Thursday, March 16, 2017

Suspected Hack Attack Snagging Cell Phone Data Across D.C.

Malicious entity could be tracking phones of domestic, foreign officials


An unusual amount of highly suspicious cellphone activity in the Washington, D.C., region is fueling concerns that a rogue entity is surveying the communications of numerous individuals, likely including U.S. government officials and foreign diplomats, according to documents viewed by the Washington Free Beacon and conversations with security insiders.
A large spike in suspicious activity on a major U.S. cellular carrier has raised red flags in the Department of Homeland Security and prompted concerns that cellphones in the region are being tracked. Such activity could allow pernicious actors to clone devices and other mobile equipment used by civilians and government insiders, according to information obtained by the Free Beacon.
It remains unclear who is behind the attacks, but the sophistication and amount of time indicates it could be a foreign nation, sources said.
Mass amounts of location data appear to have been siphoned off by a third party who may have control of entire cell phone towers in the area, according to information obtained by the Free Beacon. This information was compiled by a mass-monitoring program supported by DHS and ESD America and known as ESD Overwatch.
Cell phone information gathered by the program shows major anomalies in the D.C.-area indicating that a third-party is tracking en-masse a large number of cellphones. Such a tactic could be used to clone phones, introduce malware to facilitate spying, and track government phones being used by officials in the area.

Wednesday, March 8, 2017

ComSec LLC Adds OverWatch IMSI Catcher Detection Services

Virginia Beach, VA, March 08, 2017 --(PR.com)-- J.D. LeaSure, President/CEO of ComSec LLC announces the addition of IMSI catcher detection capabilities to ComSec’s world-class electronic eavesdropping / detection services. Surreptitious use of IMSI (international mobile subscriber identity) catchers and stingray devices pose a significant threat to the security and privacy of USA corporations and individuals. With ComSec’s IMSI catcher detection services, our clients gain cost-effective, real-time knowledge of IMSI catchers, baseband processor attacks, rogue base stations and cellular jamming threats to their devices and environment.

“ComSec LLC’s exclusive deployment of the ESD Overwatch System equips our clientele with real-time, actionable intelligence they can use to stop cellular attacks and to secure their networks. Enhancing our service offerings with IMSI catcher detection capability further demonstrates ComSec’s commitment to providing all-inclusive eavesdropping threat detection services that strengthen our clients’ security defenses," remarked J.D. LeaSure, ComSec LLC's President/CEO.

Hackers, foreign governments, foreign intelligence services, authoritarian regimes (via the black market in China), etc. use IMSI catchers to illegally access information sent and received via the 2G cellular network. IMSI catchers can be used to verify a phone’s location, track and locate a device, perform a denial of service attack, monitor cell phone use, intercept calls and SMS, and/or alert on the arrival and exit of a phone from a location. While an IMSI catcher can be made for approximately $500, the information illegally captured can be worth millions to the right buyer, and can result in critical financial and other ramifications for the affected corporation or individual.


Call ComSec LLC at 800-615-0392 to schedule IMSI catcher detection / TSCM services.

Saturday, March 4, 2017

Donald Trump Questions ‘Sick Guy’ Barack Obama for ‘Wire Tapping’ His Campaign..

President Donald Trump accused former President Barack Obama of wiretapping his campaign headquarters during the election in a series of messages on Twitter.

*Note: Folks, This is not the first time nor will it be the last. Wiretapping, bugging and eavesdropping is rampant in the political, corporate and private sector. Worried you might be next? Contact ComSec, we can help. JDL~

“Terrible! Just found out that Obama had my ‘wires tapped’ in Trump Tower just before the victory,” he wrote on Twitter. “Nothing found. This is McCarthyism!”
Trump questioned whether it was legal for Obama to be wiretapping a presidential candidate while he was still in office.
“How low has President Obama gone to tapp (sic) my phones during the very sacred election process,” he wrote. “This is Nixon/Watergate. Bad (or sick) guy! Is it legal for a sitting President to be ‘wire tapping’ a race for president prior to an election? Turned down by court earlier. A NEW LOW!”
Trump is likely referring to calls from talk radio hosts Mark Levin and Rush Limbaugh to investigate the nature of the Obama administration’s investigations of his campaign aides for their communications with Russia, as Breitbart News editor Joel Pollak reported. 

Thursday, March 2, 2017

Are Today's Cameras Cybersecure?



Are Today's Cameras Cybersecure? 10 Tips to Avoid Camera Hacking

We’ve all heard about the dangers of hacking into computers and smart devices, as well as cyberthieves stealing credit and debit card information. But have you though specifically about the hacking of the built-in camera in each of those devices?

Here’s the thing: If your device is connected to the internet, then your device’s camera is at risk for being hacked. And it’s not just computers—it’s cameras such as baby monitors or security cameras.

Plenty of experts and insiders use a low-tech way of helping to block camera and microphone access: They simply cover the camera lens or mic port with tape. Beyond that simple, cheap method, though, there are a number of best practices that can help build better security around your camera. That includes super-strong passwords (no “1234” please) as well as up-to-date software, which may solve security lags.

-->

Want to learn more? This graphic can help with additional ideas. Or contact ComSec, we can help. JDL~

Read more here.

Friday, February 10, 2017

JOHN C. PLATT III. Rest in Peace Cowboy...

Potomac Falls, VA - John Cheney Platt III (Jack), aged 80, died unexpectedly on January 4, 2017 of advanced esophageal cancer. Jack, also known as "Cowboy," served proudly as an officer in the United States Marine Corps followed by 25 years of service in the Central Intelligence Agency. He led a life full of intrigue, mystery and adventure serving his country abroad in Austria, Laos and France. He was a natural leader, a mentor to many, and did not suffer fools lightly.

After retiring from the CIA, he formed the Hamilton Trading Group partnership that allowed him to continue training others on security awareness measures to protect themselves in a dangerous new world. He spent his last few years traveling widely with his wife and friends. 

Mr. Platt, who was known as Jack, was a gruff former Marine officer who for years ran a training program in Washington to teach C.I.A. case officers how to operate under cover. But he was best known in the spy world for his longtime friendship with Gennadiy Vasilenko, a K.G.B. officer whose betrayal by Aldrich Ames, the Soviet mole at the C.I.A., led to Mr. Vasilenko’s imprisonment in Moscow.



Mr. Platt was hired by the CIA in 1963. He was an operations officer with an extensive information collection and counter-intelligence background.  In the course of various assignments overseas, he lived and worked in Austria, Germany, France and Laos. He also traveled extensively in Latin America, the Caribbean and to a lesser extent in Eastern Europe. For five years he directed a CIA training program which was awarded a Unit Citation for excellence.  This program was successful in preparing U.S. personnel and their families to live and work productively in hostile countries.  Upon retirement, Mr. Platt was awarded the CIA's Career Intelligence Medal for exceptional performance and commended by the Director of the Federal Bureau of Investigation for his professionalism, zeal and vital assistance to the FBI. 
Mr. Platt and several like-minded Americans took steps to open a window on the “new  Russian Federation” in the early 1990s. He contacted former Soviet adversaries and pushed for mutual agreements on conducting commercial inquiries and personal security and safety –in Russia.  The joint business efforts of the company and the Russians were favorably described in news stories (LA Times, Palm Beach Post, Forbes Magazine and the NYT). Platt’s unusual but interesting relationships with “former KGB enemies” have been cited in TV programs about the CIA and KGB (Discovery Channel in 1997 and CBS 60 Minutes II in 2001). 
Regrettably, the results of “regime change” in Russia (i.e., Putin’s Kremlin) rendered bilateral business cooperation with Russian contacts as damaged efforts best observed in the rear-view mirror. In 2005, the prime business partner in Russia, retired KGB officer Gennadiy Vasilenko, was arrested in Moscow on trumped up charges and sentenced to a long prison term. After serving 5 ½  years of a 3-year sentence in the Russian prison system, Mr. Vasilenko was granted free passage to be resettled with his family in the USA  -- being part of a historic “Russian- USA spy swap” of July 2010. 
In addition to his wife, the former Paige Gordon, he is survived by three daughters, Leigh, Michelle and Diana Platt, and one grandson.

Rest in Peace Cowboy.  You will be greatly missed. J.D.L. ~

Sunday, January 15, 2017

The Light Phone...Possible New "Anti-Spy" Phone??



Note: Not sure how the 2G sunset will effect this emerging product, but hopefully they have it all figured out. ~JDL

The Light Phone is a discreet credit card sized mobile phone designed to be used as little as possible. It is the only phone designed to be used as your second phone as a seamless extension of you smartphone. It is an unlocked 2G GSM phone that works independent of your current plan, but using our unique software platform it can keep your same phone number. The Light Phone is easily set up and controlled via an app on your computer. Other features are limited to nine speed dials and a time display. 

An active SIM is required because the phone is not tethered, it will work regardless of where your smartphone is. The cost of using our service is approximately $5/month in the United States. 


Read more here.

Friday, January 13, 2017

WhatsApp vulnerability allows snooping on encrypted messages..

A security vulnerability that can be used to allow Facebook and others to intercept and read encrypted messages has been found within its WhatsApp messaging service.

Facebook claims that no one can intercept WhatsApp messages, not even the company and its staff, ensuring privacy for its billion-plus users. But new research shows that the company could in fact read messages due to the way WhatsApp has implemented its end-to-end encryption protocol. Privacy campaigners said the vulnerability is a “huge threat to freedom of speech” and warned it could be used by government agencies as a backdoor to snoop on users who believe their messages to be secure.

WhatsApp has made privacy and security a primary selling point, and has become a go to communications tool of activists, dissidents and diplomats.