Thursday, November 26, 2009

Counterespionage: Protecting Your Company from Corporate Espionage


Any business can be the target of covert eavesdropping; however, some are under greater risk than others i.e.; software development companies, high tech startups, defense contractors, companies awarded GSA or GPO contracts, or any highly competitive industry. What is the potential effect on you or your business if sensitive information is intercepted by an eavesdropper?

No business in today's highly competitive marketplace is safe from the threat of corporate, economic or industrial espionage. Imagine the financial and strategic damage to your company should confidential plans, trade secrets or competition sensitive information is leaked... If the company's security, trade secrets or confidential information is being breached by an insider who happens to be working for someone else, not only the top executives, but everyone in the company is at risk of having their livelihood taken away. In any given corporation, there could be hundreds or even thousands of employees that depend on that company for their income and security. How can you protect yourself? What signs should you be on the lookout for?

When possible, eavesdroppers or spies take the easiest route to a target or company's assets. In those situations, for example, a spy may gain authorized access as an employee. In other cases, a spy might enter your home or organization as a member of the cleaning crew or gather information from employees by posing as a vendor, potential client, or headhunter. However, when these avenues have been compromised, spies will turn to electronic surveillance technology. Electronic bugging devices are freely available over the web, through retail outlets and mail-order houses. They are used by competitors, disgruntled employees, professional investigators, journalists, or anyone with a reason for obtaining information about you or your company’s plans. The deployment of such equipment takes only seconds and they can be easily concealed. And, as electronic surveillance technology improves and becomes more readily available, executives, security professionals and private individuals must educate themselves about what counter surveillance methods and tools they can use to see that their interests remain safe.

A Counter Surveillance Sweep, or Technical Surveillance Countermeasure (TSCM) “Bug Sweep”, is one of the most effective means of protecting your valuable information. These highly specialized Counter Surveillance Specialist conduct sweeps or surveys that have become more effective in recent years as the counter surveillance technology used to find microphones, transmitters, and other eavesdropping devices has caught up to the sophistication level of covert surveillance equipment. The TSCM or “Bug Sweep” is designed to detect the presence of technical surveillance devices. It should also identify security hazards or weaknesses that could leave you or your company vulnerable to corporate, economic or industrial espionage.

What can you do to protect your Business from Electronic Espionage: 7 steps
1. Recognize the signs and that there is a real threat.
2. Identify and valuate trade secrets.
3. Implement a definable plan for safeguarding your assets.
4. Secure physical trade secrets and limit access.
5. Confine intellectual knowledge.
6. Provide ongoing security training to employees.
7. Contact a professional Counter Surveillance Specialist Today!

2009, © Copyright ComSec LLc All Rights Reserved

Wednesday, November 25, 2009

New Worm Attacks iPhones, Targets Mobile Banking
A second iPhone worm is in the wild, and unlike the jokey Australian worm authored by hacker prankster Ikee two weeks ago, this one is dangerous.

Unlike Ikee’s hack, which merely rick-rolled owners of infected iPhones, the new Dutch variant targets customers of the bank ING. When triggered, the worm redirects users visiting the banking site to an address in Lithuania which shows a fake login screen for ING online banking. It is essentially a phishing attack run on compromised iPhones.

The panic that will inevitably spread from this story is unjustified. First, if you are a regular iPhone customer you are safe, even if you are in the Netherlands. This is because, like the Ikee hack before it, the new worm will only work on a jailbroken, or hacked iPhone. Further, you will have to explicitly install SSH remote access, and then you will have to leave the root password at its default, which is alpine.


Hero SEALS face rap for fiend's bloody lip

Note: Of all the spineless Whimpering B*ll S**t ! These Brave Men deserve a MEDAL! not being subjected to this blatant abuse!

Three Navy SEALs involved in nabbing one of Iraq's most wanted terrorists are reportedly facing criminal charges related to his capture -- all because he claimed he had a bloody lip.

The SEALs took down Ahmed Hasim Abed, the alleged mastermind of a ghastly 2004 incident in which four American contractors who worked security for Blackwater USA, were murdered in Fallujah and two of the bodies were hung from a bridge over the Euphrates River.

But instead of being praised as heroes, the SEALs are all facing charges and have hired lawyers, reported.

Hacked E-Mails Fuel Global Warming Debate

An online debate over global warming science has broken out after an unknown hacker broke into the e-mail server at a prominent, British climate-research center, stole more than a thousand e-mails about global warming research and posted them online.

Global warming skeptics are seizing on portions of the messages as evidence that scientists are colluding and warping data to fit the theory of global warming, but researchers say the e-mails are being taken out of context and just show scientists engaged in frank discussion.

The Climate Research Unit at the University of East Anglia is one of the United Kingdom’s leading climate research centers and has been a strong proponent of the position that global warming is real and has human causes. The center confirmed the hack occurred in an e-mail statement to Threat Level.


Cell Phone Spying
MADISON COUNTY, AL - Our cell phones are our life lines these days. They're as much a part of our wardrobes as the clothes we wear. When we forget them we feel naked. However, a Taking Action Consumer Investigation will make you realize just how vulnerable you and your private information are.

Most of us are on our cell phones all the time. Talking, texting and taking care of business.

Think about the private conversations and information you share over your cell phone. And now imagine someone listening in without you knowing it.

It might be the ultimate invasion of privacy.

In this fast paced world who doesn't have a cell phone! You use it just about everywhere you go. even when you're at work.

"As long as my boss ain't watching," jokingly says Keith McLaglen.

Cell phones are a universal connection to our family and friends around the world!

But how private are your conversations?


Note: Help is available! Click Here for Cellular Anti Virus & Anti Eavesdropping software!

Novice Israeli spy gets nicked by... Tel Aviv cops

JERUSALEM — An apprentice spy for Israel's once vaunted Mossad overseas intelligence service was arrested by rank and file police during an abortive training exercise in the country's metropolis of Tel Aviv.

"Let's hope the Mossad is more effective abroad," commented Israel's commercial Channel 10 television as reports of the incident swept an aghast Israeli media on Tuesday.

The want-to-be James Bond was spotted on Monday planting a dummy bomb under a vehicle in the bustling commercial capital by a woman passer-by who swiftly alerted a passing policeman, the media reports said.

It was only after questioning at the the local police station that the rumbled trainee assassin managed to convince his captors that he was indeed a member of the famous spy agency.

The Mossad never warns Israel's uniformed security services in advance of its exercises in a bid to give the training an element of reality.


Ga. nurse arrested for taping patients' bathroom

ATLANTA -- A registered nurse anesthetist who was arrested for unlawful surveillance and eavesdropping of patients has been re-arrested after a juvenile was identified as an alleged victim, police said Tuesday.

Paul Patrick Serdula, 47, was arrested Monday night on child molestation and sodomy charges, Cobb County police Sgt. Dana Pierce said.

Pierce said the investigation into Serdula is "far from over," and more charges are likely as additional victims come forward.

"We have victims, probably, in the early double-digits, and we expect as many as 100," he said.


Tuesday, November 24, 2009

Workers stealing data for competitive edge
The recession is creating camaraderie amongst workforces, at the expense of their employers, is the finding of a transatlantic survey. Carried out amongst 600 office workers in Canary Wharf London and Wall Street New York, 41% of workers have already taken sensitive data with them to their new position, whilst a third would pass on company information if it proved useful in getting friends or family a job.

Pilfering data has become endemic in our culture as 85% of people admit they know it’s illegal to download corporate information from their employer but almost half couldn’t stop themselves taking it with them with the majority admitting it could be useful in the future!

However, it would seem employers have only themselves to blame as they appear pretty lackadaisical when it comes to protecting their data from their employees with 57% of respondents stating that it’s become a lot easier to take sensitive information from under their bosses noses this year, up from 29% last year.


Court Kills ‘Round-The-Clock’ Surveillance Case
Welcome to the tinfoil hat club.

That’s what a federal appeals court is telling Scott Tooley of Kentucky in dismissing his civil rights lawsuit. Tooley believes the government put him under blanket surveillance after he said the word bomb to an airline agent.

Tooley sued the government on allegations of invasion of privacy and for violation of his First Amendment speech rights, claiming he was subjected to “round-the-clock surveillance” following his 2002 B-word utterance.

The alleged spying targeting Tooley ranged from phone taps to RFID chips on his vehicles. He claimed he was placed on an airline travel watchlist, and, in 2005, spotted an undercover agent in a Ford Crown Victoria parked outside his Louisville house for about six hours a day.


Cop guilty in Broderick/Parker baby-mama spying
IN MARTINS FERRY, Ohio, the police chief is going to jail.

A jury yesterday found suspended chief Barry Carpenter guilty of receiving stolen property, theft in office and tampering with evidence relating to a break-in at the home of Michelle Ross, the surrogate mother who carried twins for Sarah Jessica Parker and Matthew Broderick. Carpenter was acquitted on charges of burglary and unauthorized use of property or services.

Carpenter put his head in his hands after the verdict was read.

Prosecutors alleged that Carpenter broke into Ross' home in May, took items related to her pregnancy and the surrogacy and schemed with Police Chief Chad Dojack of neighboring Bridgeport to sell them to celebrity photographers.

Dojack faces trial in January.

Based on yesterday's verdict, he may want to make a deal.


Monday, November 23, 2009

Let an FBI spy put you at ease
During his 25 years in the FBI, Joe Navarro did everything from running a SWAT team to flying a plane.

But it was his work monitoring foreign spies that launched him into his new career as an adviser to businesses on “non-verbal intelligence”.

He and his team would follow spies and try to infer from their behavior what they were up to.

How often did they gather? Which were their favorite restaurants? Were they walking differently one day to the next?

“When we're relaxed, our body has a certain posture,” says Navarro. “But when we're concerned about being followed, it changes.”

Spies were often taught to glance into shop windows to see if they were being followed. But Navarro could easily tell if someone was doing it to see what was inside the shop or to see who was behind him.

For all but the most diligent spies, he says, the habits and disciplines they learned before being sent into the field yielded quickly to ordinary human instincts.


Sunday, November 22, 2009

US calls for release of geologist held in China as spy
The United States called Friday for the release of Xue Feng, a China-born US oil geologist being held on suspicion of stealing State secrets, according to AFP.

"We encourage China to grant Dr Xue humanitarian release and immediately deport him back to the United States," Susan Stevenson, spokeswoman for the US Embassy in Beijing, told AFP.

"It is an espionage case," the counter-espionage official from the Chinese government department said. "The Chinese side has very solid evidence to prove that Xue Feng stole State secrets and violated China's law."

Xue was detained in China in November 2007 as he prepared to fly back to the United States after trying to purchase a database of information about China's oil industry on behalf of his employer at the time, IHS Inc, according to Jerome Cohen, a New York University law professor who is seeking Xue's release and spoke with The New York Times Sunday.

An anonymous source told AFP that Xue was formally arrested in April the following year and charged with procuring State secrets.


Mushrooming Spy Scandal in Argentina
BUENOS AIRES – Revelations of illegal wiretapping by a former cop have sparked a war of words between the city’s conservative mayor and the center-left government of Argentine President Cristina Fernandez.

Federal Cabinet chief Anibal Fernandez (no relation to the president) said Thursday that Mauricio Macri “has other no other way out” than to resign, likening the mayor’s conduct to that of U.S. President Richard Nixon during Watergate.

The illegal wiretaps were arranged by former police inspector Jorge “Fino” Palacios and Macri, Anibal Fernandez said.

Palacios and Macri, according to the Cabinet chief, were “working on a kind of small business in which what was done was to carry out telephone intercepts to sell them (the tapes) later to the highest bidder.”


Friday, November 20, 2009

New spyware lets you monitor cell phone activity
DENVER - It's like something out of a James Bond movie. "Spyware" you can secretly install on a cell phone. It allows you to eavesdrop, and gives you access to everything the person does on the phone.

And they'll never know it's happening.

Fox 31 investigative reporter Julie Hayden found out this new cell phone spyware takes the "big brother" concept to an unprecedented level. "Overall I think this is very dangerous software capability, I think this is an invasion of privacy," said Jennifer, who participated in a test of the new spyware for FOX 31 News.

The spyware was downloaded from the website, and then put on a "target phone," which was given to Jennifer's fiancée, Neil. She had the "monitor phone."

Jennifer watched her phone as a she received a text message that alerted her that Neil made a call on his phone. Every time Neil's phone sent or received a call, text message, or email, Jennifer's phone was alerted.

"I just can't believe that I'm listening in on this conversation," Jennifer said.


Note: Anti Virus & Anti Eavesdropping cell phone software is available! Click here

China steps up US cyber-spying

Chinese spies are aggressively stealing secrets to build up China's military and economic power, a US advisory panel on US-China relations has warned.

Its members urged the US Congress to ensure the country was adequately protected against Chinese spying.

The report was published in the same week that US President Barack Obama made his first official visit to China.

A Chinese embassy spokesman in Washington dismissed the allegations as baseless and irresponsible.

The report - which says China's spying is becoming more intense and sophisticated - was produced by the US-China Economic and Security Review Commission.

"China is changing the way that espionage is being done," said Carolyn Bartholomew, who chaired the commission.


Employees: Boss asks county workers to spy on his wife
COUNTY: A Charlotte County worker is in trouble after serious allegations surfaced regarding him allegedly spying on his wife during their divorce.

It was a letter that sparked an investigation into Donny Bernhagen, the 24-year veteran who works in the Charlotte County Environmental and Extension Services Department.

“Allegations were made that he used county resources on county time for personal business,” said Bernhagen’s boss Jim Thompson.

The letter, signed by employees, claims that Bernhagen used a county system to track his wife - including her finances and whereabouts.

It then goes on to say that Bernhagen used his “position of authority to have two of his employees check up on his wife.”

According to the letter, some of the employees accused Bernhagen of forcing them to follow his wife around town to see if she's at work or the doctor's office.


Hearing begins for Maui man accused of being spy

Associated Press
HONOLULU — A former B-2 stealth bomber engineer accused of spying for China suffers from narcissistic personality disorder, expert witnesses for the prosecution and the defense testified in federal court Thursday.

But the forensic psychologists who evaluated Noshir Gowadia of Maui disagreed during the hearing over whether he is competent to stand trial and assist in his defense.

Gowadia, who worked for years on highly classified military systems, has been held without bail since his 2005 arrest on suspicion of selling cruise missile secrets. He has pleaded not guilty to 21 counts of conspiracy, money-laundering and falsifying tax returns.

The charges against Gowadia also assert that he offered to sell classified stealth technology to foreign business people in Israel, Germany and Switzerland.

With Gowadia seated in white prison overalls alongside his attorneys, prosecution witness Lisa Hope testified Thursday that she and a postdoctoral psychology intern evaluated the defendant at a federal prison in Los Angeles last spring.


Thursday, November 19, 2009

The Rising Threat of Industrial Espionage

When asked what comes to mind when the word “espionage” is mentioned, most people would think of the CIA, the Cold War era KGB, or James Bond. The present reality is that espionage is taking on a new form, evolving into more than just the practice of stealing countries’ security secrets, and into the practice of stealing business secrets. Today’s most dangerous spies might not arrive in a helicopter or know how to disarm a bomb, but could be sitting in the next cubicle and drive a Prius.

Espionage, a topic whose actions are usually hidden in the shadows, has been brought into the light recently by various news stories. The story of the three American hikers being held in Iran on charges of spying has caught the attention of many. Industrial espionage also poses a great risk as companies all around the world strive to protect their competitive advantage. This is increasingly becoming more concerning to nations’ as they assess the potential risk of industrial espionage to national prosperity and growth.


Countries prepping for cyberwar

(CNET) -- Major countries and nation-states are engaged in a "Cyber Cold War," amassing cyberweapons, conducting espionage, and testing networks in preparation for using the Internet to conduct war, according to a new report to be released on Tuesday by McAfee.

In particular, countries gearing up for cyberoffensives are the U.S., Israel, Russia, China, and France, the says the report, compiled by former White House Homeland Security adviser Paul Kurtz and based on interviews with more than 20 experts in international relations, national security and Internet security.


Wife caught on tape 'plotting husband's death'
US police have released new hidden camera video of a woman allegedly attempting to hire a police informant to kill her husband.

Dalia Dippolito was arrested in August on a charge of solicitation to commit first-degree murder after Florida police staged an elaborate ruse to convince the 26-year-old her husband Michael was dead.

The new video allegedly shows Dippolito in a car with the informant, who was posing as the hired hit man.

"I'm a lot tougher than what I look," she says in the clip.

"I know you came here and were like oh what a cute little girl or whatever — you know but I'm not."

Dippolito proceeds to show the informant photographs of her husband and discuss a price for the murder.

"You're extremely beautiful," the informant says.

"Thank you but I just need to make sure everything is going to be taken care of," she replies.

Police claim Dippolito gave the informant a down payment of $US1200 ($A1428) so he could buy a handgun.

She also allegedly asked for a time for the hit so that she could get her hair done in Boca Raton to create an alibi.


Doctor Accused Of Planting Hidden Camera Inside Bathroom
NORTH HILLS, N.Y. (WPIX) - A North Hills cardiologist is adamantly denying charges that he spied on female employees with a hidden camera inside his Manhasset office bathroom.

Vincent Pacienza, 54, pleaded not guilty in court Wednesday to one count of second-degree unlawful surveillance, the charge reportedly handed down by a Nassau County grand jury on Oct. 29.

Pacienza was arrested by Nassau County police last June. He was released Wednesday on $2,500 bail.

Nassau County District Attorney Kathleen Rice said Pacienza installed a video camera hidden inside an air purifier inside one of the bathrooms at Manhasset Cardiovascular and Wellness Center. Authorities said Pacienza shut down the employees-only bathroom after the camera was installed, which forced everyone that worked there to use the bathroom equipped with the camera.


Wednesday, November 18, 2009

Army Eyes Missiles Filled With Flying Spy Bots
The Army wants to instantly get eyes in the sky to watch over a potential enemy. But spy drones or satellites or even fighter jets can be too slow to handle the job. The answer: missiles that carry surveillance drones inside.

That’s right. The military wants to shoot off loads of flying, spying robots, using missiles to make for faster surveillance and attack. “ISR (Intelligence, Surveillance and Reconnaissance) platforms delivered from missiles can potentially provide battlefield information that is only seconds old when transmitted from long ranges,” the Army explains in a request for research proposals. “This information is particularly valuable since it is so current. It provides the potential for striking a very mobile enemy before he has time to alter his position.”


RIM security chief sees smartphone attacks on horizon

TORONTO/BOSTON (Reuters) - Hackers could one day turn ordinary smartphones into "rogue" devices to attack major wireless networks, Research In Motion's security chief warned.

Scott Totzke, RIM's vice-president of BlackBerry security, said hackers could use smartphones to target wireless carriers using a technique similar to one used in assaults that slowed Internet traffic in the United States and South Korea in July.

In what's known as a distributed denial of service, or a DDOS attack, criminals use phone signals to order tens of thousands computers to contact a targeted site repeatedly, slowing it or eventually crashing it.

"I think that's an area of concern," Totzke said in an interview this week at the company's headquarters in Waterloo, Ontario.

Totzke said a technique involving data packets might be used to bring down a wireless network, though hackers might accomplish that using a relatively small number of smartphones.


Sunday, November 15, 2009

Court Silences CIA Operative Despite Yellowcake Scandal
Valerie Plame Wilson cannot publicize details of her work as a CIA operative, even though a government official already outed her as an agent in an attempt to discredit her husband, Joseph C. Wilson, a federal appeals court says.

Plame Wilson, who served as chief of the unit responsible for weapons proliferation issues related to Iraq, argued that confidentiality agreements she signed to win her employment more than two decades ago should be nullified. The CIA has prohibited her from discussing her pre-2002 employment in her 2007 memoir, Fair Game: My Life as a Spy, My Betrayal by the White House.

She maintained the confidentiality agreement should be set aside because Vice President Dick Cheney’s chief of staff, I. Lewis Libby, and others leaked to syndicated columnist Robert Novak that she was an agent. Also, as part of a battle to obtain retirement benefits, her 20-year-employment status became part of the congressional record.

Given that she has been revealed as a operative, the First Amendment allows her to sidestep her confidentiality agreement, she argued.


Spy scandal strains diplomatic ties

South American neighbours Chile and Peru are embroiled in a serious diplomatic row following a Peruvian court's arrest order for two Chilean military officers for allegedly spying.

Peru is seeking the extradition of the two Chilean military officers and has opened an official inquiry into the matter.

The two officers were allegedly in league with a Peruvian Air Force officer who has been charged with revealing state secrets, espionage and money laundering.

Peruvian president Alan Garcia cancelled talks with his Chilean counterpart Michelle Bachelet at the APEC summit in Singapore to return to Peru early for a briefing on the scandal.


Saturday, November 14, 2009

Evidence at issue in corporate espionage case involving WYCO employees
There is an expectation of privacy for files stored on a laptop computer but not for files stored on a central office server, a federal magistrate judge ruled Thursday in a case of alleged corporate espionage.

U.S. Magistrate Judge C. Clifford Shirley Jr. found that e-mail messages of defendant Clark Alan Roberts were stored under an expectation of privacy in a case where employees of WYCO Inc. of Greenback are accused of conspiring to steal trade secrets.

Roberts and co-defendant Sean Edward Howley have been charged in a federal indictment of gaining access to the Goodyear Tire and Rubber Co. plant in Topeka, Kan., in May 2007 to steal trade secrets.

Attorneys for both defendants squared off with federal prosecutors Thursday in U.S. District Court in Knoxville over issues related to the admissibility of evidence in the case based on the seldom-prosecuted Economic Espionage Act of 1996.


Thursday, November 12, 2009

Lebanon sentences 4 Israeli spies to death
A Lebanese Military court has sentenced to death four people on charges of spying for Israel and conspiring with the regime to wage a war on the country.

Two of the defendants were tried in absentia because they had reportedly fled to Israel, the Lebanese media reported on Wednesday.

The other two were a staff sergeant in the Lebanese internal security services and his wife.

The four were found guilty of "conspiring with Israel, allowing it to launch an attack against Lebanon and to make contacts with its agents in Lebanon."

Lebanon launched a counter espionage crackdown last spring through which it arrested at least 100 suspects.

According to senior Lebanese security officials the arrests have dealt a severe blow to Israel's spy networks in the country.


Note: "Pray for the Peace of Jerusalem"...JDL

Camera hidden in a tissue box is pretty unsettling

t's official: you can never be sure someone isn't watching you at all times. I mean, just take a look at this tissue box. It looks benign enough. But inside is a camera that takes color footage in the daytime and black and white footage at night, all at a resolution of 720x480 with a framerate of 30fps. It uses SD cards to store footage, and can be programmed to activate automatically at a particular time. In fact, there might be one somewhere in your home right now. Probably not, but there might be.


Four Indicted In $9 Million RBS WorldPay Hack
Four men were indicted on Tuesday for allegedly hacking into Atlanta, Ga.-based payment processor RBS WorldPay and stealing over $9 million from ATMs around the globe.

A federal grand jury returned indictments against Sergei Tsurikov, 25, of Tallinn, Estonia; Viktor Pleshchuk, 28, of St. Petersburg, Russia; Oleg Covelin, 28, of Chisinau, Moldova; and a person identified only as "Hacker 3." A year ago, RBS WorldPay, owned by the Royal Bank of Scotland, was hacked in what Acting U.S. Attorney Sally Quillian Yates described as "perhaps the most sophisticated and organized computer fraud attack ever conducted."

On December 23, 2008, the company announced that on November 10 of that year, it had discovered "its computer system had been improperly accessed by an unauthorized party."


Wednesday, November 11, 2009

Government Will Pay $3 Million in Coffee Table Spying Suit

The U.S. has agreed to pay $3 million to a former government worker who accused officials with the CIA and State Department of spying on him with a bugged coffee table.

Rather than comply with a court order to provide lawyers in the case with what the U.S. government says is classified information, the government has agreed to settle to end the 15-year-old suit.

A close review of the case suggests that the Justice Department may have also decided to pay off the plaintiff in order to quash the series of damaging legal rulings issued by the influential judge overseeing the case that would have forced them to disclose the classified information. Those decisions may have a bearing on the “state secrets privilege” that the Bush and Obama administrations have used to try and thwart a high-profile lawsuit in California over illegal wiretapping conducted in the war on terror.


Tuesday, November 10, 2009

Warning: Industrial Espionage on the rise...

Spies of old with code names and secret handshakes have been replaced with hackers and patent copiers

Companies are being warned by both an industry organisation and the national intelligence agency that industrial spies are ever present.

Jakob Scharf, head of the Danish Security and Intelligence Service (PET), recently warned that industrial espionage has been growing steadily in the last number of years and Danish companies are not impervious to it.

‘The fall of the wall did not lead to a fall in espionage activities – almost the opposite. The activities have changed in nature but spies are still a real threat to Denmark’s safety and competitiveness,’ Scharf told Politiken newspaper.

PET has been working closely with the Confederation of Danish Industry (DI) to help companies protect themselves from the threat of domestic and international spies. Industrial espionage is traditionally handled by the national police. But if the case involves foreign states, then it comes under the control of the counter-espionage unit at PET.

According to Tom Togsverd, head of DI’s IT division, cyber-crime is becoming increasingly problematic.


Every phone call, email and internet click stored by 'state spying' databases

Note: Eavesdropping news from across the pond. Get ready, because it's heading this fact, it's already here! JDL

Every phone call, text message, email and website visit will be stored for a year for monitoring by the state.

All telecoms companies and internet service providers will be required by law to keep a record of every customer's personal communications, showing who they are contacting, when, where and which websites they are visiting.

Despite widespread opposition over Britain's growing surveillance society, 653 public bodies will be given access to the confidential information, including police, local councils, the Financial Services Authority, the Ambulance Service, fire authorities and even prison governors.


App Listens and Records All, Waiting for Twitterable Moment
Careful what you say — that iPhone over there could be a live microphone.

Which is to say there’s a new, free iPhone app called Soundbiter designed to monitor the world’s audio and upload it to Twitter and Facebook with the push of a button.

When running, the Soundbiter app is constantly recording, keeping an audio buffer of a minute or so. Then when you hear a good joke, a fine guitar riff or a politician’s slip-of-the-tongue, you hit the apps’s only button, which saves the last 60 seconds of sound. From there, it’s a cinch to edit, upload, title and publish the sonic snippet to Twitter or Facebook.

Think of it as a way to make an audio version of “Overheard in New York” using an iPhone application.


Monday, November 9, 2009

Micro Digital Audio Recorder
Just when you thought that your digital recorder was as small as possible, the folks at TS-Market Ltd release the A-31 model. This recorder is the smallest among there models. It is 12% smaller than its predecessor, which is the Guinness Book of Records winner!

Being extremely miniature, the recorder supports all the technical characteristics of the Tiny series. The built-in rechargeable battery provides rather big duration of the autonomic work – up to 25 hours (sampling rate -8 k Hz, 18 K bits/sec). Firm, but light, the recorder's metal case is available in three colors: silver, golden and black.

Six series of the Edic-mini Miniature Professional Digital Audio Recorders: Edic-mini, Edic-mini Tiny, Edic-mini Tiny 16, Edic-mini LCD, Edic-mini Pro and Edic-mini Plus. The Edic-mini Tiny series is the Guinness Book of Records winner – the world's smallest professional audio recorders.

Just think about the possible uses for this nifty little eavesdropping device! Coming soon to a boardroom near you....

Sunday, November 8, 2009

Crooks set sights on bank ATMs

Crooks set sights on bank ATMs Stop and look before inserting your card into an ATM machine.

Crooks have been tampering with automated teller machines around the world -- and in Virginia, striking last summer in Hampton Roads and leaving behind 100 victims including those from Richmond and Chesterfield County.

The victims were robbed of about $500,000, according to the Secret Service in Richmond. An investigation is ongoing.

Globally, thieves walk off with billions of dollars of other people's money after skimming ATM card information and then withdrawing cash or going on shopping sprees, law-enforcement agencies say.

Don't let thieves walk away with your hard-earned dollars.

Here's how the con artists operate and what to look for the next time you're ready to use an ATM:


U.S. Agrees to Pay $3 Million to Ex-DEA Agent in 15-Year-Old CIA Spying Case
It took former DEA agent Richard Horn 15 years to finally win his case against the CIA for spying on him, in part because intelligence officials lied about the covert status of one of their operatives. Horn, who was stationed in Burma in the early 1990s, claimed CIA officer and Rangoon station chief Arthur M. Brown conspired with diplomat Franklin Huddle Jr. to plant a listening device in Horn’s residence and relay information back to superiors in Washington. The case was held up in federal court until this week, when U.S. District Court Judge Royce Lamberth approved a settlement that requires the U.S. government to pay Horn $3 million.

Previously, Lamberth ruled the CIA had committed a fraud on the court when it was discovered the agency had lied about Brown’s covert status, which intelligence officials had used to delay the case on grounds it would expose the agent’s identity. It turned out Brown’s secret identity was rolled back six years ago, a fact that was not revealed to the court by the CIA.


Friday, November 6, 2009

The Next Room Eavesdropping Device

Listening in on the neighbors is always way too tempting to resist. If your walls are just a little too thick, you can pick up this handy gadget to help you out. Instead of trying the usual trick of pressing a glass against the wall, you could have an actual gadget do the job. Plus, this is far more portable than carrying around a glass. Although keep in mind, the seller does warn that some countries do actually prohibit the ownership of spy devices. Which makes it seem all the more awesome.

The device has an earphone jack to make it possible to listen. It also has an on/off switch, a volume dial and a built-in rechargeable battery. It will work on doors, windows, steel plates, walls and more. To use it, just press the metal device up against the wall and listen in through your earphones.

Digital Bread Crumbs: Following Your Cell Phone Trail
Jeff Fischbach is a little bit like those guys in The Matrix — when he puts on his shades and looks at the world, he sees data.

Walking down the street in San Francisco, he points out all the devices that record people's comings and goings: digital parking meters, apartment intercom systems, digital security cameras.

"Anything with a computer is going to keep a log," Fischbach says.

Fischbach is a forensic technologist. Lawyers eagerly pay for his ability to extract evidence from everyday devices — he's even checked alibis on kitchen appliances. But when it comes to tracking where people go, he says, the most common source of data is in your pocket.

"Cell phones leave a data trail," he says. "And it's becoming standard for major police departments and the feds to use this data."


Wednesday, November 4, 2009

The Official CIA Manual of Trickery and Deception

Note: Every spy worth there salt should have a copy of this manual! Get yours today before they disappear! JDL

Once a top-secret training manual for CIA field agents in the early Cold War Era of the 1950s, The Official CIA Manual of Trickery and Deception is now available to the general public. An amazing historical artifact, this eye-opening handbook offered step-by-step instructions to covert intelligence operatives in all manner of sleight of hand and trickery designed to thwart the Communist enemy. Part of the Company’s infamous MK-ULTRA—a secret mind-control and chemical interrogation research program—this legendary document, the brainchild of John Mulholland, then America’s most famous magician, was believed lost forever. But thanks to former CIA gadgeteer Bob Wallace and renowned spycraft historian H. Keith Melton, The Official CIA Manual of Trickery and Deception is now available to everyone, spy and civilian alike.


Mossad Hacked Syrian Official’s Computer Before Bombing Mysterious Facility

Agents of Israel’s Mossad intelligence service hacked into the computer of a senior Syrian government official a year before Israel bombed a facility in Syria in 2007, according to Der Spiegel.

The intelligence agents planted a Trojan horse on the official’s computer in late 2006 while he was staying at a hotel in the Kensington district of London, the German newspaper reported Monday in an extensive account of the bombing attack.

The official reportedly left his computer in his hotel room when he went out, making it easy for agents to install the malware that siphoned files from the laptop. The files contained construction plans for the Al Kabir complex in eastern Syria — said to be an illicit nuclear facility — as well as letters and hundreds of detailed photos showing the complex at various stages of construction.


Tuesday, November 3, 2009

Former spy shot dead near Putin's Moscow office

MOSCOW (Reuters) - Gunmen shot dead a former KGB spy turned basketball tycoon in his car Monday a few hundred meters from the Moscow office of Russian Prime Minister Vladimir Putin, officials said.

Shabtai von Kalmanovic, who went on to organize a Michael Jackson concert in Moscow and help two clubs win Europe's top basketball title, died at the scene, the state prosecutor's office said in a statement.

More than 20 shots were fired at Kalmanovic's Mercedes from a silver Lada a few hundred meters from the White House, the seat of Russia's government headquarters, state Russian television channel Vesti reported.

Kalmanovic's driver, who was wounded, gave chase to the attackers but had to abandon it because of his wounds, investigators said.

Kalmanovic spent five years in an Israeli prison for passing secret military technology to the KGB before being released in 1993, state media reported.


Sunday, November 1, 2009

Spy cam Coke can looks just like the real thing

Are there any objects you can trust these days? With cameras and their associated gadgetry getting smaller and smaller, virtually anything can be spying on you at any time. Just look at this spying Coke can, for example.

These fake Coke cans have a tiny camera and DVR built inside, as well as a fake bottom that can be removed to reveal a USB port and on-off switch. They also have a remote control so they can be started and stopped from afar. If this is a camera, what else is hiding spy equipment? Maybe it's best not to think about it.