significant new interest in the Kestrel TSCM ® Professional Software | Signals Intelligence Support System (SISS) TM, including a live demonstration of our latest Kestrel ® Heat Mapping Display (HMD) technology.

HMD TM is the latest milestone within our developmental strategy, and supports our recently released Receiver Differential Signal Analysis (RDSA)TM, in full support of our growing market share, within the TSCM | SIGINT | RSSM TMspace across the public and private sector, within the national security apparatus.

This latest release v1.36.1 is a full installer (64-Bit), and is also available in a 32-Bit release, if required.

PDTG Inc., and COMSEC LLc, made a number of strategic alliances during the event, with a strong focus on powerful new government, and military based Software Defined Radio technology, discussions, for fixed, and portable mobile deployment.

Many delegates were impressed by the powerful, scalability, and uniqueness of the detection, capture and analysis tools, with a current support level for seven (7) different manufacturers, receivers and spectrum analyzers, and very much impressed by plans for another three (3) prominent SDR products to be supported prior to the end of the year.

During the event, high-level discussions with a number of SDR manufacturers, expressed interest in the Kestrel TSCM ®Professional Software | Signals Intelligence Support System (SISS) TM platform.

The HMD TM feature is just one, of a series of new and powerful, professional features and functionality, added to the Kestrel TSCM ® Professional Software in the past number of months.





Monday, January 15, 2018

HUNDREDS of Twitter Employees Paid to View "Everything You Post," & Private "Sex Messages..


Project Veritas has released undercover footage of Twitter Engineers and employees admitting that Twitter employees view"everything you post" on their servers, including private "sex messages," and "d*ck pics." The engineers also admit that Twitter analyzes this information to create a "virtual profile" of you which they sell to advertisers. James O’Keefe has just completed a book about this series entitled "AMERICAN PRAVDA: My fight for Truth in the Era of Fake News." The book will be released by St. Martin’s Press on January 16, 2018.

More here.