Monday, December 7, 2015

Google in hot water for allegedly spying on children

Complaint filed for the illegal compiling of data

In what could turn out to be a disaster for Google’s reputation, the company is being accused of collecting the personal data of thousands of schoolchildren. The Electronic Frontier Foundation, known as EFF, has filed a complaint with the Federal Trade Commission (FTC) claiming that Google is illegally compiling data from the Chromebooks and Google Apps for Education (GAGE) products that Google provides to schools.

The Chromebooks and GAFE products Google sends to schools are all part of a suite of cloud-based tools designed to be advertisement free, and a safe place for students to learn while exploring the internet. EFF is claiming that the Chromebooks have a default setting which synchronizes all the preinstalledChrome browsers and allows Google to spy on the children’s actions.

Wednesday, November 25, 2015

Is Your Connected Home Spying on You For Criminals?

The Internet of Things is still at an early adoption stage, but it's already changing the way that we live our lives. 2008 was the year there were more devices online than people. By the year 2019, it's estimated that 1.9 billion devices that connect homes to the Internet will be in place. That's 1.9 billion opportunities for hackers to get into your home.

So What Is The Internet of Things?

Steve Weisman, a professor at Bentley University in Boston and the proprietor of, explains the Internet of Things as any device that's connected to the Internet. "Your fridge can tell you when it needs repairs," he says. "You can raise or lower the heat from afar. It can make a lot of things easier."

"The problem is that when most of these were developed, they didn't build in security," Weisman said, noting that last year, Hewlett-Packard Security Research found that most common "things" on the Internet of Things had security flaws. "90% of them used weak passwords and unencrypted wireless," Weisman added.

Read more:

Did you know that ComSec's residential TSCM services include more than an evaluation of your home for eavesdropping devices? We also include an examination of your computer, your cellphone and your wireless network for security issues. The Internet of Things gives spies an opportunity to penetrate your home privacy in many more ways. Since we incorporate Cyber TSCM into our TSCM services, we have you covered. We provide TSCM solutions that are top rated by our clients because they are thorough and effective. Learn more here:

Image courtesy of Naypong at

Monday, November 23, 2015

FBI Warns of Spies Targeting Medical Researchers

The same week that Jonathan Pollard walked out of a U.S prison after serving 30 years for spying on behalf of Israel, U.S. federal agents, academics and information technology specialists gathered in Houston to discuss this region’s vulnerability to espionage.

When it comes to espionage, it might not seem that foreign governments would target cancer and other medical research, but the FBI is warning that academics and others who work in disciplines that might seem far removed from national security to be on guard.

Foreign governments and their companies _ as well as elements of organized crime _ are known to try and infiltrate academia to steal work that can be reproduced back home without having to spend the time and money the United States has put into research and development.

Read more:

Research labs, pharmaceutical companies, medical device companies, universities, etc. that have access to, or are developing, medical technologies are increasingly at risk for industrial espionage. Cybersecurity is but one element of thoroughly protecting valuable intellectual property. ComSec LLC's cyber counterespionage experts employ a multi-faceted counterespionage approach that includes HUMINT (Human Intelligence), OSINT (Open Source Intelligence) vulnerability assessments, cyber technical surveillance countermeasures (Cyber TSCM) and mobile device forensics. We assess your vulnerabilities to identify human, 
technical and electronic threats. Contact us to learn more about our counterespionage services. 

Image courtesy of KEKO64 at

Friday, November 20, 2015

Police used apparently illegal wiretaps to make hundreds of arrests

RIVERSIDE, Calif. — Prosecutors in the Los Angeles suburb responsible for a huge share of the nation’s wiretaps almost certainly violated federal law when they authorized widespread eavesdropping that police used to make more than 300 arrests and seize millions of dollars in cash and drugs throughout the USA.

The violations could undermine the legality of as many as 738 wiretaps approved in Riverside County, Calif., since the middle of 2013, an investigation by USA TODAY and The Desert Sun, based on interviews and court records, has found. Prosecutors reported that those taps, often conducted by federal drug investigators, intercepted phone calls and text messages by more than 52,000 people. 

Image courtesy of Stuart Miles at

Thursday, November 19, 2015

US Urged to Investigate Alleged Spying Against Chinese Americans

Some Congressional members and Asian American groups are calling on the U.S. Justice Department to investigate what they say is a trend of Asian American scientists being suspected of spying for China.

Temple University physics professor Xi Xiaoxing and Sherry Chen, a hydrologist with the National Weather Service, were accused of spying for China. The government later dropped the cases against them.

At a news conference Tuesday on Capitol Hill, Xi and Chen – both naturalized U.S. citizens – told their stories of being arrested by the FBI in front of coworkers and family members. Both said they are innocent and were unfairly targeted because of their race.

Read more:

Protecting corporate technologies and information from industrial and economic espionage is a necessity. Nation state sponsored corporate espionage is on the rise, and prevention is much more effective than prosecution. Not all who are suspected are guilty. And, it may be extremely difficult to prove spying after the fact.  If you are interested in protecting valuable corporate intellectual property from corporate, economic or industrial espionage, contact us for information about The Assurance Option

Image courtesy of somkku9 at

Wednesday, November 18, 2015

Pa. landlord accused of taping mom, kids

HAZELTON, Pa. — A Pennsylvania landlord who police say used a surveillance camera hidden in a bathroom vanity to record a mother and her two children has been arrested.

Christopher Shenyo, of Sheppton, faces charges including sexual abuse of children and invasion of privacy.

Hazelton police say Shenyo recorded the woman and children showering and using the toilet at their Hazelton rental property.

Forty-year-old Shenyo was arraigned Tuesday and is being held at the Luzerne County Prison because he couldn’t post bail.

Read more:

Yes, cameras and listen devices are still planted in washrooms and bathrooms by voyeurs. They can be hidden in a public restroom, an office washroom, a hotel bathroom and even in rented property bathrooms as in the story above. If you are responsible for security for a restaurant, hotel, business or rental property, you should not overlook the potential for the property to be compromised by hidden cameras. Once privacy is compromised, it can damage to your brand and lead to lawsuits. A physical inspection for hidden cameras, cell phones, and other recording devices in washroom and bathrooms should be conducted on a regular basis. And, if there is suspicion of electronic eavesdropping, call ComSec. Our bug sweep experts detect electronic eavesdropping devices that are well hidden and/or passive until activated. 

Image courtesy of khunaspix at

Tuesday, November 17, 2015

Defense Claims Courthouse Was Illegally Bugged

SAN FRANCISCO — You might want to watch what you say on your way in and out of court.According to court papers filed Friday, federal agents placed secret recording devices in at least three locations around the entrance to the San Mateo County courthouse in Redwood City without first getting judicial approval.

The courthouse bugs were used in 2009 and 2010 to investigate bid-rigging at public foreclosure auctions. Their existence surfaced in a motion from defense lawyers for a group of five real estate investors accused of colluding to deflate prices at the auctions, which were held on the courthouse steps.

Electronic eavesdropping remains a very popular method of obtaining private information. Whether it's in public spaces, a private business or a home, bugging unsuspecting victims happens more often than you might think. And, it's easier to bug someone now than it ever has been. Eavesdropping devices have evolved. They're easy to use, small, inexpensive and the information can be captured without having to retrieve the device. If you're concerned you are the victim of electronic eavesdropping, contact us. We're thorough and effective! 

Image courtesy of JanPietruszka at FreeDigitalPhotos (dot) net 

Vizio slapped with two class-action lawsuits over alleged smart-TV spying

The company stands accused of sharing smart TV owners’ personal information with third parties without their approval.

Vizio, the company best known for its bang-for-buck TVs, is these days in the news for all the wrong reasons owing to some truly troubling data collection practices. And it doesn’t seem as if the controversy is going to blow over in a jiffy. On the contrary, as first reported by Consumer Reports, it has boiled over into court.

While that site only referred to a single lawsuit in its report, turns out the company is facing two different class action complaints. In both the lawsuits—filed two days apart in separate California courts last week—Cognitive Media Networks has been named as a co-defendant alongside the TV maker. Cognitive’s Automatic Content Recognition (ACR) technology is essential to Vizio’s ability to track users’ viewing habits, so much so that it acquired the San Francisco-based company earlier this year and renamed it Inscape Data Services.

Read more: 

Image courtesy of Naypong at FreeDigitalPhotos (dot) net

Friday, November 13, 2015

Protecting Trade Secrets in an Age of Cyber Insecurity

If your company electronically stores or transmits trade secrets, they are at risk. Cybercrime is, after all, its own industry now. The corporate world has entered an age of cyber espionage far beyond unsophisticated phishing emails and run-of-the-mill malware. And a new era of IP-focused data breach litigation is not far behind.

Against that background, this article examines an important tool for understanding the cybersecurity standard that a company will need to meet in a litigation environment, and also for fighting back. It is none other than old-fashioned trade secret law.

Read more:

If you're tasked with protecting corporate intellectual property, it's important to consider CYBER TSCM in your risk management strategy.  Not all IT related threats and breaches can be detected by corporate or supply chain IT professionals. Call us at 1-800-615-0392 to learn more about our CYBER TSCM services!

Image courtesy of jscreationzs at

Thursday, November 12, 2015

Report finds apps regularly 'spy on users'

Apps on Apple and Android smartphones leak lots of users' information to third parties, research has suggested.

Researchers from the Massachusetts Institute of Technology (MIT), Harvard, and Carnegie-Mellon universities studied 110 apps available on Google Play and the Apple App Store.

They found 73% of the Android apps shared users' email addresses, and 47% of the iOS apps shared location data.

Privacy International said it was more evidence of how devices "betray us".

The study, Who Know What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps, tested 55 of the most popular Android apps and the same number of iOS apps.

Read more:

Image courtesy of hywards at

Tuesday, November 10, 2015

Harris showcases Signal Sentry 1000 solution that detects, locates GPS-jamming sources

Image courtesy of 
At the heart of many communications solutions is satellite-based Global Positioning System (GPS) technology, which is used to provide location and timing information that helps automate and simplify multiple complex tasks. If GPS does not function properly, tasks like flying a plane or operating a shipping port become much more difficult, if not impossible.

Given this, the ability to detect GPS jamming and quickly locate the source can be vital to many critical-infrastructure operators. Harris last week exhibited at IACP 2015 in Chicago its Signal Sentry 1000 that provides this information in real time to critical-infrastructure operators, so they can quickly identify the jamming source and take steps to mitigate it, according to Joe Rolli, business development manager for the Harris precision navigation and timing business unit. 

Check Point Security unveils the inner workings of cyber-espionage campaign against CEOs, ministry officials and others

Image courtesy of  YaiSirichai at
The cyber-espionage activities of a group with possible ties to Iranian Revolutionary Guard Corps called Rocket Kitten are being detailed in a new report from Check Point Software Technologies Ltd.

Led by researchers in the software and hardware security company that has an office in San Carlos, the report highlights malware attacks supported by extensive spear phishing campaigns and a list of 1,600 of the group's targets.

Read more:

Friday, November 6, 2015

Old-school espionage is on the rise

Image courtesy of 
Idea go
A pivotal operation in the lead up to D-Day during World War II was a deception plan using dummy airfields and landing craft to mask the actual Allied landing sites. While the tools of modern warfare may have rendered such a ploy seemingly obsolete, 21st century advances such as CCTV, HD satellites and drone technology are actually reviving a new era of classic espionage. 

“There has been a drastic paradigm shift in this regard,” Fred Burton, vice president of Intelligence for Texas-based global intelligence company Stratfor told “The challenges posed by the digital age have led to a return to old-school tradecraft.”

Read more:

What some would consider "old-school" tradecraft is very effective in penetrating an organization and capturing valuable corporate information or technology.  HUMINT, electronic eavesdropping and other non-cybersecurity related espionage methods often require much less technical expertise to accomplish in comparison to hacking a network, installing malware, etc. Bugging devices have become easier to use, inexpensive and the captured information can be collected remotely. The potential rewards for the eavesdropper increase at a much lower risk of being detected during retrieval of the captured information. If you suspect your corporate information is the target of spies, call us to discuss. Economic, industrial and nation-state sponsored espionage are on the rise. We can help you detect it and help you prevent future recurrence with our corporate TSCM services.

Thursday, November 5, 2015

5 times as much Mac malware this year

Image courtesy of Idea Go at

If you're worried about hackers and cybercriminals, but you think you're safe because you've got a Mac, you need to change your thinking fast. Macs are no longer the invulnerable devices they once were.

Years ago, Macs were remarkably safe, compared to Windows PCs. Part of the reason for that is hackers didn't spend much time attacking them because they were relatively unpopular.

That has changed. In fact, Macs are one of the few bright spots in the PC marketplace. While overall PC sales were down 7.7 percent from third quarter last year, according to Gartner, Mac sales were up 1.5 percent, and rank as the No. 4 computer brand. Read more:

Concerned your Mac is infected with malware? ComSec LLC detects malware, spyware and related malicious software on smartphones and computers. The service is included with our comprehensive, flat fee residential TSCM service. Get more information:

Wednesday, November 4, 2015

The Apps That Can Secretly Spy on You Through Your Cellphone

Image courtesy of 
Imagine being tracked through your cellphone without even knowing it.

That’s what one woman says happened to her. She told “GMA” Investigates that her ex-husband installed a spy app on her phone and tracked her, all without her knowledge.

“I don’t know if when I’m sending an email, he’s reading it. Or if I’m making a phone call, if he can hear what I say,” said the woman, who asked not to be named out of fear for her safety.  
Read more:

Concerned your cellphone has a tracking app, malware, spyware or other covert spying software? ComSec LLC offers Cellular Forensic Services that detect these threats to your privacy. Learn more:

Tuesday, November 3, 2015

Espionage is fueling China's development of high-end weapons systems

Image courtesy of
Between its development of fifth-generation fighters and upgraded models of ballistic missiles, China's military is quickly becoming one of the most powerful and technologically advanced armed forces on the planet.

But it isn't happening because of Chinese technological ingenuity — at least not in the usual sense. One of the principal reasons for the country's new wave of hardware, USNI notes, is Beijing's willingness to copy and steal other nations' military technology.

Read more:

Manufacturers of military technologies and defense contractors are targets of nation state sponsored espionage. Espionage can be accomplished by several means, including by electronic eavesdropping. ComSec LLC offers The Assurance Option, which is a contracted, proactive TSCM service plan. If your company develops or handles military or defense related technologies, ComSec's Assurance Option can help you detect electronic eavesdropping aimed at stealing military and defense technologies. Contact us today to learn more!

Friday, October 30, 2015

The NFL Swept The Patriots’ Opposing Locker Room For Bugs

Image courtesy of 
Sira Anamwong 

There’s A Crazy Theory As To Why

Hey, did you know that the Patriots have been accused of cheating once or twice in the past? Well, they have! And it appears that some people around the NFL are not forgetting that anytime soon.

According to the latest reports, the NFL conducted a sweep of the opponent’s locker room prior to the Patriots’ October 25 contest against the New York Jets at Gillette Stadium. Those reports indicate that the primary focus of the search was to find bugs discreetly planted for the purpose of eavesdropping.

The Patriots have never been caught using listening devices in the opposing locker room, but rumors of such have emerged in the past, most recently in Sports Illustrated‘s examination of the Pats’ history of breaking and bending the rules.

Read more:

Electronic eavesdropping happens more often than you might think. Why? It's easier and less expensive than ever. Advances in audio and video surveillance make it easy to hide the devices, and to remotely access the captured information. Many of the devices on the market do not require the eavesdropper to return to the scene of the crime to retrieve the device. The cost and risk are reduced, and the potential reward becomes much more attractive. If you are concerned you are under surveillance, contact ComSec for a bug sweep. Our experts are standing by to help you regain your privacy and peace of mind. 

Wednesday, October 28, 2015

Here’s how the IRS can spy on you

Image courtesy of  adamr at
IRS just became the 13th federal agency known to use this technology.

The Internal Revenue Service has become the thirteenth federal agency known to own Stingray surveillance equipment, the Guardian reports.

Stingray devices are IMSI-catchers, otherwise known as “cell-site stimulators.” Disguised as cellphone towers, they can retrieve metadata and content from cellphones in the area. Nate Wessler, a staff attorney at the American Civil Liberties Union, says: “If the IRS is using it, it shows just how far these devices have spread.”

Invoices show the IRS made payments in 2009 and 2012 to the Harris Corporation, one of the companies that produce the equipment. The 2012 document shows the agency had upgraded its Stingray II to HailStorm, a more advanced version, and spent $6,000 on training.

Read more:

Did you know that IMSI catchers are not only used by government agencies? That's right. The technology is commercially available. And, it has been used to capture corporate and private information. Learn more about it here:

Monday, October 26, 2015

A New Material Promises NSA-Proof Wallpaper

Image courtesy of  twobee at

A Utah company has a new nickel-carbon material that could help the Pentagon fight off some of its most haunting threats.

Your next tinfoil hat won’t be made of tinfoil. A small company called Conductive Composites out of Utah has developed a flexible material — thin and tough enough for wallpaper or woven fabric — that can keep electronic emissions in and electromagnetic pulses out. 

Concerned corporate intellectual property is the target or industrial or economic espionage? ComSec offers eavesdropping detection services to corporations and executives. In economically challenging times, nation state and domestic industrial espionage typically increases. We help you detect electronic espionage, and help you stop leaking valuable corporate information. Visit out web site to learn more about our services.

Wednesday, October 21, 2015

NASA Supervisors Charged in Chinese Spy Case

Image courtesy of stockimages at
Two NASA supervisors were criminally indicted Tuesday under U.S. espionage laws for “willfully violating” national security regulations while allowing a visiting Chinese foreign national to gain “complete and unrestricted access” to the space agency’s Langley Research Center, according to the U.S. Attorneys office for the Eastern District of Virginia.

The indictments of NASA Langley supervisors Glenn A. Woodell and Daniel J. Jobson cap a federal investigation into the two supervisor’s decision to permit Bo Jiang unrestricted access for two years at Langley. Bo Jiang was deported back to China in 2013.

Assistant U.S. Attorney Lisa McKeel filed the indictments against the two NASA supervisors before the U.S. District Court in Newport News, Virginia on October 20. The Daily Caller News Foundation obtained the indictments. Woodell and Jobson’s case will come before a yet-to-be named U.S. District Judge in the next few weeks, according to the U.S. Attorneys office.

Read more:

Monday, October 19, 2015

Victim of state spying? Facebook will tell you

Image courtesy of 

The social network will now explicitly warn users it fears are being targeted by state-sponsored hackers

Facebook will explicitly notify users it believes have been targeted by an attacker suspected of working on behalf of a nation state, the company has announced.

Users whose accounts are targeted or compromised by state-sponsored hackers will now receive a notification upon login, warning them that “we believe your Facebook account and your other online accounts may be the target of attacks from state-sponsored actors”.

The user is then prompted to turn on Facebook’s “login approvals”, a form of two-factor authorisation which texts a login code to the user when they (or anyone else) tries to access the app using their phone.

Read more: 

Friday, October 16, 2015

Researchers figure out how to silently hack Siri and Google voice search

Image courtesy blackzheep of at
Most smartphones can respond to your voice commands, but they might also respond to someone else’s. Researchers from France’s ANSSI information security agency has found a way to make Apple’s Siri and Google voice search respond to commands without talking to them. It happens via radio waves and works up to 16 feet away. This technique can be used to exploit the device in a number of ways.

This clever hack relies upon the headphone jack, which has a microphone input on virtually all modern smartphones. The main limitation of the method developed by ANSSI is that the target device needs to have headphones with a mic plugged into the device. That’s because the electromagnetic waves must use the cord as an antenna to access the mic input. The electrical signals can be made to look like a user’s voice, thus activating Siri or Google.

Read more: 

Wednesday, October 14, 2015

FBI tips for IoT safety: National Cyber Security Awareness Month

Image courtesy of nenetus at
There are more than three billion Internet users across the globe, and in the United States alone, there are over 200 million users who are connected. These staggering stats on connectivity are on the rise, thanks to the Internet of Things (IoT) movement, making more and more everyday objects capable of communicating data to other machines, apps and services.

But there are also downsides to connectivity, especially as things like light bulbs, doorknobs and security systems are controllable via mobile apps and tap into home networks. The increase in internet-connected devices grants more access to personal data and home networks, where hackers can spread malware, steal credit card information and remotely control the devices upon which we rely. As October is National Cyber Security Awareness Month, the FBI is sharing some safety tips to consumers, and highlighting security issues we should all keep in mind. 

Read more:

Concerned your home data network is compromised by IoT devices? ComSec LLC offers comprehensive cyber TSCM services. Our services detect your vulnerabilities. Call us today to schedule service:

Friday, October 9, 2015

Image courtesy of chanpipat at

Webcam hacker used Blackshades malware to spy on his victims

A hacker from Leed has been found guilty of spying on unsuspecting victims for between five and 12 hours each day, seeing everything they did in front of their computer.. The hacker whose name is Stefan Rigo, has been found guilty of voyeurism offenses after he used Blackshades malware to spy on unsuspecting victims via webcam.

According to BBC News, Rigo pleaded guilty back into July to one count of voyeurism and one count of another computer-related offense. The documents filed in the court reveal that Rigo used his ex-girlfriend’s credit card to purchase Blackshades malware, a well known remote access trojan (RAT) that surreptitiously infects users’ computers

Read more:

Concerned your mobile device is compromised? You need ComSec's cellular forensics service. Learn more:  

Tuesday, October 6, 2015

Hacking Wireless Printers With Phones on Drones

ComSec LLC can detect IMSI catchers / WiFi threats. Read a case study here: Contact us if you're concerned about WiFi threats and need service > 1-800-615-0392.

YOU MIGHT THINK that working on a secured floor in a 30-story office tower puts you out of reach of Wi-Fi hackers out to steal your confidential documents.

But researchers in Singapore have demonstrated how attackers using a drone plus a mobile phone could easily intercept documents sent to a seemingly inaccessible Wi-Fi printer. The method they devised is actually intended to help organizations determine cheaply and easily if they have vulnerable open Wi-Fi devices that can be accessed from the sky. But the same technique could also be used by corporate spies intent on economic espionage.

Monday, October 5, 2015

Man pleads guilty to corporate espionage, awaits sentencing

Image courtesy of Idea go at
Nation state sponsored corporate and economic espionage is a real threat to US technology companies operating in the US and abroad. There are certain industries and technologies that are more likely targets of nation state sponsored attacks. If your company suspects you are the target of corporate or economic espionage, call ComSec LLC. Our expert TSCM/Cyber TSCM pros are trained, equipped and effective. We'll help you detect electronic eavesdropping threats and provide valuable information to help protect your corporate information: 

Man pleads guilty to corporate espionage, awaits sentencing

CHARLOTTE, N.C. (AP) - A researcher has pleaded guilty to charges that he stole trade secrets from his government and civilian employers, but his attorneys are hoping to limit the time he serves in prison.

The Charlotte Observer reports ( Xiwen Huang pleaded guilty Friday to one count of stealing trade secrets. Federal prosecutors say the 55-year-old chemical engineer stole proprietary technology and hundreds of pages of documents over the last decade from his government and civilian employers, including a Charlotte company.

Read more:

Monday, September 28, 2015

“Sick, twisted individual:” Landt to spend 12 years in prison for setting up hidden cameras

If you suspect an employee, other insider or an outsider has your business under electronic surveillance, contact ComSec LLC. Our TSCM experts detect eavesdropping devices that can be used to erode your privacy, damage your reputation and steal valuable corporate secrets. Contact us today to discuss your concerns and schedule service, or call us at 1-800-615-0392.

KENOSHA COUNTY -- An Illinois man will spend twelve years in a Wisconsin prison for conspiring to set up hidden cameras in women's locker rooms at Uline and the RecPlex in Pleasant Prairie. Karl Landt was sentenced on Friday, September 18th.

There was anger and there were tears as one victim after another talked of the impact Karl Landt's four-year, hidden camera project has had on them. And not once did he look them in the eye.

"This is once in a lifetime, historic case," said Michael Gravely, prosecutor.

Landt spent four years compiling more than 20,000 hours of pornographic videos to satisfy his sexual fetishes. Many of those videos were recorded by his girlfriend, at his direction, inside women's locker rooms.

"What kind of sick, twisted individual do you have to be to do this to your coworkers?" said one of Landt's victims. Read more:

Image courtesy of Sira Anamwong at

Friday, September 25, 2015

China Is Stealing American Property

Image courtesy of KEKO64 at
If you suspect your company is the target of corporate espionage, contact ComSec LLC. We offer counterespionage services in the US and globally. Learn more here:

On Friday, communist China’s president Xi Jinping will make a state visit to Washington. Presidential candidates, government agencies and special interest groups are clamoring to have their pet issues added to the discussion agenda. Which ones should President Obama choose?

The 2013 report of the prestigious bipartisan Commission on the Theft of American Intellectual Property certainly indicates that Chinese cyber-theft should top the list. It states, “The scale of international theft of American intellectual property (IP) is unprecedented — hundreds of billions of dollars per year, on the order of the size of U.S. exports to Asia,” and concludes, “China is the world’s largest source of IP theft.” The FBI agrees.

At FBI headquarters in July, the head of FBI counterintelligence, Randall Coleman, said there has been a 53 percent increase in the theft of American trade secrets, thefts that have cost hundreds of billions of dollars in the past year. In an FBI survey of 165 private companies, half of them said they were victims of economic espionage or theft of trade secrets — 95 percent of those cases involved individuals associated with the Chinese government.

Read more:

Wednesday, September 23, 2015

Loco-motive for rail worker accused of corporate espionage

Two major Canadian rail companies are set to battle out an espionage claim in court after a worker defected from one organization to the other – allegedly taking confidential and incredibly valuable information with him.

Canadian National Railway Co. claims former employee Greg Shnerer downloaded pricing information, customer contracts and the corporate business plan – only to quit days later, absconding to industry rival Canadian Pacific Railway Ltd.

Read more:

Image courtesy of adamr at

If you are concerned your company is the target of corporate espionage, call ComSec LLC at 1-800-615-0392. ComSec provides electronic eavesdropping detection services in the US and globally for corporation and executive residences. Visit our web site to learn more:

Monday, September 21, 2015

39 iOS Apps Infected, Including WeChat, Affecting Hundreds of Millions of Users

Malware XcodeGhost Infects 39 iOS Apps, Including WeChat, Affecting Hundreds of Millions of Users

Yesterday we posted an analysis report on a novel malware XcodeGhost that modifies Xcode IDE to infect Apple iOS apps. In the report, we mentioned that at least two popular iOS apps were infected. We now believe many more popular iOS apps have been infected, including WeChat, one of the most popular IM applications in the world.

After we posted the report, some security companies like Qihoo 360 scanned popular apps in App Store by code analysis; and some iOS developers analyzed some more apps using crowd-sourcing techniques. Several Internet companies such as Tencent, NetEase, and Jianshu, have made statements on their respective affected products. Read more:

If you are concerned your smartphone or mobile device is infected with viruses, spyware, Trojans, malware and other malicious payloads, contact ComSec for Cellular Forensics Services:

Image courtesy of  KROMKRATHOG at

Tuesday, September 15, 2015

Cisco router break-ins bypass cyber defenses

Image courtesy of watcharakun at
Security researchers say they have uncovered clandestine attacks across three continents on the routers that direct traffic around the Internet, potentially allowing suspected cyberspies to harvest vast amounts of data while going undetected.

In the attacks, a highly sophisticated form of malicious software, dubbed SYNful Knock, has been implanted in routers made by Cisco (CSCO.O), the world's top supplier, U.S. security research firm FireEye (FEYE.O) said on Tuesday.

Routers are attractive to hackers because they operate outside the perimeter of firewalls, anti-virus, behavioral detection software and other security tools that organizations use to safeguard data traffic. Until now, they were considered vulnerable to sustained denial-of-service attacks using barrages of millions of packets of data, but not outright takeover.

Read more:

Concerned your router may be compromised? ComSec's cyber TSCM service includes an inspection of your Wi-Fi and wireless Internet of Things. We can detect issues with your WiFi security that your cybersecurity program cannot detect. Learn more about our cyber TSCM services, or call us at 1-800-615-0392.

Monday, September 14, 2015

Police: Fired officer used drone to spy on neighbors

 Image courtesy of 

A Valdosta, GA police officer was out of a job as of Monday evening after being arrested for reportedly using a drone to eavesdrop on a neighbor.

Officer Howard Kirkland, 53, of Ray City, was fired Monday morning, Valdosta Police Chief Brian Childress confirmed.

He had been on suspension since September 4th. He was arrested at the police department by Lanier County Sheriff's Deputies on September 10th. The sheriff's office had been conducting an investigation for about a week.

Valdosta Police Chief Brian Childress said he waited to release information about the arrest because he didn't want to compromise the investigation.

Read more:

Wednesday, September 9, 2015

ESPN just nuked the Patriots and NFL for Spygate

The latest bombshell from Bristol links the NFL's tough stance on DeflateGate to its fumbling of the Spygate investigation.

It may be hard to believe, but Roger Goodell's seemingly tenuous position as commissioner of the NFL is more secure following his handling of the DeflateGate scandal, according to a bombshell of a story co-written by ESPN's Don Van Natta, Jr. and Seth Wickersham under the Outside the Lines banner. The reason goes all the way back to Spygate, the 2007 New England Patriots videotaping scandal.

Owners and others were disappointed that the NFL did not issue stronger discipline to the Patriots in the wake of the investigation over video taping opposing teams' hand signals. The ESPN report, in talking with owners, executives and others around the league, found that many inside the NFL view Goodell's tough stance on DeflateGate as a "makeup call" for how the league handled the Spygate.

Read more: 

If you are concerned about hidden cameras being used to collect your valuable information, contact ComSec LLC. We detect hidden cameras, other optical devices, audio devices, and other eavesdropping devices that compromise your privacy. Our bug sweeps are thorough and effective at detecting eavesdropping threats. 

Image courtesy of arkorn at

Tuesday, September 8, 2015

Beijing expected to escape US hacking sanctions

Image courtesy of cssanndesign at
Looming sanctions aimed at Chinese interests suspected of stealing and profiting from U.S. trade secrets are unlikely to directly target Beijing, as the White House is expected to go after companies instead of foreign governments.

A series of leaked comments from unnamed White House sources over the past few days has revealed that sanctions against hackers are now in the works. But experts say they won't apply to cyberattacks like the recent hack of the federal Office of Professional Management, which compromised the personal information of millions of workers and is widely considered to be the work of state-backed hackers.

Read more:

If you suspect your company is the victim of corporate espionage by a nation state, foreign company or foreign national, contact ComSec LLC. Our corporate espionage experts are the best in the business. We perform professional bug sweeps, as well as cyber TSCM to detect cyber threats not addressed by your cybersecurity program. Contact us today!

Thursday, September 3, 2015

Researcher gives baby monitors an 'F' in cybersecurity

Image courtesy of David Castillo Dominici at
A new report by a Rapid7 security consultant claims a slew of baby monitors can be hacked – which could offer potential attackers a way to snoop on people’s homes.
A new report claims a wide array of Internet-connected baby monitors do not have basic cybersecurity protections that would prevent outside hackers from accessing video feeds into unsuspecting people’s homes.

The report released Wednesday by Mark Stanislav, a senior security consultant at the information security firm Rapid7 tested baby cameras from eight different manufacturers and gives all but one failing grades. The other monitor’s letter grade wasn’t much better – a “D.”

Read more:

If you are concerned that your home privacy has been compromised by an eavesdropping device, contact ComSec LLC. We detect hidden cameras, bugs, wire taps, and other surreptitious electronic eavesdropping devices. Get more information here:

Thursday, August 27, 2015

Number of phones infected by Dendroid spying app remains unknown

An American student who hoped to sell enough malicious software to infect 450,000 Google Android smartphones pleaded guilty to a law meant to prevent hacking of phones and computers.

But how many phones were actually infected by Carnegie Mellon University student Morgan Culbertson's malicious creation remained a mystery after his court appearance before a federal judge in Pittsburgh, Pennsylvania. Infected phones could be remotely controlled by others and used to spy and secretly take pictures without the phone owner's knowledge, as well as to record calls, intercept text messages and otherwise steal information the owners downloaded on the devices.

Culbertson, 20, of Churchill, Pennsylvania, faces up to 10 years in prison and US$250,000 (NZ$385,000) in fines when he's sentenced December 2. But he'll likely face probation or a short prison term under sentencing guidelines that will take into account his lack of a criminal record.

Read more:

Image courtesy of adamr at

Monday, August 24, 2015

Ashley Madison: Spam, Extortion Begins

Attackers, Investigators Have Begun Using Leaked Data, Experts Warn

Organizations are being warned to beware of now-underway spam campaigns and extortion attacks that may target any of their employees who are current or former users of the pro-adultery Ashley Madison online dating site.

Meanwhile, the attackers behind the data breach of Ashley Madison - tagline: "Life is short, have an affair" - are continuing to follow through on their July threat to release details about many of the site's 37 million members, unless parent company Avid Life Media shuts down three of its sites, which it has declined to do.

Read more:

If you're concerned that your cell phone or mobile device has been compromised, consider ComSec LLC's cellular forensic services. Our service detects viruses, spyware, malware, trojans, and other malicious payloads. Just complete the form, send your payment and phone to us, and we'll quickly return your phone with an extensive report with our findings.  

Your cellphone is your constant companion -- usually no more than 6' from you. If you suspect that it's compromised, you have good reason to suspect your privacy is also compromised. We can help you regain your privacy and peace of mind. Contact us!

Image courtesy of 

Friday, August 21, 2015

Jared Fogle Case - Concealed Cameras Used to Record Visitors

When documents were unsealed in Federal Court in Indianapolis Wednesday, it became clear that the government’s case against former Subway pitchman Jared Fogle was rooted firmly in a parallel investigation of a man named Russell Taylor, the former director of Fogle’s foundation, and according to court documents, his partner in numerous episodes involving sexual images of young children.

“Russell Taylor gave a recorded statement to law enforcement,” the document states. “He admitted that he placed a clock radio containing a hidden camera in a child’s bedroom.” Investigators further stated that Taylor told them that in the past he had placed clocks with concealed cameras in various rooms of the house.

Read more:

Recording devices have been incorporated into seemingly harmless items you would expect to to see in a office or home. For instance, wall clocks, watches, pens, men's ties, buttons, water bottles, etc. are available with embedded recorders (video/audio). The devices are inexpensive and easy for the eavesdropper to use. They compromise your privacy and security, and can be particularly damaging when they are placed in private spaces such as a CEO's office, a corporate apartment, bedroom, bathroom, etc. where there is an expectation of privacy and sensitive information is shared. 

If you are concerned that your company or home are under surveillance, contact ComSec LLC. We provide eavesdropping detection services for corporations, non-profits and individuals. We help restore your privacy and peace of mind. 
Call (800) 615-0392 or click here to submit a contact form.

Image courtesy of Stockimages at

Tuesday, August 18, 2015

Woman Finds Hidden Camera in Starbucks Bathroom in Brea: Police

 Image courtesy of F
(Los Angeles, CA) Brea police on Monday were working to identify the person who hid a small camera in a Starbucks bathroom.

The video recorder, which was about the size of a large pen, was mounted under a shelf in the restroom of the Starbucks located at 101 W. Imperial Highway, the Brea Police Department tweeted on Monday.

According to a news release from the department, a woman was using the restroom when she found the device. She removed the item and alerted police, who were initially unsure if the item was a camera. 

If you're concerned your business or residence has been compromised by illegal eavesdroppers, contact ComSec LLC for a comprehensive TSCM survey. ComSec's TSCM surveys locate hidden cameras, listening devices and other electronic eavesdropping devices. Learn more here: or call 1-800-615-0392.

Monday, August 17, 2015

Special Investigation: Bugged, Tracked, Hacked

Image courtesy of  Pannawat at
It’s impossible to imagine life without smartphones. Everything about our lives can now be contained in the palm of our hand. Personal details, professional contacts, banking details, photos, medical data, it’s all there, so you’d expect your smartphone to be secure. But in this special investigation Ross Coulthart discovers, we are facing the biggest threat to our privacy that the world has ever seen. The sensitive data contained on our phones is in fact open for anyone to see. 

Anyone in the know can bug or track your phone, from anywhere in the world. It’s long been the dirty little secret of international espionage, but now, organized crime, commercial spies and potential terrorists are exploiting this security loophole for their own gain. 

Watch the compelling video demonstrating the huge hole in mobile communications: