Monday, May 15, 2017

Infrastructure vulnerabilities make surveillance easy..

Weakness in digital communications systems allows security to be bypassed, leaving users at risk of being spied on.



Governments want to spy on their citizens for all sorts of reasons. Some countries do it to help solve crimes or to try to find "terrorists" before they act.
Others do it to find and arrest reporters or dissidents. Some only target individuals, others attempt to spy on everyone all the time.
Many countries spy on the citizens of other countries: for reasons of national security, for advantages in trade negotiations, or to steal intellectual property.
None of this is new. What is new, however, is how easy it has all become. Computers naturally produce data about their activities, which means they're constantly producing surveillance data about us as we interact with them.
Corporations are doing it for their own purposes; collecting and using this data has become the dominant business model of the internet. Increasingly, governments around the world are ensuring that they too have access to the data, either by mandating that the companies give it to them or surreptitiously grabbing their own copy.

Sunday, May 14, 2017

Corporate spying costs billions, can it be stopped?

Hotel giant Hilton wanted to develop an all-new luxury hotel chain called Denizen to satisfy a growing market for high-end accommodations. Its competitor Starwood thought Denizen seemed very similar to its successful W chain. Too similar. And in 2009 Starwood Hotels & Resorts filed a corporate espionage lawsuit against Hilton, claiming two former executives who left to work at Hilton stole, and recruited others to steal, more than 100,000 documents full of sensitive information.
The documents, Starwood said, included trade secrets like a step-by-step guide to creating a new luxury brand from the ground up. Starwood said the name Denizen itself came from a concept Starwood developed for the W chain called the "zen den." In the end, Hilton settled with Starwood for $75 million and had to drop the Denizen brand. Hilton did not admit wrongdoing as part of the settlement, saying in a statement, "Hilton Worldwide regrets the circumstances surrounding the dispute with Starwood Hotels & Resorts Worldwide and is pleased to bring an end to this prolonged litigation."

Monday, April 24, 2017

Top app has been spying on users and lying about it..

Uber, the ride-hailing service, is having a bad year. Last month, a secret Uber program called Greyball was exposed and it revealed how the company uses data collected from its app to evade authorities in areas where the service is resisted by law enforcement or banned.

Greyball was allegedly used in cities like Las Vegas, Boston and Paris, plus in countries like China, Australia and South Korea, to deny service to Uber accounts considered as a threat to the company.

Now, another controversy has surfaced and it involves a tussle with a company that Uber can't afford to irk.

The New York Times reported that in early 2015, Uber CEO Travis Kalanick met with Apple's Tim Cook to discuss specific questionable techniques the Uber app was allegedly employing.

Apple engineers discovered that the app was tracking its users even after it was deleted from iPhones. This practice, called "fingerprinting," violates Apple's privacy guidelines. "Fingerprinting" assigns each iPhone a specific identity via a small piece of code that persists even after the device's data has been wiped.

Tuesday, April 4, 2017

Someone is spying on cellphones in the nation's capital..



A CBC/Radio-Canada investigation has found cellphone trackers at work near Parliament Hill and embassies.

A months-long CBC News/Radio-Canada investigation has revealed that someone is using devices that track and spy on cellphones in the area around Parliament Hill.
The devices are known as IMSI catchers and have been used by Canadian police and security authorities, foreign intelligence and even organized crime.
The devices, sometimes known by the brand name of one model, StingRay, work by mimicking a cellphone tower to interact with nearby phones and read the unique ID associated with the phone — the International Mobile Subscriber Identity, or IMSI.
That number can then be used to track the phone and by extension the phone's user. In some instances, IMSI catchers can even be used to gain access to a phone's text messages and listen in on calls.

Thursday, March 16, 2017

Suspected Hack Attack Snagging Cell Phone Data Across D.C.

Malicious entity could be tracking phones of domestic, foreign officials


An unusual amount of highly suspicious cellphone activity in the Washington, D.C., region is fueling concerns that a rogue entity is surveying the communications of numerous individuals, likely including U.S. government officials and foreign diplomats, according to documents viewed by the Washington Free Beacon and conversations with security insiders.
A large spike in suspicious activity on a major U.S. cellular carrier has raised red flags in the Department of Homeland Security and prompted concerns that cellphones in the region are being tracked. Such activity could allow pernicious actors to clone devices and other mobile equipment used by civilians and government insiders, according to information obtained by the Free Beacon.
It remains unclear who is behind the attacks, but the sophistication and amount of time indicates it could be a foreign nation, sources said.
Mass amounts of location data appear to have been siphoned off by a third party who may have control of entire cell phone towers in the area, according to information obtained by the Free Beacon. This information was compiled by a mass-monitoring program supported by DHS and ESD America and known as ESD Overwatch.
Cell phone information gathered by the program shows major anomalies in the D.C.-area indicating that a third-party is tracking en-masse a large number of cellphones. Such a tactic could be used to clone phones, introduce malware to facilitate spying, and track government phones being used by officials in the area.

Wednesday, March 8, 2017

ComSec LLC Adds OverWatch IMSI Catcher Detection Services

Virginia Beach, VA, March 08, 2017 --(PR.com)-- J.D. LeaSure, President/CEO of ComSec LLC announces the addition of IMSI catcher detection capabilities to ComSec’s world-class electronic eavesdropping / detection services. Surreptitious use of IMSI (international mobile subscriber identity) catchers and stingray devices pose a significant threat to the security and privacy of USA corporations and individuals. With ComSec’s IMSI catcher detection services, our clients gain cost-effective, real-time knowledge of IMSI catchers, baseband processor attacks, rogue base stations and cellular jamming threats to their devices and environment.

“ComSec LLC’s exclusive deployment of the ESD Overwatch System equips our clientele with real-time, actionable intelligence they can use to stop cellular attacks and to secure their networks. Enhancing our service offerings with IMSI catcher detection capability further demonstrates ComSec’s commitment to providing all-inclusive eavesdropping threat detection services that strengthen our clients’ security defenses," remarked J.D. LeaSure, ComSec LLC's President/CEO.

Hackers, foreign governments, foreign intelligence services, authoritarian regimes (via the black market in China), etc. use IMSI catchers to illegally access information sent and received via the 2G cellular network. IMSI catchers can be used to verify a phone’s location, track and locate a device, perform a denial of service attack, monitor cell phone use, intercept calls and SMS, and/or alert on the arrival and exit of a phone from a location. While an IMSI catcher can be made for approximately $500, the information illegally captured can be worth millions to the right buyer, and can result in critical financial and other ramifications for the affected corporation or individual.


Call ComSec LLC at 800-615-0392 to schedule IMSI catcher detection / TSCM services.

Saturday, March 4, 2017

Donald Trump Questions ‘Sick Guy’ Barack Obama for ‘Wire Tapping’ His Campaign..

President Donald Trump accused former President Barack Obama of wiretapping his campaign headquarters during the election in a series of messages on Twitter.

*Note: Folks, This is not the first time nor will it be the last. Wiretapping, bugging and eavesdropping is rampant in the political, corporate and private sector. Worried you might be next? Contact ComSec, we can help. JDL~

“Terrible! Just found out that Obama had my ‘wires tapped’ in Trump Tower just before the victory,” he wrote on Twitter. “Nothing found. This is McCarthyism!”
Trump questioned whether it was legal for Obama to be wiretapping a presidential candidate while he was still in office.
“How low has President Obama gone to tapp (sic) my phones during the very sacred election process,” he wrote. “This is Nixon/Watergate. Bad (or sick) guy! Is it legal for a sitting President to be ‘wire tapping’ a race for president prior to an election? Turned down by court earlier. A NEW LOW!”
Trump is likely referring to calls from talk radio hosts Mark Levin and Rush Limbaugh to investigate the nature of the Obama administration’s investigations of his campaign aides for their communications with Russia, as Breitbart News editor Joel Pollak reported.